Computer network

Results: 31604



#Item
201Security / Prevention / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / National Security Agency

YOUR COUNTRY NEEDS YOU: HERE’S HOW TO ANSWER THE CALL! BRIGADIER GENERAL JOHN ADAMS, US ARMY (RET) & LIEUTENANT COLONEL CHRIS COURTNEY, US ARMY (RET)

Add to Reading List

Source URL: nssp.unm.edu

Language: English - Date: 2012-02-22 13:09:17
202Computing / Spamming / Cyberspace / Cyberwarfare / Computer network security / Multi-agent systems / Botnets / Email spam / MessageLabs / Anti-spam techniques / Festi / Proofpoint /  Inc.

MessageLabs Intelligence: NovemberIntroduction Welcome to the November edition of the MessageLabs Intelligence monthly report. This report provides the latest email threat trends for November 2005 to help in

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:20
203Computing / Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Recreational Software Advisory Council / Self-censorship / Botnet / Malware / Bitstream Cyberbit / Steganography / Censorship

SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-07-18 23:27:59
204Software / Computing / Cybercrime / Web browsers / Embedded Linux / Freeware / Portable software / Phishing / HTTP cookie / Opera / Computer security / Web browsing history

Int. Secure Systems Lab Vienna University of Technology A Practical Attack to De­Anonymize Social  Network Users

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-22 10:36:07
205Cyberinfrastructure / Computing / Network architecture / Computer architecture / Grid computing / E-Science / Worldwide LHC Computing Grid / Internet2 / Open Science Grid Consortium / Italian Grid Infrastructure / D-Grid

About SGTW | Subscribe | Archive | Contact SGTW May 18, 2005 Calendar/Meetings

Add to Reading List

Source URL: www.interactions.org

Language: English - Date: 2005-08-04 15:25:03
206Computing / Software / System software / Computer networking / Middlebox / Hyper-V / Hardware virtualization / Virtual machine / I/O virtualization / Open vSwitch / Packet processing / Virtualization

PerfSight: Performance Diagnosis for Software Dataplanes Wenfei Wu, Keqiang He, Aditya Akella University of Wisconsin-Madison ABSTRACT The advent of network functions virtualization (NFV) means that

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2015-10-29 15:03:47
207Computing / Computer architecture / Computer memory / NCache / Load balancing / ASP.NET / Cache / Moonpig / Session / Scalability / Storage area network

NCache Case Study - Moonpig

Add to Reading List

Source URL: www.alachisoft.com

Language: English - Date: 2016-06-28 11:17:08
208Artificial intelligence / Computer vision / Statistics / Search algorithms / Mathematics / Robot control / Computational neuroscience / Convolutional neural network / Random sample consensus / Nearest neighbor search / K-nearest neighbors algorithm / Recommender system

A Collaborative Filtering Approach to Real-Time Hand Pose Estimation Chiho Choi, Ayan Sinha, Joon Hee Choi, Sujin Jang, Karthik Ramani Purdue University West Lafayette, IN 47907, USA {chihochoi, sinha12, choi240, jang64,

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-12-13 20:51:49
209Engineering / Academia / Science and technology / Algorithm / Mathematical logic / Theoretical computer science / Computer science / Programming language / Artificial neural network / Analysis / Outline of computer science / Shaikh College of Engineering and Technology

COURSES IN ENGLISH AT THE FACULTY OF MATHEMATICS AND COMPUTER SCIENCE UNIVERSITY OF LODZ WINTER SEMESTER

Add to Reading List

Source URL: erasmus.math.uni.lodz.pl

Language: English - Date: 2016-04-13 07:07:15
210Markov models / Machine learning / Artificial intelligence / Learning / Computational linguistics / Speech recognition software / Computer accessibility / Speech recognition / Hidden Markov model / Conditional random field / Language model / Image segmentation

STRUCTURED DISCRIMINATIVE MODELS USING DEEP NEURAL-NETWORK FEATURES R. C. van Dalen, J. Yang, H. Wang, A. Ragni, C. Zhang, M. J. F. Gales Department of Engineering, University of Cambridge, United Kingdom In this paper,

Add to Reading List

Source URL: mi.eng.cam.ac.uk

Language: English - Date: 2016-03-11 05:30:19
UPDATE