Computer network

Results: 31604



#Item
291Computing / Computer security / Software engineering / Computer network security / Cyberwarfare / Data security / Firewall / Network management / Trusted Information Systems / APL / Guard / Malware

Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2010-05-14 09:24:10
292Computing / Network management / Information technology management / Computer network security / Local area networks / Virtual LAN / Load balancing / Ixia / Firewall / Data monitoring switch / Net Optics

DATA SHEET IXIA XSTREAM 10 TM AGGREGATION, FILTERING, AND

Add to Reading List

Source URL: www.ixiacom.com

Language: English - Date: 2016-07-25 19:36:58
293Computing / Computer architecture / Microsoft Windows / Network access / Wireless access point / Windows XP / Wireless router / Home network / Control Panel / Internet Connection Sharing / Windows Server / Wireless network interface controller

Microsoft Word - XPe_Wireless_Hot_Spot_V3.docx

Add to Reading List

Source URL: www.seanliming.com

Language: English - Date: 2015-12-17 11:41:48
294File sharing networks / Computing / Software / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Gnutella / Distributed hash table / Kademlia / BitTorrent

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:16
295Artificial intelligence / Computer vision / Feature detection / Image processing / Vision / Artificial intelligence applications / Image segmentation / Market segmentation / Hough transform / Optical character recognition / Feature extraction / Binary image

CHARACTER SEGMENTATION FOR HANDWRITTEN BANGLA WORDS USING ARTIFICIAL NEURAL NETWORK T. K. Bhowmik # , A. Roy * and U. Roy * # IBM Global Services Pvt Ltd, Embassy Golf Link, Bangalore, INDIA.

Add to Reading List

Source URL: www.dsi.unifi.it

Language: English - Date: 2009-12-17 04:49:48
296Graph theory / Mathematics / Network flow / Computer vision / Image segmentation / Search algorithms / Edsger W. Dijkstra / Graph cuts in computer vision / Maximum flow problem / Watershed / Flow network / Pushrelabel maximum flow algorithm

usinggraphcuts_in_gpus_for_color_based_human_skin_segmentation_revision

Add to Reading List

Source URL: www.gcg.ufjf.br

Language: English - Date: 2016-07-25 19:25:40
297Computing / Computer access control / Software / Form / HTML / World Wide Web / Login / Network architecture

Tech Center Guide for the Requester 1. To login, go to https://techcenter.armstrong.edu/. Enter your Port login information and select “Login”. Example Port Username: Students: la1234 (first name initial, last

Add to Reading List

Source URL: www.armstrong.edu

Language: English - Date: 2015-07-08 15:23:05
298Security / Cybercrime / National security / Prevention / Cyberwarfare / Computer network security / Computer security / Cryptography

DEPARTMENT OF CIVILIAN PERSONNEL MANAGEMENT SERVICE 1400 KEY BOULEVARD ARLINGTON, VA 22209·

Add to Reading List

Source URL: cpol.army.mil

Language: English - Date: 2016-07-05 14:56:37
299Cybercrime / Security / Computing / Cyberwarfare / Computer network security / Spamming / Chess strategy / Phishing / SHA-1 / Email / Pawn / Computer security

A Trend Micro Research Paper Operation Pawn Storm Using Decoys to Evade Detection Loucif Kharouni

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-10-26 23:30:05
UPDATE