Computer network

Results: 31604



#Item
671Knowledge representation / Infographics / Graph drawing / Tree / Diagram / Social network analysis / Topology / Physics / Computing / Information science

Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation Bahador Saket, Paolo Simonetto, Stephen Kobourov and Katy Borner Computer Science Department, University of Arizona Department of Information and Library Scien

Add to Reading List

Source URL: cns.iu.edu

Language: English - Date: 2014-07-25 15:24:08
672Computing / Computer networking / Data management / Network architecture / Cloud storage / Data center / Distributed data storage / Software-defined networking / Cloud computing / Computer security / Application Defined Network

Research Statement for Theophilus Benson The average enterprise network operator is responsible for managing a network that secures $5 billion worth of intellectual property (McAfeeand whose poor performance can r

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2014-03-19 22:40:33
673Software / Computing / System software / Remote desktop / Computer network security / OpenConnect / Citrix Systems / Software deployment

WorkiQ resource requirements Document overview The purpose of this document is to provide a reasonable estimation of resources required for a new deployment of OpenConnect’s WorkiQ® solution. Implementation resources

Add to Reading List

Source URL: www.oc.com

Language: English - Date: 2016-06-02 15:50:09
674Computer security / Data security / Security / Prevention / Computer network security

Criteria Common to All [Security, Availability, Processing Integrity, and Confidentiality] Principles CC1.0 CC2.0

Add to Reading List

Source URL: www.aicpa.org

Language: English
675Computing / Technology / American brands / Videotelephony / Computer network security / Cisco Systems / Deep packet inspection / Wireless networking / Virtual private network / Wi-Fi / Bring your own device / Cisco Prime

Five Critical Considerations for Network Access Deploy and Manage Your LAN and Mobile Devices with Cisco ONE™ for Access

Add to Reading List

Source URL: webobjects.cdw.com

Language: English - Date: 2016-04-06 10:58:57
676Visualization / Software / Computational science / Computer graphics / Infographics / Application software / Communication design / Cybernetics / Network science / VisIt / Scientific visualization / Big data

Brief Bio and (PR)2: Problems & Pitches – Rants & Raves by Stephen Uzzo Current research interests include network science and ecosystems ecology, scientific visualization, cybernetics and epistemology. As Director, T

Add to Reading List

Source URL: vw.slis.indiana.edu

Language: English - Date: 2008-03-31 13:53:06
677Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Language: English - Date: 2011-01-17 04:39:11
678Cyberwarfare / Security / Computer security / Cybercrime / Computer network security / Secure communication / Cyber-security regulation / Michigan Cyber Range

OFFICE OF THE GOVERNOR October 2015 National Cyber Security Awareness Technology plays a vital role in our daily lives – California’s citizens,

Add to Reading List

Source URL: cio.ca.gov

Language: English - Date: 2015-10-22 12:53:02
679Computing / Security / Information technology management / Computer network security / Computer security / Crime prevention / Cryptography / National security / Information security / Security appliance / Intrusion detection system / Firewall

Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

Add to Reading List

Source URL: esd.ny.gov

Language: English - Date: 2016-04-19 12:12:44
680Artificial intelligence / Computational neuroscience / Vision / Cybernetics / Artificial neural networks / Computer vision / Convolutional neural network / Deep learning / Outline of object recognition / One-shot learning / ImageNet / Cross-validation

Robust Single-View Instance Recognition David Held, Sebastian Thrun, Silvio Savarese Abstract— Some robots must repeatedly interact with a fixed set of objects in their environment. To operate correctly, it is helpful

Add to Reading List

Source URL: cvgl.stanford.edu

Language: English - Date: 2016-04-30 19:03:42
UPDATE