Computer network

Results: 31604



#Item
681Concurrent computing / Computing / Parallel computing / Computer cluster / Job scheduler / Scheduling / Distributed computing / Cluster manager / SPMD / Grid computing / TORQUE / Data-intensive computing

Exploring the Relationship Between Parallel Application Run-Time Variability and Network Performance in Clusters Jeffrey J. Evans Department of Electrical and Computer Engineering Technology Purdue University

Add to Reading List

Source URL: wgropp.cs.illinois.edu

Language: English - Date: 2016-08-16 11:52:12
682Spamming / Computing / Cyberspace / Social engineering / Spam filtering / Cybercrime / Computer security / Computer network security / Cloudmark / Phishing / Email spam / Anti-spam techniques

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks Spear phishing is one of the top threats plaguing enterprises today, often resulting in severe financial losses and theft of intellectual property.

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2016-01-11 19:00:03
683Education / Educational psychology / Learning / Crime prevention / Exercise / Mathematics education / Educational technology / Active learning / Testbed / Computer security

Teaching Security With Network Testbeds Jelena Mirkovic, Mike Ryan and John Hickey (USC/ISI) Keith Sklower (UC Berkeley) Peter Reiher and Peter A. H. Peterson (UC Los Angeles) B. Hoon Kang (George Mason University) Mooi

Add to Reading List

Source URL: edusigcomm.info.ucl.ac.be

Language: English - Date: 2011-03-11 22:12:23
684Information technology management / Computing / Computer security / Data mining / Data security / Information technology / Anomaly detection / Data analysis / Intrusion detection system / Network monitoring / Anomaly / Server

Anomaly detection from server log data. A case study

Add to Reading List

Source URL: www.vtt.fi

Language: English - Date: 2015-03-18 09:57:49
685Computational neuroscience / Cybernetics / Technology / Applied mathematics / Artificial neural networks / Childhood / Computer vision / Convolutional neural network / Toddler / Deep learning / Outline of object recognition / Visual learning

Active Viewing in Toddlers Facilitates Visual Object Learning: An Egocentric Vision Approach Sven Bambach, David J. Crandall, Linda B. Smith†, Chen Yu† {sbambach, djcran, smith4, chenyu}@indiana.edu School of Informa

Add to Reading List

Source URL: vision.soic.indiana.edu

Language: English - Date: 2016-06-26 10:26:39
686Electrical engineering / Synchronization / Clock signal / Clock skew / Computing / Computer programming / Clock synchronization / Heap / Flow network / Distributed computing

Tight Bounds for Clock Synchronization [Extended Abstract] ∗ Christoph Lenzen

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:15:58
687Computing / Cyberwarfare / Computer security / Computer network security / SQL / Hacking / Software testing / Web applications / SQL injection / Vulnerability / Web application security / Code injection

Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

Add to Reading List

Source URL: worldcomp-proceedings.com

Language: English - Date: 2014-05-28 12:08:56
688Computing / Computer hardware / Computer data storage / Data management / Non-volatile memory / Converged storage / Hybrid array / Flash memory / Storage area network / USB flash drive / NetApp / SolidFire

A SolidFire Insight Why Is All-Flash Adoption Growing So Fast? This article was originally published on TechTarget (searchsolidstatestorage.techtarget.com) and authored

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-07-18 16:16:15
689Mathematics / Graph theory / Network theory / Theoretical computer science / Computational learning theory / Dimension / Statistical classification / VC dimension / Centrality / Sampling / Statistics / Mode

Sampling-based Data Mining Algorithms: Modern Techniques and Case Studies Matteo Riondato Brown University, Providence, RI 02912, USA Abstract. Sampling a dataset for faster analysis and looking at it

Add to Reading List

Source URL: matteo.rionda.to

Language: English - Date: 2016-07-30 12:22:15
690Computer network security / Security / Computing / Cyberwarfare / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Software-defined protection / Wireless security

Parapet_Service_Overview_20020522.doc

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2008-12-09 00:36:52
UPDATE