Computer network

Results: 31604



#Item
691Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
692Computing / Computer networking / Technology / Named data networking / Content centric networking / Router / Computer network / Content delivery network / Internet / Communications protocol / Forwarding plane / Provisioning

Future Internet Service Provisioning in Content-Centric Networking Challenges, Opportunities, and Promising Directions

Add to Reading List

Source URL: www.infosys.tuwien.ac.at

Language: English - Date: 2016-03-14 08:57:23
693Computer graphics / Image processing / Gray level size zone matrix / Image texture / Texture / Matrix / Image segmentation / Scientific method / Chemistry / Learning

ADVANCED STATISTICAL MATRICES FOR TEXTURE CHARACTERIZATION: APPLICATION TO DNA CHROMATIN AND MICROTUBULE NETWORK CLASSIFICATION Guillaume Thibault, Jes´us Angulo, Fernand Meyer CMM-Centre de Morphologie Math´ematique,

Add to Reading List

Source URL: thibault.biz

Language: English - Date: 2013-11-11 13:31:24
694Emerging technologies / Network architecture / Computing / Network function virtualization / Computer architecture / Technology / Wind River Systems / Cloud computing / Software-defined networking / Brocade Communications Systems / 6WIND

TITANIUM CLOUD BROCADE AND WIND RIVER Brocade and Wind River NFV Solutions Deliver Carrier Grade Reliability and

Add to Reading List

Source URL: www.wrs.com

Language: English - Date: 2016-08-16 04:00:33
695Wireless networking / Wireless / Synthetic aperture radar / Sensors / Technology / Computing / Computer networking / Sensor node / Wireless sensor network / Unattended ground sensor / Security alarm

iScout® i S co u t ® D E S I G N iScout® sensors were designed to produce exceptional performance while keeping size and cost

Add to Reading List

Source URL: www.mcqinc.com

Language: English - Date: 2015-11-23 09:29:36
696Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Vulnerability / Authorization / Computing

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Employees Adopted: May 24, 2002 ______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 13:56:00
697Safety / Prevention / Medicine / Identity documents / Health informatics / Computer network security / Bracelets / Fashion / Wristband / Medical identification tag / Medical alarm / Artificial cardiac pacemaker

Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices Tamara Denning† , Alan Borning† , Batya Friedman‡ , Brian T. Gill∗ , Tadayoshi Kohno† , a

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:00
698Computer security / Computer network security / Cyberwarfare / Security / Computer access control / Ambient intelligence / Internet of things / OWASP / Authentication / Cross-site scripting / Internet

Internet of ThingsTop Ten

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-08-17 12:09:42
699Government / Security / Cybercrime / Cyberwarfare / National security / Computer network security / Computer security / Cryptography / Cyber / United States Department of Homeland Security

I 114TH CONGRESS 2D SESSION H. R. 5064

Add to Reading List

Source URL: docs.house.gov

Language: English
700Statistics / Applied mathematics / Image processing / Feature detection / Computational neuroscience / Artificial neural network / Mathematical psychology / Expectationmaximization algorithm / Density estimation / Gabor filter / Machine learning / Sepp Hochreiter

Learning Quadratic Forms by Density Estimation and its Applications to Image Coding Hauke Bartsch, Sepp Hochreiter and Klaus Obermayer Dept. of Computer Science, Technische Universit¨ at Berlin, Germany,

Add to Reading List

Source URL: www.bioinf.jku.at

Language: English - Date: 2006-05-15 05:02:22
UPDATE