Computer network

Results: 31604



#Item
861Neuroscience / Artificial neural networks / Computational neuroscience / Artificial intelligence / Cybernetics / Computer vision / Convolutional neural network / Image processing / Receptive field / MNIST database / Yann LeCun / Outline of object recognition

20th International Conference on Artificial Neural Networks (ICANN), Thessaloniki, Greece, SeptemberEvaluation of Pooling Operations in Convolutional Architectures for Object Recognition Dominik Scherer, Andreas M

Add to Reading List

Source URL: amueller.github.io

Language: English - Date: 2016-08-04 15:59:56
862Computing / Networking hardware / Computer architecture / Ethernet / Network performance / Low latency / Latency / Remote direct memory access / TCP offload engine / Chelsio Communications / Throughput / Internet protocol suite

T5 High Frequency Trading Report Lowest Latency, Lowest Standard Deviation of Latency, Highest Message Rate Overview Chelsio is the leading provider of network protocol offloading technologies, and Chelsio’s Terminator

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2013-10-01 14:31:42
863Software engineering / Computing / Program optimization / World Wide Web / Artificial neural network / Inline expansion / Computer programming

Analyzing the Power Consumption of the Mobile Page Load ABSTRACT ergy effects of Web enhancements, one needs to repeat the power measurements on each enhancement or combinations thereof using the monitor. Since Web page

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2016-04-18 09:52:03
864Internet privacy / Computing / Computer security / Privacy / Cyberspace / HTTP cookie / Personally identifiable information / Medical privacy / Network Advertising Initiative / P3P

PRIVACY POLICY OF CYEST CORPORATION (PROPRIETARY) LIMITED (“CYEST”) 1. INTRODUCTION Cyest is sensitive to the private nature of information you provide to it as a

Add to Reading List

Source URL: www.cyestcorp.com

Language: English - Date: 2014-08-08 06:00:43
865Statistics / Artificial intelligence / Computer vision / Vision / Computational neuroscience / Regression analysis / Robot control / Econometrics / Convolutional neural network / Deep learning / Local regression / Pose

DeepHand: Robust Hand Pose Estimation by Completing a Matrix Imputed with Deep Features Ayan Sinha∗ Chiho Choi∗ Karthik Ramani

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2016-06-21 21:05:29
866Security / Prevention / Computer security / Safety / Crime prevention / National security / Computer network security / Cryptography / Vulnerability / Information security / San Jose State University / Attack

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:38
867Computing / Graph theory / Fault-tolerant computer systems / Mathematics / Network analysis / Cluster analysis / Data mining / Geostatistics / Hierarchical clustering / Computer cluster / Graph partition / High-availability cluster

CONTIGUITY-CONSTRAINED PARTITIONING OF HETEROGENEOUS URBAN NETWORKS Mohammadreza Saeedmanesh Nikolas Geroliminis May 2016

Add to Reading List

Source URL: www.strc.ch

Language: English - Date: 2016-06-15 12:09:15
868Computer security / Computer network security / Cyberwarfare / Computing / Software testing / OWASP / Application security / Vulnerability / Penetration test / Legacy system / Web application security / HP Application Security Center

Microsoft PowerPoint - SecuringAndModernizingApplicationsForTexasStateAgencies_Content.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:42
869World Wide Web / Cyberwarfare / Internet search engines / Computing / Computer network security / Antivirus software / Rogue software / Bing / Malware / Google Search / Spyware / Search engine optimization

Eine aufwendige AV-TEST-Studie bringt es ans Licht: Obwohl sich Suchmaschinen-betreiber wie Google und Bing viel Mühe geben,

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2013-04-06 11:57:20
870Security / Technology / Computer network security / E-commerce / Computer security / Cryptography / Cyberwarfare / National security / Internet / Internet censorship

Sure WiFi Service Specific Terms and Conditions Sure WiFi SERVICE PRODUCT DESCRIPTION The Sure (Guernsey) Limited WiFi service is an unencrypted, public service allowing users with wireless compatible devices such as la

Add to Reading List

Source URL: web.sure.com

Language: English - Date: 2014-03-12 06:18:44
UPDATE