Computer network

Results: 31604



#Item
961Computing / Computer architecture / Business / Operations research / Network performance / Stochastic processes / Association for Computing Machinery / Queueing theory / Microsecond / Load / Null / Rate

programming pearls THE ENVELOPEIS BACK The February 1984 column was about “back-of-theenvelope” calculations. When you’re deciding whether to add a new command to a database system,

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English
962System software / Computer architecture / Software / Network file systems / File system / Server / XFS / Inode / Directory services

Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:33
963Computing / Hypertext Transfer Protocol / Network architecture / Internet privacy / Network protocols / World Wide Web / Computer access control / HTTP cookie / Session / Transmission Control Protocol / Same-origin policy / Session fixation

Network Working Group Kristol Request for Comments: 2109 Technologies Category: Standards Track Montulli

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-11-05 22:20:49
964PlayStation / PlayStation Portable / Stork / European Distance and E-learning Network / Quality Assurance Agency for Higher Education / Computing / Education / Computer hardware

Trusted Identities Cross Border A Look at Stork-Experiences From STORK to STORK 2.0 Architecture and Technical Aspects Stork 2.0 is an EU co-funded project INFSO-ICT-PSP

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2013-03-25 06:53:35
965Graph theory / Mathematics / Combinatorial optimization / Computational complexity theory / Routing algorithms / Search algorithms / Operations research / Matching / A* search algorithm / Flow network

Overlays with preferences: Approximation algorithms for matching with preference lists Giorgos Georgiadis Department of Computer Science and Engineering Chalmers University of Technology SG¨oteborg, Sweden

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-05-18 09:50:44
966Cyberwarfare / Computing / Computer security / Computer network security / National security / Cryptography / Denial-of-service attack / Malware / Threat / Information security / Vulnerability / Antivirus software

Available online at www.postmodernopenings.com e-ISSN: 2069–9387; ISSN–L: 2068–0236 Postmodern Openings 2016, Volume 7, Issue 1, June, pp

Add to Reading List

Source URL: drwho.virtadpt.net

Language: English - Date: 2016-07-04 18:56:05
967Computing / Security / Technology / Cyberwarfare / Cybercrime / National security / E-commerce / Computer network security / Computer security / Microsoft

Die Fakultät für Informatik der Universität Wien lädt Sie in Kooperation mit Microsoft, SBA Research und dem KIRAS-Projekt CERT Komm 2 herzlich ein zum CS-Colloquium Preventing, detecting & responding to cyber-attack

Add to Reading List

Source URL: cs.univie.ac.at

Language: English - Date: 2016-07-18 07:13:48
968Security / Cyberwarfare / Cybercrime / Prevention / Computer network security / Computer security / Cryptography / National security / Medical device / Food and Drug Administration

April 21, 2016 Dr. Suzanne Schwartz Center for Devices and Radiological Health Food and Drug AdministrationNew Hampshire Ave., Bldg. 66, RmSilver Spring, MD

Add to Reading List

Source URL: spqr.eecs.umich.edu

Language: English - Date: 2016-04-23 17:33:37
969Telecommunications engineering / Requirement / Conceptual model / Computer network / User / Computing / Electrical engineering / Engineering

Microsoft Word - IBSKDS full.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:43:11
970Computing / Network architecture / Wireless networking / Transmission Control Protocol / Network packet / Routing / Computer networking / Packet loss / Dynamic Source Routing

Semester Thesis WS06 Multi-Hop Routing for Wireless Sensor Networks David Dominic Landis

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:58
UPDATE