Computer configuration

Results: 1629



#Item
1Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst  Department of Computer Science & Engineering

Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst Department of Computer Science & Engineering

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
2Network-wide Configuration Synthesis Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev ETH Z¨ urich  Abstract. Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reacha

Network-wide Configuration Synthesis Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev ETH Z¨ urich Abstract. Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reacha

Add to Reading List

Source URL: www.sri.inf.ethz.ch

Language: English - Date: 2018-05-15 09:28:45
    3Staccato: A Bug Finder for Dynamic Configuration Updates∗ John Toman1 and Dan Grossman2 1  Department of Computer Science & Engineering

    Staccato: A Bug Finder for Dynamic Configuration Updates∗ John Toman1 and Dan Grossman2 1 Department of Computer Science & Engineering

    Add to Reading List

    Source URL: drops.dagstuhl.de

    - Date: 2016-07-18 08:06:46
      4Build and Maintain a Secure Network and Systems Requirement 1: Install and maintain a firewall configuration to protect cardholder data Firewalls are devices that control computer traffic allowed between an entity’s ne

      Build and Maintain a Secure Network and Systems Requirement 1: Install and maintain a firewall configuration to protect cardholder data Firewalls are devices that control computer traffic allowed between an entity’s ne

      Add to Reading List

      Source URL: examples.complianceforge.com

      - Date: 2016-07-28 21:18:26
        5Status Report on Software Configuration Management Impact Study Alexander L. Wolf Department of Computer Science University of Colorado at Boulder

        Status Report on Software Configuration Management Impact Study Alexander L. Wolf Department of Computer Science University of Colorado at Boulder

        Add to Reading List

        Source URL: www.sigsoft.org

        - Date: 2014-01-11 14:39:08
          6Ocasta: Clustering Configuration Settings For Error Recovery Zhen Huang David Lie Department of Electrical and Computer Engineering University of Toronto Abstract—Effective machine-aided diagnosis and repair of

          Ocasta: Clustering Configuration Settings For Error Recovery Zhen Huang David Lie Department of Electrical and Computer Engineering University of Toronto Abstract—Effective machine-aided diagnosis and repair of

          Add to Reading List

          Source URL: www.eecg.toronto.edu

          - Date: 2014-05-03 15:50:16
            7DOI LEARN MIMIMUM WORKSTATION CONFIGURATION AND IE BROWSER SETTINGS Before You Access DOI LEARN The steps for changing your browser settings should be used on every computer that you intend to use to access DOI LEARN. Be

            DOI LEARN MIMIMUM WORKSTATION CONFIGURATION AND IE BROWSER SETTINGS Before You Access DOI LEARN The steps for changing your browser settings should be used on every computer that you intend to use to access DOI LEARN. Be

            Add to Reading List

            Source URL: www2.usgs.gov

            - Date: 2010-07-29 09:48:53
              8AutoBash: Improving configuration management with operating system causality analysis Ya-Yunn Su, Mona Attariyan, and Jason Flinn Department of Electrical Engineering and Computer Science University of Michigan

              AutoBash: Improving configuration management with operating system causality analysis Ya-Yunn Su, Mona Attariyan, and Jason Flinn Department of Electrical Engineering and Computer Science University of Michigan

              Add to Reading List

              Source URL: www.sosp2007.org

              - Date: 2016-06-15 13:09:51
                9Tutorial City Highlights by Sjaak Bosman - Rotterdam, The Netherlands –  - © 2016  Tutorial City Highlights Content 1.

                Tutorial City Highlights by Sjaak Bosman - Rotterdam, The Netherlands – - © 2016 Tutorial City Highlights Content 1.

                Add to Reading List

                Source URL: teach.appinventor.mit.edu

                Language: English - Date: 2016-07-14 03:12:05
                10CIS CONFIGURATION ASSESSMENT TOOL (CIS-CAT) Description CIS-CAT is a configuration assessment/audit software tool available to CIS Security Benchmarks Members. Written in Java, CIS-CAT: (a) reads those CIS Security Bench

                CIS CONFIGURATION ASSESSMENT TOOL (CIS-CAT) Description CIS-CAT is a configuration assessment/audit software tool available to CIS Security Benchmarks Members. Written in Java, CIS-CAT: (a) reads those CIS Security Bench

                Add to Reading List

                Source URL: benchmarks.cisecurity.org

                Language: English - Date: 2016-07-18 18:05:36