Data Control

Results: 12347



#Item
411Statistics / Prediction / Statistical theory / Weather forecasting / Statistical forecasting / Bayesian statistics / Estimation theory / Control theory / Data assimilation / Ensemble Kalman filter / Kalman filter / Forecasting

Model error representation in WRF/DART So-Young Ha, Judith Berner, Chris Snyder MMM/NCAR 12th Annual WRF Users’ Workshop (June 21-23, 2011)

Add to Reading List

Source URL: www2.mmm.ucar.edu

Language: English - Date: 2011-07-19 10:49:02
412Safety / Safety engineering / Occupational safety and health / Chemical safety / Health / Industrial hygiene / Toxicology / Safety data sheet / Dangerous goods / Toxic Substances Control Act / Personal protective equipment / Toxicity

SAFETY DATA SHEET 1. Identification Product identifier HyPrene P220N

Add to Reading List

Source URL: msds.ergon.com

Language: English - Date: 2015-01-28 18:40:42
413Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

The Molva - Di Pietro scheme Problems with the identification Design flaws

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-10 03:06:40
414Software engineering / Computer programming / Computing / C / Light-emitting diode / Signage / Data types / Pulse-width modulation / Sizeof / Infinite loop / Foreach loop / Const

Controlling The Real World With Computers ::. Control And Embedded Systems .:: Table Of Contents Previous: Boolean Logic - AND, OR, XOR, NAND, NOR, NXOR Next: Programming Part 3

Add to Reading List

Source URL: learn-c.com

Language: English - Date: 2016-02-02 18:33:30
415Transaction processing / Computing / Data management / Data / Concurrency control / Databases / Commitment ordering / Schedule / Serializability / ACID / Snapshot isolation / Multiversion concurrency control

Analysing Snapshot Isolation Andrea Cerone Alexey Gotsman IMDEA Software Institute

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2016-05-22 15:38:26
416Smart cards / Computing / Answer to reset / Electromagnetism / Smart card application protocol data unit / ISO/IEC / EMV / Longitudinal redundancy check / Card reader / Technology / Control character / ASCII

GB-HA4) Printed on Oct 8, ’99 Data Transmission Specifications 3S4YR-MVFW(DL)-0** Series Hybrid Card Reader/Writer

Add to Reading List

Source URL: secdev.zoller.lu

Language: English - Date: 2009-02-23 10:28:26
417Signal processing / Linear filters / Telecommunications engineering / Sensors / Control theory / Computer data / Robotic sensing / Sensor fusion / Kalman filter / Data fusion / Sensor / Image noise

MATEC Web of Conferences 4 2 , ) DOI: m atecconf0 8  C Owned by the authors, published by EDP Sciences, 2016 Multi-modal mobile sensor data fusion for

Add to Reading List

Source URL: www.matec-conferences.org

Language: English
418Computing / Transaction processing / Data management / Software / Java Transaction API / Enterprise JavaBeans / Concurrency control / Distributed transaction / Microsoft Transaction Server / Two-phase commit protocol / Java Platform /  Enterprise Edition / ACID

A Flexible Framework for Adding Transactions to Components Marek Prochazka INRIA Rhône-Alpes 665, avenue de l’Europe, MontbonnotSaint Ismier Cedex, France

Add to Reading List

Source URL: jotm.objectweb.org

Language: English - Date: 2009-03-13 09:12:38
419Computing / Software engineering / Computer programming / Concurrency control / Transaction processing / Concurrency / Data management / Software bugs / Thread / Race condition / Monitor / Synchronization

Learning from Mistakes — A Comprehensive Study on Real World Concurrency Bug Characteristics Shan Lu, Soyeon Park, Eunsoo Seo and Yuanyuan Zhou Department of Computer Science, University of Illinois at Urbana Champaign

Add to Reading List

Source URL: web1.cs.columbia.edu

Language: English - Date: 2016-01-23 22:11:59
420Computer access control / Cryptography / Automatic identification and data capture / Computer security / Security / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Authentication / Challengeresponse authentication / Password

Microsoft Word - final_revised.doc

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-06-19 05:33:30
UPDATE