Data access

Results: 11696



#Item
561Programming language implementation / Compilers / Computer file formats / Dynamic linker / Dynamic loading / Data types / Library / Linker / Relocation / Portable Executable / Loader / Position-independent code

Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

Add to Reading List

Source URL: grugq.github.io

Language: English - Date: 2015-01-27 19:51:39
562Computer memory / Non-volatile memory / Computer architecture / Solid-state drive / Dynamic random-access memory / Computer data storage / Flash memory / DDR3 SDRAM / Random-access memory / Phase-change memory / Memory controller / Cache

Understanding the Impact of Emerging Non-Volatile Memories on High-Performance, IO-Intensive Computing Adrian M. Caulfield∗ Joel Coburn∗

Add to Reading List

Source URL: mesl.ucsd.edu

Language: English - Date: 2011-04-30 02:39:41
563Data management / Business intelligence / Knowledge representation / Records management / Technical communication / Data / Open data / Telecommunications (Interception and Access) Amendment (Data Retention) Act

TERN Data Provider Deed BACKGROUND The Terrestrial Ecosystem Research Network (TERN) is a collaborative and integrated network of facilities designed to serve ecosystem research across Australia. As an unincorporated

Add to Reading List

Source URL: tern.org.au

Language: English - Date: 2015-10-28 01:50:22
564Hadoop / Parallel computing / Cloud infrastructure / Formal sciences / Apache Software Foundation / Apache Hadoop / Apache Mahout / Cluster analysis / Big data / MapReduce / K-means clustering / Hierarchical clustering

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:41:01
565User interface techniques / Password / Point and click / Outlook.com / Form / Macintosh User Groups / Features of the Opera web browser

Welcome to the DCS User Interface Web Page! Introduction The DCS User Interface Web Page facilitates individual registration as a DCS user. Once registered, users will be granted access to DCS platform and message data.

Add to Reading List

Source URL: dcs4.noaa.gov

Language: English - Date: 2015-10-27 19:27:36
566Data management / Computer memory / Database management systems / Non-volatile memory / Adobe software / Flash memory / In-memory database / Adobe Flash / Cloud computing / Thin client / Database / Online transaction processing

WHITE PAPER All-Flash Arrays Poised for Mainstream Adoption SURVEY FINDS IT PROS CONFIDENT IN THEIR ABILITY TO IMPROVE DATA ACCESS AND INCREASE CUSTOMER SATISFACTION.

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-07-18 16:07:35
567Computer access control / Ajax / OAuth / JSON

SIF xPress Demystified Infrastructure: Preconfigured Data: Flatter, Usages Known Simpler for whom?

Add to Reading List

Source URL: www.sifassociation.org

Language: English - Date: 2015-03-06 10:15:12
568Academic publishing / Open access / Open science / Digital libraries / Data / Data curation / Digital curation / Data sharing / Geobiology / Geographic information system

Optimizing Data Resources for Reuse: Site-Based Data Curation Carole L. Palmer Center for Informatics Research in Science & Scholarship Graduate School of Library & Information Science University of Illinois at Urbana-Ch

Add to Reading List

Source URL: cybergis.illinois.edu

Language: English - Date: 2014-02-12 16:16:27
569Open access / Academic publishing / Scholarly communication / Scientific method / Data publishing / Data sharing / Neuroinformatics / Funding of science / E-Science / Research / Organisation for Economic Co-operation and Development / Research data archiving

POLICY FORUM SCIENCE AND GOVERNMENT Appropriate professional and career reward structures are necessary (20–22). The way scientists are being evaluated and how their careers are shaped are at stake. For example, resear

Add to Reading List

Source URL: www.codata.info

Language: English - Date: 2013-06-25 01:00:00
570National security / Public housing in the United States / United States Department of Housing and Urban Development / Urban planning in the United States / Computer security / HUD

Rules of Behavior for Use of Enterprise Income Verification (EIV) Information (for Individuals without Access to the EIV System) The Department of Housing and Urban Development’s EIV system contains sensitive data obta

Add to Reading List

Source URL: www.hud.gov

Language: English - Date: 2009-09-17 14:29:44
UPDATE