Data loss

Results: 1185



#Item
471Knowledge / Computational learning theory / Concept learning / Supervised learning / Statistical inference / Bayesian probability / Loss function / Statistical classification / Data mining / Machine learning / Statistics / Science

Robert Williamson Digitally signed by Robert Williamson DN: cn=Robert Williamson, o=NICTA, ou, email=Bob.Williamson@nicta.

Add to Reading List

Source URL: users.cecs.anu.edu.au

Language: English - Date: 2009-08-08 03:02:47
472Statistical forecasting / Time series analysis / Emergency management / Climate risk / Management / Statistics / Data analysis / Forecasting

Goal of Approach: Reducing loss and damage associated with weather and climate extremes through climate risk management (CRM) initiatives Input provided by: Asian Disaster Preparedness Center (ADPC) Main elements of the

Add to Reading List

Source URL: unfccc.int

Language: English - Date: 2012-08-26 03:33:55
473Financial risk / Financial economics / Business / Financial regulation / Loss given default / Advanced IRB / Exposure at default / Credit risk / Risk-weighted asset / Basel II / Finance / Bank regulation

Data quality questionnaire for QIS 5 - September 2005

Add to Reading List

Source URL: www.bis.org

Language: English - Date: 2005-12-12 06:15:32
474Data transmission / TCP congestion avoidance algorithm / TCP tuning / Transmission Control Protocol / Network congestion / Packet loss / OWD / Throughput / TCP Vegas / Network performance / Computing / Network architecture

Baseline single-flow TCP results for TEACUP v0.4.5 testbed Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 140502A Swinburne University of Technology Melbourne, Australia

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2014-07-09 00:53:49
475Computer security / Computing / Cyberwarfare / Electronic commerce / Business software / Data breach / TRAC / Internet privacy / Data loss / Security / Computer network security / Secure communication

Microsoft Word - VSM_White Paper_F

Add to Reading List

Source URL: infoarmor.com

Language: English - Date: 2014-10-10 15:14:28
476Companies listed on the New York Stock Exchange / Data loss prevention software / HP Enterprise Services / Data classification / Technology / Host Based Security System / McAfee VirusScan / Computer security / McAfee / Computing

Solution Brief HP Data Loss Prevention Services Establish a secure, sustainable information management structure built on McAfee technology

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:45
477Software / Ntop / Netflow / IP Flow Information Export / Packet loss / Traffic flow / FlowMon / System software / Network management / Computing

nBox Netflow NetFlowTM v5/v9/IPFIX Probe nBox is a flow-based network traffic analyser capable of Cisco NetFlowTM data export and analysis. The ability to characterise IP traffic is

Add to Reading List

Source URL: www.ntop.org

Language: English - Date: 2014-05-03 03:06:14
478Network architecture / Computing / Data / Explicit Congestion Notification / Transmission Control Protocol / TCP congestion avoidance algorithm / Packet loss / Congestion window / Fast retransmit / Network performance / Flow control / TCP/IP

ECN Implementations in the NS Simulator Sally Floyd and Kevin Fall Lawrence Berkeley National Laboratory One Cyclotron Road, Berkeley, CA[removed]removed], [removed] December 30, 1998

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 1998-12-30 23:32:47
479Data / Explicit Congestion Notification / Network congestion / TCP global synchronization / Transmission Control Protocol / Packet loss / Random early detection / Throughput / Sliding window protocol / Network performance / Computing / Network architecture

IEEE/ACM TRANSACTIONS ON NETWORKlNG, VOL. 6, NO. 4, AUGUST[removed]Explicit Allocation of Best-Effort Packet Delivery Service David D. Clark, Fellow, IEEE, and Wenjia Fang

Add to Reading List

Source URL: nms.lcs.mit.edu

Language: English - Date: 2002-09-03 07:12:04
480Computer network security / Time to live / Overt channel / Firewall / Channel / Packet loss / Data transmission / Cyberwarfare / Computing / Covert channel / Steganography

An Empirical Evaluation of IP Time To Live Covert Channels Sebastian Zander, Grenville Armitage, Philip Branch {szander,garmitage,pbranch}@swin.edu.au http://caia.swin.edu.au/cv/pbranch

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2010-09-09 01:11:41
UPDATE