Emulation

Results: 543



#Item
371Remote desktop / Remote administration software / Virtual Network Computing / X Window System / Remote desktop software / RFB protocol / QEMU / Remote administration / Remote Desktop Protocol / Software / System software / Computing

Challenges of Remote Access to Emulation of Original Environments Functional Longterm Archiving Group Albert-Ludwigs University Freiburg Hermann-Herder Str[removed]Freiburg i. B., Germany

Add to Reading List

Source URL: digitalpreservationchallenges.files.wordpress.com

Language: English - Date: 2013-09-03 11:10:14
372Museology / Digital libraries / Science / Digital preservation / Web archiving / Internet Archive / Emulator / File format / UVC-based preservation / Archival science / Library science / Preservation

LONG-TERM PRESERVATION OF WEB ARCHIVES – EXPERIMENTING WITH EMULATION AND MIGRATION METHODOLOGIES IIPC PROJECT TO EVALUATE EMULATION AND MIGRATION AS LONG-TERM PRESERVATION SOLUTIONS FOR WEB ARCHIVES.

Add to Reading List

Source URL: netpreserve.org

Language: English - Date: 2014-03-10 15:09:52
373Preservation / Emulator / Digital preservation / OS/2 / Mac OS / Hardware emulation / UVC-based preservation / High-level emulation / Software / System software / Computing

Migration of Complex Original Environments – Verification and Quality Assurance Challenges Functional Longterm Archiving Group Albert-Ludwigs University Freiburg Hermann-Herder Str[removed]Freiburg i. B., Germany

Add to Reading List

Source URL: digitalpreservationchallenges.files.wordpress.com

Language: English - Date: 2013-09-03 11:10:08
374Telecommunications engineering / Latency / Computer networking / Jitter / Network emulation / Router / Computer network / Packet Processing / Ethernet / Computing / Electronics / Network architecture

Micro-Time-Scale Network Measurements and Harmonic Effects Mark Carson and Darrin Santay National Institute of Standards and Technology (NIST) [removed], [removed]

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-02-03 16:25:16
375LaTeX / Digital typography / OML / CountryLink XPT / TeX / Application software / Computing / Typography

The rawfonts package Alan Jeffrey v0.01 Overview The rawfonts LATEX 2ε package is used to provide emulation of LATEX 2.09 documents which used low-level commands such as \tenrm. If you say:

Add to Reading List

Source URL: ctan.math.utah.edu

Language: English - Date: 2014-10-30 12:02:58
376

Kapitel 8.4 Emulation nestor Handbuch: Eine kleine Enzyklopädie der digitalen Langzeitarchivierung hg. v. H. Neuroth, A. Oßwald, R. Scheffel, S. Strathmann, M. Jehn im Rahmen des Projektes: nestor – Kompetenznetzwer

Add to Reading List

Source URL: nestor.sub.uni-goettingen.de

Language: German - Date: 2009-08-28 07:31:38
    377Conservation / Habitats / Forests / Logging / Old-growth forest / Forest / Forestry / Environment / Systems ecology

    Canadian Institute of Forestry/Institut forestier du Canada “Voice of Forest Practitioners” Position Statement Emulation of Natural Disturbance Patterns as a Model

    Add to Reading List

    Source URL: www.cif-ifc.org

    Language: English - Date: 2014-08-12 15:09:37
    378LaTeX / Digital typography / OML / CountryLink XPT / TeX / Application software / Computing / Typography

    The rawfonts package Alan Jeffrey v0.01 Overview The rawfonts LATEX 2ε package is used to provide emulation of LATEX 2.09 documents which used low-level commands such as \tenrm. If you say:

    Add to Reading List

    Source URL: ctan.mirrorcatalogs.com

    Language: English - Date: 2014-10-30 12:02:58
    379Psychology / Cognition / Animal cognition / Emulation / Imitation / Motivation / Developmental psychology / Social learning theory / Behavior / Mind

    Imitation of Directed Motion Events Running Header: Imitation of Directed Motion Events

    Add to Reading List

    Source URL: faculty.psy.ohio-state.edu

    Language: English - Date: 2010-11-02 08:53:53
    380Computer security / Cyberwarfare / Iptables / Netfilter / Firewall / Snort / Denial-of-service attack / System software / Software / Computer network security

    fire_03.book Page 173 Monday, August 27, 2007 3:54 PM 10 DEPLOYING FWSNORT With the theoretical discussion in Chapter 9 on the emulation of Snort rule options

    Add to Reading List

    Source URL: www.tinker.tv

    Language: English - Date: 2012-02-08 15:24:21
    UPDATE