Fragmentation

Results: 1062



#Item
351Landscape ecology / Extinction / Ecological restoration / Conservation biology / Population / Habitat fragmentation / American badger / Metapopulation / Extinction threshold / Environment / Ecology / Biology

Ecological Modelling–430 Simulated effects of habitat loss and fragmentation on a solitary mustelid predator Henriette I. Jager ∗ , Eric A. Carr 1 , Rebecca A. Efroymson Oak Ridge National Laboratory,

Add to Reading List

Source URL: www.esd.ornl.gov

Language: English - Date: 2006-01-11 09:34:47
352Software engineering / Fragmentation / C dynamic memory allocation / Region-based memory management / Free list / New / Garbage collection / Allocator / Reference counting / Memory management / Computing / Computer memory

Improving Python’s Memory Allocator Evan Jones <> http://evanjones.ca/ Abstract Python automatically manages memory using reference counting. In order to provide

Add to Reading List

Source URL: www.evanjones.ca

Language: English
353Data / IP traceback / Denial-of-service attack / IP address spoofing / IP fragmentation attacks / Firewall / Transmission Control Protocol / Ping / Communications protocol / Computer network security / Computing / Network architecture

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-07-15 10:32:33
354Financial crises / Covariance and correlation / Late-2000s financial crisis / Autoregressive conditional heteroskedasticity / Econometrics / Time series analysis / Euro / Credit default swap / Bond / Economics / Statistics / Economic history

Kitty Moloney, Neill Killeen & Oliver Gilvarry1 Economic Letter Series A Fragmentation Indicator for Euro Area Sovereign Bond Markets

Add to Reading List

Source URL: www.centralbank.ie

Language: English - Date: 2015-05-07 06:16:28
355Pharmaceutical sciences / Government Accountability Office / Open government / Technology assessment / Medicare / TRICARE / E-Rate / Food and Drug Administration / United States Environmental Protection Agency / Government / United States Department of Defense / Health

GAO-15-404SP, 2015 Annual Report: Additional Opportunities to Reduce Fragmentation, Overlap, and Duplication and Achieve Other Financial Benefits

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2015-04-14 09:31:06
356Pharmaceutical sciences / Government Accountability Office / Open government / Technology assessment / Medicare / TRICARE / E-Rate / Food and Drug Administration / United States Environmental Protection Agency / Government / United States Department of Defense / Health

GAO-15-404SP, 2015 Annual Report: Additional Opportunities to Reduce Fragmentation, Overlap, and Duplication and Achieve Other Financial Benefits

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-04-14 09:31:06
357C dynamic memory allocation / Slab allocation / Fragmentation / Allocator / Paging / New / Page / Memory pool / Free list / Memory management / Computer memory / Computing

Memory Management in Nix mark IV Francisco J. Ballesteros ABSTRACT Memory management in Nix has been reworked recently to make the system more efficient. This paper reports the changes made to the sys­

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 11:30:40
358Satellite imagery / Lachlan / Counties of New South Wales / Geography / Geographic information system / Landsat program / Cadastre

This thesis investigates the patterns of land holding ownership change, fragmentation and consolidation within the Lachlan Local Government Area (LGA) in central rural NSW, and to determine the vegetative consequences as

Add to Reading List

Source URL: www.geosci.usyd.edu.au

Language: English - Date: 2009-10-15 01:27:55
359System software / Fragmentation / File system / Venti / Computer file / Cache / Files-11 / Hierarchical File System / Disk file systems / Computing / Data management

The Design and Implementation of the Creepy File System and the IX File Protocol Francisco J. Ballesteros Roger Peppe draft:

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:53:18
360Computer network security / Evasion / Metasploit Project / Internet protocol suite / IP fragmentation / Data link layer / Transmission Control Protocol / Internet Protocol / Intrusion detection system evasion techniques / Computing / Cyberwarfare / Computer security

Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
UPDATE