Granular computing

Results: 33



#Item
21Radio-frequency identification / Ubiquitous computing / Wireless / Human–computer interaction / Label / Online shopping / Automatic identification and data capture / Technology / Privacy

Your need for the right “information at the right time becomes more granular, so apparel

Add to Reading List

Source URL: www.gs1au.org

Language: English - Date: 2012-10-02 04:28:07
22Computing / AGDLP / Software / Filesystem permissions / Group / System software

Advanced Security Feature The Advanced Security add-on for Sentinel Visualizer allows a System Administrator to define Users and Groups and control their read, edit, and delete permissions at a granular level. Topics can

Add to Reading List

Source URL: www.fmsasg.com

Language: English - Date: 2014-03-21 23:19:39
23Scrolling / Granular synthesis / Scroll wheel / HTML5 Audio / JavaScript / Audio timescale-pitch modification / Framing / User interface / Representational state transfer / Computing / User interface techniques / Software

Scrolling Through Sound Scrolling as a method of interaction with audio on the web Ehsan Ziya Independent Researcher London, UK

Add to Reading List

Source URL: wac.ircam.fr

Language: English - Date: 2015-01-20 12:36:51
24Anti-spam / Computer-mediated communication / Internet / Anti-spam techniques / ID-based encryption / Content filtering / Proofpoint /  Inc. / Spam filtering / Email / Computing

» GROUP TEST l Email security There’s been a lot of convergence in email security and content management tools. Look for the granular differences, says Nathan Ouellette. T

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-03-17 20:00:10
25OSI protocols / Simple Mail Transfer Protocol / Extended SMTP / Bounce address / MIME / Anti-spam techniques / SMTP Authentication / Email / Computer-mediated communication / Computing

Application Inspection and Control for SMTP The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be configured to inspect packets on a granular level so that malicious network a

Add to Reading List

Source URL: www.cisco.com

Language: English
26Biology / Science / Computing / Auditory display / International Community for Auditory Display / Caenorhabditis elegans / Acoustics / Granular synthesis / Caenorhabditis / Multimodal interaction / Display technology / Sonification

C. ELEGANS MEETS DATA SONIFICATION: CAN WE HEAR ITS ELEGANT MOVEMENT? Hiroko Terasawa1, Yuta Takahashi1, Keiko Hirota1, Takayuki Hamano2, Takeshi Yamada1, Akiyoshi Fukamizu1, Shoji Makino1 Life Science Center of TARA, Un

Add to Reading List

Source URL: slis.tsukuba.ac.jp

Language: English - Date: 2014-07-03 02:27:22
27Cloud applications / Web 2.0 / Google Apps / Password / Google / Single sign-on / Password fatigue / Google Voice / Computing / World Wide Web / Centralized computing

The White pages for Google Apps and more CloudPages is a powerful user search and self-service tool for Google Apps that provides granular management for an

Add to Reading List

Source URL: www.cloudsolutions.co.uk

Language: English - Date: 2014-02-07 05:41:45
28Cloud applications / Web 2.0 / Google Apps / Password / Google / Single sign-on / Password fatigue / Google Voice / Computing / World Wide Web / Centralized computing

The White pages for Google Apps and more CloudPages is a powerful user search and self-service tool for Google Apps that provides granular management for an

Add to Reading List

Source URL: www.cloudsolutions.co.uk

Language: English - Date: 2014-03-06 16:56:22
29Markup languages / XML / Technical communication / XACML / XPath / Security Assertion Markup Language / Computing / OSI protocols / Web standards

XACML Policy Proposal The current syntax for policy in XACL is oriented around the 3-tuple {subject, object, action}. The subject primitive allows user IDs, groups, and/or role names. The object primitive allows granular

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-06-23 07:02:08
30System software / Backup Exec / Backup / Symantec / HP Data Protector / GRBackPro / Backup software / Computing / Software

How to Search for and Recover a Granular Object with Backup Exec™ 2014 Solution Overview: Backup and Disaster Recovery Introduction Backup Exec granular recovery technology is one of the features that set Backup Exec a

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2014-05-12 20:36:20
UPDATE