Information flow

Results: 2315



#Item
121Computing / Software / System software / Network management / Internet protocols / IP Flow Information Export / NetFlow / Network performance / Pcap / Throughput / IPv4 / Traffic flow

Trace2Flow Karol Adamski, Maciej KorczyƄski, Lucjan Janowski, Krzysztof Rusek 3rd NMRG Workshop on Netflow/IPFIX Usage in Network Management July 30, 2010, Maastricht

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:41
122Accounting / Financial accounting / Professional studies / Financial statements / Asset / Fund accounting / United States Generally Accepted Accounting Principles / Cash flow statement / Net asset value / Fixed asset / Net worth / Governmental accounting

Connecticut Community Colleges Financial Statements, Required Supplementary Information and Supplemental Information June 30, 2015 Members of the Board of Regents for Higher Education

Add to Reading List

Source URL: www.ct.edu

Language: English - Date: 2016-02-01 11:22:18
123Accounting / Financial accounting / Professional studies / Asset / Cash flow / Balance sheet / Cash flow statement / Fixed asset / Finance / Revenue / Expense / Cash and cash equivalents

News Release Details on how the business of the Sector is managed and its related performance are set out below. This information is given on a voluntary basis and from the perspective of the Sector management, as its di

Add to Reading List

Source URL: www.stee.stengg.com

Language: English - Date: 2015-05-17 22:58:13
124Software / Computing / Free software / Internet privacy / Computer access control / Computer networking / Network performance / Proxy server / Information flow / Server / HTTP cookie / World Wide Web

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D3.3

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:50
125Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information flow / Information security

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D3.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:50
126Network performance / Computing / Telecommunications engineering / Network management / Performance management / Wireless networking / Flow control / Packet loss / Queuing delay / Throughput / Computer network / Wireless ad hoc network

Minimizing Age of Information in Vehicular Networks Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University, NJ, U.S.A Vinuth Rai and John Kenney

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-08-05 16:48:52
127Medicine / Clinical medicine / RTT / Heart / Intravenous therapy

Cardioloyte Treadmill Stress Test Why do I need this test? This examination will give your doctor information about the blood flow to your heart muscle. The most common

Add to Reading List

Source URL: www.oakleafclinics.com

Language: English - Date: 2016-04-25 15:08:24
128Economy / Finance / Business / Investment banks / Corporate finance / Cash flow / Factoring / Fundamental analysis / Close Brothers Group / Invoice / Skipton Business Finance / Financial services

ASSET BASED FINANCE ASSOCIATION QUARTERLY STATISTICS TO SEPTEMBER 2012 No part of this information may be reproduced, photocopied, stored in an electronic retrieval system or transmitted except by members of the ABFA or

Add to Reading List

Source URL: www.factors.org.uk

Language: English - Date: 2015-02-04 09:32:43
129Information theory / Probability / Interference / Elevator / Covert channel / Information flow / Electronics / Measurement / Applied mathematics

ICS 355: Introduction Dusko Pavlovic Covert Security and Trust I:

Add to Reading List

Source URL: www.asecolab.org

Language: English - Date: 2014-12-01 15:45:46
130Graph theory / Discrete mathematics / Mathematics / Static program analysis / Compiler optimizations / Graph / Flow network / Call graph / Pointer / Static single assignment form / Directed graph

Ar Abstract Many current program analyses require highly precise pointer information about small, targeted parts of a given program. This motivates the need for demand-driven pointer analyses that compute information on

Add to Reading List

Source URL: www.bodden.de

Language: English - Date: 2016-05-18 17:46:26
UPDATE