Inter-process communication

Results: 1979



#Item
241Unix / System software / Computer networking / Transmission Control Protocol / Node.js / STREAMS / Network socket / Npm / Zlib / Computing / Software / Inter-process communication

STREAMS PAST.pipe(PRESENT).pipe(FUTURE) Isaac Z. Schlueter Thursday, November 22, 12 STREAMS

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
242Netflow / Network management / Inter-process communication / Internet protocols / Traffic flow / Computer network security / IP Flow Information Export / Transmission Control Protocol / Routing / Computing / Network architecture / Internet

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu D. M. Chiu

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-12-14 03:07:20
243Visual arts / Mural / Computing / Cosentino / C dynamic memory allocation / Computer programming / C POSIX library / Inter-process communication / Mmap

Thursday, August 11th, 2011 5:30PM - 7:30PM Shih Yu-Lang Central YMCA Welcome Dear MMAP Friends and Family,

Add to Reading List

Source URL: www.muralmusicarts.org

Language: English - Date: 2012-04-26 18:27:13
244Functional languages / Actor model / Futures and promises / Inter-process communication / Observer pattern / Scala / Continuation / Errors and residuals in statistics / Computing / Software engineering / Computer programming

RAY: Integrating Rx and Async for Direct-Style Reactive Streams Philipp Haller Heather Miller

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2013-09-05 08:45:30
245Software / Computer file / Inter-process communication / Data synchronization / File hosting / Windows Vista / Windows Explorer / SyncToy / System software / Computing / File managers

Version 8.0 to 8.1 Upgrade Instructions This tutorial is only for existing iDevAffiliate 8.0 users who are upgrading to 8.1. BACKUP YOUR FILES AND DATABASE BEFORE CONTINUING! 1.

Add to Reading List

Source URL: www.idevlibrary.com

Language: English - Date: 2014-10-01 16:31:58
246Features new to Windows XP / Windows Explorer / Computer file / Inter-process communication / Windows Vista

Docsoft:AV Appliance User Guide Version: 3.0 Copyright 2005,2009 Docsoft, Inc.

Add to Reading List

Source URL: support.docsoft.com

Language: English - Date: 2009-09-16 17:05:16
247Computer programming / Inter-process communication / Models of computation / Computer data / Stream / Twitter / Pipeline / Computing / Concurrent computing / Programming paradigms

Akka Stream and HTTP Experimental Java Documentation Release 1.0-M3 Typesafe Inc

Add to Reading List

Source URL: doc.akka.io

Language: English - Date: 2015-02-06 08:18:57
248CORBA / Common Object Request Broker Architecture / Component-based software engineering / Inter-process communication / Object-oriented programming / Authorization / Access control / Service-oriented architecture / Computer security / Security / Computing / Identity management

In Proceedings of the Annual Computer Security Applications Conference, Phoenix, Arizona, U.S.A., December 6-10, 1999 A Resource Access Decision Service for CORBA-based Distributed Systems Konstantin Beznosov Baptist He

Add to Reading List

Source URL: cadse.cs.fiu.edu

Language: English - Date: 2000-01-27 15:46:10
249Data / Information / Data security / Computer data / Computer file / Inter-process communication / Data loss prevention software / Information security / Data loss / Data management / Computer security / Computing

C O NTR O LL ED FI LE PR O T E CTI ON WITH IN T HE P ERI ME TER AND B EY OND – A N ETI Q S O LU TI ON BRI EF In today’s vibrant business environment the information security paradigm has changed dramatically. It is

Add to Reading List

Source URL: techarbor.com

Language: English - Date: 2015-05-19 05:03:30
250Computer security / Inter-process communication / Access control / Security descriptor / Local Procedure Call / Access token / Object Manager / Security Identifier / Windows Registry / Microsoft Windows / Computing / Windows NT architecture

Modeling the trust boundaries created by securable objects Matt Miller Leviathan Security Group Abstract One of the most critical steps of any security review involves identifying the trust boundaries that an application

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-15 18:26:11
UPDATE