Key System

Results: 6849



#Item
301

Abstract The Northeast Corridor (NEC) is the rail transportation spine of the Northeast United States and is a key component of the region’s transportation system, which supports the operation of eight Regional rail au

Add to Reading List

Source URL: www.necfuture.com

Language: English - Date: 2015-11-05 15:04:52
    302Software / System software / Computing / Concurrency control / Transaction processing / Transactional memory / Programming language implementation / Cyberwarfare / Rootkit / Hypervisor / Hyper-V / VM

    Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory Yutao Liu†, Yubin Xia†, Haibing Guan§, Binyu Zang†, Haibo Chen† Shanghai Key Laboratory of Scalable Computing and System

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2014-02-20 00:16:23
    303Cloud storage / Business continuity and disaster recovery / Data security / Disk encryption / Backup / Public-key cryptography / File system / Transparent Data Encryption / CTERA Networks

    Data: Making it be there where you want it, and making it be gone when you want it gone Radia Perlman

    Add to Reading List

    Source URL: tce.technion.ac.il

    Language: English - Date: 2015-06-21 01:59:30
    304Cryptography / Evaluation / Quality / ISO / Professional certification / Public key certificate / Vashi / Certificate / Audit

    Certifies that the Quality Management System of ASHURAJ AGENCIES Head Office : 7 & 8, Agrawal Chamber, No 2, Plot No. 8, Sec -19 C, APMC Vashi, Navi Mumbai, India. Branch Office : Ashuraj Complex, Near Mhavash

    Add to Reading List

    Source URL: www.ashurajagencies.com

    Language: English
    305Thermodynamic entropy / Atmospheric thermodynamics / State functions / Thermodynamics / Psychrometrics / Entropy / Non-equilibrium thermodynamics / Thermodynamic system / Humidity / Water vapor / Temperature / Vapor pressure

    PUBLICATIONS Journal of Advances in Modeling Earth Systems RESEARCH ARTICLE2015MS000496 Key Points: ! An anelastic framework for LES with

    Add to Reading List

    Source URL: climate-dynamics.org

    Language: English - Date: 2015-11-05 16:11:17
    306Door furniture / Gates / Locksmithing / Doors / Physical security / Construction / Key / Real estate / Lock / Door handle / File locking / Remote keyless system

    www.LockState.com LockState LS-6600 User Manual Before installing and using your LS-6600, please review the following important notes: ◆

    Add to Reading List

    Source URL: www.lockstate.com

    Language: English - Date: 2015-04-16 14:15:45
    307Biometrics / Security / Fingerprints / Identification / Cryptography / Fingerprinting algorithms / Fingerprint / Human anatomy / Integrated Automated Fingerprint Identification System / Automated fingerprint identification / Biometric passport / Public key fingerprint

    LF10™ Unchallenged speed, reliability and image quality. 02/03

    Add to Reading List

    Source URL: www.dermalog.com

    Language: English - Date: 2016-02-04 10:49:03
    308VTB Bank / Bank regulation / Basel II / Central bank / Operational risk / Evrofinance Mosnarbank / Global financial system / CAMELS rating system / Central Bank of Armenia

    Annual Report 2013 VTB Bank (France) SA Contents Key figures as of 31 December 2013

    Add to Reading List

    Source URL: ru.vtb.fr

    Language: English - Date: 2014-07-03 01:44:25
    309Internet / Computing / Domain name system / Cryptography / Internet protocols / Internet Standards / Key management / DNSSEC / Domain Name System Security Extensions / Domain name registry / Domain name / Information security

    KSRegistry DNSSEC Policy Statement 1. INTRODUCTION............................................................................................................................5 1.1 Overview..............................

    Add to Reading List

    Source URL: nic.gd

    Language: English - Date: 2016-06-06 05:48:12
    310

    A HMTT: A Hybrid Hardware/Software Tracing System for Bridging the DRAM Access Trace’s Semantic Gap Yongbing Huang, Licheng Chen, Zehan Cui, State Key Laboratory of Computer Architecture, Institute of Computing Technol

    Add to Reading List

    Source URL: asg.ict.ac.cn

    Language: English - Date: 2014-01-01 21:38:40
      UPDATE