<--- Back to Details
First PageDocument Content
Windows NT / Computer architecture / Hacking / Software testing / Vulnerability / Windows / Microsoft Office / Microsoft Lync / Microsoft Data Access Components / Software / Computing / Microsoft Windows
Date: 2013-11-05 17:47:02
Windows NT
Computer architecture
Hacking
Software testing
Vulnerability
Windows
Microsoft Office
Microsoft Lync
Microsoft Data Access Components
Software
Computing
Microsoft Windows

Security Advisory SA2013-087

Add to Reading List

Source URL: doa.alaska.gov

Download Document from Source Website

File Size: 76,81 KB

Share Document on Facebook

Similar Documents

Concurrent computing / Parallel computing / Computing / Computer architecture / Cluster computing / Fault-tolerant computer systems / Computer cluster / Supercomputer / Scalability / Data-intensive computing / High-availability cluster / MOSIX

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. 11, NO. 2, JULY-DECEMBERIncluding Variability in Large-Scale Cluster Power Models

DocID: 1xUHZ - View Document

Artificial neural networks / Computational neuroscience / Applied mathematics / Neuroscience / Cybernetics / Computational statistics / Market research / Deep learning / Heart rate variability / Emotion recognition / Recurrent neural network / Affective computing

Calibrating the Classifier: Siamese Neural Network Architecture for End-to-End Arousal Recognition from ECG Andrea Patan`e and Marta Kwiatkowska Department of Computer Science, University of Oxford

DocID: 1xTaw - View Document

CALL FOR WORKSHOPS AND TUTORIAL PROPOSALS HPCA 2018 24th IEEE International Symposium on HighPerformance Computer Architecture GENERAL CHAIR Michael Gschwind, IBM TJ Watson

DocID: 1vpZy - View Document

Call for Papers 2014 Annual Conference of Advanced Computer Architecture (Shenyang, China) (http://aca2014.tcarch.org) In order to promote the development of information technology and strengthen academic exchanges, the

DocID: 1vpbt - View Document

Siamese Network: Architecture and Applications in Computer Vision Tech Report Dec 30, 2014 Hengliang Luo

DocID: 1vp5V - View Document