Network Computer

Results: 31604



#Item
771Computer virus / Deception / Internet security / Windows 10 / Windows Vista / Computing / Computer network security

C:uments and Settingsleman.NTDOMAINktopJourney 2 - Instruction Manual.wpd

Add to Reading List

Source URL: www.kscgroup.com

Language: English - Date: 2005-01-20 00:00:00
772Security / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Areva / EPR / Threat

PDF Document

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-06-29 11:30:21
773Computing / Routing / Computer networking / Network protocols / Packet processing / Packet switching

A simpler proof for O(congestion + dilation) packet routing Thomas Rothvoß Department of Mathematics, MIT IPCO 2013

Add to Reading List

Source URL: www.math.washington.edu

Language: English - Date: 2013-11-01 17:11:36
774Computing / Network architecture / Computer networking / Internet / Routing / Wormhole switching / Transmission Control Protocol / Router / Packet switching / Packet loss / Routing table

PS-1 Ultra Low-Power High-Speed Flexible Probabilistic Adder for Error-Tolerant Applications

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2013-12-16 08:28:50
775Security / Computer security / Cyberwarfare / Secure communication / Cybercrime / Computer network security / Data security / Data breach / Balabit / Threat / Insider threat / Cyber-attack

www.balabit.com Why do companies need User Behavior Analytics? "Only amateurs attack machines; professionals target people. And any solutions will have to target the people problem, not the math problem."1

Add to Reading List

Source URL: pages.balabit.com

Language: English - Date: 2016-08-13 13:21:12
776Computing / Security / Prevention / Data security / Crime prevention / Cryptography / Information governance / National security / Certified Information Systems Security Professional / CompTIA / Computer security / VMware ESXi

Senior Computer Network Administrator / Information System Security Officer (ISSO) Candidate Requirements: • Experience with Information Technology, Information Security and Information Assurance • Ability to work wi

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2016-08-02 13:19:19
777Psychology / Cognition / Cognitive science / Behavioural sciences / Computational linguistics / Computational neuroscience / Language acquisition / Referring expression generation / Artificial neural network / Vocabulary development / Pragmatics / Reason

Reasoning About Pragmatics with Neural Listeners and Speakers Jacob Andreas and Dan Klein Computer Science Division University of California, Berkeley {jda,klein}@cs.berkeley.edu

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-04-04 20:39:56
778Security / Cyberwarfare / Computing / Cryptography / Computer network security / Computer security / Crime prevention / National security / National Security Agency

The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

Add to Reading List

Source URL: nsclab.org

Language: English - Date: 2016-06-20 22:48:36
779Cognition / Learning / Creativity / Metaphysics / Collaboration / Concepts / Brainstorming / Network science / Ideation / Idea / Crowdsourcing / Everything2

Kaleidoscope: Computer-Assisted Ideation through Idea Network Exploration Zifei Shan, Yuke Zhu and Tianxin Zhao⇤ Department of Computer Science, Stanford University {zifei,yukez,tianxin}@stanford.edu

Add to Reading List

Source URL: www.zifeishan.org

Language: English - Date: 2014-12-18 18:37:50
780Computing / Software / Computer networking / Emerging technologies / Network architecture / Configuration management / Software-defined networking / OpenFlow / Nox / ONOS / OpenDaylight Project / App Store

Isolating and Tolerating SDN Application Failures with LegoSDN Balakrishnan Chandrasekaran Duke University Brendan Tschaen

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2016-03-31 23:58:46
UPDATE