Network intelligence

Results: 2949



#Item
221Cybernetics / Adaptive system / Artificial neural network / Machine learning / Computational intelligence / Genetic algorithm / Artificial immune system / Artificial intelligence / Adaptive control / Cellular neural network

RTD – SAS Executive Summary Reporting Period: – Achievements The Research Theory and Development – Smart Adaptive Systems Committee has been a highly active committee within EUNITE, contrib

Add to Reading List

Source URL: www.eunite.org

Language: English - Date: 2014-12-06 14:07:29
222Smart devices / Machine vision / Smart camera / Ambient intelligence / Visual sensor network

Paris, France, September 12-15, 2016

Add to Reading List

Source URL: eunevis.org

Language: English - Date: 2016-01-27 09:15:49
223Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
224Personality tests / Personal development / Occupations / Strong Interest Inventory / Employment / Career counseling / MyersBriggs Type Indicator / Occupational therapist / Teacher / Occupational Information Network / Intelligence quotient

Strong Interest Inventory® Profile with High School Profile High School Profile developed by Sandra K. Rumpel and Kathleen Lecertua Report prepared for

Add to Reading List

Source URL: www.skillsone.com

Language: English - Date: 2012-04-13 23:39:40
225Distribution / Minerals / Foresight / Futurology / Transhumanism / Mining / Supply chain / Raw material

Minerals4EU FP7-NMPMinerals Intelligence Network for Europe D 6.4 “Network of institutions with various backgrounds

Add to Reading List

Source URL: www.minerals4eu.eu

Language: English - Date: 2015-10-28 04:17:30
226Computational linguistics / Artificial neural networks / Artificial intelligence / Interpolation / Statistical natural language processing / Recurrent neural network / Language model / Linear interpolation / N-gram / Speech recognition / Craig interpolation

INVESTIGATION OF BACK-OFF BASED INTERPOLATION BETWEEN RECURRENT NEURAL NETWORK AND N-GRAM LANGUAGE MODELS X. Chen, X. Liu, M. J. F. Gales, and P. C. Woodland University of Cambridge Engineering Department, Cambridge, U.K

Add to Reading List

Source URL: mi.eng.cam.ac.uk

Language: English - Date: 2016-03-11 05:30:19
227Customer experience management / Information technology management / Marketing / Infrastructure optimization / Network performance / Customer experience / Customer service / Business process improvement / Business intelligence / Change management / Marketing operations

HDI 2017 TRACKS EVOLVING DESKTOP SUPPORT – Rae Ann Bruno Description: The sessions in this track provide practical solutions and innovative methods for managing increased demands on Desktop Support teams and for navig

Add to Reading List

Source URL: www.hdiconference.com

Language: English - Date: 2016-07-06 16:44:09
228Spamming / Computer network security / Multi-agent systems / Botnets / Cybercrime / Email spam / Phishing / Computer worm / The Spamhaus Project / Anti-spam techniques / Zombie / Bagle

Be certain MessageLabs Intelligence: April 2006 Catch Me If You Can: A Review of QuarterIntroduction Welcome to the April edition of the MessageLabs Intelligence monthly report. This report provides the latest t

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:20
229Computer network security / Cyberwarfare / Cybercrime / Computer security / E-commerce / Man-in-the-browser / Denial-of-service attack / Internet security / Password / Threat / Web application firewall / Threat Intelligence Platform

ShapeAdvancedAppDefense_DataSheet

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:28
230Spamming / Computer network security / Multi-agent systems / Cyberwarfare / Cybercrime / Bitcoin / Phishing / Computer security / ZeroAccess botnet / Botnet / IID / Command and control

MARKET INTELLIGENCE eCrime Trends Report: Fourth QuarterBroadway

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-03-19 14:38:36
UPDATE