Network intelligence

Results: 2949



#Item
581Computer security / Computer crimes / Malware / National security / Threat / Crime / Computer network security / Security / Cyberwarfare

Cyber Threat Operations Tactical Intelligence Bulletin Date: Contact: Reference:

Add to Reading List

Source URL: pwc.blogs.com

Language: English - Date: 2015-02-24 04:02:59
582Business intelligence / Relational database management systems / Database management systems / Cross-platform software / Data warehousing / IBM DB2 / IBM InfoSphere DataStage / Pentaho / Oracle Database / Data management / Software / Information technology management

Microsoft Word - Marleon D Cumpston resume

Add to Reading List

Source URL: www.b-eye-network.com

Language: English - Date: 2009-05-22 12:53:35
583Financial economics / Science / Stock market / Commodities market / Foreign exchange market / Technical analysis / Perceptron / MACD / Artificial neuron / Neural networks / Computational neuroscience / Cybernetics

Trade with Intelligence… A TradingSolutions Primer: An overview of technical analysis using TradingSolutions’ neural network technology. NeuroDimension, Inc.

Add to Reading List

Source URL: www.tradingsolutions.com

Language: English - Date: 2002-09-24 15:07:54
584Social philosophy / Meta-ethics / Professional ethics / Business ethics / Moral relativism / Is–ought problem / Secular ethics / Public sector ethics / Ethics / Applied ethics / Philosophy

INTELLENET News Official Newsletter of the International Intelligence Network, Ltd. SummerIntellenet will host a social mixer during the TALI Conference in San

Add to Reading List

Source URL: www.intelnetwork.org

Language: English - Date: 2014-06-10 07:42:39
585Knowledge representation / Lexical semantics / Semantics / Semantic similarity / Natural language processing / WordNet / Word-sense disambiguation / Semantic network / Lexical database / Computational linguistics / Linguistics / Science

Journal of Artificial Intelligence Research212 Submitted 03/07; publishedKnowledge Derived From Wikipedia For Computing Semantic Relatedness

Add to Reading List

Source URL: jair.org

Language: English - Date: 2009-08-06 19:21:10
586IOS / Input/output / Mobile business intelligence / IPhone / Smartphones / Computing / Computer architecture

The Surprising Effect of the Weather on Your Network By TMCnet Special Guest Fergus Wills, Director of Product Management, Openwave Mobility The weather is an important topic of conversation in most people’s daily liv

Add to Reading List

Source URL: owmobility.com

Language: English - Date: 2014-09-26 14:13:56
587Electronics / Network architecture / Digital television / Information technology / Technological convergence / Convergence / Multimedia / Social networking service / Ambient intelligence / Technology / Digital technology / Media technology

ACM — Interactions — Volume XIX.3 — July + August 2011 — On Modeling Forum Convergence 2.0 = service + social + physical

Add to Reading List

Source URL: www.dubberly.com

Language: English - Date: 2013-06-05 10:55:36
588Patriot Act / Internet privacy / Malware / Investigative journalism / U.S. Air Force Office of Special Investigations / Central Intelligence Agency / Law / National security / Government / Privacy law / Antivirus software / 107th United States Congress

INTELLENET News Official Newsletter of the International Intelligence Network, Ltd. Intellenetwork.org Spring 2013

Add to Reading List

Source URL: www.intelnetwork.org

Language: English - Date: 2014-06-10 07:42:38
589Game artificial intelligence / Constraint programming / Network theory / Shortest path problem / Static single assignment form / Hypergraph / Pathfinding / NP-complete problems / Decomposition method / Theoretical computer science / Mathematics / Graph theory

Mode Directed Path Finding Irene M. Ong1 , Inˆes de Castro Dutra2 , David Page1, V´ıtor Santos Costa2 1 2

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2006-07-20 15:45:54
590Computer network security / Financial regulation / Money laundering / Tax evasion / Threat / Critical infrastructure protection / Computer network / Financial Intelligence / Surveillance / National security / Security / Espionage

Project QUANTUM LEAP After Action Report

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:30:34
UPDATE