Network intelligence

Results: 2949



#Item
811SAP AG / Hewlett-Packard / Automation / SAP NetWeaver Business Intelligence / Software development process / HP OpenView / HP Software Division / Computing / Technology / Open Travel Alliance

Exsys Case Study Online Configuration Advisory Systems Help Drive HP’s E-Business Strategy Hewlett Packard Interactive System Determines Best Hardware and Network Configuration for Customers Hewlett Packard’s deploy

Add to Reading List

Source URL: www.exsys.com

Language: English - Date: 2013-10-15 23:19:01
812Computational neuroscience / Cognition / Philosophy of mind / Neural coding / Artificial intelligence / Nirvana / Neural correlate / Neural network / Eddy / Mind / Cognitive science / Neuroscience

Eddies in the Stream © Rick Hanson, Ph.DRivers flow and eddies form. An eddy is a relatively stable pattern whose elements continually change. It is

Add to Reading List

Source URL: www.wisebrain.org

Language: English - Date: 2011-03-01 05:44:49
813Artificial intelligence / Control engineering / Fuzzy logic / Logic in computer science / Control theory / Fuzzy control system / Control system / Soft sensor / Neural network / Science / Logic / Cybernetics

SCIAD - Self-Learning Industrial Control Systems Through Process Data Achievements - Direct application to industry problems; • Hierarchical genetic algorithm (HGA) for learning a T-S fuzzy model for identification of

Add to Reading List

Source URL: www.isr.uc.pt

Language: English - Date: 2014-09-03 10:05:22
814Applied mathematics / Artificial intelligence / Predicate logic / Mathematical logic / Graphical models / Markov logic network / First-order logic / Algorithm / Atomic formula / Mathematics / Theoretical computer science / Logic

An Integer Polynomial Programming Based Framework for Lifted MAP Inference Somdeb Sarkhel, Deepak Venugopal Computer Science Department The University of Texas at Dallas {sxs104721,dxv021000}@utdallas.edu

Add to Reading List

Source URL: www.hlt.utdallas.edu

Language: English - Date: 2014-10-31 21:57:33
815Artificial intelligence / Alan Turing / Transaction authentication number / Challenge-response authentication / Turing test / Brute-force attack / HTTP cookie / Brute-force search / Virtual Network Computing / CAPTCHA / System software / Computing

LNCSEnhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-11-28 11:08:41
816OSI protocols / Roofnet / ExOR / Link-state routing protocol / Packet loss / Routing / Network packet / Throughput / Transmission time / Wireless networking / Technology / Network architecture

ExOR: Opportunistic Multi-Hop Routing for Wireless Networks Sanjit Biswas and Robert Morris M.I.T. Computer Science and Artifical Intelligence Laboratory biswas, rtm @csail.mit.edu

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-07-14 13:18:43
817Cognition / Science / Technology / Statistical classification / Affective computing / Wireless sensor network / Sensors / Artificial intelligence / Activity recognition

Introducing New Sensors for Activity Recognition Dawud Gordon, Hedda Schmittke and Michael Beigl Distributed and Ubiquitous Systems Technische Universit¨at Braunschweig, Braunschweig, Germany Email: {gordon, schmidtke,

Add to Reading List

Source URL: www.teco.edu

Language: English - Date: 2010-05-21 11:30:54
818Information science / Artificial intelligence / Hash table / Bloom filter / Hash function / Trie / Lookup table / Cryptographic hash function / Hash list / Hashing / Search algorithms / Information retrieval

Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing Haoyu Song Sarang Dharmapurikar Jonathan Turner John Lockwood l.e

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-22 10:41:44
819Computing / Computer network security / Information security / National security / Information Technology Security Assessment / Security controls / Central Intelligence Agency / Federal Information Security Management Act / NIST Special Publication 800-53 / Computer security / Data security / Security

NIST Special PublicationSecurity Self-Assessment Guide for Information Technology Systems Marianne Swanson

Add to Reading List

Source URL: www.fda.gov

Language: English
820Health economics / Demography / Global health / Population health / Socioeconomics / Disease management / Health / Medicine / Healthcare

Benchmarks in Population Health Management Brought to you by the Healthcare Intelligence Network www.hin.com

Add to Reading List

Source URL: www.hin.com

Language: English - Date: 2014-05-15 10:44:29
UPDATE