Network intelligence

Results: 2949



#Item
941Science and technology in Europe / European Commission / Evaluation / Quality assurance / Ambient intelligence

FCTESTNET Fuel Cells TEsting and STandardisation NETwork Presented by Georgios TSOTRIDIS European Commission-DG Joint Research Centre Institute for Energy

Add to Reading List

Source URL: www.iphe.net

Language: English - Date: 2011-02-16 17:08:47
942Deep packet inspection / Electronics / Packet Processing / Ericsson / Firewall / 3GPP Long Term Evolution / Continuous Computing / Deep content inspection / Computer network security / Computing / Technology

Adax and Vineyard Networks Announce DPI Partnership Adax Cavium-based Packet Processing Controllers combine with Vineyard Networks to deliver unmatched intelligence and performance for Deep Packet Inspection. June 27th,

Add to Reading List

Source URL: www.adax.com

Language: English - Date: 2012-06-22 04:54:00
943Internet Protocol / Universal Mobile Telecommunications System / 3GPP Long Term Evolution / 4G / IP Fabrics / Network intelligence / Wi-Fi / 3GPP / Ericsson / Technology / Electronics / Electronic engineering

For further information contact: Berkeley PR T: +0909 E: Adax and IP Fabrics give Carriers and SMEs real-time access to Wi-Fi data analytics

Add to Reading List

Source URL: www.adax.com

Language: English - Date: 2014-07-22 14:29:00
944Australian intelligence agencies / Privacy law / Definitions of terrorism / International law / Counter-terrorism / Australian Muslim Civil Rights Advocacy Network / Australian Security Intelligence Organisation / Anti-terrorism legislation / War on Terror / National security / Law / Terrorism

3rd national Now We The People conference Advance Australia Fair Building sustainability, justice and peace 30-31, July 2005, Melbourne Trades Hall Conference Briefing Paper 1

Add to Reading List

Source URL: www.nowwethepeople.org

Language: English - Date: 2008-08-13 03:46:45
945Financial Crimes Enforcement Network / United States Department of the Treasury / Business / Finance / Financial system / Bank Secrecy Act / Money laundering / Financial Intelligence / Currency transaction report / Tax evasion / Financial crimes / Financial regulation

United States General Accounting Office GAO Testimony

Add to Reading List

Source URL: www.druglibrary.org

Language: English - Date: 2004-02-02 09:42:56
946Learning / Semi-supervised learning / Supervised learning / Unsupervised learning / Neural network / Support vector machine / Pattern recognition / Machine learning / Statistics / Artificial intelligence

Pseudo-Label : The Simple and Efficient Semi-Supervised Learning Method for Deep Neural Networks Dong-Hyun Lee Nangman Computing, 117D Garden five Tools, Munjeong-dong Songpa-gu, Seoul, Korea

Add to Reading List

Source URL: deeplearning.net

Language: English - Date: 2013-06-13 14:08:35
947Technology / Packet Processing / 3GPP Long Term Evolution / Network processor / 4G / Cavium Networks / QorIQ / Computer hardware / Computing / PCI Express

Adax Announces Octeon II Packet2-PCIe Board and Software for RMS LTE Packet Processing Advanced PCIe controller with unmatched intelligence and performance for Packet Processing, IP Flow Management, Security, QoS, DPI, L

Add to Reading List

Source URL: www.adax.com

Language: English - Date: 2012-05-04 12:40:00
948Law / Australian Security Intelligence Organisation / Australian Muslim Civil Rights Advocacy Network / Definitions of terrorism / Counter-terrorism / Anti-terrorism legislation / Australian Security Intelligence Organisation Act / Australian anti-terrorism legislation / National security / Australian intelligence agencies / Terrorism

anti-terrorism laws ASIO, the Police and You A plain English guide to anti-terrorism laws in Australia third edition

Add to Reading List

Source URL: amcran.org

Language: English - Date: 2008-07-11 15:07:52
949Cyberwarfare / Computer network security / Computer crimes / Threat / Webroot Software / Phishing / Malware / Advanced persistent threat / Defense Intelligence Agency / Computer security / Antivirus software / Cybercrime

A CyberEdge Group White Paper Licensed by Webroot June 2014 SELECTING THE RIGHT THREAT INTELLIGENCE OEM PARTNER

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2014-07-08 11:17:16
950Activity recognition / Cognition / Learning / Supervised learning / Algorithm / Reinforcement learning / Wireless sensor network / Hidden Markov model / Markov models / Artificial intelligence / Science

Transfer Learning for Activity Recognition via Sensor Mapping

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2011-07-20 09:20:43
UPDATE