Remote computer

Results: 3393



#Item
211Cyberwarfare / Computing / Computer security / Computer network security / Internet security / Cryptography / Cybercrime / Electronic voting / Malware / Denial-of-service attack / Computer virus / Computer worm

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

Add to Reading List

Source URL: avirubin.com

Language: English - Date: 2012-11-01 14:51:07
212Supercomputers / Parallel computing / Fabless semiconductor companies / Graphics hardware / Computer memory / IWARP / Remote direct memory access / Chelsio Communications / GPU cluster / 100 Gigabit Ethernet / Nvidia / WARP

FOR IMMEDIATE RELEASE Media Contact: Chelsio Communications

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2016-03-30 07:55:22
213Computing / Computer hardware / Computer architecture / Memory management / Virtual memory / Computer memory / Inputoutput memory management unit / X86 virtualization / Direct memory access / Shared memory / Remote direct memory access / Translation lookaside buffer

Active Access: A Mechanism for High-Performance Distributed Data-Centric Computations Maciej Besta Torsten Hoefler

Add to Reading List

Source URL: spcl.inf.ethz.ch

Language: English - Date: 2015-04-19 21:19:08
214Computing / Computer hardware / Ethernet / Chelsio Communications / 100 Gigabit Ethernet / IWARP / Network interface controller / Remote direct memory access / ISCSI / PCI Express / Open Compute Project / Adapter

FOR IMMEDIATE RELEASE Media Contact: Chelsio Communications

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2016-03-08 07:23:31
215Supercomputers / Computer networks / Computer memory / SCSI / IWARP / Remote direct memory access / Chelsio Communications / InfiniBand / ISCSI / Replication / OpenFabrics Alliance / RDMA over Converged Ethernet

FOR IMMEDIATE RELEASE Media Contact: Chelsio Communications +CHELSIO AND MICROSOFT COLLABORATE TO SHOWCASE IWARP RDMA OVER 40G METRO

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2015-05-06 15:47:17
216

Characterizing the Remote Control Behavior of Bots Elizabeth Stinson and John C. Mitchell Department of Computer Science, Stanford University, Stanford, CA 94305 {stinson, mitchell}@cs.stanford.edu Abstract. A botnet is

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-08-26 17:57:08
    217

    Startup Procedure • Starting the Inverted Microscope: 1. Turn on both switches on the Remote Control left = computer + right = microscope 2. Turn on the Computer (button on the tower) 3. Make sure the network says 1Gbi

    Add to Reading List

    Source URL: qbic.facilities.northwestern.edu

    Language: English - Date: 2011-09-20 18:30:54
      218Computing / Computer programming / Parallel computing / Software engineering / Application programming interfaces / MPICH / SHMEM / Message Passing Interface / Partitioned global address space / Coarray Fortran / Synchronization / Remote direct memory access

      Enabling Highly-Scalable Remote Memory Access Programming with MPI-3 One Sided Robert Gerstenberger ∗

      Add to Reading List

      Source URL: htor.inf.ethz.ch

      Language: English - Date: 2013-08-25 13:14:18
      219

      Annex ***** CVRS 2012 REGISTRATION FORM ***** International Conference on Computer Vision in Remote Sensing Dec 16-18, 2012. Xiamen, China. http://cvrs2012.xmu.edu.cn

      Add to Reading List

      Source URL: cvrs2012.xmu.edu.cn

      Language: English - Date: 2012-11-18 21:52:04
        220

        CCCP: Secure Remote Storage for Computational RFIDs Mastooreh Salajegheh1 Shane Clark1 Benjamin Ransford1 Kevin Fu1 Ari Juels2 1 Department of Computer Science, University of Massachusetts Amherst 2 RSA Laboratories, The

        Add to Reading List

        Source URL: www.arijuels.com

        Language: English - Date: 2013-09-23 13:10:41
          UPDATE