Replay

Results: 445



#Item
61Object-oriented programming languages / Memory management / Java / Cross-platform software / Concurrent programming languages / Garbage collection / Java virtual machine / Escape analysis / JRuby / Scala / Weak reference / Apache Harmony

ORDER: Object centRic DEterministic Replay for Java Zhemin Yang Fudan University Min Yang Fudan University

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:05
62Web analytics / Business intelligence / Marketing / Customer experience management / Analytics / Big data / Touchpoint / Adobe Systems / Conversion marketing / Session replay / Adobe Marketing Cloud

Integration_adobeAnalyeics_NB3

Add to Reading List

Source URL: www.clicktale.com

Language: English - Date: 2016-03-09 06:07:48
63

To appear in the Proceedings of the 8th International Conference on Biometrics (ICB), Phuket Thailand Live Face Video vs. Spoof Face Video: Use of Moir´e Patterns to Detect Replay Video Attacks Keyurkumar Patel† , Hu

Add to Reading List

Source URL: www.cse.msu.edu

Language: English - Date: 2012-11-01 12:13:00
    64

    Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance Jonathan Lifflander*, Esteban Meneses† , Harshitha Menon*, Phil Miller*, Sriram Krishnamoorthy‡ , Laxmikant V. Kale* jliffl2@illinoi

    Add to Reading List

    Source URL: www.jlifflander.com

    Language: English - Date: 2014-09-25 16:41:58
      65

      TCPivo: A High-Performance Packet Replay Engine Wu-chang Feng Ashvin Goel Abdelmajid Bezzaz Wu-chi Feng Jonathan Walpole OGI @ OHSU ABSTRACT This paper describes the design and implementation of a

      Add to Reading List

      Source URL: www.eecg.toronto.edu

      Language: English - Date: 2014-04-23 13:14:40
        66Formal sciences / Cryptography / Computer network security / Crime prevention / National security / Exploit / Computer security / Vulnerability / Computing / Security hacker / Theoretical computer science / Computer science

        Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

        Add to Reading List

        Source URL: www.cs.dartmouth.edu

        Language: English - Date: 2014-08-22 21:44:16
        67Web analytics / Marketing / Economy / Business / Business intelligence / Webtrends / Internet marketing / Analytics / Conversion marketing / Session replay / Market segmentation / Touchpoint

        integration_Analytics_Webtrends_NB3

        Add to Reading List

        Source URL: www.clicktale.com

        Language: English - Date: 2016-03-09 06:07:37
        68

        Architecture-­‐level  Security  Issues     for  main  memory   Ali  Shafiee   Aganda   •  Replay-­‐A;ack  

        Add to Reading List

        Source URL: www.eng.utah.edu

        Language: English - Date: 2015-10-07 16:52:04
          69Customer experience management / Web analytics / Business intelligence / Business / Gene expression / Heat map / Adobe Systems / Touchpoint / Customer experience / Session replay / Analytics

          ADOBE ANALYTICS INTEGRATION ® CUSTOMER SUCCESS

          Add to Reading List

          Source URL: www.clicktale.com

          Language: English - Date: 2016-03-10 01:53:32
          70

          Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance Jonathan Lifflander Esteban Meneses

          Add to Reading List

          Source URL: www.jlifflander.com

          Language: English - Date: 2014-07-25 18:31:13
            UPDATE