Systems

Results: 323656



#Item
81Theoretical computer science / Helmut Veith / Formal methods / TU Wien / Institute for Applied Information Processing and Communications / Software engineering / Verification / Formal verification / Computing

RESEARCH LINES Mapping SHiNE RiSE Rigorous Systems Engineering

Add to Reading List

Source URL: www.eziobartocci.com

Language: English - Date: 2017-06-06 20:45:42
82Cloud infrastructure / IBM cloud computing / Computing / Cloud computing

InsFtute
of
Molecular
Systems
Biology

 Accelerating 3D Protein Modeling Using Cloud Computing 
 Lars
Malmström,
Ruedi
Aebersold
–
ETH
Zürich,
IMSB
h?p://www.imsb.ethz.ch
 Wibke
Sud

Add to Reading List

Source URL: cloudbroker.com

Language: English - Date: 2011-06-23 06:55:42
83Backup software / System software / Utility software / Computing / Backup / Incremental backup / NetApp / Veeam Backup & Replication / Backup Exec

AerieTM 24 Clutch Teradactyl® makes complex large department backup of heterogeneous environments easy to protect with a simple 4U rack mounted appliance. Operating systems, file systems, and network attached storage a

Add to Reading List

Source URL: www.teradactyl.com

Language: English
84Computer data storage / Computing / Non-volatile memory / Computer memory / Computer architecture / Flash memory / Wear leveling / Solid-state drive / Flash file system / Dd / Page

Flashix: Development of a Verified Flash File System G. Schellhorn G. Ernst, J. Pfähler, D. Haneberg, W. Reif Overview • Introduction: Flash Hardware and File Systems • Project Flashix: Approach & Tool Support:KIV

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2017-01-11 10:48:03
85Course / Curricula

Computer Science_BS_Information Systems.pdf

Add to Reading List

Source URL: catalog.southernct.edu

Language: English - Date: 2018-10-06 18:04:21
86Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Language: English
87Valuation

March 8, 2018 Ms. Lynn Hemmings Senior Chief, Pensions, Financial Systems Division Finance Canada 90 Elgin Street Ottawa ON K1A 0G5

Add to Reading List

Source URL: www.acpm.com

Language: English - Date: 2018-03-12 09:43:32
    88Estimation theory / Probability and statistics / Statistics / Graph theory / Markov chain / Parameter / Machine learning / Probability distribution fitting / Parametric model / Twisting properties

    Department of Computer Science EFFICIENT PROBABILISTIC PARAMETER SYNTHESIS FOR ADAPTIVE SYSTEMS Taolue Chen

    Add to Reading List

    Source URL: www.cs.ox.ac.uk

    Language: English - Date: 2015-10-05 08:24:58
    89Electrical engineering / Network flow problem / Clock synchronization / Clocks / Synchronization / Distributed computing / Clock skew / Time-Triggered Protocol / Distributed algorithm / Flow network / Physics / Electromagnetism

    Theory of Computing Systems manuscript No. (will be inserted by the editor) Self-stabilizing Byzantine Clock Synchronization with Optimal Precision Pankaj Khanchandani · Christoph Lenzen

    Add to Reading List

    Source URL: www.tik.ee.ethz.ch

    Language: English - Date: 2018-09-02 17:25:13
    90Systems science / Design for X / Engineering / University of Freiburg / System of systems / Systems engineering / Systems theory / Reliability engineering

    AVACS* Automatic Verification and Analysis of Complex Systems Werner Damm AVACS coordinator

    Add to Reading List

    Source URL: www.avacs.org

    Language: English - Date: 2015-09-28 03:05:31
    UPDATE