Table computer

Results: 3684



#Item
121Canon PowerShot / Canon Digital IXUS / Computer architecture / DIGIC / Software / Canon PowerShot S100

CANON POWERSHOT SD870 IS USER MANUAL CPSIUM-18-WWRG6-PDF | File Size 2,000 KB | 37 Pages | 7 Aug, 2016 TABLE OF CONTENT Introduction

Add to Reading List

Source URL: www.mtbkorea.org

Language: English - Date: 2016-08-22 03:12:14
122Computing / Computer arithmetic / Software engineering / Computer programming / Floating point / LLVM / Kahan summation algorithm / Extended precision / IEEE floating point / Program analysis / Lookup table / Type system

Precimonious: Tuning Assistant for Floating-Point Precision Cindy Rubio-Gonz´alez1 , Cuong Nguyen1 , Hong Diep Nguyen1 , James Demmel1 , William Kahan1 , Koushik Sen1 , David H. Bailey2 , Costin Iancu2 , and David Hough

Add to Reading List

Source URL: crd.lbl.gov

Language: English - Date: 2013-08-25 13:39:42
123Computing / Internet / Cryptography / Computer network security / Internet Standards / Directory services / Cryptographic protocols / Secure communication / Safe Software / Kerberos / Transport Layer Security / HTTPS

FME® Server Security Table of Contents FME Server Authentication - Access Control

Add to Reading List

Source URL: cdn.safe.com

Language: English - Date: 2015-07-30 16:36:24
124Cryptography / Computer access control / Computer security / Password / Security / Disk encryption / Login / Crypt / Password manager / SAP Logon Ticket

Drive Encryption Procedure Drive Encryption End User Guide (Revision Date: Table of Contents Introduction ......................................................................................................

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-05-16 15:09:57
125Computing / Network architecture / Computer networking / Internet / Routing / Wormhole switching / Transmission Control Protocol / Router / Packet switching / Packet loss / Routing table

PS-1 Ultra Low-Power High-Speed Flexible Probabilistic Adder for Error-Tolerant Applications

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2013-12-16 08:28:50
126Computer-mediated communication / Web conferencing / Videotelephony / Teleconferencing / Education / Remote administration software / WebEx / Educational technology / Virtual hands on training / PowWow365

How to Host WebEx Meetings Instructions for ConnSCU Faculty and Staff using ConnSCU WebEx Table of Contents How Can Faculty and Staff Use WebEx? ..........................................................................

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2016-03-28 13:13:06
127Computing / Computer data storage / Computer hardware / Cellebrite / Non-volatile memory / Data management / Computer memory / Mobile device forensics

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics ...............................................................................................

Add to Reading List

Source URL: www.cellebrite.com

Language: English - Date: 2015-04-08 06:59:20
128Computer programming / Distributed data storage / Computing / Software engineering / Routing algorithms / Chord / Distributed hash table / Flooding / Distributed computing / B-tree / Tree traversal / Kademlia

1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,

Add to Reading List

Source URL: www.cs.uoi.gr

Language: English - Date: 2006-09-30 04:49:19
129Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
130Computing / Fault-tolerant computer systems / Distributed data storage / Concurrent computing / Distributed computing / File sharing / Distributed algorithms / Distributed hash table / Paxos / Consensus / Peer-to-peer / Routing table

Speedy : a Sybil-resistant DHT implementation* anquan Liu, Qian Long, Pratiksha aker, Wenting Zheng May 12, Introduction Distributed hash tables (DHTs) are common services that leverage peer-to-peer (P2P)

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-12-08 14:33:02
UPDATE