Table computer

Results: 3684



#Item
161Probability distributions / Motion planning / Theoretical computer science / Closed and exact differential forms / Relationships among probability distributions / Table of stars with Bayer designations

SUBMITTED TO IEEE TRANS. ON AUTOMATIC CONTROL - TECHNICAL NOTE, APRILSwitching and PI Control of Walking Motions of Planar Biped Walkers E.R. Westervelt∗ , J.W. Grizzle+ , and C. Canudas de Wit×

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2016-04-25 13:15:14
162Disaster preparedness / Emergency management / Humanitarian aid / Occupational safety and health / Computer security incident management / European Association for Osseointegration

0 Table of Contents Education Abroad Overview Program Director’s Agreement of Responsibilities .............................................................................................. 2

Add to Reading List

Source URL: dga.kennesaw.edu

Language: English - Date: 2016-02-01 14:07:20
163Computer security / Auditing / Data security / Security / Information technology management / Health Insurance Portability and Accountability Act / IT risk / Chief information security officer / Audit / Enterprise risk management / Information security / Information technology audit

Beyond HIPAA compliance: Aligning IT audit and information security to manage information risks Guidance for health care internal auditors and information security professionals Executive summary Table of contents Execut

Add to Reading List

Source URL: www.ahia.org

Language: English - Date: 2016-06-06 13:37:31
164Distributed data storage / Computer network security / Multi-agent systems / Spamming / File sharing networks / Botnet / Storm botnet / Peer-to-Peer Protocol / Kademlia / Distributed hash table / Command and control / Peer-to-peer

Towards Complete Node Enumeration in a Peer-to-Peer Botnet Brent ByungHoon Kang1 , Eric Chan-Tin2 , Christopher P. Lee3 , James Tyra2 , Hun Jeong Kang2 , Chris Nunnery1 , Zachariah Wadler1 , Greg Sinclair1 , Nicholas Hop

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
165Cybercrime / Crime prevention / ESET / David Harley / AutoRun / Antivirus software / Computer security / Computer virus / Malware / AVIEN / Technical support scam / ESET NOD32

May 2015 Feature Article: Nepal earthquake scam: out for a duck… Table of Contents Nepal earthquake scam: out for a duck… .............................................................................................

Add to Reading List

Source URL: www.virusradar.com

Language: English - Date: 2015-10-06 04:33:11
166Classes of computers / Personal computing / Personal computers / Computer / Laptop / Desktop computer / Macintosh / Cell / Thin client

Comment report Lists all the questions in the survey and displays all the comments made to these questions, if applicable. Table of contents Report info....................................................................

Add to Reading List

Source URL: cio.unm.edu

Language: English - Date: 2013-09-25 13:30:20
167Computer buses / Low-voltage differential signaling / RS-232 / Clock signal / Media-independent interface

VLBI Standard Hardware Interface Specification – VSI-H Revision 1.0 (awaiting final approval) 21 June 2000 Table of Contents 1. 2.

Add to Reading List

Source URL: vlbi.org

Language: English - Date: 2009-08-18 16:35:01
168Distributed data storage / File sharing / Distributed computing / Distributed hash table / Grid computing / Peer-to-peer / Computer cluster / Data grid / Wireless grid

RW-OGS: An Optimized Random Walk Protocol for Resource Discovery in Large Scale Dynamic Grids

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-05-16 08:35:52
169Data modeling / Databases / Infographics / Database index / Nitrate / Microsoft Access / ArcInfo / Column / Table / Database

Chapter 5: Procedures This chapter describes design and implementation of the computer programs used to organize and interpret the data. Definitions of the INFO

Add to Reading List

Source URL: www.ce.utexas.edu

Language: English - Date: 1996-10-17 17:57:30
170Antivirus software / Computer network security / Cyberwarfare / ESET / Malware / David Harley / Computer virus / Sality / Stuxnet / Computer security / Internet security / Avira

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

Add to Reading List

Source URL: www.virusradar.com

Language: English - Date: 2015-06-02 02:58:26
UPDATE