Table computer

Results: 3684



#Item
481Information / Computer network security / Protected Extensible Authentication Protocol / Windows Server / Extensible Authentication Protocol / IEEE 802.1X / Windows / Authentication protocol / Transport Layer Security / Computing / Wireless networking / Data

Cisco − Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication Table of Contents Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication.......................1 Docum

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:22:41
482Fault-tolerant computer systems / Distributed data storage / Distributed computing architecture / PlanetLab / Software testing / Peer-to-peer / Amazon Elastic Compute Cloud / Replication / Distributed hash table / Cloud computing / Computing / Centralized computing

Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs Amre Shakimov Alexander Varshavsky

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2009-07-22 15:10:52
483Peer-to-peer / Computer security / Distributed hash table / Johann Jakob Heckel / Malware / Kademlia / Blacklist / Mannheim / Hash table / Distributed data storage / File sharing networks / Computing

Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia Philipp C. Heckel, University of Mannheim,

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:52:55
484Branch predictor / Boolean algebra / Alpha 21264 / CPU cache / Branch misprediction / Lookup table / Boolean function / Boolean circuit / Computing / Computer architecture / Computer hardware

Boolean Formula-based Branch Prediction for Future Technologies Daniel A. Jim´enez Dept. of Computer Sciences The University of Texas at Austin Austin, TX 78712 

Add to Reading List

Source URL: research.ac.upc.edu

Language: English - Date: 2002-03-20 08:47:57
485Computer law / Software licenses / Online chat / Contract law / End-user license agreement / Origin / Instant messaging / Mac OS X Server / Proprietary software / Software / Computing / Computer-mediated communication

Bopup Messenger User’s Guide Version 6.3.3 Bopup Messenger User’s Guide Table of Contents 1. Getting Started

Add to Reading List

Source URL: www.bopup.de

Language: English - Date: 2013-11-22 10:00:14
486Universal Serial Bus / Disk enclosure / Hard disk drive / USB 3.0 / Solid-state drive / Bus / ESATAp / USB flash drive / Computer hardware / Serial ATA / IEEE

Voyager Q USER GUIDE TABLE OF CONTENTS 1. INTRODUCTION............................................................................................1 1.1 MINIMUM SYSTEM REQUIREMENTS

Add to Reading List

Source URL: www.newertech.com

Language: English - Date: 2014-07-24 17:48:55
487System software / Mouse / Menu bar / Double-click / Drag and drop / Pointing device gesture / Button / Control key / Point and click / User interface techniques / Software / Human–computer interaction

Table Of Wingeom Labs Intersecting Lines Sentry Theorem Angle Bisector I Angle Bisector II Reflection

Add to Reading List

Source URL: math.exeter.edu

Language: English - Date: 2010-07-08 14:38:42
488Security / Cyberwarfare / Voluntary Voting System Guidelines / Electronic voting / Voting machine / Voter-verified paper audit trail / Threat / Access control / Voting system / Computer security / Election technology / Politics

Security Requirements Table of Contents2

Add to Reading List

Source URL: votingintegrity.org

Language: English - Date: 2007-09-27 15:46:01
489Distributed computing / File sharing / Distributed hash table / Failure detector / Pastry / Routing / Latency / Content delivery network / Low latency / Concurrent computing / Computing / Distributed data storage

Latency- and Bandwidth-Minimizing Optimal Failure Detectors Kelvin So Emin G¨un Sirer Dept. of Computer Science, Cornell University, Ithaca, NY 14853 {kelvinso, egs}@cs.cornell.edu Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2006-07-26 22:24:20
490Software / Logical volume management / Logical Volume Manager / NetBSD / BSD disklabel / GUID Partition Table / LVM / IBM AIX / Volume group / System software / Computer storage / Computer architecture

NetBSD LVM implementation Adam Hamsik EuroBSDcon 2009, Cambridge, UK

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2009-09-17 18:18:03
UPDATE