Table computer

Results: 3684



#Item
501Distributed hash table / Tapestry / Kademlia / Peer-to-peer / Pastry / Kad network / PKI Resource Query Protocol / Trie / Gnutella / Distributed data storage / Computing / Chord

PEACHES and Peers Massimiliano Pala and Sean W. Smith Computer Science Department, Dartmouth College 6211 Sudikoff Laboratory, Hanover, NH 03755, US {pala,sws}@cs.dartmouth.edu

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:14
502Serial ATA / Disk enclosure / Hard disk drive / Parallel ATA / Windows 98 / Disk formatting / Computer hardware / Computing / Computer storage media

TM User Manual Table of Contents

Add to Reading List

Source URL: www.newertech.com

Language: English - Date: 2012-08-27 17:07:37
503Computing / Central processing unit / Cache / CPU cache / Translation lookaside buffer / Memory management unit / Page table / Advanced Encryption Standard / Page cache / Computer hardware / Computer memory / Virtual memory

Jackpot Stealing Information From Large Caches via Huge Pages Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA {girazoki,teisenbarth,sunar}@wpi.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 14:39:32
504Memory management / Computer hardware / Kernel / Operating system / Architecture of Windows NT / Page table / Memory management unit / C dynamic memory allocation / Newton / Virtual memory / Computing / Computer architecture

To appear in Proceedings of the 1994 IEEE Computer Conference, San Francisco. Copyright © 1994 IEEE The Newton Operating System Robert Welland†, Greg Seitz†, Lieh-Wuu Wang,

Add to Reading List

Source URL: waltersmith.us

Language: English - Date: 2012-05-07 17:56:07
505Theoretical computer science / Rough set / Attribute grammar / Alert messaging / Internet privacy / Privacy / Attribute / Lookup table / Computing / Computer programming / Ethics

A Flexible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-02 15:23:09
506Architectural lighting design / Home automation / Lighting / Remote control / X10 / Source code / Subroutine / Bc programming language / Environment variable / Computing / Software engineering / Computer programming

Ocelot Manual Table of Contents 33 33

Add to Reading List

Source URL: appdig.com

Language: English - Date: 2003-09-21 00:18:41
507Artificial intelligence / Computer vision / Abstract algebra / Linear algebra / Hashing / Bloom filter / Hash function / Scale-invariant feature transform / Hash table / Algebra / Mathematics / Search algorithms

Compressed Representation of Feature Vectors Using a Bloomier Filter and Its Application to Specific Object Recognition Katsufumi Inoue and Koichi Kise Graduate School of Engineering, Osaka Prefecture University 1-1 Gak

Add to Reading List

Source URL: www.m.cs.osakafu-u.ac.jp

Language: English - Date: 2009-10-05 04:41:49
508

Table 60: Computer and Information Center service status, Year On Campus Courses Course Hours Distance Teaching Course Hours Number of Information Services Inquiries Operating System Number of IP Segment Fibre

Add to Reading List

Source URL: homepage.ntu.edu.tw

- Date: 2015-04-10 02:15:11
    509Distributed computing / File sharing networks / File sharing / Intellectual property law / Peer-to-peer computing / Peer-to-peer / Distributed hash table / Kademlia / ANts P2P / Computing / Concurrent computing / Distributed data storage

    Lecture 25: Security Issues in Structured Peer-to-Peer Networks Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

    Add to Reading List

    Source URL: engineering.purdue.edu

    Language: English - Date: 2015-04-16 10:33:48
    510Computer law / Software licenses / Online chat / Contract law / End-user license agreement / Origin / Instant messaging / Mac OS X Server / Proprietary software / Software / Computing / Computer-mediated communication

    Bopup Messenger User’s Guide Version 6.3.3 Bopup Messenger User’s Guide Table of Contents 1. Getting Started

    Add to Reading List

    Source URL: www.bopup.ru

    Language: English - Date: 2013-11-22 10:02:08
    UPDATE