Table computer

Results: 3684



#Item
561Security / Software quality / Crime prevention / National security / Fuzz testing / Computer security / Penetration test / Software assurance / Agile software development / Software testing / Computer network security / Software development

Reference table from Section 3 of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:17
562Garbage collection / Backup / C dynamic memory allocation / Extensible Storage Engine / Hash table / Trie / Computer data storage / Allocator / Computing / Memory management / Fragmentation

Log-structured Memory for DRAM-based Storage Stephen M. Rumble, Ankita Kejriwal, and John Ousterhout, Stanford University https://www.usenix.org/conference/fast14/technical-sessions/presentation/rumble This paper is incl

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-02-18 02:36:40
563Electronic engineering / Computer hardware / Extended display identification data / Electronics / TI MSP430 / Intel / Color depth / Microcontrollers

Microsoft Word - SSD1926-application_note-register_table_1.0.doc

Add to Reading List

Source URL: www.solomon-systech.com

Language: English - Date: 2013-02-25 01:23:31
564Cache / Central processing unit / CPU cache / Lookup table / Dynamic random-access memory / Cache algorithms / Computing / Computer memory / Computer hardware

Adaptive Mode Control: A Static-Power-Efficient Cache Design Huiyang Zhou, Mark C. Toburen, Eric Rotenberg, Thomas M. Conte Department of Electrical and Computer Engineering North Carolina State University {hzhou, mctobu

Add to Reading List

Source URL: research.ac.upc.edu

Language: English - Date: 2002-03-20 08:47:54
565Cross-platform software / Java / Main function / Zookeeper / Software design patterns / Java platform / Computing / Software engineering / Computer programming

ZooKeeper Java Example by Table of contents 1 A Simple Watch Client......................................................................................................2

Add to Reading List

Source URL: zookeeper.apache.org

Language: English - Date: 2012-09-23 18:00:58
566Menu bar / Mouse / Menu / Graphical user interfaces / Windows Vista / Human–computer interaction / System software / Software

HARD ROCK LABELS USER’S MANUAL Updated 7/99 Table of Contents

Add to Reading List

Source URL: www-odp.tamu.edu

Language: English - Date: 1999-11-23 11:24:15
567Distributed hash table / Prefix hash tree / Peer-to-peer / Chord / Trie / P-Grid / B-tree / Binary search tree / Hash table / Distributed data storage / Computing / Computer programming

A Case Study in Building Layered DHT Applications Paper #318 Abstract Recent research has convincingly demonstrated that one can use Distributed Hash Tables (DHTs) to build scalable, robust and efficient applications. On

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2005-09-01 19:45:26
568Monopoly / 105th United States Congress / United States / Anti-Counterfeiting Trade Agreement / Digital Millennium Copyright Act / Copyright law of the United States / Agreement on Trade-Related Aspects of Intellectual Property Rights / Copyright infringement / Trademark / Law / Intellectual property law / Computer law

TPP-ACTA Comparison Table, v. 1 PIJIP Fellows, March 2012 please send comments to General Provisions TPP

Add to Reading List

Source URL: infojustice.org

Language: English - Date: 2012-03-27 12:19:06
569Security / Monoculture / Vulnerability / Internet security / Attack / Operating system / Computer worm / Computer network / Trustworthy computing / Computer network security / Cyberwarfare / Computer security

Table of Contents 1. Introduction by Computer & Communications Industry Association (CCIA)

Add to Reading List

Source URL: www.nospam-pl.net

Language: English - Date: 2003-09-26 08:36:52
570Skip graph / Distributed hash table / Skip list / Connectivity / Linked list / Node / Chord / Bin / Koorde / Distributed data storage / Computing / Computer programming

CCCG 2011, Toronto ON, August 10–12, 2011 Orthogonal Range Search using a Distributed Computing Model Pouya Bisadi∗ Abstract

Add to Reading List

Source URL: www.cccg.ca

Language: English - Date: 2011-08-06 04:11:12
UPDATE