Table computer

Results: 3684



#Item
951Internet privacy / Data / Cryptography / Wireless security / IPsec / Network security / Virtual private network / Encryption / Computer network security / Computing / Cryptographic protocols

Page 2 Table of contents 1. INTRODUCTION................................................................................................................................................... 3

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
952Data cluster / File system / Computer cluster / Cluster chemistry / File Allocation Table / Tone cluster / ExFAT / NTFS / Computing / Music / Disk file systems

How mformatand above calculates needed FAT size Alain Knaff November 13, 2010 This small document explains the formula used by mformat.c to figure out fat size and number of clusters. Due to the way that filesyst

Add to Reading List

Source URL: gnu.org

Language: English - Date: 2010-11-13 11:34:56
953Distributed hash table / Kademlia / Pastry / Tapestry / Peer-to-peer / Trie / Routing / Hash table / Lookup table / Distributed data storage / Computing / Computer programming

Sub-Second Lookups on a Large-Scale Kademlia-Based Overlay Raul Jimenez, Flutra Osmani and Bj¨orn Knutsson KTH Royal Institute of Technology School of Information and Communication Technology Telecommunication Systems L

Add to Reading List

Source URL: people.kth.se

Language: English - Date: 2011-06-30 04:48:21
954Computer arithmetic / Niagara Falls / Subtraction / Addition / Floating point / Louis P. Bénézet / Elementary arithmetic / Binary operations / Mathematics

The Teaching of Arithmetic I: The Story of an experiment Table of Contents The Teaching ...................................................................................................................................

Add to Reading List

Source URL: wol.ra.phy.cam.ac.uk

Language: English - Date: 2000-06-25 06:05:15
955Computer networking / Network performance / Proxy server / Netscape / Internet Explorer / Web Proxy Autodiscovery Protocol / PUM.bad.proxy / Software / Computing / Internet privacy

Table of Contents 1 FAQ AND ERROR MESSAGES ................................................................. 2 1.1

Add to Reading List

Source URL: www.saphymo.de

Language: English - Date: 2013-03-05 05:31:09
956Metadata / Earth sciences graphics software / NetCDF / Statistics / Technical communication / Dimension / Data model / Climate and Forecast Metadata Conventions / GIS file formats / Data / Information / Computer file formats

OceanSITES User’s Manual NetCDF Conventions and Reference Tables Version 1.1 June 30th, 2008 Table of contents

Add to Reading List

Source URL: www.oceansites.org

Language: English - Date: 2012-02-01 06:33:09
957Cache / Computer memory / CPU cache / Central processing unit / Computer storage / Solid-state drive / IOPS / Smart Response Technology / Lookup table / Computing / Computer hardware / Computer performance

Trace Analysis for Block-level Caching in Cloud Computing Systems Pim Van Riezen, Lennard Zwart {pi,lennard}@cloudvps.com Cloud VPS Dulcardo Arteaga, Ming Zhao

Add to Reading List

Source URL: www.cloudvps.com

Language: English - Date: 2013-02-26 05:56:46
958Data modeling / Computing / Linguistics / User interface techniques / Context awareness / SQL / Database / Table / Context / Data management / Database management systems / Relational database management systems

Chameleon: Context-Awareness inside DBMSs∗ Hicham G. Elmongui #1 , Walid G. Aref #2 , Mohamed F. Mokbel ‡3 # Department of Computer Science, Purdue University 305 N. University St., West Lafayette, IN 47907, USA

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:39
959Block ciphers / CPU cache / Ciphertext / Side channel attack / Lookup table / ICE / UES / Cryptanalysis / Cellular Message Encryption Algorithm / Cryptography / Data Encryption Standard / Advanced Encryption Standard

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
960Computer programming / Trie / Null / Hash table / Ternary search tree / Hash function / Binary search tree / Ternary tree / Search algorithms / Computing / Data management

5.2 TRIES Algorithms F O U R T H R O B E R T

Add to Reading List

Source URL: t2.hhg.to

Language: English - Date: 2012-04-03 10:31:19
UPDATE