Technical analysis software

Results: 454



#Item
31Economy / Technical communication / Software testing / Usability / Technology / Humancomputer interaction / Finance / Costs / Costbenefit analysis / Valuation

APPLIED THEORY SUMMARY 䉬 Explains the concept of value added and

Add to Reading List

Source URL: redish.net

Language: English - Date: 2015-09-23 12:42:32
32

Nomination: Best Technical Analysis Platform Awards 2015 ‘Best Technical Analysis Platform’ Is your firm responsible for offering the best technical analysis platform/software for professional traders, fund managers

Add to Reading List

Source URL: www.technicalanalyst.co.uk

Language: English - Date: 2014-11-17 08:15:18
    33Defense Technical Information Center / Office of the Secretary of Defense / Government procurement in the United States / United States Secretary of Defense / Defense Science Board / Military acquisition / Institute for Defense Analyses / Under Secretary of Defense for Acquisition /  Technology and Logistics / Classified information / Washington Headquarters Services / Data & Analysis Center for Software

    Further dissemination only as directed by the Office of the Under Secretary of Defense for Acquisition/Acquisition Policy and Program Integration. Document not releasable to DTIC for secondary distribution because of con

    Add to Reading List

    Source URL: pogoarchives.org

    Language: English - Date: 2015-10-27 01:39:04
    34Software engineering / Computer programming / Computing / Subroutines / Lambda calculus / Functional programming / Data types / JavaScript / Eval / Anonymous function / Scope / Substitution

    Dynamic Information Flow Analysis for Featherweight JavaScript Technical Report #UCSC-SOEThomas H. Austin UC Santa Cruz

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2011-11-15 10:51:13
    35Programming language implementation / Transformation languages / Program transformation / ASF+SDF Meta Environment / Compiler / Principal component analysis / Domain-specific language / S0 / Type system / Computing / Software engineering / Programming language theory

    Delft University of Technology Software Engineering Research Group Technical Report Series Fusing a Transformation Language with an Open Compiler

    Add to Reading List

    Source URL: swerl.tudelft.nl

    Language: English - Date: 2008-03-31 08:21:05
    36

    Annual Report 2011 Business concept NORSAR Innovation AS markets and sells commercial software packages for 2D/3D seismic modelling and reservoir analysis; combined technical

    Add to Reading List

    Source URL: www.norsar.no

    Language: English
      37

      Annual Report 2010 Business concept NORSAR Innovation AS markets and sells commercial software packages for 2D/3D seismic modelling and reservoir analysis; combined technical

      Add to Reading List

      Source URL: www.norsar.no

      Language: English
        38Reflection seismology / Norway / Skedsmo / NORSAR / Kjeller

        Annual Report 2012 Business concept NORSAR Innovation AS markets and sells commercial software packages for 2D/3D seismic modelling and reservoir analysis; combined with technical

        Add to Reading List

        Source URL: www.norsar.no

        Language: English
        39Internet censorship / Internet privacy / Proxy servers / Reverse proxy / Computer network security / Ultrasurf / Great Firewall of China / Internet censorship circumvention / Squid / Computing / Software / Internet

        Technical analysis of the Ultrasurf proxying software Jacob Appelbaum The Tor Project Abstract Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a t

        Add to Reading List

        Source URL: media.torproject.org

        Language: English - Date: 2012-04-16 15:36:36
        40Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security

        2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2014-04-30 03:10:08
        UPDATE