Transaction time

Results: 336



#Item
41

2010 Paper 5 Question 5 Concurrent and Distributed Systems For a transaction model based on objects and object operation time-stamps: (a) (i ) Define how conflict may be specified in terms of object operation semantics.

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:18:36
    42

    EMK3 Plant Ops Powerful tools to manage complicated gas plant accounting functions Operating a gas plant is a complex and time-consuming process. A gas plant presents a variety of complicated calculations and transaction

    Add to Reading List

    Source URL: www.emk3.com

    Language: English - Date: 2014-12-11 11:14:32
      43Computer programming / Software quality / Concurrency control / Transaction processing / Actor model / Concurrency / Thread / Time of check to time of use / Vulnerability / Computing / Software bugs / Concurrent computing

      Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

      Add to Reading List

      Source URL: www.redballoonsecurity.com

      Language: English - Date: 2014-02-27 21:40:35
      44Transaction processing / Computer programming / Computer memory / Database / Non-volatile memory / Parallel computing / Application checkpointing / Booting / Transactional memory / Computing / Software engineering / Concurrency control

      Nonvolatile Memory is a Broken Time Machine Benjamin Ransford Brandon Lucia University of Washington

      Add to Reading List

      Source URL: sampa.cs.washington.edu

      Language: English - Date: 2014-06-20 15:18:16
      45One-time password / Security token / Fortinet / Two-factor authentication / Password / TOTP / Transaction authentication number / Random password generator / Forensic Toolkit / Computer security / Security / Cryptography

      FortiToken -200 TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200 is

      Add to Reading List

      Source URL: corex.at

      Language: English - Date: 2015-05-13 12:15:11
      46One-time password / Security token / Fortinet / Two-factor authentication / Password / TOTP / Transaction authentication number / Random password generator / Forensic Toolkit / Computer security / Security / Cryptography

      FortiToken -200 TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200 is

      Add to Reading List

      Source URL: www.corex.at

      Language: English - Date: 2015-05-13 12:15:11
      47

      POINT & PAY Point & Pay fees are charged every time their services are used. This fee is in no way charged by the Hamilton County Purchasing Department. TRANSACTION AMOUNT

      Add to Reading List

      Source URL: www.hamiltoncountyohio.gov

      - Date: 2014-04-30 11:03:59
        48Finance / Money laundering / Tax evasion / Money / Cheque / Financial regulation / Business / Payment systems

        (Attachment 3-2) Checklist for Compliance with Criminal Proceeds Transfer Prevention Laws and Regulations in Relation to Verification at the Time of Transaction, etc. and Foreign Exchange Laws and Regulations in Relation

        Add to Reading List

        Source URL: www.mof.go.jp

        Language: English - Date: 2014-05-16 17:19:06
        49System software / Cache / Computer memory / Relational database management systems / CPU cache / Computer data storage / Oracle Database / Solid-state drive / File system / Computing / Software / Database management systems

        Transaction Processing With General-Purpose Servers How Solid Data File Caching Technology Delivers Real-Time Transaction and Messaging Performance May 2002

        Add to Reading List

        Source URL: www.soliddata.com

        Language: English - Date: 2012-02-11 16:21:34
        50Social engineering / Internet protocols / One-time password / Two-factor authentication / Password / Phishing / Transaction authentication number / Authentication / Man-in-the-middle attack / Security / Computer security / Cryptography

        CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

        Add to Reading List

        Source URL: www.cerias.purdue.edu

        Language: English - Date: 2015-02-13 13:31:35
        UPDATE