Computer architecture

Results: 21936



#Item
101Network architecture / Computing / Fiber-optic communications / Network protocols / Computer architecture / Routing / Automatically switched optical network / Synchronous optical networking / Bandwidth / Multiprotocol Label Switching / Shortest path problem

Improving Restoration Success in Mesh Optical Networks Fang Yu 1, Rakesh Sinha2, Dongmei Wang3, Guangzhi Li3, John Strand2, Robert Doverspike2, Charles Kalmanek 3, and Bruce Cortez 2 1 EECS Department, UC Berkeley, Berke

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 20:21:43
102Computer architecture / Computing / Software / Windows 8 / Windows 10 / Mobile operating systems / Smartphones / Windows Phone / Windows 10 Mobile / Windows 8.1 / Caps lock / Microsoft Windows

www.hurstvillescc.org.au “keeping up with our grandchildren” Member of ASCCA

Add to Reading List

Source URL: www.hurstvillescc.org.au

Language: English - Date: 2016-05-31 08:58:22
103Software / Computing / Computer architecture / OS X / Adobe Flash / Adobe software / Cross-platform software / OS X Mountain Lion / Bleed / Trim

MEDIA KIT AUTOMOBILE MAGAZINE PRINT ONLINE RICH MEDIA

Add to Reading List

Source URL: 3wcxa34aqoe1j6p3g23gcv11.wpengine.netdna-cdn.com

Language: English - Date: 2016-06-08 01:51:33
104Computing / Concurrent computing / Software / Hadoop / Parallel computing / Apache Software Foundation / Distributed computing architecture / Query languages / Apache Hadoop / Data-intensive computing / MapReduce / Pig

Hyracks: A Flexible and Extensible Foundation for Data-Intensive Computing Vinayak Borkar, Michael Carey, Raman Grover, Nicola Onose, Rares Vernica Computer Science Department, University of California, Irvine Irvine, CA

Add to Reading List

Source URL: asterixdb.ics.uci.edu

Language: English - Date: 2013-06-06 15:43:58
105Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:10
106Concurrency control / Computing / Computer architecture / Computer engineering / Linearizability / Safe semantics / Processor register / Shared register / Atomic semantics

Exercise 11: Counting 1 The goal of this exercise is to understand the consistency properties of the bounded max register implementation from the lecture. a) Show that if one always writes to R< if i < M , regardless of

Add to Reading List

Source URL: resources.mpi-inf.mpg.de

Language: English - Date: 2015-01-14 07:29:22
107System software / Software / Computer architecture / Boot loaders / BIOS / Booting / Cyberwarfare / Windows Vista / Rootkit / Windows Vista startup process / Reboot / Computer security

REboot: Bootkits Revisited Bootkit Basics State of the art REboot

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
108Fault-tolerant computer systems / Computing / Computer architecture / Concurrent computing / Data synchronization / State machine replication / Byzantine fault tolerance / Replication / Clientserver model / Microkernel / Server

Attested Append-Only Memory: Making Adversaries Stick to their Word Byung-Gon Chun† Petros Maniatis⋆ Scott Shenker†‡ †

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
109Computing / Software / Computer architecture / Smartphones / Hong Kong / Pearl River Delta / South China Sea / Android

Hong Kong Toolbar Entertainment Total No. of Download: 895,000+ Total Weekly Pop Up Impression: 1,340,000+ Total Weekly Banner Impression: 1,430,000+

Add to Reading List

Source URL: hot-mob.com

Language: English - Date: 2016-08-17 23:34:13
110Computing / Computer hardware / Computer performance / Computer storage media / Non-volatile memory / Solid-state drive / Composability / Hyper-V / IOPS / Storage area network / Apache Hadoop / Direct memory access

Composable Architecture for Rack Scale Big Data Computing Chung-Sheng Li1, Hubertus Franke1, Colin Parris2, Bulent Abali1, Mukil Kesavan3, Victor Chang4 1. IBM Thomas J. Watson Research Center, Yorktown Heights, NY 1059

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2016-07-21 12:31:14
UPDATE