Computer case

Results: 3867



#Item
221Fault-tolerant computer systems / Distributed algorithms / Analysis of algorithms / Data synchronization / Paxos / Consensus / Replication / Raft / Distributed computing / Extensible Storage Engine / Leader election / Best /  worst and average case

In Search of an Understandable Consensus Algorithm (Extended Version) Diego Ongaro and John Ousterhout Stanford University Abstract

Add to Reading List

Source URL: ongardie.net

Language: English - Date: 2014-10-23 02:16:26
222Hacking / Computer security / Computer network security / Cryptography / National security / Cross-site request forgery / Oscar / SQL injection / Cross-site scripting / Application security / Vulnerability

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
223Theoretical computer science / Computability theory / Algorithm / Mathematical logic / Algorithms / Recursion / Function / Algorithm characterizations / Elliptic curve primality

CS369N: Beyond Worst-Case Analysis Lecture #1: Instance Optimality∗ Tim Roughgarden† February 19,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-09-26 19:00:24
224Classes of computers / Laptop / Personal computing / Personal computer

Case Study NetSupport Manager How/where has NetSupport added value? Saved money Increased productivity Saves time

Add to Reading List

Source URL: www.netsupportsoftware.com

Language: English - Date: 2016-03-22 11:13:43
225Parallel computing / Message Passing Interface / Portable /  Extensible Toolkit for Scientific Computation / MPICH / Computer cluster / Synchronization

Nonuniformly Communicating Noncontiguous Data: A Case Study with PETSc and MPI ∗ † P. Balaji D. Buntinas S. Balay B. Smith R. Thakur W. Gropp Mathematics and Computer Science Division

Add to Reading List

Source URL: wgropp.cs.illinois.edu

Language: English - Date: 2016-08-16 11:52:12
226Crime prevention / Cryptography / Information governance / National security / Cultural globalization / Internet / Content-control software / Computer security / World Wide Web / Educational technology / Draft:ICT Security Policy System: A Case Study / Acceptable use policy

INTER‐LAKES SCHOOL DISTRICT    TECHNOLOGY USAGE POLICY    The Inter‐Lakes School District (hereto referred as “District”) recognizes the value of computer and other electronic  resources 

Add to Reading List

Source URL: www.interlakes.org

Language: English - Date: 2016-05-31 20:05:19
227Marketing / Telephony / Computer telephony integration / Call centre / Outsourcing

D1.1 Preliminary Version Use Case Design_v1.3

Add to Reading List

Source URL: www.sensei-conversation.eu

Language: English - Date: 2014-08-18 12:22:18
228Archive formats / Zip / Comma-separated values / Data file / Spreadsheet / File Transfer Protocol / Tar / Computer file

1 README Census 2000 Summary File 4 Delivered via FTP PRIVATE

Add to Reading List

Source URL: library.case.edu

Language: English
229Autodesk / AutoCAD / Computer-aided design / .dwg / CAD Overlay / MicroStation / GTX Corp

GTX Case Study Telecomms Utility Sector Where Paper and CAD Connect™ BT CALL ON GTX FOR HELP WITH DRAWINGS

Add to Reading List

Source URL: www.gtx.com

Language: English - Date: 2009-09-09 15:46:44
230Software testing / Computer security / Program analysis / Static / Application security / FxCop / FindBugs / Worst-case execution time

Microsoft PowerPoint - DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:27
UPDATE