Computer network

Results: 31604



#Item
21David Andre and John R. Koza This chapter describes the parallel implementation of genetic programming in the C programming language using a PC type computer (running Windows) acting as a host and a network of processing

David Andre and John R. Koza This chapter describes the parallel implementation of genetic programming in the C programming language using a PC type computer (running Windows) acting as a host and a network of processing

Add to Reading List

Source URL: www.genetic-programming.com

Language: English - Date: 2006-11-17 21:16:43
    22An Efficient Spectral Algorithm for Network Community Discovery and Its Applications to Biological and Social Networks Jianhua Ruan and Weixiong Zhang Department of Computer Science and Engineering Washington University

    An Efficient Spectral Algorithm for Network Community Discovery and Its Applications to Biological and Social Networks Jianhua Ruan and Weixiong Zhang Department of Computer Science and Engineering Washington University

    Add to Reading List

    Source URL: cs.utsa.edu

    Language: English - Date: 2007-08-12 17:47:04
      23Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

      Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

      Add to Reading List

      Source URL: people.cs.vt.edu

      Language: English - Date: 2016-09-27 09:25:21
        24NIPISSING-PARRY SOUND CATHOLIC DISTRICT SCHOOL BOARD USAGE OF THE BOARD’S COMPUTER NETWORK AND INTERNET AG

        NIPISSING-PARRY SOUND CATHOLIC DISTRICT SCHOOL BOARD USAGE OF THE BOARD’S COMPUTER NETWORK AND INTERNET AG

        Add to Reading List

        Source URL: www.npsc.ca

        Language: English - Date: 2015-07-31 08:52:54
          25Deploying Safe User-Level Network Services with icTCP Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau Computer Sciences Department University of Wisconsin, Madison {haryadi, dusseau, remzi}@cs.wi

          Deploying Safe User-Level Network Services with icTCP Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau Computer Sciences Department University of Wisconsin, Madison {haryadi, dusseau, remzi}@cs.wi

          Add to Reading List

          Source URL: people.cs.uchicago.edu

          Language: English - Date: 2013-06-09 20:54:18
            26KNAER Mathematics Knowledge Network WHITE PAPER (AprilIntegrated Mathematics + Computer Studies – Gr. 10 Reforming Secondary School Mathematics Education George Gadanidis, Western University –

            KNAER Mathematics Knowledge Network WHITE PAPER (AprilIntegrated Mathematics + Computer Studies – Gr. 10 Reforming Secondary School Mathematics Education George Gadanidis, Western University –

            Add to Reading List

            Source URL: mkn-rcm.ca

            Language: English - Date: 2018-04-11 13:13:07
              27Introduction to NAS Network Attached Storage • NAS is a small computer which • •

              Introduction to NAS Network Attached Storage • NAS is a small computer which • •

              Add to Reading List

              Source URL: www.data.recovery.training

              Language: English - Date: 2015-01-25 07:21:17
                28Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 3 February 23, 2015

                Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ronald L. Rivest Handout 3 February 23, 2015

                Add to Reading List

                Source URL: courses.csail.mit.edu

                Language: English
                  29A Comparative Study of Two Network-based Anomaly Detection Methods Kaustubh Nyalkalkar∗ , Sushant Sinha† , Michael Bailey∗ and Farnam Jahanian∗ ∗ Electrical  Engineering and Computer Science, University of Mich

                  A Comparative Study of Two Network-based Anomaly Detection Methods Kaustubh Nyalkalkar∗ , Sushant Sinha† , Michael Bailey∗ and Farnam Jahanian∗ ∗ Electrical Engineering and Computer Science, University of Mich

                  Add to Reading List

                  Source URL: nsrg.ece.illinois.edu

                  Language: English - Date: 2018-06-11 12:51:20
                    30A Characterization of IPv6 Network Security Policy Mark Allman International Computer Science Institute MAPRG Meeting	 April 2016

                    A Characterization of IPv6 Network Security Policy Mark Allman International Computer Science Institute MAPRG Meeting April 2016

                    Add to Reading List

                    Source URL: www.icir.org

                    Language: English - Date: 2016-04-04 11:55:18