Computer network

Results: 31604



#Item
971Computing / Technology / Mobile technology / Mobile computers / Mobile device management / Mobile phones / Bring your own device / Computer network security / Android / Computer security / Enterprise mobility management

TEL_endorsement_blue_cmyk_CS5_No Background_No7

Add to Reading List

Source URL: tarynn.writerfolio.com

Language: English - Date: 2014-02-19 10:50:44
972Computer network security / Computer security / Cyberwarfare / Computing / Data security / Firewall / Network management / Antivirus software

Classics Department Computing Resources Guide This document is intended to provide quick guidance for new faculty, new graduate students, and research visitors in Classics and AHMA. Table of Contents CalNet ID—the esse

Add to Reading List

Source URL: ucbclassics.dreamhosters.com

Language: English
973Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
974Computing / Network architecture / Computer networking / Crime prevention / Cryptography / National security / Network segmentation / Virtual firewall / Data center / Check Point / Computer security / Information security

Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:40
975Computing / Concurrent computing / File sharing / Domain name system / Distributed data storage / Computer networking / Content delivery network / Name server / Clientserver model / Peer-to-peer / Node / Server

ClosestNode.com: An Open-Access, Scalable, Shared Geocast Service for Distributed Systems Bernard Wong Emin Gun ¨ Sirer Dept. of Computer Science, Cornell University, Ithaca, NY 14853 {bwong, egs}@cs.cornell.edu

Add to Reading List

Source URL: cs.uwaterloo.ca

Language: English - Date: 2011-08-04 20:21:16
976Computing / Data / Streaming / Data management / Multimedia / Computer networking / Quality of service / Content delivery network / MPEG-7 / Meta-data management

ENTHRONE Integrated Management Supervisor (EIMS) Michael Ransburg Klagenfurt University (UNIKLU)  Faculty of Technical Sciences (TEWI) Department of Information Technology (ITEC)  Multimedia Communication (MMC)

Add to Reading List

Source URL: enthrone.itec.uni-klu.ac.at

Language: English - Date: 2008-04-23 16:17:06
977Technology / Computing / Network architecture / Computer architecture / Mobile technology / Internet Standards / Internet protocols / Deep packet inspection / Sandvine / Policy and charging rules function / Roaming / Real-time charging

Usage Management: Overview Power revenue growth with standards-based service innovation Sandvine’s Usage Management allows you to increase revenue and achieve competitive differentiation by rapidly introducing a wide r

Add to Reading List

Source URL: www.sandvine.com

Language: English
978Computational linguistics / Linguistics / Artificial neural networks / Artificial intelligence / Computational science / Semantics / Natural language processing / Deep learning / Recursive neural network / Recurrent neural network / Parsing / Speech recognition

When Are Tree Structures Necessary for Deep Learning of Representations? Jiwei Li1 , Minh-Thang Luong1 , Dan Jurafsky1 and Eduard Hovy2 Computer Science Department, Stanford University, Stanford, CALanguage Tech

Add to Reading List

Source URL: nlp.stanford.edu

Language: English - Date: 2015-10-31 15:44:36
979Security / Computer security / Computing / Cryptography / Computer access control / E-commerce / Computer network security / National security / Single sign-on / Authentication / Encryption / Cloud computing security

OS_IIR_CloudSecurity_Infographic_v6

Add to Reading List

Source URL: oneshield.com

Language: English - Date: 2016-06-30 14:58:41
980Machine learning / Artificial intelligence / Markov models / Learning / Automatic identification and data capture / Computer accessibility / Speech recognition / Mixture model / Cluster analysis / Language model / Janus Recognition Toolkit / Viterbi algorithm

Gaussian Free Cluster Tree Construction using Deep Neural Network Linchen Zhu, Kevin Kilgour, Sebastian St¨uker, Alex Waibel International Center for Advanced Communication Technologies - InterACT, Institute of Anthropo

Add to Reading List

Source URL: isl.anthropomatik.kit.edu

Language: English - Date: 2015-09-10 06:13:32
UPDATE