G–network

Results: 1960



#Item
81Computing / Image compression / Network architecture / Internet protocols / JPIP / Hypertext Transfer Protocol / JPEG / Cache / Transmission Control Protocol

Improved JPIP protocol with proxy caching J.P. Ortiz, V.G. Ruiz and I. Garc´ıa Abstract—This paper presents a set of minimal modifications of the JPIP protocol, with HTTP as transporting protocol, in order to exploit

Add to Reading List

Source URL: www.hpca.ual.es

Language: English - Date: 2013-01-29 11:20:47
82Wireless sensor network / Wireless networking / WSN / ANT / Secure data aggregation in WSN / Mobile wireless sensor network

SensorBench: Benchmarking Approaches to Processing Wireless Sensor Network Data Ixent Galpin1 , Alan B. Stokes2 , George Valkanas3 , Alasdair J. G. Gray4 , Norman W. Paton2 , Alvaro A. A. Fernandes2 , Kai-Uwe Sattler5 ,

Add to Reading List

Source URL: ssdbm2014.org

Language: English - Date: 2014-07-31 04:28:38
83Health care / Health / Medicine / Healthcare quality / Medical terminology / Hospice / Nursing / Patient safety / National Health Service / Health informatics / Hospital network / Patient safety organization

22nd E A H M C O N G R E S S LEADERSHIP FOR NEW CHALLENGES OPENING CEREMONY ight after the EAHM General Assembly (see report on p. 7-8), the Congress

Add to Reading List

Source URL: www.eahm.eu.org

Language: English - Date: 2010-05-21 03:30:00
84Computing / Computer architecture / Parallel computing / Computer performance / Data transmission / IOPS / Storage area network / Scalability / Computer data storage / Solid-state drive / MapReduce / Computer cluster

CLOUD/STORAGE scc Informed Provisioning of Storage for Cluster Applications H A R S H A V. M A D H YA S T H A , J O H N C . M C C U L L O U G H , G E O R G E P O R T E R ,

Add to Reading List

Source URL: www.sysnet.ucsd.edu

Language: English - Date: 2012-06-26 19:14:47
85Statistics / Computer security / Computer network security / Outlier / Statistical analysis / Anomaly / Threat

Sequential Feature Explanations for Anomaly Detection Md Amran Siddiqui, Alan Fern, Thomas G. Die8erich and Weng-Keen Wong School of EECS

Add to Reading List

Source URL: intelligence.org

Language: English - Date: 2016-05-31 11:21:14
86Broadband / Technology / Emerging technologies / Network architecture / Digital subscriber line / Mobile telecommunications / Telecommunications equipment / Broadband Forum / Network function virtualization / Software-defined networking / 5G / G.fast

Keeping you updated about our activities! Here we highlight our latest work and focus on areas which are most critical. A Word from our CEO As the anniversary of our Broadbandlaunch approaches, this week’s meeti

Add to Reading List

Source URL: www.broadband-forum.org

Language: English - Date: 2016-08-03 11:08:27
87Cognitive science / Cognition / Neuropsychology / Semantic memory / Semantics / Memory / Artificial neural network / Speech recognition / Short-term memory / Language model / Recall / Encoding

Under review as a conference paper at ICLRT HE G OLDILOCKS P RINCIPLE : R EADING C HILDREN ’ S B OOKS WITH E XPLICIT M EMORY R EPRESENTATIONS arXiv:1511.02301v3 [cs.CL] 5 Jan 2016

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-01-06 22:26:21
88Computing / Network file systems / Computer architecture / Inter-process communication / Server Message Block / Computer storage devices / SMB / File server / Path

Microsoft Word - G drive for Mac.doc

Add to Reading List

Source URL: support.okstate.edu

Language: English - Date: 2015-11-20 10:57:15
89Filmmaking / Film / Computer vision / Business / Crowdsourcing / Convolutional neural network / YouTube / Screenplay

arXiv:1604.01753v3 [cs.CV] 26 JulHollywood in Homes: Crowdsourcing Data Collection for Activity Understanding Gunnar A. Sigurdsson1 , G¨

Add to Reading List

Source URL: ai2-website.s3.amazonaws.com

Language: English - Date: 2016-08-03 14:55:37
90Computational neuroscience / Applied mathematics / Artificial neural networks / Cybernetics / Cognitive science / Computer vision / Convolutional neural network / Artificial intelligence / Computer Go / Monte Carlo tree search / Monte Carlo method / CNN

Published as a conference paper at ICLRM OVE E VALUATION IN G O U SING D EEP C ONVOLUTIONAL N EURAL N ETWORKS arXiv:1412.6564v2 [cs.LG] 10 Apr 2015

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-04-12 20:19:23
UPDATE