Kernel

Results: 5601



#Item
861Profilers / ARM architecture / Linux-based devices / Microcontrollers / Single-board computers / Perf / Raspberry Pi / Device tree / Linux kernel / Linux / Kernel / Loadable kernel module

UMaine ECE Tech ReportEnabling Raspberry Pi Performance Counter Support on Linux perf_event Chad Paradis

Add to Reading List

Source URL: web.eece.maine.edu

Language: English - Date: 2014-06-13 11:23:43
862

TEF020-S001en T-Kernel Specification TEF020–S001–en TEF020-S001en

Add to Reading List

Source URL: www.tron.org

Language: English - Date: 2015-03-28 02:57:47
    863

    TEF020-S001ja T-K ern el 仕様書 T-Kernel 年 10 月

    Add to Reading List

    Source URL: www.tron.org

    Language: Japanese - Date: 2015-03-28 02:58:04
      864

      Linino OS Linino OS Stack Linux Kernel 3.11

      Add to Reading List

      Source URL: www.arduino.org

      - Date: 2015-10-21 07:04:55
        865Statistical classification / Machine learning / Parts of speech / Support vector machines / Classifier / Structured support vector machine / Binary classification / Kernel method / Affective computing / Classifier chains

        Ensemble of SVM Trees for Multimodal Emotion Recognition Viktor Rozgić, Sankaranarayanan Ananthakrishnan, Shirin Saleem, Rohit Kumar, and Rohit Prasad Speech Language and Multimedia Technologies, Raytheon BBN Technologi

        Add to Reading List

        Source URL: www.apsipa.org

        Language: English - Date: 2012-11-01 02:45:24
        866Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

        Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

        Add to Reading List

        Source URL: home.regit.org

        Language: English - Date: 2015-10-01 09:35:59
        867Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

        A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2008-08-18 13:41:12
        868

        Advanced Studies in Pure Mathematics 25, 1997 CR-Geometry and Overdetermined Systems pp. 167–220 Invariant theory of the Bergman kernel Kengo Hirachi and Gen Komatsu

        Add to Reading List

        Source URL: www.ms.u-tokyo.ac.jp

        Language: English - Date: 2003-07-10 08:50:33
          869Software / System software / Computer architecture / FreeBSD / Archive formats / Berkeley Software Distribution / Software maintenance / Ports collection / Loadable kernel module / NetBSD / MD5 / Patch

          USENIX Association Proceedings of BSDCon ’03 San Mateo, CA, USA September 8–12, 2003

          Add to Reading List

          Source URL: www.daemonology.net

          Language: English - Date: 2003-08-25 13:38:51
          870

          Kernel Methods Bernhard Sch¨ olkopf Max-Planck-Institut f¨ ur biologische Kybernetik

          Add to Reading List

          Source URL: mlg.eng.cam.ac.uk

          Language: English - Date: 2009-08-30 09:57:00
            UPDATE