Remote computer

Results: 3393



#Item
151Emerging technologies / Internet of Things / Ambient intelligence / Wind River Systems / Smart city / Computer security / Smart grid / Smart meter

The Intelligence in the Internet of Things INTERNET OF THINGS: SMART BUILDINGS USE CASE • Remote monitoring and control: Building operators and residential consumers will be able to monitor utility consumption and co

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2014-04-09 23:14:38
152Cartography / Geographic information systems / Cartographic generalization / Generalization / Topological map / Digital elevation model / Topography / Remote sensing / Map

SOFTWARE-DEVELOPMENTS FOR COMPUTER-ASSISTED GENERALIZATION U. MEYER Institute of Cartography University of Hannover Callinstrasse 32

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:28:50
153Computer data / Cartography / Geographic data and information / Remote sensing / Spatial analysis / Data processing / SPSS / Data set / Erdas Imagine / Geographic information system

A STUDY OF SPATIAL DATA MANAGEMENT AND ANALYSIS SYSTEMS Clyde Christopher Jackson State University

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 00:33:07
154

To use LSUHSC remote access, type “remote.lsuhsc.edu” in the browser’s address line from any computer with internet access. Press . Enter your LSUHSC username and password in the appropriate boxes, and sel

Add to Reading List

Source URL: alliedhealth.lsuhsc.edu

- Date: 2013-01-25 14:44:25
    155Municipalities of Portugal / International Conference on Remote Engineering and Virtual Instrumentation / University of Porto / International Conference on Interactive Computer Aided Learning / Coimbra / Porto

    Call for Papers “Talking about Teaching 2016” (TaT’16) SPEE Special Session @ 45th IGIP International Conference on Engineering PedagogySeptember 2016, Belfast, UK http://www.icl-conference.org/icl2016/ The

    Add to Reading List

    Source URL: icl-conference.org

    Language: English - Date: 2016-06-07 11:23:02
    156Biometrics / Computer access control / Security / Cryptographic nonce / Cryptography / Password / Iris recognition / Challengeresponse authentication / Authentication / Private biometrics / Fuzzy extractor

    PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

    Add to Reading List

    Source URL: vast.uccs.edu

    Language: English - Date: 2012-07-06 12:46:22
    157Remote desktop / Desktop virtualization / Citrix Systems / Acer Inc. / Xeon / Thin client / Nvidia Ion / Acer TravelMate / Virtual Computer

    Acer Shared Resource Computing (SRC) Solution Brief As business grows, the number of personal computers and servers continues to stagger, and the cost is incremental to maintain and service.

    Add to Reading List

    Source URL: static.acer.com

    Language: English - Date: 2013-07-08 21:41:47
    158Supercomputers / Computer networks / SCSI / Computer memory / IWARP / Windows Server / Remote direct memory access / TCP offload engine / Hyper-V / LIO / ISCSI / InfiniBand

    Scaling SMB for Server 2012 with RDMA over Ethernet The release of Windows Server 2012 is expected to be one of the largest, most feature rich Server Operating System releases for Microsoft. Besides a new user interface,

    Add to Reading List

    Source URL: www.chelsio.com

    Language: English - Date: 2012-12-05 16:58:44
    159Health informatics / Surgery / Telehealth / Computer-assisted surgery / Videotelephony / Robot-assisted surgery / Remote surgery / Laparoscopic surgery / Society of American Gastrointestinal and Endoscopic Surgeons / Intuitive Surgical / General surgery / Da Vinci Surgical System

    Microsoft Word - ARTICLE # 3 AUGESTAD.docx

    Add to Reading List

    Source URL: www.surgery.uci.edu

    Language: English - Date: 2016-01-04 18:22:09
    160Cyberwarfare / Computer network security / Spamming / Cybercrime / Multi-agent systems / Ransomware / Computer security / Malware / Denial-of-service attack / Botnet / Search warrant / Phishing

    Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

    Add to Reading List

    Source URL: www.privacyink.org

    Language: English - Date: 2015-10-13 22:14:45
    UPDATE