Software inspection

Results: 601



#Item
571Traffic classification / Deep packet inspection / Traffic shaping / BitTorrent / Throughput / Network neutrality / EMule / Tor / Quality of service / Software / Network performance / Computing

Glasnost: Enabling End Users to Detect Traffic Differentiation Marcel Dischinger Massimiliano Marcon Saikat Guha

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2010-03-18 13:36:48
572System software / Spamming / Spam filtering / Computer networking / Deep packet inspection / Anti-spam techniques / Proxy server / Denial-of-service attack / Malware / Computing / Computer network security / Computer security

GAJSHIELD Progressive Security Data Sheet Data Leak Prevention

Add to Reading List

Source URL: www.gajshield.com

Language: English - Date: 2013-10-14 02:22:44
573Evaluation / First article inspection / Purchasing process / Quality assurance / Requirement / AS9100 / Reliability engineering / Software quality control / Validation / Quality / Business / Management

Page 1 of 39 Revision Q7.4.1–3 A

Add to Reading List

Source URL: magellan.aero

Language: English - Date: 2014-01-09 13:34:35
574System software / Spamming / Spam filtering / Computer networking / Deep packet inspection / Anti-spam techniques / Proxy server / Denial-of-service attack / Malware / Computing / Computer network security / Computer security

GAJSHIELD Progressive Security Data Sheet Data Leak Prevention

Add to Reading List

Source URL: www.gajshield.com

Language: English - Date: 2013-09-13 04:07:57
575Computer programming / Defect tracking / Software bug / Fagan inspection / Software development process / Test automation / Acceptance testing / Debugging / Quality assurance / Software testing / Software development / Software quality

SOFTWARE DEFECT ORIGINS AND REMOVAL METHODS Capers Jones, Vice President and Chief Technology Officer Namcook Analytics LLC Draft 5.0

Add to Reading List

Source URL: www.ifpug.org

Language: English - Date: 2013-02-11 13:57:19
576SRI International / User interfaces / Usability inspection / Science / Usability / Calendaring software / User experience / Cognitive walkthrough / Recommender system / Human–computer interaction / Artificial intelligence / CALO

Evaluating User-Adaptive Systems: Lessons from Experiences with a Personalized Meeting Scheduling Assistant Pauline M. Berry, Thierry Donneau-Golencer, Khang Duong Melinda Gervasio, Bart Peintner, Neil Yorke-Smith SRI In

Add to Reading List

Source URL: www.ai.sri.com

Language: English - Date: 2010-01-06 13:57:08
577System software / Spamming / Spam filtering / Computer networking / Deep packet inspection / Anti-spam techniques / Proxy server / Denial-of-service attack / Malware / Computing / Computer network security / Computer security

GAJSHIELD Progressive Security Data Sheet Data Leak Prevention

Add to Reading List

Source URL: www.gajshield.com

Language: English - Date: 2013-09-13 03:13:54
578Software / Computing / Animal and Plant Health Inspection Service / Wildlife Services / ADMB

ANIMAL DAMAGE MANAGEMENT BOARD WYOMING 6607 Campstool Road, Cheyenne, WY[removed]

Add to Reading List

Source URL: www.wyadmb.com

Language: English - Date: 2013-10-21 12:02:42
579Evaluation / First article inspection / Purchasing process / Quality assurance / Requirement / AS9100 / Reliability engineering / Software quality control / Validation / Quality / Business / Management

Page 1 of 39 Revision Q7.4.1–3 A

Add to Reading List

Source URL: www.verdictaerospace.com

Language: English - Date: 2014-01-09 13:34:35
580System software / Spamming / Spam filtering / Computer networking / Deep packet inspection / Anti-spam techniques / Proxy server / Denial-of-service attack / Malware / Computing / Computer network security / Computer security

GAJSHIELD Progressive Security

Add to Reading List

Source URL: www.gajshield.com

Language: English - Date: 2013-09-13 03:41:33
UPDATE