Computer network

Results: 31604



#Item
81Computer Network Defence Ltd: armed forces corporate covenant pledge

Computer Network Defence Ltd: armed forces corporate covenant pledge

Add to Reading List

Source URL: www.gov.uk

- Date: 2016-11-23 05:16:03
    82Modeling the Visual Word Form Area Using a Deep Convolutional Neural Network Sandy Wiraatmadja () Department of Computer Science and Engineering, University of California San Diego 9500 Gilman Dr 0404, L

    Modeling the Visual Word Form Area Using a Deep Convolutional Neural Network Sandy Wiraatmadja () Department of Computer Science and Engineering, University of California San Diego 9500 Gilman Dr 0404, L

    Add to Reading List

    Source URL: mindmodeling.org

    - Date: 2016-08-03 11:42:52
      83NOn: Network Function Virtualization Ontology towards Semantic Service Implementation Luis Cuellar Hoyos and Christian Esteve Rothenberg School of Electrical and Computer Engineering (FEEC) University of Campinas (UNICAM

      NOn: Network Function Virtualization Ontology towards Semantic Service Implementation Luis Cuellar Hoyos and Christian Esteve Rothenberg School of Electrical and Computer Engineering (FEEC) University of Campinas (UNICAM

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

        84Bayesian Network Automata for Modelling Unbounded Structures James Henderson Department of Computer Science University of Geneva Geneva, Switzerland

        Bayesian Network Automata for Modelling Unbounded Structures James Henderson Department of Computer Science University of Geneva Geneva, Switzerland

        Add to Reading List

        Source URL: aclweb.org

        - Date: 2011-09-20 12:01:49
          85Radiator - a true NFV solution  What is NFV? ● In computer science, network-function virtualization (NFV) is a network architecture concept that uses the technologies of IT virtualization to virtualize entire

          Radiator - a true NFV solution What is NFV? ● In computer science, network-function virtualization (NFV) is a network architecture concept that uses the technologies of IT virtualization to virtualize entire

          Add to Reading List

          Source URL: open.com.au

          - Date: 2016-02-17 07:12:53
            862013 IEEE Conference on Computer Vision and Pattern Recognition  Deep Convolutional Network Cascade for Facial Point Detection Yi Sun1 1

            2013 IEEE Conference on Computer Vision and Pattern Recognition Deep Convolutional Network Cascade for Facial Point Detection Yi Sun1 1

            Add to Reading List

            Source URL: www.cv-foundation.org

            - Date: 2013-06-08 15:23:30
              87Celebrations of Women in Computing Imagine yourself surrounded by 200 computer science students, all ready to network and share their experiences! Our ACM Celebrations of Women in Computing showcase women involved in the

              Celebrations of Women in Computing Imagine yourself surrounded by 200 computer science students, all ready to network and share their experiences! Our ACM Celebrations of Women in Computing showcase women involved in the

              Add to Reading List

              Source URL: women.acm.org

              - Date: 2016-09-26 09:53:03
                88Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

                Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

                Add to Reading List

                Source URL: www.icir.org

                - Date: 2013-12-05 15:32:47
                  89Computer Network Solutions  Disaster Recovery Preparedness Benchmark Survey The State of Global Disaster Recovery Preparedness

                  Computer Network Solutions Disaster Recovery Preparedness Benchmark Survey The State of Global Disaster Recovery Preparedness

                  Add to Reading List

                  Source URL: drbenchmark.org

                  - Date: 2014-02-03 14:06:49
                    90Timing Analysis for Sensor Network Nodes of the Atmega Processor Family ∗ Sibin Mohan1 , Frank Mueller1 , David Whalley2 and Christopher Healy3 1 Dept. of Computer Science, Center for Embedded Systems Research, North C

                    Timing Analysis for Sensor Network Nodes of the Atmega Processor Family ∗ Sibin Mohan1 , Frank Mueller1 , David Whalley2 and Christopher Healy3 1 Dept. of Computer Science, Center for Embedded Systems Research, North C

                    Add to Reading List

                    Source URL: moss.csc.ncsu.edu

                    - Date: 2004-12-13 09:52:03