DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Documents Autodesk Maya API

AUTODESK® MAYA® API WHITE PAPER Autodesk Maya API | White Paper This white paper introduces Autodesk® Maya® software and its architecture to programmers who may be unfamiliar…

Documents ParaViewVis08 Python

Python Scripting for ParaView Utkarsh Ayachit Kitware Inc. Motivation • Scripting • Makes automation possible • Used for batch processing • Only means to visualize…

Documents EMPro Workshop - Module2 - EMPro Basics Version 2.0

Module 2: EMPro Basics EMPro Workshop Version 2.0 1 EMPro User Interface Workspace Tool Bar Geometry, Grid, Component, Sensor Tools Project Tree Toggle Buttons Geometry Tools…

Technology How to detect side channel attacks in cloud infrastructures

1. Elastic SIEM to detect side-channel attacks in Cloud Infrastructures Pasquale Puzio SecludIT & EURECOM [email protected] Joint work with: Refik Molva (EURECOM)…

Documents Lecture 12

Lecture 12: Public-Key Cryptography and RSA Lecture Notes on “Computer and Network Security” by Avi Kak ([email protected]) February 26, 2013 4:36pm c 2013 Avinash Kak,…

Technology OpenStack documentation & translation management 2012_summit

1. The OpenStack SummitSan Diago 2012 OpenStack Documentation and Translation Management Ying Chun Guo (Daisy) Anne Gentle OpenStack Doc Team OpenStack Doc Team [email protected]

Technology MySQL Schema Maintenance

1. MySQL schema maintenance Giuseppe Maxia MySQL Community Team Lead This work is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported License. Thursday,…

Engineering Large scale virtual Machine log collector (Project-Report)

1. CMPE283 Spring 2014 1 CMPE 283 VIRTUALIZATION TECHNOLOGIES SPRING 2014 CMPE283: Virtualization Technologies Project Report (Large Scale Virtual Machine Log Analyser) Submitted…

Documents Simseer and Bugwise - Web Services for Binary-level Software Similarity and Defect Detection

1. Simseer and BugwiseWeb Services for Binary-level Software Similarity andDefect Detection SILVIO CESARE AND YANG XIANG DEAKIN UNIVERSITY 2. Introduction Defect detection…

Technology Reversing and Decrypting the Communications of APT Malware (Etumbot)

1. Monnappa KA – Info Security Investigator 2. The Content, Demonstration, Source Code and Programspresented here is "AS IS" without any warranty or conditionsof…