Filters
Detection of the Music or Compressing Files in BitTorrent
on the BitTorrent protocol such as sharing networks based on "torrent" files. History is described such as reason for the creation of this protocol, algorithms for file transfers, a detailed preview of the torrent file...
JA - Elektronika a optoelektronika, elektrotechnika
- 2013 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
MSTperl delexicalized parser transfer scripts and configuration files
This is a set of MSTperl parser configuration files and scripts for delexicalized parser transfer. They were used in the work reported in arXiv:1506.04897 (http://arxiv.org/abs/1506.04897), as well as several related papers. The MST...
IN - Informatika
- 2015 •
- R •
- Link
Rok uplatnění
R - Software
Výsledek na webu
CineGrid Experience: The Need for a Fast File Transfer Protocol Environment
This talk gives overview of need to have new file transfer protocol into digital cinematography workflow.
IN - Informatika
- 2008 •
- A
Rok uplatnění
A - Audiovizuální tvorba
System for secure big data sharing
Software solution of the system for secure file transfer using hardware acceleration implementing data transfer encryption. The software solution consists of a software part and hardware acceleration. System proposed tries ...
Communication engineering and systems
- 2021 •
- R •
- Link
Rok uplatnění
R - Software
Výsledek na webu
TRANSFER OF ENCRYPTED FILES BETWEEN MOBILE DEVICES
The article deals with possibility to transfer encrypted files between mobile devices running Android because the mobile phones and tablets with this operating to the operating system Android and XML GUI design. For data transfe...
IN - Informatika
- 2013 •
- D
Rok uplatnění
D - Stať ve sborníku
Selection of image file formats for raster cartographic data
graphic file formats which come into question for storing of raster data of selectedimage file formats in light of reduction of the data given by using offered compression methods, optimization of raster data transfers ove...
JC - Počítačový hardware a software
- 2010 •
- D
Rok uplatnění
D - Stať ve sborníku
Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat
, is the spear phishing email. These phishing emails may contain disguised executable files. This paper presents the disguised executable file detection (DeFD) module, which aims at detecting disguised exe files transfe...
Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
- 2018 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Distributed file system with online multi-master replicas
and data transfer rate. Data amount used by nowadays applications is beyond the capability of mobile devices. A distributed file system presents an appropriate solution, but currentdistributed file systems are not suitable...
IN - Informatika
- 2011 •
- D
Rok uplatnění
D - Stať ve sborníku
3D models transfer from system Pro/ENGINEER
The article presents transfer possibility of 3D models among different systems. It solves a problem of communication among systems, so model application created in one system, into another system. The solution is using files that en...
JD - Využití počítačů, robotika a její aplikace
- 2004 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Model for planning of distributed data production
We propose a model of distributed data production, where input files from a single source are processed at several remote sites (each file once) and output is transferred back. The model is formulated using a network flow m...
IN - Informatika
- 2015 •
- D
Rok uplatnění
D - Stať ve sborníku
- 1 - 10 out of 33 710