Results 11 to 20 of about 3,347,283 (277)

PROXYRENEWAL, ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
The proxy renewal daemon is responsible for keeping proxy certificates valid throughout all the lifetime of corresponding ...
Sustr, Zdenek
core   +1 more source

MYPROXY YAIM, ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
The proxy renewal daemon is responsible for keeping proxy certificates valid throughout all the lifetime of corresponding ...
Aiftimiei, Cristina
core   +1 more source

PSEUDONYMITY SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
White, John
core   +1 more source

APEL PUBLISHER SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
APEL (Accounting Processor for Event Logs) gathers CPU accounting information by parsing batch system and blah accounting log files and inserting the data into a local MySQL database.
Gordon, John
core   +1 more source

SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core   +1 more source

APLIKASI TRAFFIC MONITORING SERVER MENGGUNAKAN SMS [PDF]

open access: yes, 2010
Penelitian ini bertujuan membuat aplikasi traffic monitoring yang dapat membantu network administrator dalam memonitor server kapan dan dimana saja, yaitu dengan menggunakan SMS. Hal – hal yang akan dimonitor adalah lalu lintas data (traffic) dan koneksi
Clarissa, Ilona
core   +2 more sources

APEL SSM SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
The SSM (Secure STOMP Messenger) is used to send messages between computers using the STOMP protocol.
Gordon, John
core   +1 more source

The administrator, teachers and parents involvement in preschool during Movement Control Order [PDF]

open access: yes, 2021
The Covid-19 pandemic is affecting the whole education system including the preschoolers in Malaysia in receiving a proper teaching and learning lesson especially in the classroom. Movement Control Order (MCO) implemented by the government has restricted
Halim, Harliana, Senin, Muhammad Adam
core   +1 more source

Infection Spreading and Source Identification: A Hide and Seek Game

open access: yes, 2015
The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator.
Leng, Mei, Luo, Wuqiong, Tay, Wee Peng
core   +1 more source

Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy