Zobrazeno 1 - 10
of 142
pro vyhledávání: '"Gilbert Clark"'
Publikováno v:
International Conference on Cyber Warfare and Security. 17:459-468
Interest in securing InfiniBand networks with encryption is growing. However, the performance benefit realized by InfiniBand’s use of Direct Memory Access (DMA) to bypass the kernel and avoid intervention from host Central Processing Units (CPUs) i
Autor:
GILBERT, CLARK1 cgilbert@hbs.edu
Publikováno v:
Academy of Management Journal. Oct2005, Vol. 48 Issue 5, p741-763. 23p. 1 Diagram, 8 Charts.
Publikováno v:
Critical Infrastructure Protection XVI ISBN: 9783031201363
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::774109eccf71dfe2e3aecc211eebde08
https://doi.org/10.1007/978-3-031-20137-0_11
https://doi.org/10.1007/978-3-031-20137-0_11
Publikováno v:
Harvard Business Review. Dec2012, Vol. 90 Issue 12, p65-73. 8p. 1 Color Photograph.
Autor:
Gilbert, Clark G.
Publikováno v:
Organization Science, 2006 Jan 01. 17(1), 150-167.
Externí odkaz:
https://www.jstor.org/stable/25146018
Autor:
Gilbert, Clark G.1 (AUTHOR) cgilbert@deseretdigital.com, Eyring, Matthew J.2 (AUTHOR) meyring@innosight.com
Publikováno v:
Harvard Business Review. May2010, Vol. 88 Issue 5, p92-98. 7p. 2 Color Photographs, 2 Illustrations, 1 Diagram.
Autor:
Bower, Joseph L.1 jbower@hbs.edu, Gilbert, Clark G.2 gilbertc@byui.edu
Publikováno v:
Harvard Business Review. Feb2007, Vol. 85 Issue 2, p72-79. 8p. 3 Color Photographs, 3 Illustrations.
Autor:
Gilbert, Clark1, Bower, Joseph L.2
Publikováno v:
Harvard Business Review. May2002, Vol. 80 Issue 5, p94-101. 6p. 2 Color Photographs, 1 Diagram.
Publikováno v:
WiSEE
This paper develops the concept of a cognitive network and describes a microservice based architecture which could be used to implement such a system. Delay tolerant networking (DTN) influences the design of the architecture as well as the networking
Publikováno v:
ICC
The Cognitive Network Controller (CNC) defines a neuromorphic architecture where a spiking neural network can both encode network performance observations and select the optimal actions (e.g., routes) for the context of those observations. Because of