Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
d
- Deployment MethodDescription: The Deployment Method in the context of software development refers to a technique used to launch applications to users efficiently(...) Read more
- Diagnostic moduleDescription: The diagnostic module is an essential component responsible for analyzing and identifying problems within an embedded operating(...) Read more
- Dry dockDescription: A dry dock is a port structure specifically designed for the repair and maintenance of vessels, where ships can be removed from the(...) Read more
- Dead tideDescription: The 'dead tide' refers to a state of calm at sea when there is little or no tidal movement. This phenomenon occurs at specific(...) Read more
- Docking pierDescription: A docking pier is an essential structure in ports, specifically designed to allow ships to secure themselves while loading or(...) Read more
- Delay metricDescription: Delay metric is a crucial measure in the field of quality of service (QoS) in communication networks. It refers to the time it(...) Read more
- Downtime MetricDescription: Downtime Metric is a crucial measure in evaluating the Quality of Service (QoS) of systems and applications. It refers to the(...) Read more
- Damping mechanismDescription: The damping mechanism is a technique used in various routing protocols, including the Border Gateway Protocol (BGP), to suppress(...) Read more
- Detection mechanismDescription: The detection mechanism refers to the methods used to identify security violations or anomalies in computer systems. This mechanism(...) Read more
- Defense mechanismsDescription: Defense mechanisms are strategies and tools used to protect against DDoS (Distributed Denial of Service) attacks. These attacks aim(...) Read more
- Detection methodsDescription: Detection methods are techniques used to identify DDoS attacks in real time. These methods are fundamental for network and system(...) Read more
- Defense modelDescription: The defense model refers to the strategy and overall architecture used to protect against DDoS (Distributed Denial of Service)(...) Read more
- Defense mechanismDescription: A defense mechanism is a strategy or tool used to protect systems from attacks. In the context of cybersecurity, these mechanisms(...) Read more
- Digital mammographyDescription: Digital mammography is an advanced imaging technique that uses digital X-rays to examine breast tissue. Unlike traditional(...) Read more
- Diffusion modelDescription: The diffusion model is a mathematical representation used to describe the propagation of phenomena within a population over time.(...) Read more