Communication protocol

Results: 2818



#Item
211Computer hardware / Computing / Out-of-band management / Telecommunications equipment / Computer buses / Modems / Null modem / USB / Serial port / RS-232 / COM / Serial communication

Velotron Ergo Controller Utility Vergo will allow connection, or a bridge, between a Metabolic cart and Velotron. It emulates a Lode™ ergometer protocol so the metabolic cart software thinks it is communicating with a

Add to Reading List

Source URL: www.racermateinc.com

Language: English - Date: 2014-05-22 16:42:27
212Concurrent computing / Computing / Software engineering / Fault-tolerant computer systems / Distributed computing / Inter-process communication / Message-oriented middleware / Publishsubscribe pattern / Paxos / Consensus / Communications protocol / Distributed algorithm

Fact-based Inter-Process Communication Primitives for Programming Distributed Systems Robbert van Renesse, Department of Computer Science Cornell University Category: Representation The following position paper describes

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2012-11-08 10:08:11
213Computing / Computer networking / Cyberwarfare / Internet protocols / Data transmission / Denial-of-service attacks / Named data networking / Packet loss / IP multicast / Network packet / Communications protocol / Transport layer

Consumer / Producer Communication with Application Level Framing in Named Data Networking Ilya Moiseenko UCLA

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:12:00
214Cryptography / Theoretical computer science / E-commerce / Secure communication / Model checking / Cryptographic protocol / Public-key cryptography / Communications protocol / Formal methods / Computer security / Secure multi-party computation

Secure Protocols for Secrecy Hanane Houmani and Mohamed Mejri LSFM Research Group Computer Science Department LAVAL University Quebec, Canada

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
215

Mentoring program for engineering  departmental academic activities Prof. Pallapa Venkataram Protocol Engineering and Technology Unit, Electrical Communication Engineering Dept., Indian Institute of Sci

Add to Reading List

Source URL: cce.iisc.ernet.in

Language: English
    216Transmission Control Protocol / Network packet / Voice over IP / Computing / Information

    Multi-Class Traffic Morphing for Encrypted VoIP Communication W. Brad Moore, Henry Tan, Micah Sherr, and Marcus A. Maloof Georgetown University {wbm,ztan,msherr,maloof}@cs.georgetown.edu

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:33:46
    217Internet protocols / Internet Standards / Internet security / Secure communication / Network performance / Transmission Control Protocol / Transport layer / Internet protocol suite / Out-of-order delivery / Tor / Stream Control Transmission Protocol / Hypertext Transfer Protocol

    Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

    Add to Reading List

    Source URL: dedis.cs.yale.edu

    Language: English - Date: 2013-07-21 06:56:10
    218Computing / Data / Web design / Data synchronization / Communication / Concurrency / Synchronization / Sitemaps / Site map / Microsoft Sync Framework / Europeana / Protocol for Metadata Harvesting

    ResourceSync: Leveraging Sitemaps for Resource Synchronization Bernhard Haslhofer Simeon Warner

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:46:54
    219Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2014-02-27 10:40:02
    220Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

    Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

    Add to Reading List

    Source URL: www.vanbever.eu

    Language: English - Date: 2014-10-08 09:38:20
    UPDATE