Computer architecture

Results: 21936



#Item
151Computing / Network architecture / Internet / Routing protocols / Routing / Internet Standards / Computer networking / Internet protocols / Border Gateway Protocol / IP routing / Traceroute / Router

Solving the Interdomain Routing Puzzle – Understanding Interdomain Routing Dynamics by Zhuoqing Mao B.S. (University of California at Berkeley) 1998

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-12-16 00:59:30
152Computing / Switches / Computer architecture / Network architecture / Computer networking / Network protocols / Teletraffic / Circuit switching / Packet switching / Crossbar switch / Traffic flow / Virtual output queueing

Hunting Mice with Microsecond Circuit Switches Nathan Farrington, George Porter, Yeshaiahu Fainman, George Papen, Amin Vahdat† UC San Diego UC San Diego and Google†

Add to Reading List

Source URL: nathanfarrington.com

Language: English - Date: 2016-02-22 00:30:08
153Computer architecture / Software / System software / Free audio software / Red Hat software / Planet CCRMA / Linux kernel / Ingo Molnr / JACK Audio Connection Kit / Fedora / Linux / RPM Package Manager

SURVIVING ON PLANET CCRMA, TWO YEARS LATER AND STILL ALIVE Fernando Lopez-Lezcano, CCRMA Stanford University http://ccrma.stanford.edu/planetccrma/software/

Add to Reading List

Source URL: lac.zkm.de

Language: English - Date: 2005-06-24 21:08:10
154Distributed data storage / File sharing networks / Computing / File sharing / Kademlia / Mnet / Peer-to-peer / Node / Wireless ad hoc network / Routing / Network architecture

Trading in Trust, Tokens, and Stamps Tim Moreton and Andrew Twigg Computer Laboratory, Cambridge University, UK E-mail: Abstract

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:32:02
155Computing / Network architecture / Transmission Control Protocol / Server / Internet Relay Chat / Network protocols / Computer network security / Internet protocols

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYDistributed System Engineering: SpringQuiz I Solutions

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
156Software / Computing / Computer architecture / Quake-Catcher Network / Berkeley Open Infrastructure for Network Computing / Accelerometer / Installation / Windows 7

QCN_sensor_installation_instructions

Add to Reading List

Source URL: www.emsc-csem.org

Language: English - Date: 2016-03-11 07:10:08
157Water / Computer architecture / Hydrology / Computing / Habitat / Water streams / Riparian zone / Rivers / Evaluation / Cell

“In an increasingly complicated management arena, the challenge will be to find alternatives to fixed-width buffers that meet the multiple objectives of providing clean water (minimizing nutrient and sediment inputs),

Add to Reading List

Source URL: nhd.usgs.gov

Language: English - Date: 2015-11-16 10:48:59
158Computing / Computer architecture / Computer engineering / Central processing unit / Cache / Computer memory / Processor register / Microarchitecture / Cache memory / Optimizing compiler / Instruction set / Locality of reference

Computer Systems A Programmer’s Perspective, Second Edition 1 Randal E. Bryant David R. O’Hallaron January 13, 2010

Add to Reading List

Source URL: csapp.cs.cmu.edu

Language: English - Date: 2010-02-14 13:34:53
159Computing / Software / Computer architecture / E-commerce / Consumer behaviour / Online shopping / Clothing / Fashion / EShakti / Android

final presentation deck - web

Add to Reading List

Source URL: res.cloudinary.com

Language: English - Date: 2016-06-12 20:08:18
160Computer network security / Computing / Security / Videotelephony / Cyberwarfare / Internet privacy / Network architecture / Secure communication / Videoconferencing / Virtual private network / Endpoint / Computer security

NARBHAnet Documentation of Security Measures for Clinical Videoconferencing Connections This form is required as written documentation that security measures are in place for all videoconference endpoints and connections

Add to Reading List

Source URL: www.rbha.net

Language: English - Date: 2013-04-11 02:24:06
UPDATE