Computer network

Results: 31604



#Item
101

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: www.tik.ee.ethz.ch

- Date: 2015-05-18 12:16:38
    102

    After connecting to the LSUHSC-Secure wireless network, click the Start button -> Computer On the menu bar, select “Map network drive”. If it doesn’t appear on your menu bar, hit the ALT key and the “T” key at

    Add to Reading List

    Source URL: alliedhealth.lsuhsc.edu

    - Date: 2013-01-25 14:46:42
      103

      Towards the Development of Computational Tools for Evaluating Phylogenetic Network Reconstruction Methods Luay Nakhleh Jerry Sun Tandy Warnow Dept. of Computer Sciences, U. of Texas, Austin, TX 78712 {nakhleh,jsun,tandy}

      Add to Reading List

      Source URL: www.cs.rice.edu

      - Date: 2004-07-27 17:52:24
        104

        Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements William Yurcik James Barlow* Kiran Lakkaraju Mike Haberman National Center for Supercomputing Applications (NCSA) Univer

        Add to Reading List

        Source URL: www.andrewpatrick.ca

        - Date: 2003-02-12 07:18:34
          105

          Computer Network Information Center, Chinese Academy of Sciences ANNUAL REPORT 2013 Address: No. 4, South 4th Street, Zhongguancun, Haidian District, Beijing, Computer Network Information Center, CAS

          Add to Reading List

          Source URL: english.cnic.cas.cn

          - Date: 2016-05-13 01:16:54
            106

            Payload Caching: High-Speed Data Forwarding for Network Intermediaries Ken Yocum and Je Chase Department of Computer Science

            Add to Reading List

            Source URL: www.cs.duke.edu

            - Date: 2001-05-07 19:41:11
              107

              Cheating the I/O Bottleneck: Network Storage with Trapeze/Myrinet Darrell C. Anderson, Jeffrey S. Chase, Syam Gadde, Andrew J. Gallatin, and Kenneth G. Yocum Department of Computer Science Duke University fanderson, cha

              Add to Reading List

              Source URL: www.cs.duke.edu

              - Date: 1998-05-02 17:49:45
                108

                Code NoPage 1 of 8 APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS AND THE INTERNET The Vision for Teaching and Learning in the Midland Community School District While technology has always been important

                Add to Reading List

                Source URL: www.midland.k12.ia.us

                - Date: 2014-08-13 11:44:00
                  109

                  Network I/O with Trapeze Jeffrey S. Chase, Darrell C. Anderson, Andrew J. Gallatin, Alvin R. Lebeck, and Kenneth G. Yocum Department of Computer Science Duke University fchase, anderson, gallatin, alvy, .e

                  Add to Reading List

                  Source URL: www.cs.duke.edu

                  - Date: 1999-05-12 11:34:38
                    110

                    Network Science Tools Mark Meiss, Department of Computer Science, IUB Katy Börner, School of Library and Information Science, IUB

                    Add to Reading List

                    Source URL: vw.slis.indiana.edu

                    - Date: 2005-03-18 22:21:14
                      UPDATE