Computer network

Results: 31604



#Item
11

Journal of Network and Computer Applications, 25–43 Experimental studies on software tools to enhance accessibility to information in digital libraries Shigeo Sugimoto∗, Akira Maeda∗, Tetsuo Sakaguchi∗

Add to Reading List

Source URL: www.eis.mdx.ac.uk

Language: English - Date: 2006-06-27 09:34:47
    12

    Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

    Add to Reading List

    Source URL: cs.nyu.edu

    Language: English - Date: 2006-10-10 04:45:29
      13

      Economics of Network Pricing with Multiple ISPs Srinivas Shakkottai R. Srikant Dept. of Electrical and Computer Engineering, and

      Add to Reading List

      Source URL: www.ece.tamu.edu

      Language: English - Date: 2004-12-22 13:09:16
        14

        Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

        Add to Reading List

        Source URL: courses.csail.mit.edu

        Language: English
          15

          Camera Network Calibration from Dynamic Silhouettes Sudipta N. Sinha Marc Pollefeys Leonard McMillan. Dept. of Computer Science, University of North Carolina at Chapel Hill. ssinha, marc, mcmillan  @cs.unc.edu

          Add to Reading List

          Source URL: www.cs.unc.edu

          Language: English - Date: 2004-04-29 14:32:16
            16

            Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2004-11-19 19:00:56
              17Computing / Internet / Information and communications technology / Proxy servers / Internet censorship in China / Internet privacy / Internet security / Secure communication / Tor / Great Firewall / Internet censorship

              iii Enhancing Censorship Resistance in the Tor Anonymity Network Philipp Winter Department of Mathematics and Computer Science

              Add to Reading List

              Source URL: nymity.ch

              Language: English - Date: 2017-08-25 13:31:01
              18

              Variational Deep Q Network Alp Kucukelbir Department of Computer Science Columbia University

              Add to Reading List

              Source URL: bayesiandeeplearning.org

              Language: English - Date: 2017-12-05 15:00:34
                19

                Measuring the Topic-Level Impact of Experts in Scholarly Network Lili Lin College of Computer and Information, Hohai University No.1 Xikang Road, Nanjing, 210098, Jiangsu, China

                Add to Reading List

                Source URL: www.ieee-tcdl.org

                Language: English - Date: 2013-10-05 15:32:54
                  20

                  Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

                  Add to Reading List

                  Source URL: www.pre-secure.com

                  Language: English - Date: 2002-11-01 16:30:46
                    UPDATE