Computer network

Results: 31604



#Item
371Cyberwarfare / Computer security / Computing / Malware / Computer network security / Multi-agent systems / Spamming / Malware analysis / Antivirus software / Computer virus / Rootkit / Botnet

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:19
372Computing / Internet / Network architecture / Internet Standards / Internet protocols / Routing protocols / Networking hardware / Computer networking / Router / Open Shortest Path First / Border Gateway Protocol / IP address

Wireless Optimizer Installation Flexibility Layer 2 Bridge or full function Layer 3 IP Router Configuration Options XipLink wireless optimization software is based on the Space Communication Transport Specification (SCPS

Add to Reading List

Source URL: www.xiplink.com

Language: English - Date: 2010-12-14 17:29:00
373Cartography / Triangulation / Triangulated irregular network / Delaunay triangulation / Computer science / Geography / Computing / Topography / Point location / Iterative method / Level of detail / Digital elevation model

Issues in Iterative TIN Generation to Support Large Scale Simulations Michael F. Polis*

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-29 22:11:58
374Computer security / Security / Cyberwarfare / Computer network security / Qualys / Vulnerability / Attack / Asset / Threat

Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory SOLUTION BRIEF TOP 6 SECURITY USE CASES

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-01-15 14:54:13
375Computing / Ethernet / Computer networks / Supercomputers / Network performance / Networking hardware / Transmission Control Protocol / Network interface controller / Myrinet / Bandwidth / Network switch / Network congestion

A sampling-based approach for communication libraries auto-tuning ´ Elisabeth Brunet, Fran¸cois Trahay, Alexandre Denis, Raymond Namyst

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2016-06-14 21:59:01
376Technology / Education / Digital media / Cultural globalization / Digital technology / Internet / New media / Telegraphy / Computer network / Educational technology

Client Name: The Philippine Research, Education, and Government Information Network (PREGINET) School-over-the-Internet Asia (SOI Asia): A Model for the Philippines for Enabling Collaborative Environments Through Researc

Add to Reading List

Source URL: www.asti.dost.gov.ph

Language: English - Date: 2014-07-22 03:44:07
377Computing / Computer architecture / Computer networks / Computer networking / Computer memory / Direct memory access / Motherboard / Network interface controller / Latency / Low latency / Transmission Control Protocol / Cell

Cut-Through Delivery in Trapeze: An Exercise in Low-Latency Messaging Kenneth G. Yocum Jeffrey S. Chase Andrew J. Gallatin

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 1998-06-22 10:13:50
378Computing / Network protocols / Computer networking / Telecommunications engineering / OpenFlow / Streaming / Software-defined networking / Network switch / Reliability / Computer network / Transmission Control Protocol / Switch

Providing Reliable FIB Update Acknowledgments in SDN Maciej Ku´zniar Peter Perešíni EPFL

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:58:45
379Infographics / Visualization / Computational science / Computer graphics / Communication design / Software / Graph drawing software / Academia / Information visualization / Data visualization / Visual.ly / Gephi

NetworkCube: Bringing Dynamic Network Visualizations to Domain Scientists Benjamin Bach, Nathalie Henry Riche, Roland Fernandez, Emmanoulis Giannisakis, Bongshin Lee, Jean-Daniel Fekete To cite this version:

Add to Reading List

Source URL: hal.inria.fr

Language: English
380Malware / Cyberwarfare / Trojan horses / Computing / Computer network security / Botnets / Rootkits / Zeus / SpyEye / Cybercrime / Computer security

FROM RUSSIA TO HOLLYWOOD: TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-01-26 20:15:24
UPDATE