Computer network

Results: 31604



#Item
41Network Acceptable Use and Internet Safety Policy Educational Service Unit No. 13 (ESU #13) recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and o

Network Acceptable Use and Internet Safety Policy Educational Service Unit No. 13 (ESU #13) recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and o

Add to Reading List

Source URL: esu13.socs.net

Language: English - Date: 2016-06-30 16:03:53
    42Introduction to Multithreading and Multiprocessing in the FreeBSD SMPng Network Stack Robert N. M. Watson  Computer Laboratory University of Cambridge

    Introduction to Multithreading and Multiprocessing in the FreeBSD SMPng Network Stack Robert N. M. Watson Computer Laboratory University of Cambridge

    Add to Reading List

    Source URL: www.watson.org

    Language: English - Date: 2006-05-30 07:16:37
      43Opportunistic File Transfer over a Fading Channel under Energy and Delay Constraints ∗ Heng Wang and Narayan B. Mandayam Wireless Information Network Laboratory (WINLAB) Department of Electrical and Computer Engineerin

      Opportunistic File Transfer over a Fading Channel under Energy and Delay Constraints ∗ Heng Wang and Narayan B. Mandayam Wireless Information Network Laboratory (WINLAB) Department of Electrical and Computer Engineerin

      Add to Reading List

      Source URL: www.winlab.rutgers.edu

      Language: English - Date: 2002-08-22 12:50:10
        44Ving: Bootstrapping the Desktop Area Network with a Vibratory Ping Joshua Adkins† , Genevieve Flaspohler† , and Prabal Dutta Electrical Engineering and Computer Science Department University of Michigan Ann Arbor, MI

        Ving: Bootstrapping the Desktop Area Network with a Vibratory Ping Joshua Adkins† , Genevieve Flaspohler† , and Prabal Dutta Electrical Engineering and Computer Science Department University of Michigan Ann Arbor, MI

        Add to Reading List

        Source URL: iot.stanford.edu

        Language: English - Date: 2016-09-10 18:15:38
          45Performance of Turbo Coded WCDMA with Downlink Space Time Block Coding in Correlated Fading Channels Jie Lai and Narayan B. Mandayam Wireless Information Network Laboratory (WINLAB) Department of Electrical & Computer En

          Performance of Turbo Coded WCDMA with Downlink Space Time Block Coding in Correlated Fading Channels Jie Lai and Narayan B. Mandayam Wireless Information Network Laboratory (WINLAB) Department of Electrical & Computer En

          Add to Reading List

          Source URL: www.winlab.rutgers.edu

          Language: English - Date: 2002-12-06 18:18:38
            46Revised August 13, 2010 Computer Acceptable Use Policy The Library Network, supported by the Delaware Department of State, Division of Libraries, provides access to electronic information resources through the Internet t

            Revised August 13, 2010 Computer Acceptable Use Policy The Library Network, supported by the Delaware Department of State, Division of Libraries, provides access to electronic information resources through the Internet t

            Add to Reading List

            Source URL: dover.lib.de.us

            Language: English - Date: 2017-04-28 11:08:29
              47Experiences in Measuring a Human Contact Network for Epidemiology Research Maria A. Kazandjieva∗ , Jung Woo Lee∗ , Marcel Salathe´ † Marcus W. Feldman† , James H. Jones‡ , and Philip Levis∗ ∗ Computer

              Experiences in Measuring a Human Contact Network for Epidemiology Research Maria A. Kazandjieva∗ , Jung Woo Lee∗ , Marcel Salathe´ † Marcus W. Feldman† , James H. Jones‡ , and Philip Levis∗ ∗ Computer

              Add to Reading List

              Source URL: sing.stanford.edu

              Language: English - Date: 2014-11-10 18:30:09
                48Network-wide Configuration Synthesis Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev ETH Z¨ urich  Abstract. Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reacha

                Network-wide Configuration Synthesis Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev ETH Z¨ urich Abstract. Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reacha

                Add to Reading List

                Source URL: www.sri.inf.ethz.ch

                Language: English - Date: 2018-05-15 09:28:45
                  49YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland

                  YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland

                  Add to Reading List

                  Source URL: www.cs.umd.edu

                  Language: English - Date: 2001-08-11 18:26:34
                  50Website-Targeted False Content Injection by Network Operators  arXiv:1602.07128v1 [cs.CR] 23 Feb 2016 Gabi Nakibly1,3 , Jaime Schcolnik2 , and Yossi Rubin3 1 Computer Science Department, Technion, Haifa, Israel

                  Website-Targeted False Content Injection by Network Operators arXiv:1602.07128v1 [cs.CR] 23 Feb 2016 Gabi Nakibly1,3 , Jaime Schcolnik2 , and Yossi Rubin3 1 Computer Science Department, Technion, Haifa, Israel

                  Add to Reading List

                  Source URL: arxiv.org

                  Language: English - Date: 2016-02-23 20:52:48