Computer network

Results: 31604



#Item
541Software / Computing / System software / Computer network security / Iptables / Packet processing / Firewall / Netfilter / Communications protocol / Transmission Control Protocol / Ipfirewall / Statistical classification

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
542Computing / Embedded systems / Technology / Robotics / Emerging technologies / Cyber-physical system / Cloud computing / Recreational vehicle / Wireless sensor network / Mobile robot / Unmanned aerial vehicle / Task

Cyber-Physical Cloud Computing Implemented as PaaS Clemens Krainer Christoph M. Kirsch Department of Computer Sciences

Add to Reading List

Source URL: cpcc.berkeley.edu

Language: English - Date: 2016-06-12 17:08:37
543Wireless networking / Telecommunications engineering / Wireless LAN / Wireless network / Computer network / Electrical engineering / Technology / Electromagnetism / Ian F. Akyildiz / Quality of service

Microsoft Word - CfP_SYM_QoS_Lorenz_2011_1205.doc

Add to Reading List

Source URL: marjan.fesb.hr

Language: English - Date: 2011-05-19 06:21:45
544Computing / Ethernet / Network architecture / Computer architecture / Computer networking / Network topology / Network switch / Cisco Nexus switches / Internet protocol suite / Traffic flow / Dell Networking / Dell PowerConnect

mmi2010040029.3d:54

Add to Reading List

Source URL: nathanfarrington.com

Language: English - Date: 2016-02-22 00:30:08
545Security / Cyberwarfare / Prevention / Computer network security / Cybercrime / Email / Password / Computer security / Internet privacy / Rootkit / Computer virus / Internet

IT ACCEPTABLE USE STANDARDS PURPOSE A standard includes specific low level mandatory controls that help enforce and support a policy. The purpose of this document is to support and outline in detail

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:51
546United States Department of Defense / Computer networking / Defense Information Systems Network / Computing / Contemporary history / Defense Information Systems Agency / Wide area networks / Global Information Grid / NetOps / Department of Defense Information Assurance Certification and Accreditation Process / Defense Red Switch Network / Defense Technical Information Center

Microsoft Word - TAB CJCSI 6211.02D Signature.docx

Add to Reading List

Source URL: jitc.fhu.disa.mil

Language: English - Date: 2013-09-11 17:22:25
547Computing / Network architecture / Internet / Telecommunications engineering / Routing algorithms / Routing protocols / Computer networking / Streaming / Routing / Multipath routing / Router / Computer network

Microsoft Word - PhD position Multipath routing and collaborative load balancing.docx

Add to Reading List

Source URL: icube-reseaux.unistra.fr

Language: English - Date: 2013-03-27 17:25:13
548Computing / Networking hardware / Network architecture / Ethernet / Computer networking / Router / Multilayer switch / Network switch / Forwarding plane / Forwarding information base

Page 1 of 1 Application NoteConfiguring the z-16.16r for a Multi-Router Environment As of November of 1996, the z-16.16r has been shipping with the ability to be reconfigured to accept commands sent to routers o

Add to Reading List

Source URL: www.z-sys.com

Language: English - Date: 1999-11-05 11:20:33
549Artificial neural networks / Statistics / Artificial intelligence / Applied mathematics / Cybernetics / Computational neuroscience / Computational statistics / Deep learning / Graphical models / Bayesian network / Pattern recognition / Computer vision

Attend, Infer, Repeat: Fast Scene Understanding with Deep Generative Models S. M. Ali Eslami David Szepesvari

Add to Reading List

Source URL: juxi.net

Language: English - Date: 2016-06-17 11:44:38
550Software / Computing / Computer network security / Cloud clients / Portable software / Web browsers / Hypertext Transfer Protocol / Browser security / HTTP cookie / JavaScript / Google Chrome / Browser extension

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
UPDATE