Computer network

Results: 31604



#Item
581Spacecraft / Spaceflight / Computing / Network protocols / Ethernet / Computer networking / Optical switch / Packet switching / Network switch / USB / Switch / SIGCOMM

commpde79-farrington

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2012-07-05 07:07:28
582Computing / Transmission Control Protocol / Computer network security / Communications protocol / Network performance / Flow control / Multipath TCP / Internet protocol suite

TURN TCP [draft-ietf-behave-turn-tcp-02] Simon Perreault Viagénie

Add to Reading List

Source URL: www.viagenie.ca

Language: English - Date: 2009-03-25 11:21:45
583Computing / Computer architecture / Internet protocols / Directory services / Internet Standards / File sharing / Network protocols / IP multicast / Peer-to-peer / Web Services Discovery / Lightweight Directory Access Protocol / Active Directory

Pattern Language for Service Discovery Juha Pärssinen VTT Teemu Koponen Helsinki University of Technology

Add to Reading List

Source URL: www.pasieronen.com

Language: English - Date: 2014-04-22 23:09:22
584Cognition / Learning / Creativity / Cognitive science / Collaboration / Concepts / Brainstorming / Ideation / Recommender system / Idea / Open Mind Common Sense / Bing

Kaleidoscope: Computer-Assisted Ideation Through Idea Network Exploration! Zifei  Shan,  Yuke  Zhu  and  Tianxin  Zhao   {zifei,  yukez,  5anxin}@stanford.edu   Department of Computer Scienc

Add to Reading List

Source URL: www.zifeishan.org

Language: English - Date: 2014-12-18 18:37:50
585Computing / Network architecture / Computer architecture / Internet Protocol / File sharing / Distributed computing architecture / Distributed data storage / Overlay network / Mobile IP / Distributed hash table / IPv6 / Node

File: Title: Authors: Date:

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2005-01-30 17:39:30
586Computing / Cyberwarfare / Computer security / Computer network security / Cross-site scripting / Hacking / Cross-site request forgery / JavaScript / SQL injection / Application security / Web application firewall

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
587Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
588Digital rights management / Malware / Computer security / Internet advertising / Computer network security / Identity theft / Rogue software / Spyware / Internet privacy / Origin / Web browser / Application software

Downloadable Software Guidelines Funmoods is committed to ethical standards for downloadable Downloadable Software Application ("Downloadable Software Application") and follows these guidelines: • No Downloadable Soft

Add to Reading List

Source URL: www.funmoods.com

Language: English - Date: 2013-01-24 10:11:01
589Computer security / Cyberwarfare / Security / Cybercrime / Computer network security / E-commerce / Antivirus software / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
590Computational neuroscience / Artificial intelligence / Applied mathematics / Cybernetics / Computer vision / Convolutional neural network / Artificial neural network

The Pulse of Allegheny County and Pittsburgh   FINAL RESEARCH REPORT José M F Moura (PI), Evgeny Toropov, Joya Deri, Satwik Kottur

Add to Reading List

Source URL: utc.ices.cmu.edu

Language: English - Date: 2016-04-20 09:36:36
UPDATE