Computer network

Results: 31604



#Item
871Computing / Hypertext Transfer Protocol / Network protocols / Cache / Computer networking / Video hosting / YouTube / Quality of experience / Proxy server / Digital video / Dynamic Adaptive Streaming over HTTP / Web cache

An Information-Aware QoE-Centric Mobile Video Cache Shan-Hsiang Shen and Aditya Akella University of Wisconsin, Madison {shan-hsi,akella}@cs.wisc.edu

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-08-28 13:22:31
872Concurrent computing / Distributed computing / Software / Berkeley Open Infrastructure for Network Computing / Volunteer computing / Grid computing / Climateprediction.net / NC / BitTorrent / SETI@home / Algorithm

Distributed Asymmetric Verification in Computational Grids Michael Kuhn, Stefan Schmid, Roger Wattenhofer Computer Engineering and Networks Laboratory (TIK) ETH Zurich CH-8092 Zurich, Switzerland

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
873IEEE 802.11 / Computer network security / Wireless networking / Computing / Cryptographic protocols / Wi-Fi / Password / Computer security / Prevention

Connecting to KSU-HOUSING Wi-Fi on WindowsOn the bottom right of your desktop, open up your wireless networks then open the Network and Sharing Center.

Add to Reading List

Source URL: ksuhousing.kennesaw.edu

Language: English - Date: 2015-09-01 10:59:01
874Computing / Wireless networking / Technology / Computer networking / Sensor node / Wireless sensor network / Distributed computing / Body area network / Windows Task Scheduler

Microsoft Word - Bodynets-CameraReady-Seelab.docx

Add to Reading List

Source URL: seelab.ucsd.edu

Language: English - Date: 2012-09-19 15:53:07
875Computing / Network protocols / Network architecture / Emerging technologies / Computer networking / Configuration management / Software-defined networking / Network virtualization platform / OpenFlow / Virtual LAN / Nicira / Network switch

Toward Transitional SDN Deployment in Enterprise Networks Dan Levin, Marco Canini, Stefan Schmid, and Anja Feldmann TU Berlin / T-Labs Mid to large enterprise campus networks present complex operational requirements: The

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2013-11-29 09:03:54
876Wireless networking / Computing / IEEE 802.11 / Wireless / Computer network security / Technology / Wi-Fi / Password / Login / IPhone / Wireless@SG / IOS version history

Wireless Accessing ConnSCU Internet Wireless from iPad/iPhone (Revision Date: Introduction

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-09-18 16:04:55
877Security / Prevention / Safety / National security / Computer security / Cybercrime / Cyberwarfare / Cryptography / Denial-of-service attack / Information security

Corero Network Security plc Corero Network Security plc 169 High Street Rickmansworth Hertfordshire WD3 1AY

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2012-04-10 09:15:59
878Micro Focus International / SUSE Linux / Computer network security / Computing / SUSE Linux distributions / SUSE / Port forwarding / Novell / Linux / Computer architecture / Linux distributions

Architecting your SUSE Manager deployment SUSECon 2015, Amsterdam, The Netherlands Gábor Nyers

Add to Reading List

Source URL: www.susecon.com

Language: English - Date: 2015-11-20 11:19:28
879Telecommunications engineering / Network performance / Network management / Probability theory / Operations research / Computing / Scientific modeling / Queueing theory / Discrete event simulation / Network simulation / Computer simulation / Traffic generation model

An efficient method for performance analysis of high speed networks : modeling and hardware emulation  Cyril Labb´e and Jean-Marc Vincent

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:30
880Software / Computer security / Computing / Computer network security / Software testing / Metasploit Project / Open core / H. D. Moore

Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed by

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:27
UPDATE