Computer network

Results: 31604



#Item
881Computing / Computer networking / Network architecture / Internet / Packet loss / Transmission Control Protocol / Packet forwarding / Packet processing / Forwarding plane / Network protocols / NetFlow / Packet switching

High-Speed Inter-domain Fault Localization Cristina Basescu∗ , Yue-Hsun Lin† , Haoming Zhang‡ , Adrian Perrig∗ ∗ Department of Computer Science, ETH Zurich, {cba,adrian.perrig}@inf.ethz.ch

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-05-26 14:23:02
882Computing / Internet privacy / Proxy / Computer networking / Proxy servers / Internet / Computer network security / Proxy list

myPurdue Proxy Frequently Asked Questions Student Questions Q: What is a myPurdue proxy? A: Students can give parents, legal guardians, or other trusted parties access to view certain pieces of their student information

Add to Reading List

Source URL: www.purdue.edu

Language: English - Date: 2016-08-16 10:37:59
883Computing / Software / Computer architecture / Network architecture / Internet protocol suite / IBM RPG / IP address / IBM VisualAge / IBM Notes / IBM System i

Speaker Excellence Awards – 1999 Fall Conference Gold Medal Sessions Dr. Russell Barnes • Domino/Notes e-Commerce: the Nine Golden Questions Randall Munson • Success through Creativity!

Add to Reading List

Source URL: www.common.org

Language: English - Date: 2016-07-26 12:30:37
884Computing / Network architecture / Internet / Routing protocols / Routing / Computer networking / Internet Standards / Internet protocols / Border Gateway Protocol / Router / Route flapping / Route reflector

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane Max Schuchard University of Minnesota schuch @ cs.umn.edu

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:03
885Computer network security / Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Virtual private network / Information security / Firewall

JOHN MORGAN SALOMON e-mail: www.zog.net ____________________________________

Add to Reading List

Source URL: www.zog.net

Language: English - Date: 2012-04-24 18:10:16
886Computing / Ethernet / Emerging technologies / Computer networking / Computers and the environment / Wireless networking / Smart grid / Computer network / Efficient energy use / Data center / Wireless sensor network / Voice over IP

Electronics as an End Use LBNL noon seminar • Electronics are an end use of electricity

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2009-01-09 17:12:22
887Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Computer network security / Communications and Multimedia Act / Computer security / Social security in Australia

TTdC ARD_Final_29 FebRevision 28 Aprilfinal 1

Add to Reading List

Source URL: www.time.com.my

Language: English - Date: 2016-05-23 19:00:37
888Computing / Network architecture / OSI protocols / Computer networking / Routing / Internet Standards / Internet protocol suite / OSI model / Router / Computer network / Communications protocol / Data link layer

Keith Douglas Statistics Canada1 Title: “Prolegomena to any Future Metaphysics of Networking” Abstract: The hierarchical nature of both Mario Bunge’s metaphysics and the OSI model of co

Add to Reading List

Source URL: philosopher-animal.com

Language: English - Date: 2009-06-21 11:50:57
889Computing / Network architecture / Wireless networking / Data transmission / Computer networking / Network protocols / Routing / Wireless ad hoc network / Packet switching / ALOHAnet / Channel

1 Coordination-free Safety Messages Dissemination Protocol for Vehicular Network Sangho Oh, Student Member, IEEE, Marco Gruteser, Member, IEEE, Dario Pompili, Member, IEEE

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-04-23 12:53:20
890Privacy of telecommunications / Technology / Prevention / National security / Computer network / Telephone tapping / Electronic Communications Privacy Act / Surveillance / Privacy / Internet / Pen register / Lawful interception

IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-06-07 13:58:45
UPDATE