Computer network

Results: 31604



#Item
901Computing / Network performance / Computer networking / Telecommunications engineering / Network protocols / Iperf / Forwarding plane / Packet processing / Ethernet / Computer network / Ping / Reliability

Using NetMagic to Observe Fine-Grained Per-Flow Latency Measurements Tao Li Zhigang Sun

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:53:48
902Business / Economy / Management / Manufacturing / Information technology management / Computer-aided engineering / ERP software / Enterprise resource planning

Support for growth based on open concept Modern energy measurement and automatic meter reading systems specialist Aidon requires integration capability and scaling from its ERP system. System for diverse network manageme

Add to Reading List

Source URL: roimaint.com

Language: English - Date: 2016-01-25 11:39:07
903Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
904Computing / Network file systems / Computer architecture / Inter-process communication / Server Message Block / Computer storage devices / SMB / File server / Path

Microsoft Word - G drive for Mac.doc

Add to Reading List

Source URL: support.okstate.edu

Language: English - Date: 2015-11-20 10:57:15
905Economy / Money / Business / Payment systems / E-commerce / Merchant services / Identity theft / Computer network security / Credit card fraud / Fraud / Computer security / Credit card

Rudolf: Interactive Rule Refinement System for Fraud Detection Tova Milo 1 Slava Novgorodov 1 1

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2016-08-04 06:51:27
906Computing / Routing protocols / Network architecture / Internet / Internet Standards / Internet protocols / Computer networking / Border Gateway Protocol / Routing / Vector space / Communications protocol / Path vector protocol

Abstract Foundations of Inter-Domain Routing Vijay Ramachandran 2005 Inter-domain routing protocols establish best-effort connectivity between the independently administered networks that form the Internet. Because of th

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2005-06-14 14:56:00
907Filmmaking / Film / Computer vision / Business / Crowdsourcing / Convolutional neural network / YouTube / Screenplay

arXiv:1604.01753v3 [cs.CV] 26 JulHollywood in Homes: Crowdsourcing Data Collection for Activity Understanding Gunnar A. Sigurdsson1 , G¨

Add to Reading List

Source URL: ai2-website.s3.amazonaws.com

Language: English - Date: 2016-08-03 14:55:37
908Computing / Wireless networking / Network architecture / Internet / Computer networking / Network protocols / Wireless ad hoc network / Vehicular ad hoc network / Geocast / Mobile ad hoc network / Routing protocol / Routing

Eur. Transp. Res. Rev: 36 DOIs12544ORIGINAL PAPER Design and simulation of a collision notification application

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2016-01-29 07:37:36
909Computing / Computer architecture / Security engineering / Computer network security / Dynamic Host Configuration Protocol / Network service / Windows / Computer security

SECURITY COMPLIANCE MANAGEMENT THE ELEMENTAL COMPLIANCE SYSTEM Managing security in ever-changing enterprise networks requires that compliance officers and IT security managers continuously measure how well networked co

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
910Computational neuroscience / Applied mathematics / Artificial neural networks / Cybernetics / Cognitive science / Computer vision / Convolutional neural network / Artificial intelligence / Computer Go / Monte Carlo tree search / Monte Carlo method / CNN

Published as a conference paper at ICLRM OVE E VALUATION IN G O U SING D EEP C ONVOLUTIONAL N EURAL N ETWORKS arXiv:1412.6564v2 [cs.LG] 10 Apr 2015

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-04-12 20:19:23
UPDATE