Computer networking

Results: 7870



#Item
271Business / Economy / Computing / Crime prevention / Cryptography / Information governance / National security / Data management / Computer security / Data center / Managed services / Hewlett Packard Enterprise Networking

Microsoft PowerPoint - BBNS-GS NATO Capabilities Overview_December 14, 2015 v09 DM

Add to Reading List

Source URL: www.cybersecurity.cz

Language: English - Date: 2016-04-17 12:12:36
272Computing / Node / Tree / Computer networking / Distributed data storage

Accurate and Provably Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN {dchantin, hopper}@cs.umn.edu

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:41
273Computing / Routing / Computer networking / Network protocols / Packet processing / Packet switching

A simpler proof for O(congestion + dilation) packet routing Thomas Rothvoß Department of Mathematics, MIT IPCO 2013

Add to Reading List

Source URL: www.math.washington.edu

Language: English - Date: 2013-11-01 17:11:36
274Computing / Network architecture / Computer networking / Internet / Routing / Wormhole switching / Transmission Control Protocol / Router / Packet switching / Packet loss / Routing table

PS-1 Ultra Low-Power High-Speed Flexible Probabilistic Adder for Error-Tolerant Applications

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2013-12-16 08:28:50
275Computing / Software / Computer networking / Emerging technologies / Network architecture / Configuration management / Software-defined networking / OpenFlow / Nox / ONOS / OpenDaylight Project / App Store

Isolating and Tolerating SDN Application Failures with LegoSDN Balakrishnan Chandrasekaran Duke University Brendan Tschaen

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2016-03-31 23:58:46
276Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
277Computing / Network architecture / Routing protocols / Computer networking / Internet Standards / TRILL / Internet protocols / Routing bridge / OSI protocols / Data center bridging / Link-state routing protocol / IS-IS

1 Donald E. Eastlake 3rd Co-Chair, IETF TRILL Working Group , +

Add to Reading List

Source URL: www.nanog.org

Language: English - Date: 2010-10-03 14:17:38
278Security / Prevention / Computer access control / Computer network security / Cryptography / Wireless networking / Password / Internet privacy / Biometrics / Wireless access point / Authentication / Email

Microsoft Word - master.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-07-13 14:07:08
279Computer architecture / Network architecture / Emerging technologies / Computing / Software / Open Platform for NFV / Network function virtualization / Linux Foundation / Software-defined networking / Linux / Open-source software

CASE STUDY Open Platform for Network Function Virtualization Project Case Study – A path to open source success with The Linux Foundation

Add to Reading List

Source URL: www.linuxfoundation.org

Language: English - Date: 2016-07-18 16:20:35
280Software / Digital media / Computing / Social networking services / Microblogging / Real-time web / Text messaging / Twitter / Tay / Situation awareness / Tweet / Classifier

Extracting Situational Awareness from Microblogs during Disaster Events Anirban Sen∗, Koustav Rudra† and Saptarshi Ghosh∗‡ ∗ Department of Computer Science and Technology Indian Institute of Engineering Science

Add to Reading List

Source URL: socialnetworks.mpi-sws.org

Language: English - Date: 2015-09-14 09:16:28
UPDATE