Computer networking

Results: 7870



#Item
641Computing / OSI protocols / Units of information / Network architecture / Computer networking / Telecommunications engineering / Long-range identification and tracking / OSI model / Presentation layer / Transmission Control Protocol / Zip / Network packet

LRIT TRANSMITTER SPECIFICATION 1.0 Introduction The National Oceanic and Atmospheric Administration (NOAA) Low Rate Information System (LRIT broadcast system is an imagery and environmental products delivery system base

Add to Reading List

Source URL: www.noaasis.noaa.gov

Language: English - Date: 2010-09-23 07:28:50
642Digital media / Technology / New media / Structure / Social information processing / Social networks / Network theory / Social networking service / Social network / Social media / Collective intelligence / Internet

SANJAY KAIRAM RESEARCH STATEMENT My research in human-computer interaction addresses implications of the large-scale digital traces left behind by

Add to Reading List

Source URL: www.sanjaykairam.com

Language: English - Date: 2016-04-10 22:01:04
643Routing algorithms / Mathematics / Wireless networking / Computing / Routing protocols / Graph theory / Network theory / Edsger W. Dijkstra / Geographic routing / Greedy algorithm / Routing / Shortest path problem

Worst-Case Optimal and Average-Case Efficient ∗ Geometric Ad-Hoc Routing Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
644Computing / Network architecture / Computer networking / Internet Standards / Internet protocols / OSI protocols / Transmission Control Protocol / Transport layer / Internet protocol suite / Internet Protocol / Communications protocol / Quality of service

bundle layer vs Internet layers

Add to Reading List

Source URL: ipnsig.org

Language: English - Date: 2015-09-17 13:18:44
645Network protocols / OpenFlow / Computer networking / Networking hardware / Router / Routing

Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain

Add to Reading List

Source URL: fibbing.net

Language: English - Date: 2016-05-11 12:31:01
646Computing / Software / Wireless sensor network / Classes of computers / Wireless networking / Embedded operating systems / Computer networking / TinyOS / Embedded systems / Conference on Embedded Networked Sensor Systems / International Conference on Information Processing in Sensor Networks / Contiki

Debugging Wireless Sensor Network Simulations with YETI and COOJA

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:52
647Wireless sensor network / Wireless networking / Computing / Data transmission / Technology / Sensor node / ANT / Node

Poster Abstract: Reliable and Energy-Efficient Bulk-Data Dissemination in Wireless Sensor Networks David Gugelmann, Philipp Sommer, Roger Wattenhofer Computer Engineering and Networks Laboratory ETH Zurich, Switzerland

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:32
648Computing / Wireless networking / IEEE 802.11 / Wireless / Wi-Fi / Computer network security / Technology / Local area networks / Wi-Fi Protected Access / Wireless access point / Password / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with the Droid (Android 2.x OS) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
649Routing / Computer networking / Ethernet / Forwarding information base / Router / Internet Protocol / Forwarding plane / Routing table

Communication Networks Spring 2016 Laurent Vanbever www.vanbever.eu

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English - Date: 2016-03-06 13:14:47
650Computing / Software / System software / Ethernet / Computer networking / Virtual firewall / VM / Hyper-V / Network function virtualization / Hypervisor / Virtualization / Link aggregation

ITL BULLETIN FOR JUNE 2016 EXTENDING NETWORK SECURITY INTO VIRTUALIZED INFRASTRUCTURE Ramaswamy Chandramouli, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory Nationa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 17:23:03
UPDATE