Computer networking

Results: 7870



#Item
671Computing / Network architecture / OSI protocols / Wireless networking / Network performance / Computer networking / Packet loss / Carrier sense multiple access with collision avoidance / OSI model / Data link layer / Communications protocol / Transmission Control Protocol

Sharing a Medium Between Concurrent Protocols Without Overhead Using the Capture Effect ¨ Michael Konig Roger Wattenhofer

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2016-02-04 04:44:23
672Computing / Network protocols / Network architecture / Computer networking / Computer-mediated communication / Virtual communities / Internet protocol suite / ARPANET / Packet switching / Xerox Network Systems / UUCP / Internet

Not The Internet, but This Internet: How Othernets Illuminate Our Feudal Internet Paul Dourish Department of Informatics University of California, Irvine Irvine, CA, USA

Add to Reading List

Source URL: www.dourish.com

Language: English - Date: 2016-03-18 11:41:43
673Internet privacy / Marketing / Computing / HTTP cookie / Computer security / Privacy / Online advertising / Personally identifiable information / Medical privacy / Targeted advertising / P3P / Privacy concerns with social networking services

Privacy Policy April 10, 2012 Your privacy is critically important to us. At MyGet we have a few fundamental principles:

Add to Reading List

Source URL: www.myget.org

Language: English - Date: 2016-06-16 17:35:48
674Social networking services / Computer access control / XING / Login / Computing / Software / Humancomputer interaction

The login button for your website Win over new users for your website, e-shop, online services or blog with the free login feature from XING. XING login button

Add to Reading List

Source URL: x1.xingassets.com

Language: English - Date: 2016-05-31 06:33:27
675Technology / Science and technology / Computing / Complex systems theory / Formal sciences / Cognitive science / Blogs / Social computing / Social networking service / Computer science / Social complexity / Social media

84_ISWebScience.indd

Add to Reading List

Source URL: claudiawagner.info

Language: English - Date: 2014-12-09 05:08:03
676Wireless networking / Network management / Computing / Information technology management / Network simulation / Traffic generation model / Optimized Link State Routing Protocol / Wireless ad hoc network / Quality of service / Mobile ad hoc network / Mesh networking / Throughput

Wireless Traffic: The Failure of CBR Modeling Stefan Karpinski, Elizabeth M. Belding, Kevin C. Almeroth {sgk,ebelding,almeroth}@cs.ucsb.edu Department of Computer Science University of California, Santa Barbara

Add to Reading List

Source URL: karpinski.org

Language: English - Date: 2016-04-13 16:19:52
677Software / Computing / System software / Out-of-band management / System administration / Virtual Network Computing / Remote desktop / Networking hardware / ISCSI / RFB protocol / Field-programmable gate array / Headless computer

IP Only Server Muli Ben-Yehuda1 Oleg Goldshmidt1 Elliot K. Kolodner1 2 1

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:37
678Cloud storage / Computer networking / Data center / Data management / Distributed data storage / Colorado Springs /  Colorado / Colorado

LINX Installation Profiled The Colorado Springs Gazette DRIVE FOR DATA Progressive’s center biggest yet in Springs By WAYNE HEILMAN THE GAZETTE

Add to Reading List

Source URL: 2phr6z28e7ne3dr19116dggt.wpengine.netdna-cdn.com

Language: English - Date: 2014-07-11 18:52:14
679Internet Standards / Routing protocols / Internet protocols / Computer networking / Routing / Open Shortest Path First / Multiprotocol Label Switching / Border Gateway Protocol / Router / Interior gateway protocol / Convergence / Forwarding information base

Achieving sub-second IGP convergence ∗ in large IP networks Clarence Filsfils and John Evans

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2016-06-17 10:35:58
680Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
UPDATE