Computer networking

Results: 7870



#Item
791Internet privacy / Computing / Security / Computer security / Identity management / Privacy policy / HTTP cookie / Privacy / Medical privacy / Privacy concerns with social networking services / Privacy law

Privacy Policy This Privacy Policy applies to all products, services, and websites (the “Services”) offered by Ghostruck Inc., a Delaware corporation (referred to as “us,” “we,” “our,” “Provider”). Yo

Add to Reading List

Source URL: ghostruck.com

Language: English - Date: 2015-11-26 20:16:53
792Computer networking / Content centric networking / Namespace / Computer network

Secure Name Configuration and Prefix Registration Marc Mosko, Glenn Scott, Nacho Solis, Christopher A. Wood Palo Alto Research Center, Palo Alto, CA 94304 {mmosko, gscott, isolis, cwood}@parc.com

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:27:18
793Routing / Computer networking / Forwarding plane / Trie / Radix tree / Forwarding information base / Named data networking / Packet forwarding / Forwarding / Hash table / Router / Routing table

Scalable Name-Based Packet Forwarding: From Millions to Billions Tian Song Haowei Yuan

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:10:42
794Social networking services / Facebook / Social information processing / Social networks / Social systems / Small-world network / Clustering coefficient / Social network / Clique / Social graph / Graph / Orkut

User Interactions in Social Networks and their Implications Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Y. Zhao Computer Science Department, University of California at Santa Barbara {bo

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2009-05-30 06:36:57
795Software / Computing / Social networking services / Data management / Data security / Personal /  Inc. / Cloud computing / Foursquare / Internet privacy / Android / Location-based service / Mobile app

Privacy, Availability and Economics in the Polaris Mobile Social Network Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng and Ben Y. Zhao Department of Computer Science, U. C. Santa Barbara, Sant

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-02-11 14:21:36
796IEEE 802 / OSI protocols / Computer networking / Units of information / Network architecture / PHY / OSI model / Network packet / Frame / IEEE 802.15 / ZigBee / Transmission Control Protocol

Phantom Boundaries and Cross-layer Illusions inDigital Radio (Research Report) Travis Goodspeed Straw Hat Security

Add to Reading List

Source URL: spw14.langsec.org

Language: English - Date: 2014-06-12 23:25:59
797Computing / Software / Technology / Network architecture / Computer networking / Emerging technologies / Local area networks / Network function virtualization / 6WIND / Packet processing / Open vSwitch / System Architecture Evolution

Acclerated Data Plane Solution For EPC and vEPC Application Brief

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2014-07-22 11:54:55
798Network architecture / Computer networking / Network protocols / Information-centric networking / Routing / Delay-tolerant networking / Internet / Ambient intelligence / Publishsubscribe pattern / Transmission Control Protocol

Multipath Support for Name-based Information Dissemination in Fragmented Networks Kohei Sugiyama Atsushi Tagami

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:27:27
799Wireless networking / Wireless / Technology / Computing / Wireless ad hoc network / Traffic flow / Wireless sensor network / Vehicular ad hoc network / T-Mobile US / IEEE 802.11 / Transmission Control Protocol / Transmission time

On Infostation Density of Vehicular Networks Vinod Kone† , Haitao Zheng† , Antony Rowstron§ , and Ben Y. Zhao† † Department of Computer Science, U. C. Santa Barbara § Microsoft Research, Cambridge, United Kingd

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2009-12-31 05:34:12
800Cryptography / Public-key cryptography / Elliptic curve cryptography / Computer networking / Named data networking / Key management / Digital signature / RSA / Elliptic Curve Digital Signature Algorithm / Secure Shell / Type-length-value / Digital Signature Algorithm

Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:49
UPDATE