Data Control

Results: 12347



#Item
911Computer networking / Named data networking / Internet protocol suite / IP multicast / Computer network / Internet / Network packet / Van Jacobson / Transmission Control Protocol / Web conferencing / Router

ACT: Audio Conference Tool Over Named Data Networking Zhenkai Zhu Sen Wang Xu Yang

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2011-06-27 14:08:09
912Computing / Network architecture / Internet protocols / Units of information / Data / Transmission Control Protocol / Communications protocol / Transport layer / Best-effort delivery / Network packet

Now, it’s your turn …to design a Internet protocol I’m asking you to develop a reliable transport protocol (sitting at L4)

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English - Date: 2016-03-03 06:11:02
913Software engineering / Computer programming / Computing / Method / Data types / C++ / Virtual method table / Control-flow integrity / Dangling pointer / Method overriding / Pointer / Control flow

VTrust: Regaining Trust on Virtual Calls Chao Zhang Scott A. Carr Tongxin Li

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
914Concurrency control / Computing / Transaction processing / Data management / Information science / Software transactional memory / Lock / Non-blocking algorithm / Transactional memory / Linearizability / Critical section / Synchronization

Performance Evaluation of Adaptivity in Software Transactional Memory Mathias Payer ETH Zurich, Switzerland Abstract—Transactional memory (TM) is an attractive platform for parallel programs,

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
915

APRS World, LLC specializes in data logging and control equipment primarily for the renewable energy industry. To learn more about this product or any of our other products, please visit us online at: Wind Monitor

Add to Reading List

Source URL: winddatalogger.com

Language: English - Date: 2011-12-19 20:43:51
    916File sharing / Peer-to-peer / Transmission Control Protocol / Network packet / Computing / Information / Computer networking / Data transmission / Network protocols / Overlay network

    Noname manuscript No. (will be inserted by the editor) On Performance Evaluation of Swarm-based Live Peer-to-Peer Streaming Applications Reza Rejaie · Nazanin Magharei

    Add to Reading List

    Source URL: mirage.cs.uoregon.edu

    Language: English - Date: 2014-01-28 14:44:03
    917Sound / Noise pollution / Noise reduction / Noise / Computing / Signal processing / Acoustics / Audio engineering / Active noise control / Reverberation / Image noise / Microphone

    Brigham Young University Acoustical Analysis of Active Control in the Server Room of a C7 Data Centers Colocation Facility Feasibility Report

    Add to Reading List

    Source URL: www.c7.com

    Language: English - Date: 2014-07-03 13:06:55
    918Computing / Concurrent computing / Distributed data storage / Computer network security / Multi-agent systems / Spamming / Distributed computing / Cyberwarfare / Botnet / Command and control / Distributed hash table / Kad network

    Tsunami: A parasitic, indestructible botnet on Kad Ghulam Memon, Jun Li & Reza Rejaie Peer-to-Peer Networking and

    Add to Reading List

    Source URL: mirage.cs.uoregon.edu

    Language: English - Date: 2013-04-22 13:17:57
    919Statistics / Estimation theory / Statistical inference / Robot control / Kalman filter / Maximum likelihood estimation / Expectationmaximization algorithm / Exponential family / Principal component analysis / Confidence interval / Draft:Pirate programming

    An EM-Algorithm for Maximum Likelihood Estimation of Vector Autoregressions with Mixed Frequency Data J¨urgen Antony∗ and Torben Klarl† February 13, 2016 Abstract

    Add to Reading List

    Source URL: www.wiwi.uni-augsburg.de

    Language: English - Date: 2016-04-29 01:52:57
    920Computing / Software engineering / Memory management / Software / Computer memory / Program analysis / Control flow graph / Data-flow analysis / Data buffer / C dynamic memory allocation / Stack / Call stack

    HI-CFG: Construction by Binary Analysis, and Application to Attack Polymorphism Dan Caselden1 , Alex Bazhanyuk2 , Mathias Payer3 , Stephen McCamant4 , and Dawn Song3 1

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    UPDATE