Data Transmission Network

Results: 1754



#Item
381Computing / Network architecture / Cyberwarfare / Teletraffic / Data / Denial-of-service attack / Transmission Control Protocol / LAND / SYN flood / Denial-of-service attacks / Computer network security / Network performance

How to Test DoS Defensesāˆ— Jelena Mirkovic USC/ISI 4676 Admiralty Way Ste 1001 Marina Del Rey, CAEmail:

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2009-07-27 18:06:23
382Data transmission / Common Image Generator Interface / Transmission Control Protocol / Communications protocol / Network packet / Information / Data / Computing

Interface Control Document for CIGI Version 3.2

Add to Reading List

Source URL: cigi.sourceforge.net

Language: English - Date: 2006-11-16 17:14:04
383Channel / Information theory / Network packet / Data / Scheduling / Transmission Control Protocol / High Speed Packet Access / High-Speed Uplink Packet Access / Scheduling algorithms / Information / Computing

WCDMA Packet Access (Chapter 10) Peter Chong, Ph.D. (UBC, Canada) Research Engineer Nokia Research Center, Helsinki, Finland 1

Add to Reading List

Source URL: www.comlab.hut.fi

Language: English - Date: 2011-02-11 04:31:31
384Data transmission / Communications protocol / Protocols / Computer networking / Routing / Network architecture / Forwarding plane / Forwarding information base / Data / Computing / Information

Microsoft PowerPointNDNfd.pptx [Read-Only]

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:39
385Network architecture / Internet standards / Operating systems / User Datagram Protocol / Communications protocol / Internet Control Message Protocol / Port / V / Transmission Control Protocol / Computing / Data / Internet protocols

Timing UDP: mechanized semantics for sockets, threads and failures Keith Wansbrough Michael Norrish

Add to Reading List

Source URL: www.lochan.org

Language: English - Date: 2005-03-28 17:17:23
386Communications protocol / Data transmission / Protocols / Public-key cryptography / Cryptographic protocols / Network protocols / Cryptography / Data / Information

Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:01:14
387Internet protocols / Internet standards / Logical Link Control / Transmission Control Protocol / Point-to-point protocol / Telecommunication / Internet protocol suite / Telnet / Computer network / Computing / Internet / Data

Microsoft Word - COM1000_2.doc

Add to Reading List

Source URL: pcmicro.com

Language: English - Date: 2004-11-14 14:22:22
388Computing / Transmission Control Protocol / Network congestion / Throughput / Traffic flow / Communications protocol / Network performance / Data / Information

Choosing Internet Paths with High Bulk Transfer Capacity by Jacob A. Strauss S.B., Massachusetts Institute of TechnologySubmitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
389Computing / Network architecture / Hypertext Transfer Protocol / World Wide Web / Transmission Control Protocol

Evidence-Based Process Innovation How to make most out of big data? Wil van der Aalst DSC/e

Add to Reading List

Source URL: bpm-roundtable2014.eu

Language: English - Date: 2014-10-14 06:58:12
390Internet protocols / Computer network security / Data security / Port scanner / Transmission Control Protocol / Firewall / Port / X Window System / Communications protocol / Computing / Data / Software

Introducing Unicornscan - RIDING THE UNICORN

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2009-11-16 20:49:03
UPDATE