EECS

Results: 4734



#Item
31Computer network security / IT infrastructure / Computing / Cloud infrastructure / Information and communications technology / Middlebox / Cloud computing / Akamai Technologies / Network address translation / Gateway / Computer network

Making Middleboxes Someone Else’s Problem: Network Processing as a Cloud Service Justine Sherry Shaddi Hasan

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-11-27 04:23:35
32Logic / Mathematics / Mathematical logic / Formal languages / Grammar frameworks / Symbol / Substitution / Indexed grammar / Table of stars with Bayer designations

LNCSMildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 19:33:28
33Computing / Internet broadcasting / Information and communications technology / Concurrent computing / Twitch.tv / Proxy server / Server / Video game live streaming / Esports / Video on demand / Twitch / Streaming media

Internet Scale User-Generated Live Video Streaming: The Twitch Case Jie Deng, Gareth Tyson, Felix Cuadrado, and Steve Uhlig Queen Mary University of London, UK {j.deng,gareth.tyson,felix.cuadrado,steve.uhlig}@qmul.ac.uk

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2017-01-15 07:42:16
34Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field

Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-06-09 02:13:24
35Computing / Software / System software / Computer network security / Wireless networking / IEEE 802.11 / Web scraping / Wireshark / Pcap / Aircrack-ng / Packet analyzer / Transmission Control Protocol

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
36Computing / Concurrency control / Networking hardware / Information and communications technology / Concurrent computing / Computer networking / Computer network security / Middlebox / Monitor / Packet processing / Data Plane Development Kit / Transmission Control Protocol

Rollback-Recovery for Middleboxes Justine Sherry∗ Peter Xiang Gao∗ Soumya Basu∗ Aurojit Panda∗ Arvind Krishnamurthy• Christian Maciocco† Maziar Manesh† João Martins/ Sylvia Ratnasamy∗ Luigi Rizzo‡ Scot

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2015-07-16 16:30:14
37Programming language implementation / Compiler construction / Computing / Software engineering / Parsing / Parsing algorithms / SYNTAX / LR parser / Deterministic parsing / Identifier

Practical Algorithms for Incremental Software Development Environments Tim A. Wagner March 10, 1998 Preface

Add to Reading List

Source URL: www2.eecs.berkeley.edu

Language: English - Date: 1998-03-12 13:13:23
38Computing / Computer networking / Data transmission / Information and communications technology / Internet protocols / Information-centric networking / Named data networking / Cache / Publishsubscribe pattern / Web cache / ICN / SBB-CFF-FFS RABDe 500

Information-Centric Networking: Seeing the Forest for the Trees Ali Ghodsi Teemu Koponen

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-01-02 03:06:32
39Security engineering / Computer security / Human behavior / Computer network security / Data security / Cryptography / National security / Asset / Threat / Countermeasure / Paranoia / Security

EECS 388 Intro to Computer Security September 6, 2016 Homework 1: Rational Paranoia

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
40Cryptography / Mathematics / Theoretical computer science / Computational complexity theory / Secret sharing / Quantum complexity theory / Secure multi-party computation / IP / PP / Polynomial / Communication complexity / Lagrange polynomial

Best of Both Worlds in Secure Computation, with Low Communication Overhead

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-08-09 16:19:58
UPDATE