Flow control

Results: 3353



#Item
961Data / Middlebox / Traffic flow / Transmission Control Protocol / NAT traversal / Firewall / Latency / Traffic shaping / Network address translation / Computer network security / Computing / Network architecture

Session Substrate Protocol for User Datagrams (SPÜD) Brian Trammell (IAB IP Stack Evolution Program)

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-24 16:33:08
962Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-04-29 08:46:04
963Internet protocols / Network protocols / Computer network security / Transmission Control Protocol / Packet loss / Retransmission / Traffic flow / Transport layer / Deep packet inspection / Computing / Network architecture / Data

Towards Accurate Accounting of Cellular Data for TCP Retransmission Younghwan Go, Denis Foo Kune† , Shinae Woo, KyoungSoo Park, and Yongdae Kim KAIST University of Massachusetts Amherst†

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2015-02-24 22:18:06
964Source code / Ada programming language / Ada / C programming language / Constant / Control flow / String literal / GNAT / C syntax / Computer programming / Computing / Software engineering

Quick Ada ● 1 The history of Ada ●

Add to Reading List

Source URL: goanna.cs.rmit.edu.au

Language: English - Date: 2000-10-15 20:46:30
965Programming language / Logic / Mathematics / Model theory / Metalogic / Structure

IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version)

Add to Reading List

Source URL: stefanheule.com

Language: English - Date: 2015-01-16 18:44:42
966Cyberwarfare / Transmission Control Protocol / Firewall / Pcap / Packet capture / Tcpdump / Traffic flow / Denial-of-service attack / National Energy Research Scientific Computing Center / Software / Computer network security / Computing

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic Stefan Kornexl Vern Paxson Holger Dreger TU M¨unchen ICSI / LBNL TU M¨unchen Abstract There are times when it would be extrao

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2005-08-11 15:51:44
967Aquatic ecology / Environmental flow / Groundwater / Salmon / Riparian zone / Stream / Drinking water / California State Water Resources Control Board / Water resource policy / Water / Hydrology / Rivers

British Columbia’s Water Act Modernization Technical Background Report

Add to Reading List

Source URL: www.livingwatersmart.ca

Language: English - Date: 2010-03-29 13:25:01
968Acorn Computers / Procedural programming languages / Control flow / Eval / BBC Micro / Assembly language / IBM Basic assembly language / Subroutine / C / Computing / Software engineering / Computer programming

9th JulySupport Group Application Note Number: 028 Issue: 1 Author:

Add to Reading List

Source URL: chrisacorns.computinghistory.org.uk

Language: English - Date: 2013-08-13 09:33:18
969OSI protocols / Explicit Congestion Notification / Active queue management / Network congestion / Transmission Control Protocol / Random early detection / Additive increase/multiplicative decrease / Packet loss / Traffic flow / Network performance / Computing / Management

The Power of Explicit Congestion Notification Aleksandar Kuzmanovic Department of Computer Science Northwestern University

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-14 15:58:08
970Inter-process communication / Network socket / Computer networking / Internet protocols / Internet protocol suite / Transmission Control Protocol / STREAMS / Traffic flow / Transport layer / Computing / Data / Information

Rigorous Specification and Conformance Testing Techniques for Network Protocols, as applied to TCP, UDP, and Sockets Steve Bishop∗ Peter Sewell∗ ∗

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-17 11:05:46
UPDATE