Flow network

Results: 2096



#Item
561Security / Computer network security / Computer security / Crime prevention / Electronic commerce / National security / Mathematical proof / Information flow / Modal logic / Logic / Computing / Mathematical logic

doi:j.pmcj

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
562Telecommunications engineering / Internet protocols / Inter-process communication / Adapter / Transmission Control Protocol / Computer network / Firewall / Traffic flow / Network packet / Computing / Network architecture / Data

Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications 1 Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard Guy, V. Ramakrishna, and Peter Reiher UCLA

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-05-20 12:07:13
563Static single assignment form / Linked list / Combinatorics / Connectivity / Control flow graph / Graph / Search algorithms / Network theory / Depth-first search / Compiler construction / Mathematics / Graph theory

Graal IR: An Extensible Declarative Intermediate Representation Gilles Duboscq∗ Lukas Stadler∗ Doug Simon† Christian Wimmer† Thomas Würthinger† Hanspeter Mössenböck∗

Add to Reading List

Source URL: ssw.jku.at

Language: English - Date: 2013-06-03 13:35:12
564Data / Packet loss / Transmission Control Protocol / Traffic flow / Transport layer / Leaky bucket / Packet switching / Bottleneck / Congestion window / Computing / Network performance / Network architecture

MIT Technical Report MIT-CSAIL-TR-945, AprilM&M: A Passive Toolkit for Measuring, Correlating, and Tracking Path Characteristics Sachin Katti MIT CSAIL

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
565System software / Computer network security / Networking hardware / Cyberwarfare / Router / Server appliance / Traffic flow / OpenWrt / Wake-on-LAN / Computing / Network performance / Network architecture

Real Time Traffic Classification and Prioritisation on a Home Router using DIFFUSE Nigel Williams, Sebastian Zander Centre for Advanced Internet Architectures, Technical Report 120412A Swinburne University of Technology

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2012-04-12 19:43:50
566Computer programming / Programming paradigms / Computing / Constraint satisfaction / Flow network / Mathematical optimization / Local consistency / Constraint programming / Operations research / Software engineering

On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems Tomoya Tanjo1 , Kazuhiro Minami1 , Ken Mano2 , and Hiroshi Maruyama1 1

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2014-03-05 04:21:36
567Computing / Firewall / PF / Ipfirewall / Netfilter / IPFilter / ALTQ / Network address translation / Traffic classification / System software / Software / Computer network security

Design of DIFFUSE v0.1 – DIstributed Firewall and Flow-shaper Using Statistical Evidence

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2010-12-22 23:44:27
568Internet / Network architecture / Smurf attack / Trinoo / IP address spoofing / UDP flood attack / Tribe Flood Network / Stacheldraht / Traffic flow / Denial-of-service attacks / Computing / Denial-of-service attack

D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus Jelena Mirkovi

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-24 19:27:00
569Physics / GridLAB-D / Smart grid / Power system simulation / Flow network / Simulation / Electric power transmission / Power flow study / AC power / Electromagnetism / Electric power / Energy

Simulating the Smart Grid Manfred P¨ochacker1 , Anita Sobe2 , Wilfried Elmenreich1,3 1 Institute of Networked and Embedded Systems / Lakeside Labs Alpen-Adria Universit¨at Klagenfurt, Austria

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-04-09 21:04:24
570Cyberwarfare / Computer security / Denial-of-service attack / Internet Relay Chat / Transmission Control Protocol / IP address spoofing / SYN flood / Traffic flow / Packet loss / Computer network security / Denial-of-service attacks / Computing

1 D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks Jelena Mirkovic, Member, IEEE, and Peter Reiher, Member, IEEE

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-07-01 17:41:22
UPDATE