Flow network

Results: 2096



#Item
921Human rights / Computing / Ethics / Internet access / Computer network security / Internet censorship / Global Internet Freedom Task Force / Global Network Initiative / Google China / Computer law / Censorship / Content-control software

INTERNET FREEDOM & ONLINE CENSORSHIP APRIL 2012  The free flow of information is essential to Internet freedom and to electronic commerce. Filtering or regulation by private carriers or by governments curtails the de

Add to Reading List

Source URL: cdn.ccianet.org

Language: English - Date: 2014-09-06 05:41:31
922Computer programming / Software bugs / Network flow / C Standard Library / C dynamic memory allocation / Static single assignment form / Memory leak / Region-based memory management / Flow network / Computing / Software engineering / Memory management

Practical Memory Leak Detection using Guarded Value-Flow Analysis ∗ Sigmund Cherem Lonnie Princehouse

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-06-11 17:19:00
923Broadband / Videotelephony / Voice over IP / Internet / Metaswitch / Network architecture / Digital media / Electronics

CUSTOMER CASE STUDY OmniCenter® Suite Delivers End-to-End Network, Flow, Applications and VoIP Management for Mitsubishi Motors North America

Add to Reading List

Source URL: www.netreo.com

Language: English - Date: 2014-02-13 18:22:36
924OSI protocols / Streaming / Traffic flow / Transmission time / Transmission Control Protocol / Multipath routing / Network architecture / Wireless networking / Routing algorithms / Computer networking / Computing / Inter-process communication

Survivability in Wireless Networks: A Case for Overhead Reduction Axel Krings Computer Science Department University of Idaho [removed]

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-26 19:58:10
925Network management / Information technology management / Cisco Systems / Cisco IOS / Cisco Catalyst / Computer emergency response team / Traffic flow / Plixer International / Network traffic measurement / System software / Computing / Netflow

Cisco IT Case Study – February 2014 How CSIRT uses StealthWatch Using Lancope StealthWatch for Information Security Monitoring How the Cisco Computer Security Incident Response Team (CSIRT) uses Lancope

Add to Reading List

Source URL: www.cisco.com

Language: English
926Denial-of-service attack / Computing / Contemporary history / Denial-of-service attacks / Prolexic Technologies / Computer network security

Prolexic Flow Based (PLXfbm) Layer 3 and 4 distributed denial of service (DDoS) attack monitoring and analysis

Add to Reading List

Source URL: www.prolexic.com

Language: English - Date: 2014-03-20 17:26:53
927TCP/IP / Data / Internet protocols / Flow control / Explicit Congestion Notification / Transmission Control Protocol / Slow-start / TCP tuning / Network congestion / Computing / Network performance / Network architecture

Measuring the Evolution of Transport Protocols in the Internet ∗ Alberto Medina BBN Technologies

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2005-03-30 14:38:03
928Software / Scheduling / Latency / Hardware virtualization / Network congestion / Hyper-V / Throughput / Amazon Elastic Compute Cloud / Traffic flow / System software / Computing / Network performance

Small is Better: Avoiding Latency Traps in Virtualized Data Centers Yunjing Xu, Michael Bailey, Brian Noble, Farnam Jahanian University of Michigan {yunjing, mibailey, bnoble, farnam}@umich.edu

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:23
929Statistical classification / Computer network security / Network performance / Traffic classification / C4.5 algorithm / Deep packet inspection / Classification rule / Traffic flow / Skype / Software / Computing / Statistics

Aalborg Universitet A method for classification of network traffic based on C5.0 Machine Learning Algorithm Bujlow, Tomasz; Riaz, Tahir; Pedersen, Jens Myrup Published in:

Add to Reading List

Source URL: vbn.aau.dk

Language: English - Date: 2012-03-02 03:43:00
930Internet standards / Internet protocols / Inter-process communication / Streaming / Traffic flow / IPv4 / Transmission Control Protocol / User Datagram Protocol / Communications protocol / Computing / Data / Network architecture

Internet Background Radiation Revisited Eric Wustrow Manish Karir Michael Bailey

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:20
UPDATE