IEEE Internet Computing

Results: 576



#Item
421File sharing networks / Multimedia / Network protocols / Digital television / Internet television / Leaky bucket / Streaming media / Token bucket / Peer-to-peer / Computing / Concurrent computing / Distributed computing

8th IEEE International Symposium on Applied Computational Intelligence and Informatics • May 23–25, 2013 • Timisoara, Romania Leaky Bucket Model for Autonomic Control of Distributed, Collaborative Systems Marin Li

Add to Reading List

Source URL: www.savinetwork.ca

Language: English - Date: 2013-10-15 16:18:36
422Professional associations / Computer science / Science / IEEE standards / Institute of Electrical and Electronics Engineers / IEEE Transactions on Multimedia / IEEE Xplore / IEEE Standards Association / IEEE Internet Computing / International nongovernmental organizations / Standards organizations / Engineering

Computer Software Computer Software Organizations Innovate with IEEE Information Whether you’re researching software standards, cloud computing, predictive modeling, SQL or any other computer software technology, IEEE

Add to Reading List

Source URL: www.ieee.org

Language: English
423Computers and the environment / Cloud computing / Virtual machine / Data center / Internet backbone / Green computing / Carbon footprint / Partition / Minimum k-cut / Computing / System software / Mathematics

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON CLOUD COMPUTING 1 Greenhead: Virtual Da

Add to Reading List

Source URL: www.savinetwork.ca

Language: English - Date: 2013-10-03 15:36:59
424Computing / Electronic engineering / Aruba Networks / Wireless access point / Wi-Fi / Wireless LAN / Service set / IEEE 802.11 / Captive portal / Wireless networking / Computer network security / Technology

White paper Tunneled Internet Gateway Wi-Fi Access for Mobile Devices in High-Security Environments

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2014-04-10 18:21:42
425Internet / IP traceback / Denial-of-service attacks / Routing protocols / Routing / IP address spoofing / Denial-of-service attack / Router / Communications protocol / Computing / Computer network security / Network architecture

226 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Network Support for IP Traceback Stefan Savage, David Wetherall, Member, IEEE, Anna Karlin, and Tom Anderson

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-17 21:43:15
426Network coding / Network performance / Wireless sensor network / Telecommunications engineering / Internet / Routing / Node / MORE protocol / IEEE 802.1aq / Computing / Coding theory / Information theory

The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck

Add to Reading List

Source URL: www.paradise.caltech.edu

Language: English - Date: 2005-03-15 02:29:34
427Internet of Things / Computing / Wireless sensor network / IEEE Sensors Journal / Web of Things / Smart grid / Technology / Sensors / Ambient intelligence

CALL FOR PAPERS IEEE Sensors Journal Special Issue on Internet of Things: Architecture, Protocols and Services The Internet of Things was “Born” between 2008 and 2009, when the number of things connected to the Inter

Add to Reading List

Source URL: sites.ieee.org

Language: English - Date: 2012-09-28 04:54:34
428Computer security / IEEE 802.1X / Wi-Fi Protected Access / Wireless LAN / RADIUS / Wi-Fi / Secure Shell / Wireless security / Internet Authentication Service / Computer network security / Computing / Security

Protection Profile for Wireless Local Area Network (WLAN) Access Systems Information Assurance Directorate 01 December 2011

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2013-01-14 21:08:20
429Cryptographic protocols / IEEE 802.11 / Computer security / Cyberwarfare / Wired Equivalent Privacy / Wi-Fi Protected Access / Wi-Fi / Extensible Authentication Protocol / Internet security / Computer network security / Wireless networking / Computing

Advanced Wireless Setup and Security Presented by: Jonathon M. Santilli

Add to Reading List

Source URL: www.aao.org

Language: English - Date: 2010-12-16 15:51:04
430Telecommunications engineering / Ubiquitous computing / Public safety / Radio-frequency identification / IEEE 802.11 / Confidential / Wi-Fi / Community emergency response team / Technology / Wireless / Triage

Wireless Internet Information System for Medical Response in Disasters (WIISARD)

Add to Reading List

Source URL: collab.nlm.nih.gov

Language: English - Date: 2008-02-14 14:53:00
UPDATE