Internet architecture

Results: 12640



#Item
361Computing / Network architecture / Internet / Internet Standards / File Transfer Protocol / Password / Nakula / Login

Handout Nakula & Antareja Incident Lars Molske, Damian Nowak 5.5th Bieleschweig Workshop Bielefeld, June

Add to Reading List

Source URL: www.rvs.uni-bielefeld.de

Language: English - Date: 2005-06-15 07:43:38
362Computing / Routing protocols / Network architecture / Internet / Internet Standards / Internet protocols / Computer networking / Border Gateway Protocol / Routing / Vector space / Communications protocol / Path vector protocol

Abstract Foundations of Inter-Domain Routing Vijay Ramachandran 2005 Inter-domain routing protocols establish best-effort connectivity between the independently administered networks that form the Internet. Because of th

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2005-06-14 14:56:00
363Computing / Wireless networking / Network architecture / Internet / Computer networking / Network protocols / Wireless ad hoc network / Vehicular ad hoc network / Geocast / Mobile ad hoc network / Routing protocol / Routing

Eur. Transp. Res. Rev: 36 DOIs12544ORIGINAL PAPER Design and simulation of a collision notification application

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2016-01-29 07:37:36
364Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
365Internet Protocol / Network architecture / IPv6 / IP addresses / IPv4 address exhaustion / Router / Internet / IPv6 deployment / IPv6 rapid deployment

Embargo: 31st Jan 2011 following RIPE/IANA press release on IPv4 exhaustion. London, UK, 31st January 2011: The old Internet is running out! FireBrick to the rescue helping ISPs rise to the challenge of IPv6 FireBrick, a

Add to Reading List

Source URL: www.firebrick.co.uk

Language: English - Date: 2011-01-30 11:31:27
366Computing / Network architecture / Internet / Computer networking / Internet Standards / Internet protocols / Routing protocols / Routing / Border Gateway Protocol / Router / Multiprotocol BGP / Open Shortest Path First

Definable functions continuous on curves in o-minimal structures

Add to Reading List

Source URL: www.inspire.edu.gr

Language: English - Date: 2016-06-27 04:19:16
367Computing / Network architecture / Computer architecture / Telecommunications engineering / Network protocols / Internet Standards / Tunneling protocols / Multiprotocol Label Switching / Quality of service / Computer network / Virtual LAN / Internet protocol suite

Fact Sheet Individual Pages2

Add to Reading List

Source URL: www.time.com.my

Language: English - Date: 2016-05-23 19:00:35
368Microsoft Windows / Software / Internet Explorer / Computer architecture / News aggregators / Chicago

Browser Compatibility – PCs Only For optimum system performance, we recommend you use Google Chrome. If you are unable to download Chrome due to administrative restrictions on your computer and are using Internet Explo

Add to Reading List

Source URL: ictr.research.bcm.edu

Language: English - Date: 2014-12-12 13:00:53
369Computing / Network architecture / Internet / Routing protocols / Computer networking / Internet Standards / Internet protocols / Routing / Border Gateway Protocol / Router / Shortest path problem / Path vector protocol

Inferring the Origin of Routing Changes using Link Weights Mohit Lad∗ , Ricardo Oliveira∗ , Dan Massey† , and Lixia Zhang∗ ∗ Computer Science Department, University of California, Los Angeles CA 90095

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English
370Security / Identity management / Crime prevention / Cryptography / Information governance / National security / Prevention / Privacy / Internet privacy / Computer security

GMOC and GENI Security Architecture – Joint Effort  The  team   currently  plans to implement  attribute­based credential  mechanisms  to enforce   the  policies for sharing operational data w

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2009-07-15 10:58:06
UPDATE