Internet architecture

Results: 12640



#Item
381Computing / Network architecture / Cryptographic protocols / Internet protocols / Tunneling protocols / Wireless networking / IPsec / Internet security / Extensible Authentication Protocol / Internet Key Exchange / 6LoWPAN / Virtual private network

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29
382Technology / Computing / Network architecture / Computer architecture / Mobile technology / Internet Standards / Internet protocols / Deep packet inspection / Sandvine / Policy and charging rules function / Roaming / Real-time charging

Usage Management: Overview Power revenue growth with standards-based service innovation Sandvine’s Usage Management allows you to increase revenue and achieve competitive differentiation by rapidly introducing a wide r

Add to Reading List

Source URL: www.sandvine.com

Language: English
383Computer architecture / Software / Computing / Windows 7 / Windows 8 / Cross-platform software / Microsoft Windows / Adobe AIR / Windows Vista / Internet Explorer / Adobe Flash Player

AIM Explorer Installation The AIM Explorer has a two-part installation for both PC and Macintosh. To run AIM Explorer, download and install the Adobe AIR 2 Runtime first and then download and install AIM Explorer. If the

Add to Reading List

Source URL: aem.cast.org

Language: English - Date: 2016-03-22 16:13:05
384Computing / Message-oriented middleware / Network protocols / Cloud infrastructure / Open standards / Internet of things / MQTT / Gateway / OPC Unified Architecture / Advanced Message Queuing Protocol / EtherCAT / Cloud computing

Beckhoff solutions for Industrie 4.0 and IoT

Add to Reading List

Source URL: www.pc-control.net

Language: English - Date: 2016-08-02 05:38:11
385Computing / Network architecture / Internet / Routing algorithms / Multipath routing / Routing / Border Gateway Protocol / Transmission Control Protocol / Load balancing / Equal-cost multi-path routing

Microsoft Word - PhD position multipath networks 2016 en.docx

Add to Reading List

Source URL: icube-reseaux.unistra.fr

Language: English - Date: 2016-04-18 17:34:23
386Domain name system / Internet / Computing / Network architecture / Internet Standards / Internet protocols / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / CNAME record / DNS zone transfer / OpenDNSSEC

DNSSEC Check Proxy - revision 1 Matthijs Mekking1 , Willem Toorop2 , NLnet Labs NLnet Labs documentOctober 3, 2011

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-04-17 06:07:30
387Broadband / Network architecture / Local loop / Fiber-optic communications / Telephony / Technology / Computing / Electronics / Fiber to the x / Internet access / Triple play / Glen Lang

` About the Cornerstone Award Each year, a committee of industry leaders, analysts, and writers selected by Broadband Properties votes to bestow a half dozen or so Cornerstone Awards to private developments,

Add to Reading List

Source URL: www.bbpmag.com

Language: English - Date: 2010-01-06 08:56:42
388Software / Computing / Computer architecture / Smartphones / Mobile operating systems / Mobile app / App Store / Internet privacy / Mobile marketing / Google Play / Android / IOS 9

SIGCHI Conference Paper Format

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2016-04-27 02:16:51
389Computing / Network architecture / Internet / Computer networking / Internet protocols / Internet Standards / Routing protocols / Routing / Border Gateway Protocol / Router / Route reflector / Convergence

Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal1 , Chen-Nee Chuah2 , Supratik Bhattacharyya3 , and Christophe Diot4 1 University of California, Berkeley, USA, 2

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 15:34:59
390Computing / Internet Relay Chat / Network protocols / Web development / Clientserver model / Inter-process communication / Network architecture / Denial-of-service attack / Transmission Control Protocol / Hypertext Transfer Protocol / Load balancing / Web server

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-09-10 05:14:02
UPDATE