Internet architecture

Results: 12640



#Item
621Internet Protocol / Network architecture / IPv6 / IP addresses / 6to4 / Link-local address / IPv4 / ISATAP / MAC address / IPv6 deployment / IPv4 address exhaustion

Microsoft Word - student03-hu.doc

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 17:07:15
622Network architecture / Computer networking / Network protocols / Information-centric networking / Routing / Delay-tolerant networking / Internet / Ambient intelligence / Publishsubscribe pattern / Transmission Control Protocol

Multipath Support for Name-based Information Dissemination in Fragmented Networks Kohei Sugiyama Atsushi Tagami

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:27:27
623Computing / Internet / Network architecture / Internet Standards / Internet protocols / Cryptocurrencies / Dark web / Alternative currencies / Tor / Bitcoin / Litecoin / .tor

Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay? [short paper] Alex Biryukov and Ivan Pustogarov University of Luxembourg, {alex.biryukov,ivan.pustogarov}@uni.lu

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:00
624Computing / Internet / Network architecture / Network protocols / BID / Transport Layer Security / Comparison of data serialization formats

Netfonds Bank AS API Gateway Version 1.3 Pia Jakobsen 

Add to Reading List

Source URL: www.netfonds.no

Language: English
625

The NEBULA Future Internet Architecture Tom Anderson1 , Ken Birman2 , Robert Broberg3 , Matthew Caesar4 , Douglas Comer5 , Chase Cotton6 , Michael J. Freedman7 , Andreas Haeberlen8 , Zachary G. Ives8 , Arvind Krishnamurt

Add to Reading List

Source URL: www.cs.stevens.edu

Language: English - Date: 2013-03-11 23:54:53
    626Computing / Network architecture / Visual arts / File sharing networks / Network protocols / Multimedia / Internet broadcasting / Network address translation / Streaming media / Peer-to-peer / Traversal Using Relays around NAT / Transmission Control Protocol

    The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points  Kunwadee Sripanidkulchai, Aditya Ganjam, Bruce Maggs, and Hui Zhang Carnegie Mellon University

    Add to Reading List

    Source URL: conviva.com

    Language: English - Date: 2015-12-29 17:12:50
    627Network architecture / Computing / Internet / IP addresses / Subnetwork / Broadcast address / Transmission Control Protocol / Streaming media / Real-time Transport Protocol / RTP-MIDI

    RTP streaming on a local network with StreamEez-Pro Step 1: Make a copy of the RTP default profile In the StreamEez-Pro application, go to Advanced -> Streaming Service Profiles. Select RTP then click the Unlock button.

    Add to Reading List

    Source URL: www.hauppauge.com

    Language: English - Date: 2015-07-15 15:56:39
    628Computing / Network architecture / Routing protocols / Internet / Internet Standards / Routing / Internet protocols / Computer networking / Interior gateway protocol / Open Shortest Path First / Router / Multiprotocol Label Switching

    This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Lossless Migrations of Link-State IG

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2013-06-26 09:06:57
    629Network architecture / Data transmission / ISO standards / OSI protocols / Network protocols / Protocol data unit / OSI model / Transmission Control Protocol / Internet protocol suite / Service data unit / Communications protocol / Link layer

    25th Annual INCOSE International Symposium (IS2015) Seattle, WA, July 13 – 16, 2015 A modeling pattern for layered system interfaces Peter M. Shames Jet Propulsion Laboratory

    Add to Reading List

    Source URL: www.omgsysml.org

    Language: English - Date: 2015-07-30 09:46:35
    630Computing / Internet / Network architecture / Secure communication / Internet Standards / Computer network security / Internet protocols / Internet security / SoftEther VPN / Tor / Transport Layer Security / HTTPS

    Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2015-10-05 18:07:52
    UPDATE