Network Computer

Results: 31604



#Item
421Computing / Internet / Network architecture / File sharing / Computer networking / Distributed computing architecture / Overlay network / Routing / Round-trip delay time / Peer-to-peer / Sybil attack / Tor

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:41
422Computing / Network performance / Computer architecture / Network architecture / Networking hardware / Teletraffic / Telecommunications engineering / Quality of service / Router / Quality of experience / Software-defined networking / Throughput

Contextual Router: Advancing Experience Oriented Networking to the Home Ilker Nadi Bozkurt Duke University

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2016-04-27 17:56:51
423Cyberwarfare / Computing / Security / Hacking / Computer network security / Malware / Server / Computer security / CSC Version 6.0 / Cyber-collection

THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

Add to Reading List

Source URL: cdn.securelist.com

Language: English - Date: 2016-08-09 10:39:42
424Computing / Software / Security / Data management / Cyberwarfare / Secure communication / Computer network security / Computer security / Cryptography / Big data / Git / Data security

Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.ischool.drexel.edu

Language: English - Date: 2014-02-06 12:27:42
425Computing / Fault-tolerant computer systems / Data synchronization / State machine replication / Replication / Network File System / Byzantine fault tolerance / Consensus / Ping / Transmission Control Protocol / Virtual synchrony / Data grid

Appears in the Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, USA, FebruaryPractical Byzantine Fault Tolerance Miguel Castro and Barbara Liskov Laboratory for Compu

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2016-08-22 23:25:09
426Computing / Network architecture / Internet / Computer networking / Routing / Internet Standards / Internet protocols / Border Gateway Protocol / Forwarding plane / Software-defined networking / Router / Control plane

An Industrial-Scale Software Defined Internet Exchange Point Arpit Gupta?, Robert MacDavid?, R¨udiger Birkner†, Marco Canini, Nick Feamster?, Jennifer Rexford?, Laurent Vanbever† ?Princeton University †ETH Z¨ur

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2016-02-26 08:25:51
427Computing / Security / Computer security / Computer network security / Application security / Data center / Arxan Technologies / Software Development Security

Arxan Best Practices White Paper 7 Key Factors of a Highly Effective Application Protection Solution Abstract: This whitepaper discusses the key factors that enable an effective application protection solution -that mit

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:51:09
428Computing / Computer architecture / Software / Inter-process communication / Distributed computing architecture / Middleware / Remote procedure call / Stub / Local Procedure Call / V / Spring / Method stub

Implementing Remote Procedure Calls ANDREW D. BIRRELL and BRUCE JAY NELSON Xerox Palo Alto Research Center Remote procedure calls (RPC) appear to be a useful paradig m for providing communication across a network between

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-01-27 14:55:03
429Computing / Network architecture / Computer architecture / Cyberwarfare / Computer network security / Data security / IP multicast / Overlay network / Denial-of-service attack / Anycast / Database trigger / Firewall

Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-06-05 12:41:23
430Artificial neural networks / Neuroscience / Cognitive science / Computational neuroscience / Artificial intelligence / Machine learning / Computational statistics / Deep learning / Word embedding / Recurrent neural network / Language model / Long short-term memory

Visualizing and Understanding Neural Models in NLP Jiwei Li1 , Xinlei Chen2 , Eduard Hovy2 and Dan Jurafsky1 1 Computer Science Department, Stanford University, Stanford, CA 94305, USA Technology Institute, Carnegie Mell

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2016-06-08 15:36:19
UPDATE