Network architecture

Results: 18731



#Item
421Ethernet / Computing / Network architecture / Computer hardware / QSFP / 100 Gigabit Ethernet / Chelsio Communications / Network interface controller / PCI Express / IEEE 802.3 / Single-root input/output virtualization / Twinaxial cabling

T580-OCP-SO High Performance, Dual Port 40 GbE Unified Wire Adapter for Open Compute Project (OCP) Enables Single Unified Wire with SR-IOV, EVB/VNTag, DCB Highlights

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2015-08-10 06:22:13
422Computing / Computer networking / Network architecture / Switches / Computer architecture / Network protocols / Ethernet / Circuit switching / Network switch / Virtual output queueing / Traffic flow / Packet switching

Integrating Microsecond Circuit Switching into the Data Center George Porter Richard Strong Nathan Farrington Alex Forencich Pang Chen-Sun Tajana Rosing Yeshaiahu Fainman George Papen Amin Vahdat† UC San Diego

Add to Reading List

Source URL: nathanfarrington.com

Language: English - Date: 2016-02-22 00:30:08
423Cryptocurrencies / Bitcoin / Computing / Ethereum / E-commerce / Network architecture / Cross-platform software / Blockchain / Solidity / Smart contract / Joseph Lubin / RootStock

Town Crier: An Authenticated Data Feed for Smart Contracts Fan Zhang1,3 Ethan Cecchetti1,3 Kyle Croman1,3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-29 23:16:47
424Computational neuroscience / Computer architecture / Computing / Reconfigurable computing / Computer engineering / Artificial neural networks / Computer vision / Convolutional neural network / Xilinx / Virtex / Constituency Labour Party / Field-programmable gate array

Overcoming Resource Underutilization in Spatial CNN Accelerators Yongming Shen Michael Ferdman

Add to Reading List

Source URL: www.ece.stonybrook.edu

Language: English - Date: 2016-07-05 09:09:38
425Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Transport Layer Security / Internet Standards / HTTPS

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
426Computing / Network architecture / Computer networking / Local area networks / Internet protocols / Transmission Control Protocol / Open vSwitch / Packet loss / Transport layer / Out-of-order delivery / Load balancing / Internet protocol suite

Presto: Edge-based Load Balancing for Fast Datacenter Networks Keqiang He† Eric Rozner∗ Wes Felter∗ John Carter∗ †

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2015-07-09 17:05:07
427Computing / Computer networking / Data management / Network architecture / Cloud storage / Data center / Distributed data storage / Software-defined networking / Cloud computing / Computer security / Application Defined Network

Research Statement for Theophilus Benson The average enterprise network operator is responsible for managing a network that secures $5 billion worth of intellectual property (McAfeeand whose poor performance can r

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2014-03-19 22:40:33
428Computing / Network architecture / Data transmission / Telecommunications / Wide area networks / Emerging technologies / SD-WAN / Technology

digital experience solutions XENTAURS presents the Software Defined WAN (SDWAN) Explorer Workshop — an engaging, interactive event focused on helping you dive into SD-WAN concepts, essential services, designpatterns,

Add to Reading List

Source URL: www.xentaurs.com

Language: English - Date: 2016-05-30 03:43:28
429Computing / Concurrent computing / Distributed data storage / File sharing / Distributed computing architecture / Network architecture / Distributed hash table / Distributed computing / Peer-to-peer / Overlay network / Grid computing / Pastry

Scalable Computing: Practice and Experience Volume 8, Number 3, pp. 229–239. http://www.scpe.org ISSNc 2007 SWPS

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-05-16 08:40:08
430Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Language: English - Date: 2011-01-17 04:39:11
UPDATE