Network traffic control

Results: 798



#Item
571Computer security / Cyberwarfare / Companies listed on the New York Stock Exchange / Antivirus software / Threat / International Traffic in Arms Regulations / Host Based Security System / Security / Computer network security / McAfee

Data Sheet McAfee Embedded Control for Aerospace and Defense A single solution for system integrity, change control, and policy compliance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:37:43
572Partial differential equation / Constraint optimization / Optimization problem / Applied mathematics / Duality / Mathematical optimization / Mathematical analysis / Mathematics

A Cooperative Distributed Approach to Multi-Agent Eulerian Network Control: Application to Air Traffic Management

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2007-01-10 17:55:50
573Internet standards / Internet protocols / Traceroute / Ping / Internet Protocol / Internet Control Message Protocol / IPv4 / Transmission Control Protocol / Traffic flow / Computing / Network architecture / Internet

Towards Improving Packet Probing Techniques Matthew J. Luckie, Anthony J. McGregor, Hans-Werner Braun. Abstract-Packet probing is an important Internet measurement technique, supporting the investigation of packet delay,

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2008-12-15 15:52:21
574Network performance / Flow control / Internet protocols / Transmission Control Protocol / Traffic flow / Transport layer / Explicit Congestion Notification / Communications protocol / TCP congestion avoidance algorithm / Computing / Data / Network architecture

Monarch: A Tool to Emulate Transport Protocol Flows over the Internet at Large Andreas Haeberlen MPI for Software Systems, Rice University

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2006-09-22 09:34:18
575Computer security / Cyberwarfare / Companies listed on the New York Stock Exchange / Antivirus software / Threat / International Traffic in Arms Regulations / Host Based Security System / Security / Computer network security / McAfee

Data Sheet McAfee Embedded Control for Aerospace and Defense A single solution for system integrity, change control, and policy compliance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:37:43
576315th Network Warfare Squadron / Cirque du Soleil / Aeronautical Information Publication / Air traffic control

As of 18 June[removed]As a reminder, regulations published prior to 18 September 1947 are War Department regulations; those published on or after 18 September 1947 are Department of the Army regulations. To facilitate diff

Add to Reading List

Source URL: cdm16635.contentdm.oclc.org

Language: English
577Internet standards / Traceroute / Internet protocols / Computer networking / Network mapping / Transmission Control Protocol / IPv4 / Traffic flow / Border Gateway Protocol / Computing / Network architecture / Internet

A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option Matthew Luckie and kc claffy {mjl,kc}@caida.org CAIDA, UC San Diego, USA

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2014-01-15 12:18:57
578Automatic dependent surveillance-broadcast / Avionics / Envisat / Spaceflight / European Space Agency / Air traffic control

Network and Engineering Working Group Report Meeting Thursday 14th November Chair: G. Kirchner, Co-Chair: M. Wilkinson The NEWG met at the 18th ILRS Workshop in Japan and we were able to discuss some ongoing topics and t

Add to Reading List

Source URL: ilrs.gsfc.nasa.gov

Language: English - Date: 2014-01-09 12:34:59
579Transmission Control Protocol / Computer network security / Communications protocol / Daemon / Traffic flow / Data / Computing / Information

PDF Document

Add to Reading List

Source URL: dragon.linux-vs.org

Language: English - Date: 2005-08-27 04:21:20
580OSI protocols / TCP congestion avoidance algorithm / Transmission Control Protocol / Slow-start / Denial-of-service attack / Congestion window / Traffic flow / TCP window scale option / Transport layer / TCP/IP / Computing / Network architecture

Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse Technical Report: UMD-CS-TR-4737 Rob Sherwood Bobby Bhattacharjee Ryan Braud {capveg,bobby}@cs.umd.edu [removed]

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2005-11-09 11:36:05
UPDATE