Network protocols

Results: 10979



#Item
1A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2017-11-30 09:02:54
2Communication Protocols for Underwater Data Collection using a Robotic Sensor Network Geoffrey A. Hollinger, Member, IEEE, Sunav Choudhary, Student Member, IEEE, Parastoo Qarabaqi, Student Member, IEEE, Christopher Murph

Communication Protocols for Underwater Data Collection using a Robotic Sensor Network Geoffrey A. Hollinger, Member, IEEE, Sunav Choudhary, Student Member, IEEE, Parastoo Qarabaqi, Student Member, IEEE, Christopher Murph

Add to Reading List

Source URL: robotics.usc.edu

Language: English - Date: 2012-06-07 04:24:58
    3A Language-theoretic View on Network Protocols Pierre Ganty1 , Boris Köpf1 , and Pedro Valero1,2 1 IMDEA Software Institute, Madrid, Spain Universidad Politécnica de Madrid, Spain

    A Language-theoretic View on Network Protocols Pierre Ganty1 , Boris Köpf1 , and Pedro Valero1,2 1 IMDEA Software Institute, Madrid, Spain Universidad Politécnica de Madrid, Spain

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2017-07-06 06:45:59
      4Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

      Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

      Add to Reading List

      Source URL: ribf.riken.go.jp

      - Date: 2012-12-01 22:57:34
        5International Journal of Advanced Networking & Applications (IJANA)  ISSN: A Scheduled Based MAC Protocols for Wireless Sensor Network: A Survey

        International Journal of Advanced Networking & Applications (IJANA) ISSN: A Scheduled Based MAC Protocols for Wireless Sensor Network: A Survey

        Add to Reading List

        Source URL: www.ijana.in

        Language: English - Date: 2016-07-11 03:04:47
          6Appears in Proceedings of the 11th IEEE International Conference on Network Protocols (ICNPExploiting Routing Redundancy via Structured Peer-to-Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D.

          Appears in Proceedings of the 11th IEEE International Conference on Network Protocols (ICNPExploiting Routing Redundancy via Structured Peer-to-Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D.

          Add to Reading List

          Source URL: oceanstore.cs.berkeley.edu

          Language: English - Date: 2003-12-19 16:43:18
            7D4.1 (FINAL) Interim Specification of Mechanisms, Protocols and Algorithms for Enhanced Network Platf

            D4.1 (FINAL) Interim Specification of Mechanisms, Protocols and Algorithms for Enhanced Network Platf

            Add to Reading List

            Source URL: www.comet-project.org

            Language: English - Date: 2011-02-14 08:57:10
              82 DecemberDear Colleague, Transparency and accurate reporting of research protocols and study results is paramount for high quality research that should inform the target users (public, patients, health care profe

              2 DecemberDear Colleague, Transparency and accurate reporting of research protocols and study results is paramount for high quality research that should inform the target users (public, patients, health care profe

              Add to Reading List

              Source URL: www.equator-network.org

              - Date: 2015-03-10 20:07:41
                9International Journal of Security and Its Applications Vol.8, No), pphttp://dx.doi.orgijsiaHow to Formally Model Features of Network Security Protocols∗

                International Journal of Security and Its Applications Vol.8, No), pphttp://dx.doi.orgijsiaHow to Formally Model Features of Network Security Protocols∗

                Add to Reading List

                Source URL: formal.hknu.ac.kr

                Language: English - Date: 2018-03-08 05:11:17
                  10PFLDNeT 2009 The 7th International Workshop on Protocols for Future, Large-Scale and Diverse Network Transports Lars Eggert (Nokia/TKK) & Kei Hiraki (The University of Tokyo) Tokyo, Japan May 21-22, 2009

                  PFLDNeT 2009 The 7th International Workshop on Protocols for Future, Large-Scale and Diverse Network Transports Lars Eggert (Nokia/TKK) & Kei Hiraki (The University of Tokyo) Tokyo, Japan May 21-22, 2009

                  Add to Reading List

                  Source URL: eggert.org

                  Language: English - Date: 2011-09-22 07:05:35