Process control network

Results: 146



#Item
41Information / Ethernet / Local area networks / Inter-process communication / Streaming / Traffic flow / Virtual LAN / Computer network / Network switch / Computing / Computer network security / Data

Ethane: Taking Control of the Enterprise Martìn Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, and Nick McKeown Scott Shenker

Add to Reading List

Source URL: www.sigcomm.org

Language: English - Date: 2011-07-27 15:40:00
42Inter-process communication / Network socket / Computer networking / Internet protocols / Internet protocol suite / Transmission Control Protocol / STREAMS / Traffic flow / Transport layer / Computing / Data / Information

Rigorous Specification and Conformance Testing Techniques for Network Protocols, as applied to TCP, UDP, and Sockets Steve Bishop∗ Peter Sewell∗ ∗

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-17 11:05:46
43Network performance / OSI protocols / Inter-process communication / Traffic flow / Throughput / Network architecture / Transmission Control Protocol / Wormhole switching / Packet switching / Computing / Computer networking / Streaming

Virtual- Channel Flow Controll William J. Dally Artificial Intelligence Laboratory and Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts 02139

Add to Reading List

Source URL: cva.stanford.edu

Language: English - Date: 2008-04-03 14:20:06
44Artificial intelligence / Control engineering / Fuzzy logic / Logic in computer science / Control theory / Fuzzy control system / Control system / Soft sensor / Neural network / Science / Logic / Cybernetics

SCIAD - Self-Learning Industrial Control Systems Through Process Data Achievements - Direct application to industry problems; • Hierarchical genetic algorithm (HGA) for learning a T-S fuzzy model for identification of

Add to Reading List

Source URL: www.isr.uc.pt

Language: English - Date: 2014-09-03 10:05:22
45Computer network security / Federated identity / Identity management / Kerberos / Single sign-on / Authentication / Access token / Principal / Authorization / Security / Computer security / Access control

Accountability and Control of Process Creation in Metasystems Marty Humphrey, Frederick Knabe, Adam Ferrari, and Andrew Grimshaw Department of Computer Science University of Virginia Charlottesville, VA

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2001-09-17 13:13:14
46Computer network security / Distributed computing architecture / Inter-process communication / Access control / Software testing / PlanetLab / E / Open proxy / Futures and promises / Computing / Software engineering / Computer programming

Email Prioritization: reducing delays on legitimate mail caused by junk mail

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2005-01-21 13:24:49
47Information / Computer networking / Network socket / Transmission Control Protocol / Internet protocol suite / Traffic flow / STREAMS / Communications protocol / Winsock / Computing / Inter-process communication / Data

Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and Sockets Anonymous Paper 190

Add to Reading List

Source URL: www.lochan.org

Language: English - Date: 2005-03-28 17:16:12
48Internet / Network architecture / TCP/IP / Computer networking / Inter-process communication / Internet protocol suite / Transmission Control Protocol / Port / STREAMS / Computing / Network socket / Internet protocols

The TCP Specification: A Quick Introduction Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, Keith Wansbrough March 21, 2005 What is this specification? A mathematical model of TCP, UDP, rel

Add to Reading List

Source URL: www.lochan.org

Language: English - Date: 2005-03-28 17:16:29
49Multi-agent systems / Nagios / Cron / ITER / Network management / Computing / System software / Software

Nagios Reactor – Creating Event Chains The Industry Standard in IT Infrastructure Monitoring Purpose Event chains are the main function of Nagios Reactor and control the decision making process. Without event chains, N

Add to Reading List

Source URL: assets.nagios.com

Language: English - Date: 2014-08-27 15:36:52
50Network performance / Internet protocols / Flow control / Inter-process communication / Transmission Control Protocol / Transport layer / Network congestion / TCP congestion avoidance algorithm / Throughput / Computing / Data / Network architecture

Coordinated Multi-streaming for 3D Tele-immersion David E. Ott and Ketan Mayer-Patel Department of Computer Science University of North Carolina at Chapel Hill ABSTRACT

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2004-10-27 13:21:42
UPDATE