Protocols

Results: 23793



#Item
31Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

Network instruction Wireless network is prepared at the multi-purpose hall. Settings are as follows: SSID: emis2012 Password: emis2012matsue Supported wireless and security protocols are 802.11a/b/g with WEP(128bit),

Add to Reading List

Source URL: ribf.riken.go.jp

- Date: 2012-12-01 22:57:34
    32On the Nonexistence of Resilient Consensus Protocols Gadi Taubenfeld∗ Computer Science Department, Yale University, New Haven, CTKey words: resilient consensus protocols, asynchronous message passing systems, fa

    On the Nonexistence of Resilient Consensus Protocols Gadi Taubenfeld∗ Computer Science Department, Yale University, New Haven, CTKey words: resilient consensus protocols, asynchronous message passing systems, fa

    Add to Reading List

    Source URL: www.faculty.idc.ac.il

    Language: English - Date: 2006-05-21 12:44:25
      33Having a hard time staying on top of laws, policies, documents, protocols... We have just the right solution for you! I  T IS HARD to stay on top of state and federal

      Having a hard time staying on top of laws, policies, documents, protocols... We have just the right solution for you! I T IS HARD to stay on top of state and federal

      Add to Reading List

      Source URL: www.region10.org

      Language: English - Date: 2018-04-27 14:09:46
        34How Ethernet RDMA Protocols iWARP and RoCE Support NVMe over Fabrics

        How Ethernet RDMA Protocols iWARP and RoCE Support NVMe over Fabrics

        Add to Reading List

        Source URL: www.snia.org

        Language: English - Date: 2017-08-24 14:10:14
          35Incentives and Trade-offs in Transaction Selection in DAG-based Protocols Yonatan Sompolinsky and Yoad Lewenberg  Scaling Bitcoin, Stanford

          Incentives and Trade-offs in Transaction Selection in DAG-based Protocols Yonatan Sompolinsky and Yoad Lewenberg Scaling Bitcoin, Stanford

          Add to Reading List

          Source URL: scalingbitcoin.org

          Language: English - Date: 2017-11-10 05:14:43
            36Compatibility and replaceability analysis for timed web service protocols Boualem Benatallah  CSE, UNSW Sydney NSW 2052, Autralia

            Compatibility and replaceability analysis for timed web service protocols Boualem Benatallah CSE, UNSW Sydney NSW 2052, Autralia

            Add to Reading List

            Source URL: julien.ponge.org

            Language: English - Date: 2015-02-16 03:42:49
              37Northeast Structural Genomics Consortium NESG NMR Wiki Site http://wiki.nesg.org A wiki containing many of the protocols, procedures, and experimental set-ups used by the Northeast Structural Genomics Consortium is ideal

              Northeast Structural Genomics Consortium NESG NMR Wiki Site http://wiki.nesg.org A wiki containing many of the protocols, procedures, and experimental set-ups used by the Northeast Structural Genomics Consortium is ideal

              Add to Reading List

              Source URL: nesg.org

              Language: English - Date: 2010-03-05 11:34:42
                38Case Study:  Ensuring the data delivery with IoT Protocols Workshop on New Frontiers in IoT

                Case Study: Ensuring the data delivery with IoT Protocols Workshop on New Frontiers in IoT

                Add to Reading List

                Source URL: wireless.ictp.it

                Language: English - Date: 2016-03-21 06:43:43
                  39Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web David Karger 

                  Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web David Karger 

                  Add to Reading List

                  Source URL: www.akamai.com

                  Language: English - Date: 2018-05-14 10:04:15
                    40Composition of Password-based Protocols St´ephanie Delaune LSV, ENS Cachan & CNRS & INRIA France  ∗

                    Composition of Password-based Protocols St´ephanie Delaune LSV, ENS Cachan & CNRS & INRIA France ∗

                    Add to Reading List

                    Source URL: www.cs.bham.ac.uk

                    Language: English - Date: 2009-02-25 10:33:23