Routing protocol

Results: 2050



#Item
401Optimization problem / Applied mathematics / Constraint programming / Theoretical computer science / 2-satisfiability / Mathematics

The Complexity of the Routing Problem in POR Wei Hu, Jin Xie, and Zhenghao Zhang Computer Science Department Florida State University Tallahassee, FL 32306, USA Abstract—We have designed and implemented a new protocol

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2013-06-12 09:46:54
402Telecommunications engineering / Optimized Link State Routing Protocol / Wireless mesh network / Mesh networking / Link-state routing protocol / B.A.T.M.A.N. / Routing / Wireless ad-hoc network / Computer network / Wireless networking / Technology / Network architecture

School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA Wireless Mesh Network Implementation

Add to Reading List

Source URL: users.ece.gatech.edu

Language: English - Date: 2008-01-24 13:56:17
403Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / IPv6 / Inter-domain / Border Gateway Multicast Protocol / Multicast Source Discovery Protocol / Internet / Network architecture / Computing

Internet Research Task Force (IRTF) Request for Comments: 5773 Category: Historic ISSN: E. Davies

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-02-18 13:21:10
404Cross-platform software / Freenet / Network theory / Network architecture / Routing / Routing algorithms / Networks / Small world routing / Link-state routing protocol / Distributed data storage / Software / Computing

A Contribution to Analyzing and Enhancing Darknet Routing Stefanie Roos Thorsten Strufe

Add to Reading List

Source URL: www.p2p.tu-darmstadt.de

Language: English - Date: 2013-02-15 03:28:18
405Routing / Computer networking / Packet switching / Packet forwarding / Routing table / Forwarding plane / Packet Processing / Transmission Control Protocol / Router / Network architecture / Computing / Internet

Secure and Scalable Fault Localization under Dynamic Traffic Patterns

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:34:31
406Internet privacy / Routing / Computer networking / Traceroute / Tor / Border Gateway Protocol / Hop / Proxy server / Onion routing / Computing / Internet / Network architecture

Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Predic

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2015-05-23 12:03:44
407Computing / Internet standards / Vienna U-Bahn / Border Gateway Protocol / Network architecture / Internet / Routing

Distributed Route Aggregation on the Global Network www.route-aggregation.net João Luís Sobrinho Instituto de Telecomunicações Instituto Superior Técnico Universidade de Lisboa

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-10-15 14:29:37
408Internet / Network protocols / Routing protocols / Internet broadcasting / Multicast / Internet Group Management Protocol / Network layer / Allied Telesis / PIM Dense Mode / Network architecture / Computing / Internet protocols

Training | CAE-M/ENT Net.Campus Certified Allied Telesis Expert / Multicast Enterprise Solution Introduction

Add to Reading List

Source URL: alliedtelesis.ie

Language: English - Date: 2014-02-10 18:05:29
409Internet Protocol / Internet standards / IPv6 / Subnetwork / Classless Inter-Domain Routing / IPv4 / IPv6 deployment / 6to4 / Network architecture / Internet / Routing

IPv6  Address  and   Deployment  Planning   Md.  Abdul  Awal      

Add to Reading List

Source URL: www.bdnog.org

Language: English - Date: 2015-05-21 02:15:47
410Internet / Routing protocols / Denial-of-service attacks / IP traceback / Denial-of-service attack / Router / IP address spoofing / Traffic flow / Protocol Independent Multicast / Computing / Network architecture / Computer network security

You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 15:32:10
UPDATE