Routing

Results: 7683



#Item
401Graph theory / Mathematics / Graph coloring / Maximal independent set

Geometric Ad-Hoc Routing: Of Theory and Practice

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:48
402Financial services / Economy / Finance / American Bankers Association / Banking in Canada / Banking in the United States / Routing transit number / Routing / Address

FINANCIAL INSTITUTION INFORMATION REGION #: ________ NAME__________________________________ (Indicate Chapter or Regional Council)

Add to Reading List

Source URL: bignet.org

Language: English - Date: 2016-02-03 14:02:21
403Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Language: English - Date: 2011-01-17 04:39:11
404Computing / Network architecture / Routing protocols / Networking hardware / Router / Communications protocol

Page 1 of 2 Application NoteControlling the Z-Systems z-16.16r Digital Detangler Pro Routers Inputs to are designated as sources and outputs are designated as destinations. The

Add to Reading List

Source URL: www.z-sys.com

Language: English - Date: 1999-11-05 11:20:25
405Mathematics / Combinatorial optimization / Routing algorithms / Matching / Search algorithms / Operations research

Optimal on-line colorings for minimizing the number of ADMs in optical networks⋆ Mordechai Shalom1,3 , Prudence W.H. Wong2 , and Shmuel Zaks1 ⋆⋆

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2009-02-24 10:13:31
406Distributed data storage / Computing / Concurrent computing / Distributed computing / Kademlia / Distributed hash table / Kad network / Pastry / Tapestry / Chord / Peer-to-peer / Routing

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
407Computing / Network architecture / Wireless networking / Internet / Routing / Tree / IPv6 address / Wireless sensor network / B-tree / Order One Network Protocol

MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Resource Aware Hierarchical Routing in Heterogeneous Wireless IoT Networks Guo, J.; Orlik, P.V.; Ishibashi, K.

Add to Reading List

Source URL: www.merl.com

Language: English - Date: 2016-08-01 12:17:19
408Financial services / Economy / Money / Bank account / Banking / Cheque / Numismatics / Debit / Deposit account / Bank / Savings account / Payment systems

CATHOLIC HOLY FAMILY SOCIETY PO Box 2909 Joliet, IllinoisPhonePLEASE ATTACH VOIDED CHECK OR BANK VERIFICATION OF SAVINGS ACCOUNT ROUTING AND ACCOUNT NUMBERS

Add to Reading List

Source URL: www.chfsociety.org

Language: English - Date: 2015-04-08 14:28:35
409Computing / Internet / Network architecture / Routing / Internet Standards / Internet protocols / Software-defined networking / Internet exchange point / Border Gateway Protocol

Software Defined Internet Exchange Points Arpit Gupta

Add to Reading List

Source URL: www.nanog.org

Language: English - Date: 2013-10-08 09:36:03
410Computing / Software / Free software / Dark web / Secure communication / Cryptographic software / Tor / I2P / Onion routing / HTTPS / Mixminion / Internet Relay Chat

Revisiting Circuit Clogging Attacks on Tor Eric Chan-Tin, Jiyoung Shin and Jiangmin Yu Department of Computer Science Oklahoma State University {chantin, jiyoung, jiangmy}@cs.okstate.edu Abstract—Tor is a popular anony

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2013-11-08 14:52:20
UPDATE