Skype protocol

Results: 85



#Item
11Tely Labs Inc.  April 14th, 2015 Tely Labs Inc. Device API

Tely Labs Inc. April 14th, 2015 Tely Labs Inc. Device API

Add to Reading List

Source URL: www.tely.com

Language: English - Date: 2015-04-14 12:58:37
12Nusoft Newsletter – IR Series No.25 Tech Overview : The Purpose and Installation of the IR Plug-In

Nusoft Newsletter – IR Series No.25 Tech Overview : The Purpose and Installation of the IR Plug-In

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:27
13OpenVoIP: An Open Peer-to-Peer VoIP and IM System Salman Abdul Baset, Gaurav Gupta, and Henning Schulzrinne Dept. of Computer Science, Columbia University New York, NY, USA  {salman,gg2265,hgs}@cs.columbia.edu

OpenVoIP: An Open Peer-to-Peer VoIP and IM System Salman Abdul Baset, Gaurav Gupta, and Henning Schulzrinne Dept. of Computer Science, Columbia University New York, NY, USA {salman,gg2265,hgs}@cs.columbia.edu

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2008-07-21 13:42:40
14MobiCom 2010 Poster: Mobile TCP Usage Characteristics and the Feasibility of Network Migration without Infrastructure Support Ahmad Rahmati1, Clayton Shepard1, Angela Nicoara2, Lin Zhong1, Jatinder Pal Singh2 1 2 {rahmat

MobiCom 2010 Poster: Mobile TCP Usage Characteristics and the Feasibility of Network Migration without Infrastructure Support Ahmad Rahmati1, Clayton Shepard1, Angela Nicoara2, Lin Zhong1, Jatinder Pal Singh2 1 2 {rahmat

Add to Reading List

Source URL: www.ruf.rice.edu

Language: English - Date: 2010-12-14 17:34:16
15S HAR EPLAN  T E C HN I CA L SPEC IFICATIO N S Security

S HAR EPLAN T E C HN I CA L SPEC IFICATIO N S Security

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-04-27 09:38:13
16Protocol Identification via Statistical Analysis (PISA) Black Hat 2007 Rohit Dhamankar and Rob King, TippingPoint Technologies Abstract A growing number of proprietary protocols are using end-to-end encryption to avoid

Protocol Identification via Statistical Analysis (PISA) Black Hat 2007 Rohit Dhamankar and Rob King, TippingPoint Technologies Abstract A growing number of proprietary protocols are using end-to-end encryption to avoid

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
17The OpenKnowledge Kernel Adrian Perreau de Pinninck, David Dupplaw, Spyros Kotoulas and Ronny Siebes Abstract— Web services are pieces of software that can be invoked via a standardized protocol. They can be combined v

The OpenKnowledge Kernel Adrian Perreau de Pinninck, David Dupplaw, Spyros Kotoulas and Ronny Siebes Abstract— Web services are pieces of software that can be invoked via a standardized protocol. They can be combined v

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2007-08-28 14:49:11
18Quick Start Guide This guide explains how to use and configure telyHD Pro. More information can be found at tely.com

Quick Start Guide This guide explains how to use and configure telyHD Pro. More information can be found at tely.com

Add to Reading List

Source URL: www.tely.com

Language: English - Date: 2015-03-19 18:49:25
19nDPI: Open-Source High-Speed
 Deep Packet Inspection Luca Deri *†, Maurizio Martinelli*, Alfredo Cardigliano† IIT/CNR* ntop† Pisa, Italy

nDPI: Open-Source High-Speed
 Deep Packet Inspection Luca Deri *†, Maurizio Martinelli*, Alfredo Cardigliano† IIT/CNR* ntop† Pisa, Italy

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2015-01-21 03:43:32
20Web 2.0 / Skype / File sharing / Cross-platform software / Skype protocol / Kazaa / Peer-to-peer / Gnutella / Traffic flow / Software / Computing / File sharing networks

Protocol Identification via Statistical Analysis (PISA) BlackHat 2007 Rohit Dhamankar and Rob King Agenda

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37