Source routing

Results: 206



#Item
31SEDIRAN - Service Discovery and Interaction with Routing Protocols in Ad hoc Network

SEDIRAN - Service Discovery and Interaction with Routing Protocols in Ad hoc Network

Add to Reading List

Source URL: intra.info.uqam.ca

Language: English - Date: 2009-08-04 12:55:07
32SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2014-08-07 12:38:39
33ARTICLE IN PRESS  The Journal of Systems and Software xxxxxx–xxx www.elsevier.com/locate/jss  OPERA: An open-source extensible router architecture for

ARTICLE IN PRESS The Journal of Systems and Software xxxxxx–xxx www.elsevier.com/locate/jss OPERA: An open-source extensible router architecture for

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-03-26 04:26:42
34Understanding NVDL The Anatomy of an Open Source XProc/XSLT implementation of NVDL George Bina  @georgebina

Understanding NVDL The Anatomy of an Open Source XProc/XSLT implementation of NVDL George Bina @georgebina

Add to Reading List

Source URL: archive.xmlprague.cz

Language: English - Date: 2012-02-23 08:43:44
35Multicast Routers Cooperating with Channel Announcement System

Multicast Routers Cooperating with Channel Announcement System

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2004-02-16 05:26:35
36Wiretap: An Experimental Multiple-Path Routing Algorithm1,2,3 David L. Mills Electrical Engineering Department University of Delaware Abstract This paper introduces Wiretap, an experimental routing algorithm which comput

Wiretap: An Experimental Multiple-Path Routing Algorithm1,2,3 David L. Mills Electrical Engineering Department University of Delaware Abstract This paper introduces Wiretap, an experimental routing algorithm which comput

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2001-07-21 12:48:04
37Estimating The Importance Of Topological Routing For Modelling Water And Nitrogen Transport At Catchment Scale

Estimating The Importance Of Topological Routing For Modelling Water And Nitrogen Transport At Catchment Scale

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-01-15 18:01:34
38TOP SECRET//COMINTU//FOUO) Tor 2006 CES Summer Program Abstract (U) Tor is an open-source anonymization program created by Roger Dingledine, Nick Mathewson, and Paul Syverson. Originally sponsored by the US N

TOP SECRET//COMINTU//FOUO) Tor 2006 CES Summer Program Abstract (U) Tor is an open-source anonymization program created by Roger Dingledine, Nick Mathewson, and Paul Syverson. Originally sponsored by the US N

Add to Reading List

Source URL: www.queen.clara.net

Language: English - Date: 2013-12-23 19:26:24
391  Authenticated Routing for Ad hoc Networks Kimaya Sanzgiri  Brian Neil Levine

1 Authenticated Routing for Ad hoc Networks Kimaya Sanzgiri  Brian Neil Levine

Add to Reading List

Source URL: www.dsm.fordham.edu

Language: English - Date: 2007-03-10 14:28:30
40Multicast Peering Steve Rubin Layer42 Networks   What is IP Multicast?

Multicast Peering Steve Rubin Layer42 Networks What is IP Multicast?

Add to Reading List

Source URL: www.seattleix.net

Language: English - Date: 2009-04-10 14:59:04