State network

Results: 7934



#Item
821Electrical engineering / Electronic circuits / Electronic design / Analog circuits / Electric power / Harmonic balance / Electrical network / Steady state / Harmonics / Electromagnetism / Electronic engineering / Electronics

HP ADS SIMULATION EXAMPLE – Basic Harmonic Balance Simulation for Large Signal Steady State AC Simulation. Background: Harmonic Balance (HB) simulation is used to find the steady state response of a circuit, which cont

Add to Reading List

Source URL: pesona.mmu.edu.my

Language: English - Date: 2004-12-03 09:20:04
822Computer network security / Security / Computing / Technology / Personal computer / Systems management / Computer security / Operating system / Computer systems / Crime prevention / National security

REPORT # OLA OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA

Add to Reading List

Source URL: www.auditor.leg.state.mn.us

Language: English - Date: 2002-04-26 09:23:08
823Computing / Wireless sensor network / IEEE Communications Society / International Conference on Information Processing in Sensor Networks / Wireless security / Telecommunications engineering / Association for Computing Machinery / Ambient intelligence / Support / Wireless networking / International nongovernmental organizations / Technology

Peng Ning (As of MarchDepartment of Computer Science North Carolina State University Telephone: (Email: ; URL: http://www.csc.ncsu.edu/faculty/ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 18:58:42
824System software / Information / Solid-state drive / Cache / Storage area network / RAID / Hybrid array / Converged storage / Computing / Data management / Computer storage

QUARTER 1, 2000 SAN Cache: SSD In The SAN by Michael Casey S

Add to Reading List

Source URL: www.soliddata.com

Language: English - Date: 2012-02-11 16:21:30
825Customs services / Radio-frequency identification / Public Printer of the United States / U.S. Customs and Border Protection / Secure Electronic Network for Travelers Rapid Inspection / Credential / Border Crossing Card / Political geography / Government / United States Government Printing Office / Technology

GAO-15-326R, Government Publishing Office: Production of Secure Credentials for the Department of State and U.S. Customs and Border Protection

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2015-03-10 15:15:27
826OSI protocols / Routing algorithms / Wireless networking / Computer networking / Optimized Link State Routing Protocol / Link-state routing protocol / Router / Network topology / Distance-vector routing protocol / Network architecture / Routing / Routing protocols

1 Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks Stephen Dawson-Haggerty, Arsalan Tavakoli, and David Culler Computer Science Division

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2010-09-16 16:45:01
827Monterey County /  California / Watsonville /  California / Santa Barbara /  California / California / Geography of California / Geography of the United States / California State Route 1

LEGEND (CLICK HERE FOR MORE DETAILED LEGEND) National Network (STAA) TRUCK NETWORKS on

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2015-05-13 12:39:58
828Computing / Routing / Dynamic Source Routing / B.A.T.M.A.N. / Wireless networking / Network architecture / Ad hoc On-Demand Distance Vector Routing

How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:59
829Beacon / Wireless sensor network

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks∗ Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:08
830Technology / Wireless networking / Electronics / Sensor node / Node / Networks / Wireless sensor network / Computer networking / Computing

A Framework for Identifying Compromised Nodes in Wireless Sensor Networks QING ZHANG, TING YU, and PENG NING North Carolina State University Sensor networks are often subject to physical attacks. Once a node’s cryptog

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
UPDATE