Terzis

Results: 43



#Item
31Network performance / Teletraffic / Computer networking / Internet protocols / Packet loss / Voice over IP / Overlay network / Quality of service / Transport layer / Computing / Network architecture / Computer architecture

1-800-OVERLAYS: Using Overlay Networks to Improve VoIP Quality Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis Technical Report CNDS[removed]Aug 23, 2004 http://www.cnds.jhu.edu

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
32Network performance / Teletraffic / Computer networking / Internet protocols / Telecommunications engineering / Packet loss / Overlay network / Voice over IP / Network congestion / Computing / Network architecture / Computer architecture

An Overlay Architecture for High Quality VoIP Streams Yair Amir, Member, IEEE, ACM, Claudiu Danilov, Stuart Goose, David Hedqvist, and Andreas Terzis, Member, IEEE, ACM Abstract— The cost savings and novel features as

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
33Middleware / Ambient intelligence / Server / User interface techniques / Appear / Ubiquitous computing / Context management / Systems science / Context awareness / Systems engineering / Computing / Technology

Strathprints Institutional Repository Glassey, R. and Stevenson, G. and Richmond, M. and Nixon, P. and Terzis, S. and Wang, F. and Ferguson, R.I[removed]Towards a middleware for generalised context management. In: First

Add to Reading List

Source URL: strathprints.strath.ac.uk

Language: English - Date: 2013-07-18 12:09:30
34Coulomb Technologies / Bleed / Terzis

[removed], RX1 Sign,CT4000,CMK, Bottom

Add to Reading List

Source URL: www.chargepoint.com

Language: English - Date: 2014-07-30 18:07:41
35Coulomb Technologies / Bleed / Terzis

[removed], R2 Sign, CT4000, Retractor, STD

Add to Reading List

Source URL: www.chargepoint.com

Language: English - Date: 2014-07-30 18:07:40
36Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing

On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2005-09-11 12:46:40
37Code Red / Computer virus / Witty / Morris worm / Malware / SQL Slammer / Parasitic worm / Ice / Failure / Computer worms / Cyberwarfare / Computer security

Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2005-12-24 13:57:41
38Computer network security / Malware / Network address translation / Private network / IP address / Code Red / Botnet / Witty / Computer worms / System software / Network architecture / Computing

On the Impact of Dynamic Addressing on Malware Propagation Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-25 13:27:50
39Code Red / Computer virus / Witty / Morris worm / Malware / SQL Slammer / Parasitic worm / Ice / Failure / Computer worms / Cyberwarfare / Computer security

Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:37
40Wireless networking / Sensor node / Strain gauge / Sensor / Sensors / Technology / Wireless sensor network

Slip Surface Localization in Wireless Sensor Networks for Landslide Prediction Andreas Terzis Annalingam Anandarajah

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-03-26 23:51:14
UPDATE