Token ring

Results: 40



#Item
1Philosophy / Logic / Structure / Abstraction / Knowledge representation / Metalogic / Philosophy of language / Philosophy of logic / Typetoken distinction / Token coin / Ring network / Token

Black Hole Search with Finite Automata Scattered in a Synchronous Torus J´er´emie Chalopin1 , Shantanu Das1 , Arnaud Labourel1 , and Euripides Markou2 1 2

Add to Reading List

Source URL: emarkou.users.uth.gr

Language: English - Date: 2016-05-24 11:28:43
2

Using RMON to Manage Remote Networks Previous screen Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2013-06-03 13:28:23
    3Data / IEEE standards / Data transmission / Ethernet / Token ring / Time division multiple access / Contention / Network packet / Telecommunication / Information / Media Access Control / Computing

    A TYPICAL local a k a network (LAN)todayhasthe following characteristics: Transmits bits serially rather than in parallel.

    Add to Reading List

    Source URL: www.signallake.com

    Language: English - Date: 2013-03-16 17:12:40
    4Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

    IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

    Add to Reading List

    Source URL: ioactive.com

    Language: English
    5Ring signature / Bitcoin / Digital signature / RSA / The Shadow / Model theory / Token coin / Structure / Cryptography / Public-key cryptography / Electronic commerce

    ShadowCash: Zero­knowledge Anonymous Distributed E­Cash   via Traceable Ring Signatures    Rynomster and Tecnovert  http://www.shadow.cash   

    Add to Reading List

    Source URL: shadow.cash

    Language: English - Date: 2014-12-15 21:08:51
    6National security / Personal life / Data security / Personally identifiable information / Information security / Password / Access token / Malware / Ring / Security / Computer security / Crime prevention

    All employees have the responsibility to:

    Add to Reading List

    Source URL: icbs.nwcg.gov

    Language: English - Date: 2008-06-04 13:20:46
    7

    La rete Token Ring e lo standard IEEELA RETE TOKEN RING E LO STANDARD IEEE 802.5

    Add to Reading List

    Source URL: www.homolaicus.com

    Language: Italian - Date: 2011-08-09 02:01:22
      8Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

      IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

      Add to Reading List

      Source URL: www.ioactive.com

      Language: English
      9

      ■ Token Ring ■ Le réseau local : Token Ring par Bernard COUSIN

      Add to Reading List

      Source URL: www.irisa.fr

      Language: French - Date: 1999-07-08 05:37:00
        10OSI protocols / Network topology / Local area networks / IEEE 802 / Network protocols / Token ring / Ring network / Fiber Distributed Data Interface / Token bus network / Computing / Network architecture / IEEE standards

        Real-time communication protocols: an overview∗ Ferdy Hanssen and Pierre G. Jansen October 2003 Abstract This paper describes several existing data link layer protocols that provide

        Add to Reading List

        Source URL: www.croky.net

        Language: English - Date: 2003-11-03 08:20:38
        UPDATE