Transmission Control Protocol

Results: 5242



#Item
51Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English
52Spectrometers / Computer networking / Computing / Gamma-ray spectrometer / GRS / Network packet / Gamma Ray Spectrometer / Mars Odyssey / Transmission Control Protocol / Traffic flow

Mars Odyssey GRS 2001 Gamma Data Processing VersionMARS 2001 ODYSSEY

Add to Reading List

Source URL: pds-geosciences.wustl.edu

Language: English - Date: 2004-06-22 15:53:54
53Computing / Network architecture / Computer networking / Internet / IP traceback / Router / Traffic flow / Denial-of-service attack / Transmission Control Protocol / Packet loss / NetFlow

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-13 03:12:31
54Horsehead Nebula in fiction / Ood / Transmission Control Protocol / Writing style / Algorithm / Imagination / Literature / Planet of the Ood / Fiction

Writing Tips Andrzej Duda Grenoble Institute of Technology CNRS Grenoble Informatics Laboratory UMR 5217 Grenoble, France Email:

Add to Reading List

Source URL: duda.imag.fr

Language: English - Date: 2015-02-06 09:28:49
55Computing / Network architecture / Internet protocols / Transmission Control Protocol / Cache / IPsec

XipLink XA - Appliances XO-Options

Add to Reading List

Source URL: www.xiplink.com

Language: English - Date: 2011-01-27 15:04:24
56Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-07-28 23:00:33
57Computing / Hypertext Transfer Protocol / Internet privacy / Network architecture / Network protocols / World Wide Web / Computer access control / HTTP cookie / Session / Transmission Control Protocol / Same-origin policy / Web storage

Network Working Group Kristol Request for Comments: 2109 Technologies Category: Standards Track Montulli

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:48:58
58Information theory / Radio resource management / Computing / Engineering / Technology / Wireless LAN / Precoding / Throughput / Network performance / Wireless access point / IEEE 802.11n-2009 / Transmission Control Protocol

RobinHood: Sharing the Happiness in a Wireless Jungle Tarun Bansal† , Wenjie Zhou† , Kannan Srinivasan and Prasun Sinha Department of Computer Science and Engineering, The Ohio State University, Columbus, OH 43210 {b

Add to Reading List

Source URL: web.cse.ohio-state.edu

Language: English - Date: 2014-02-04 18:24:49
59Computing / Network architecture / Network protocols / Transmission Control Protocol / Network packet / Network performance / UniPro protocol stack / ISO 15765-2

Microsoft Word - 20070204_Splimer_-_De_Santis.doc

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:58
60Real property law / Academic publishing / Acknowledgment / Arts / Collaboration / Writing / Transmission Control Protocol / Academia / Culture / Human communication

Microsoft Word - Underwriting Policies 2007.doc

Add to Reading List

Source URL: www.spiritfm.org

Language: English - Date: 2016-01-13 23:26:16
UPDATE