Control and Communications

Results: 1718



#Item
131WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. ComputPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: wcm.632  Characterizing the capacity gain of stream control

WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. ComputPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: wcm.632 Characterizing the capacity gain of stream control

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2008-06-23 04:02:58
    132Software Defined Networks and Gossip Protocols Robert Soul´e Ken Birman  Nate Foster

    Software Defined Networks and Gossip Protocols Robert Soul´e Ken Birman Nate Foster

    Add to Reading List

    Source URL: frenetic-lang.org

    Language: English - Date: 2014-09-19 04:00:51
    133Iran The Islamic Republic of Iran continues to expand and consolidate its technical filtering system, which is among the most extensive in the world. A centralized system for Internet filtering has been implemented that

    Iran The Islamic Republic of Iran continues to expand and consolidate its technical filtering system, which is among the most extensive in the world. A centralized system for Internet filtering has been implemented that

    Add to Reading List

    Source URL: www.access-controlled.net

    Language: English - Date: 2012-08-10 17:13:30
    134Linearizability: A Correctness Condition for Concurrent Objects MAURICE P. HERLIHY and JEANNETTE Carnegie Mellon University  M. WING

    Linearizability: A Correctness Condition for Concurrent Objects MAURICE P. HERLIHY and JEANNETTE Carnegie Mellon University M. WING

    Add to Reading List

    Source URL: cs.brown.edu

    Language: English - Date: 2002-12-21 01:16:06
    135National Water and Climate Center Technical Note 99–1 United States Department of Agriculture Natural

    National Water and Climate Center Technical Note 99–1 United States Department of Agriculture Natural

    Add to Reading List

    Source URL: www.nrcs.usda.gov

    Language: English - Date: 2011-08-03 14:20:37
    136A Hybrid TDOA/RSSD Geolocation System using the Unscented Kalman Filter Noha El Gemayel, Holger J¨akel and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT), Germany {noha.gema

    A Hybrid TDOA/RSSD Geolocation System using the Unscented Kalman Filter Noha El Gemayel, Holger J¨akel and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT), Germany {noha.gema

    Add to Reading List

    Source URL: www.cel.kit.edu

    Language: English - Date: 2013-09-16 05:19:26
    137Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection Haibin Sun John C.S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Email: hbsun,cslui @cse.cuhk.edu.hk

    Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection Haibin Sun John C.S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Email: hbsun,cslui @cse.cuhk.edu.hk

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2004-07-17 16:27:27
    138TCD RESOURCE PAGETransport Protocol Algorithm for Stroke and ST Segment Elevation Myocardial Infarction (STEMI) Patients. *This transport protocol algorithm corresponds to Missouri Regulation 19 CSRDe

    TCD RESOURCE PAGETransport Protocol Algorithm for Stroke and ST Segment Elevation Myocardial Infarction (STEMI) Patients. *This transport protocol algorithm corresponds to Missouri Regulation 19 CSRDe

    Add to Reading List

    Source URL: health.mo.gov

    Language: English - Date: 2015-04-17 08:18:40
    139CLEARFIELD Wheat Stewardship Bulletin ® Communications Update

    CLEARFIELD Wheat Stewardship Bulletin ® Communications Update

    Add to Reading List

    Source URL: washingtoncrop.com

    Language: English - Date: 2013-01-25 13:51:36
    140Bluetooth: With Low Energy comes Low Security Mike Ryan iSEC Partners Abstract We discuss our tools and techniques to monitor and inject

    Bluetooth: With Low Energy comes Low Security Mike Ryan iSEC Partners Abstract We discuss our tools and techniques to monitor and inject

    Add to Reading List

    Source URL: lacklustre.net

    Language: English - Date: 2013-09-26 05:42:47