Control and Communications

Results: 1718



#Item
171Transmission Control Protocol / Data transmission / Network performance / Computing / Communications protocol / Initialization vector / Throughput / Network packet / Cryptographic hash function / Information / Cryptography / Data

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04
172Legal documents / Air waybill / Waybill / Cargo / Air Warfare Officer – Command /  Control and Communications / Cochin International Airport / Containerization / Transport / Shipping / Technology

Air Waybill Outturn Reports

Add to Reading List

Source URL: cargosupport.gov.au

Language: English - Date: 2008-07-29 22:25:20
173Internet governance / Internet Society / Internet in Australia / .au / Content-control software / Content filtering / Usenet / Internaut / Internet / Computing / Internet standards

ISOC-AU Submission on Review of Broadcasting Services Act Introduction ============ This is a submission by the Internet Society of Australia (ISOC-AU) to the Department of Communications Information Technology and the

Add to Reading List

Source URL: www.internetsociety.org.au

Language: English - Date: 2010-02-17 19:02:46
174Error detection and correction / Search algorithms / Data synchronization / Rsync / Cryptographic hash functions / Hashing / Transmission Control Protocol / Checksum / Sum / Computing / Data / System software

Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-07-03 11:52:33
175Technology / Data transmission / Empirix / Telecommunications / Network performance / Teletraffic / Quality of service / 3GPP Long Term Evolution / LTE Advanced / Electronic engineering / Electronics / Telecommunications engineering

Solution Overview QCI Analytics Providing the intelligence and operational framework operators need to fully monetize their LTE investments By taking control of mobile communications rather than simply transporting

Add to Reading List

Source URL: www.empirix.com

Language: English - Date: 2013-09-12 12:16:14
176Telephony / Voice over IP / Media gateway / Real-time Transport Protocol / Media Gateway Control Protocol / H.323 / Public switched telephone network / Signaling gateway / IP Multimedia Subsystem / Electronic engineering / Electronics / Videotelephony

CHAPTER 4 Multimedia over IP The idea of multimedia communications is very appealing—text, graphics, sound, and video all combined to enrich the ways in which we communicate and to transform communications from a one-

Add to Reading List

Source URL: www.3g-wireless.net

Language: English - Date: 2012-03-15 00:38:05
177TCP/IP / Network performance / Data transmission / Internet protocols / Transmission Control Protocol / Transport layer / Network congestion / Communications protocol / Congestion window / Computing / Data / Information

A Receiver-Centric Transport Protocol for Mobile Hosts ∗ with Heterogeneous Wireless Interfaces Hung-Yun Hsieh, Kyu-Han Kim, Yujie Zhu, and Raghupathy Sivakumar School of Electrical and Computer Engineering Georgia Ins

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:30
178Middleware / Data distribution service / Message-oriented middleware / Computer network security / Real-Time Innovations / SCADA / Service-oriented architecture / Access control / Communications protocol / Computing / Technology / Security

WHITEPAPER Four Keys to Securing Distributed Control Systems Executive Summary At the core of critical infrastructure and industrial applications, control systems drive today’s power grid,

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
179Streaming / Computer network security / Internet protocols / Data transmission / Denial-of-service attacks / Transmission Control Protocol / Packet loss / Real-time Transport Protocol / Denial-of-service attack / Data / Computing / Information

DoS Protection for Reliably Authenticated Broadcast Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, and Santosh Venkatesh University of Pennsylvania Abstract Authenticating broadcast packet communications

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:43
180Electronics / Cisco Systems / VoIP phone / Voice over IP / Session Initiation Protocol / Network address translation / Virtual private network / Skinny Call Control Protocol / Cisco Unified Communications Manager / Videotelephony / Computing / Electronic engineering

Data Sheet Cisco SPA525G2 5-Line IP Phone Cisco Small Business 5-Line Business IP Phone with Enhanced Connectivity and Media for a New Level of User Experience

Add to Reading List

Source URL: www.nerim.fr

Language: English - Date: 2014-01-15 05:32:19
UPDATE