Communications protocol

Results: 5018



#Item
161Computer networking / Internet Standards / IP address / Ping / Proxy server / Hop / Router / Communications protocol / Traceroute / Dynamic Host Configuration Protocol / Domain Name System

An Investigation of Geographic Mapping Techniques for Internet Hosts  Venkata N. Padmanabhan Microsoft Research

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-12 22:30:32
162Fiber-optic communications / Broadband / Network architecture / IEEE 802 / Working groups / Passive optical network / 10G-EPON / IEEE 802.15 / Optical line termination / Ethernet / Burst mode clock and data recovery / EPON Protocol over Coax

Microsoft Word - comp120-newaz.doc

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:52:28
163Department of Science and Technology / Communications protocol

FIERC Form 2.8 Approval Letter Food and Nutrition Research Institute Ethics Review Committee

Add to Reading List

Source URL: www.fnri.dost.gov.ph

Language: English - Date: 2016-03-04 07:48:19
164Network protocols / Computer networking / Packet loss / Transmission Control Protocol / Network packet / Communications protocol / Virtual circuit / Internet protocols / RapidIO / Packet switching

The TRIBES Engine Networking Model or How to Make the Internet Rock for Multi­player Games by Mark Frohnmayer and Tim Gift   

Add to Reading List

Source URL: gamedevs.org

Language: English - Date: 2013-06-18 21:50:09
165Global Positioning System / Geodesy / Aircraft instruments / Differential GPS / Satellite navigation / Networked Transport of RTCM via Internet Protocol / Euronet / Mobile phone tracking / Internet protocol suite / Communications protocol / Computer network / GNSS applications

EuroNet GNSS Networking Software The EuroNet software package is able to process multiple GNSS reference stations in a networking mode. The networking can be done in real time or in post processing. The advantages of a r

Add to Reading List

Source URL: www.alberding.eu

Language: English - Date: 2016-07-28 05:09:40
166Computer network security / Multi-agent systems / Spamming / Botnets / Cyberwarfare / Command and control / Denial-of-service attack / ZeroAccess botnet / Communications protocol / NetFlow / Kelihos botnet / Transmission Control Protocol

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
167Working groups / IEEE standards / MAC address / Media access control / Privacy / Communications protocol / Internet privacy / IEEE Standards Association / IEEE 802

IEEE 802 EC SG Privacy Recommendation Minutes of EC Privacy Recommendation SG Teleconference November 3-7, 2014 Date: 13 January 2015 Author(s):

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2015-01-13 11:37:18
168Intellectual property law / Trademark law / Madrid system / Trademark / Patent Cooperation Treaty / Patent application / Communications protocol / Cryptographic protocol / European Patent Organisation / Hague Agreement Concerning the International Deposit of Industrial Designs / European Patent Convention

G:srosoftdaultNormalmal

Add to Reading List

Source URL: www.ghclaw.com

Language: English - Date: 2009-04-20 15:21:12
169Multihoming / Internet protocols / OSI protocols / Transmission Control Protocol / Identifier/Locator Network Protocol / Communications protocol / IP address / Transport layer

Identity and Location: implications for Security, Privacy and Resilience Saleem Bha) School of Computer Science University of St Andrews

Add to Reading List

Source URL: saleem.host.cs.st-andrews.ac.uk

Language: English - Date: 2016-04-07 10:42:21
170Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
UPDATE