Communications protocol

Results: 5018



#Item
181Microsoft Word - PRIVACY SF.docx

Microsoft Word - PRIVACY SF.docx

Add to Reading List

Source URL: www.ruinartnetwork.com

Language: English - Date: 2016-02-24 11:31:23
182Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:55:58
183Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.CIn the Matter of Transition from TTY to Real-Time Text Technology

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.CIn the Matter of Transition from TTY to Real-Time Text Technology

Add to Reading List

Source URL: www.von.org

Language: English - Date: 2016-08-01 10:05:54
184Microsoft Word - TIB_Interop21052010.doc

Microsoft Word - TIB_Interop21052010.doc

Add to Reading List

Source URL: www.xiplink.com

Language: English - Date: 2010-12-14 17:29:00
185Difficulties in Simulating the Internet Sally Floyd and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) Berkeley, CAUSA http://www.aciri.org/ February, 2001

Difficulties in Simulating the Internet Sally Floyd and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) Berkeley, CAUSA http://www.aciri.org/ February, 2001

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-03-07 18:04:57
186Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
187Modular Verification of Feature-Oriented Software Models Kathi Fisler Department of Computer Science Worcester Polytechnic Institute Worcester, MA, 01609 USA

Modular Verification of Feature-Oriented Software Models Kathi Fisler Department of Computer Science Worcester Polytechnic Institute Worcester, MA, 01609 USA

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2002-11-13 14:10:53
188Communications protocol / Data transmission

DOCX Document

Add to Reading List

Source URL: www.health.gov.bt

Language: English - Date: 2016-06-29 07:04:50
189Making Paths Explicit in the Scout Operating System David Mosberger and Larry L. Peterson TRAbstract This paper makes a case for paths as an explicit abstraction in operating system design. Paths provide a

Making Paths Explicit in the Scout Operating System David Mosberger and Larry L. Peterson TRAbstract This paper makes a case for paths as an explicit abstraction in operating system design. Paths provide a

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-02-10 20:43:48
190AREVA Resources Canada Inc. Public Disclosure Protocol AREVA is committed to providing public communications that are timely, accurate and informative and disclosed in accordance with applicable legal and regulatory requ

AREVA Resources Canada Inc. Public Disclosure Protocol AREVA is committed to providing public communications that are timely, accurate and informative and disclosed in accordance with applicable legal and regulatory requ

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2014-06-24 12:07:01