Communications protocol

Results: 5018



#Item
341Operating system / File system / Communications protocol / Diff / Exception handling / Computing / Data / Information

CS140 Operating Systems and Systems Programming Final Exam March 17, 2005 Name: (please print)______________________________ In recognition of and in the spirit of the Stanford University Honor Code, I certify

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:12
342Electronic engineering / Session border controller / Polycom / H.323 / SIP connection / SIP Trunking / NAT traversal / Comparison of VoIP software / Session Initiation Protocol / Voice over IP / Videotelephony / Computer-mediated communication

EdgeProtect™ 7000 Series Secure, high-quality, real-time voice and video communications. Scalable, single-box solution for small, medium and large enterprise. Supports mobile users and provides demarcation point for IP

Add to Reading List

Source URL: uk.ucc.westcon.com

Language: English
343OSI protocols / Carrier sense multiple access with collision avoidance / IEEE 802.15.4 / ALOHAnet / Channel access method / Carrier sense multiple access / Machine-to-Machine / Channel / Communications protocol / Media Access Control / Information / Data

Energy Efficient MAC for Cellular-Based M2M Communications Amin Azari and Guowang Miao KTH Royal Institute of Technology Abstract—In Machine-to-Machine (M2M) networks, an energy

Add to Reading List

Source URL: wireless.kth.se

Language: English - Date: 2014-10-08 02:59:41
344OSI protocols / Telecommunications engineering / Internet protocols / Internet standards / Computer networking / Data link layer / Network architecture / Transport layer / Communications protocol / Computing / Data / Information

Microsoft PowerPoint - mnet_05_Link_Layer

Add to Reading List

Source URL: www.net.in.tum.de

Language: English - Date: 2010-12-10 03:36:26
345Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
346Data / Computing / Root name server / Name server / Communications protocol / Stanford University / Microsoft DNS / Domain name system / Internet protocols / Internet

BU-2 How Protocols Work 16 June 2009 Ray Tompkins Founder & CEO |

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2010-12-03 20:29:37
347Computing / Data / Flow control / Internet protocols / TCP congestion avoidance algorithm / Slow-start / Transmission Control Protocol / Retransmission / Congestion window / TCP/IP / Network performance / Network architecture

WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2002; 2:3–20 (DOI: wcm.30) Open issues on TCP for mobile computing Vassilis TsaoussidisŁ,† Computer Science

Add to Reading List

Source URL: utopia.duth.gr

Language: English - Date: 2003-05-19 11:15:47
348Information / Transmission Control Protocol / Transport layer / Retransmission / Network congestion / TCP congestion avoidance algorithm / Communications protocol / Throughput / Measuring network throughput / Network performance / Data / Computing

Wave & Wait Protocol (WWP): High Throughput & Low Energy for Mobile IP-Devices. V. Tsaoussidis, A Lahanas, H. Badr Department of Computer Science State University of New York at Stony Brook New York

Add to Reading List

Source URL: utopia.duth.gr

Language: English - Date: 2003-05-19 11:07:56
349International law / United Nations Human Rights Committee / United Nations Convention Against Torture / International Covenant on Civil and Political Rights / Reservation / Human rights / United States Constitution / Communications protocol / Extradition / International relations / Human rights instruments / Law

CCPR/C/OP/4 INTERNATIONAL COVENANT ON CIVIL AND POLITICAL RIGHTS

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-05-12 12:24:04
350Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information

ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

Add to Reading List

Source URL: www.irisa.fr

Language: English - Date: 2003-12-17 02:53:50
UPDATE