Computer networking

Results: 7870



#Item
911Computing / Network architecture / OSI protocols / Wireless networking / Network performance / Throughput / Packet loss / Hidden node problem / Transmission Control Protocol / Transport layer / Data link layer / IEEE 802.15.4

Grant to Send: Fairness and Isolation in Low-Power Wireless Technical Report SINGJung Il Choi and Philip Levis Computer Systems Laboratory Stanford University

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:11
912Computing / Network architecture / Computer architecture / Denial-of-service attacks / Cyberwarfare / Emerging technologies / Internet Relay Chat / Network function virtualization / Software-defined networking / Denial-of-service attack / OpenFlow / Virtual firewall

Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 21:41:25
913Computing / Internet / Network architecture / Computer network security / Computer networking / Transmission Control Protocol / Border Gateway Protocol / Router / Internet protocol suite / Packet loss / Firewall / Communications protocol

Application-Driven TCP Recovery and Non-Stop BGP Robert Surton, Ken Birman, and Robbert van Renesse Department of Computer Science, Cornell University Abstract—Some network protocols tie application state to underlying

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-04-22 08:52:17
914Computing / File sharing / Network protocols / Internet protocols / Computer networking / Information-centric networking / Scalability / ICN / Peer-to-peer / Hypertext Transfer Protocol

Proceedings Template - WORD

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:45:28
915Computer networking / Computing / Named data networking / Information-centric networking / Content centric networking / ICN / Van Jacobson / Interest Flooding Attack

Program ACM ICN San Francisco 2015

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-02 18:16:47
916Internet privacy / Computing / Computer security / Policy / Privacy policy / Privacy / Technology / Personally identifiable information / HTTP cookie / Privacy concerns with social networking services / In re Gateway Learning Corp.

REDPATH SUGAR LTD. LEGAL NOTICE AND PRIVACY POLICY Legal Notice This website is owned and provided by Redpath Sugar Ltd. (“Redpath”). This site is for your personal and non-commercial use. Your access to and use of t

Add to Reading List

Source URL: redpathsugar.com

Language: English - Date: 2014-03-07 00:28:01
917Computing / Concurrent computing / File sharing / Parallel computing / Peer-to-peer / Clientserver model / Node / Scalability / Computer cluster / Windows Vista networking technologies / Ansible

PeerMon: A Peer-to-Peer Network Monitoring System Tia Newhall, J¯anis L¯ıbeks, Ross Greenwood, Jeff Knerr Swarthmore College Computer Science Department, Swarthmore, PA, USA Abstract We present PeerMon, a peer-to-peer

Add to Reading List

Source URL: www.dgp.toronto.edu

Language: English - Date: 2011-11-27 21:38:55
918Computer networking / Sensor node / Wireless sensor network / Railway signal / North American railroad signals / Light-emitting diode

LOGIC R AIL TECHNOLOGIESTomball Pkwy Suite 287 Houston, TX 77070

Add to Reading List

Source URL: www.logicrailtech.com

Language: English - Date: 2016-02-04 20:41:15
919Computer networking / Computing / Technology / Named data networking / Data transmission / Information-centric networking / Association for Computing Machinery / Internet / Computer network / Interest Flooding Attack / Content centric networking

Differentiated Service over Content-Centric Networking

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-02 17:14:46
920Computing / Network architecture / OSI protocols / Network performance / Computer networking / Routing algorithms / Carrier sense multiple access with collision avoidance / IEEE 802.11 / OSI model / Data link layer / Hidden node problem / Throughput

The Case for a Network Protocol Isolation Layer Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA USA

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:11
UPDATE