Computer networks

Results: 6080



#Item
11System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
12

Byzantine Agreement Service for Cooperative Wireless Embedded Systems Wenbo Xu, Martin Wegner, Lars Wolf, R¨udiger Kapitza Institute of Operating Systems and Computer Networks, TU Braunschweig, Germany Email: wxu,wegner

Add to Reading List

Source URL: www.ibr.cs.tu-bs.de

Language: English - Date: 2017-06-28 07:32:35
    13

    Locality in Networks Jukka Suomela Helsinki Institute for Information Technology HIIT Department of Computer Science, University of Helsinki Foundations of Network Science Workshop Riga, 7 July 2013

    Add to Reading List

    Source URL: users.ics.aalto.fi

    Language: English - Date: 2013-12-09 16:38:32
      14

      Peer to Peer Networks for Defense Against Internet Worms∗ Srinivas Shakkottai R. Srikant Dept. of Electrical and Computer Engineering

      Add to Reading List

      Source URL: www.ece.tamu.edu

      Language: English - Date: 2006-07-10 14:47:38
        15

        Finding a Team of Experts in Social Networks Theodoros Lappas ∗ Computer Science Dept.

        Add to Reading List

        Source URL: www.almaden.ibm.com

        Language: English - Date: 2009-04-26 16:29:53
          16

          Emergence of Scale-free Graphs in Dynamical Spiking Neural Networks (paperFilip Piękniewski, m.sc, PhD student at Faculty of Mathematics and Computer Science Nicolaus Copernicus University, Poland Degree histogra

          Add to Reading List

          Source URL: filip.piekniewski.info

          Language: English - Date: 2013-12-08 19:00:00
            17

            A Reinforcement Learning Approach to Optimize Downloads Over Mobile Networks Jayashree Mohan∗ , Angad Vittal∗ , K Chandrasekaran∗ and Bhaskar Krishnamachari† ∗ Department of Computer Science,National Institute

            Add to Reading List

            Source URL: anrg.usc.edu

            Language: English - Date: 2016-11-28 13:31:15
              18

              Policy No: IJNDB REGIONAL SCHOOL UNIT NO. 38 STUDENT COMPUTER, INTERNET USE, AND CYBER SAFETY Regional School Unit No. 38’s computers, networks and Internet access are provided to support the educational mission of the

              Add to Reading List

              Source URL: www.maranacook.org

              Language: English - Date: 2015-08-25 14:47:26
                19Graph theory / Mathematics / Discrete mathematics / Graph rewriting / Graph / Line graph / Topology / Connectivity / Double pushout graph rewriting

                Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks Reiko Heckel? Department of Computer Science University of Leicester United Kingdom

                Add to Reading List

                Source URL: www.cs.le.ac.uk

                Language: English - Date: 2006-05-06 19:27:18
                20

                Implicit Affinity Networks Matthew Smith Christophe Giraud-Carrier Brock Judkins (now at Amazon.com) Department of Computer Science Brigham Young University

                Add to Reading List

                Source URL: m.smithworx.com

                Language: English - Date: 2010-07-01 18:07:09
                  UPDATE