Connectivity

Results: 4243



#Item
1Internet architecture / Computing / Network architecture / Routing / Information and communications technology / Computer networking / Forwarding plane / Router / Packet processing / Packet forwarding / Control plane / Transmission Control Protocol

Ensuring Connectivity via Data Plane Mechanisms Junda Liu‡ , Aurojit Panda\ , Ankit Singla† , Brighten Godfrey† , Michael Schapira , Scott Shenker\♠ ‡ Google Inc., \ UC Berkeley, † UIUC,  Hebrew U., ♠ ICS

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2013-02-21 13:22:56
2Computing / Internet / Information and communications technology / Internet protocols / Internet privacy / Internet security / Internet Standards / Cryptographic protocols / Proxy server / Transmission Control Protocol / DNS hijacking / SOCKS

figs/connectivity_t1s_numprobes.eps

Add to Reading List

Source URL: people.cs.umass.edu

Language: English - Date: 2014-06-24 12:29:11
3

Smart City Journey 2018 Hosting Companies: IoT and Connectivity 31 October 2018, 8:30am-11:30am @Kraftwerk, Zurich Innovation Workshop - RSVP on Doodle or Sched th

Add to Reading List

Source URL: ksacc.panter.ch

- Date: 2018-10-22 09:12:19
    4

    Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2017-06-30 16:01:04
      5Magnetic resonance imaging / Neuroimaging / Neuroscience / Cognitive neuroscience / Medical imaging / Resting state fMRI / Functional magnetic resonance imaging / Univariate / Principal component analysis / Nervous system / Mathematical analysis

      Multivariate Pattern Connectivity

      Add to Reading List

      Source URL: saxelab.mit.edu

      Language: English - Date: 2016-08-17 14:35:44
      6Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

      Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:56:26
      7

      S T I N AT I O N HOMEPLUG AV2 NEXT-GENERATION CONNECTIVITY BEAMFOR

      Add to Reading List

      Source URL: www.homeplug.org

      - Date: 2015-01-05 10:52:30
        8

        Branch Redefined: Enabling the Distributed Enterprise with SD-WAN Citrix customers deliver seamless, secure connectivity with a great experience while

        Add to Reading List

        Source URL: www.citrix.com

        Language: English - Date: 2018-08-03 11:55:52
          9

          Mobile and Wide-Area IoT: LPWA and LTE connectivity Technical and Economic Analysis: Matching each application with the best standards Abstract Low-power wide-area (LPWA) technologies promise to open new market opportun

          Add to Reading List

          Source URL: frankrayal.com

          Language: English - Date: 2016-07-05 20:16:55
            10

            HighPoint Unveils Fast & Versatile Thunderbolt 3 I/O Storage and Connectivity Solutions! May 2018, Milpitas, CA. HighPoint proudly launches the RocketStor 6661A I/O Adapter series; the industry’s most comprehensive sel

            Add to Reading List

            Source URL: www.highpoint-tech.com

            Language: English - Date: 2018-05-14 23:37:41
              UPDATE