Control network

Results: 9285



#Item
301Sprinklers: a Randomized Variable-Size Striping Approach to Reordering-Free Load-Balanced Switching Weijun Ding† Jun (Jim) Xu† Jim Dai‡ Yang Song∗ Bill Lin∗ † Georgia Tech ‡ Cornell University ∗ UC San Di

Sprinklers: a Randomized Variable-Size Striping Approach to Reordering-Free Load-Balanced Switching Weijun Ding† Jun (Jim) Xu† Jim Dai‡ Yang Song∗ Bill Lin∗ † Georgia Tech ‡ Cornell University ∗ UC San Di

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:59:03
302Bidirectional Forwarding Detection (BFD) implementation and support in OpenBSD

Bidirectional Forwarding Detection (BFD) implementation and support in OpenBSD

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2016-06-10 16:18:11
303ALOHA LOAD BALANCER CHECKING THE HEALTH OF APPLICATION SERVERS “APPNOTE” #0013 ― LIST OF CHECKS IN ALOHA This application note is intended to list the main checks available in the Aloha solution to be sure of the s

ALOHA LOAD BALANCER CHECKING THE HEALTH OF APPLICATION SERVERS “APPNOTE” #0013 ― LIST OF CHECKS IN ALOHA This application note is intended to list the main checks available in the Aloha solution to be sure of the s

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
304IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
30564  IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
306Briefing Paper International Network of Engineers and Scientists Against Proliferation Western States Legal Foundation Briefing Paper

Briefing Paper International Network of Engineers and Scientists Against Proliferation Western States Legal Foundation Briefing Paper

Add to Reading List

Source URL: www.wslfweb.org

Language: English - Date: 2014-08-08 15:37:18
307NBDPN_newsletter2008AM2.pub

NBDPN_newsletter2008AM2.pub

Add to Reading List

Source URL: www.nbdpn.org

Language: English - Date: 2010-08-10 09:26:27
308Supercharging SDN Security Takayuki Sasaki (NEC) Topics ▌ Control-plane security l Isolation and recovery

Supercharging SDN Security Takayuki Sasaki (NEC) Topics ▌ Control-plane security l Isolation and recovery

Add to Reading List

Source URL: www.ch-open.ch

Language: English - Date: 2016-06-16 13:14:14
309Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-06-11 12:23:00
310Olaf Kolkman  Seoul,16 June 2008 Internet Technical Community Forum  The Hourglass:

Olaf Kolkman Seoul,16 June 2008 Internet Technical Community Forum The Hourglass:

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52