G–network

Results: 1960



#Item
941Security / Security token / Integrated Windows Authentication / Kerberos / Authentication server / Password authentication protocol / Single sign-on / Digest access authentication / Extensible Authentication Protocol / Computer security / Computer network security / Computing

Peer-to-Peer Authentication with a Distributed Single Sign-On Service ∗ William Josephson Emin G¨un Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:58:13
942Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / IP hijacking / Router / Route flapping / Open Shortest Path First / Network architecture / Internet / Computing

1 Using External Security Monitors to Secure BGP Patrick Reynolds, Oliver Kennedy, Emin G¨un Sirer, Fred B. Schneider {reynolds,okennedy,egs,fbs}@cs.cornell.edu

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2008-05-13 16:06:04
943Teletraffic / Network performance / Computer networking / Network congestion / Transmission Control Protocol / Lyapunov stability / Queuing delay / Dynamical system / Control theory / Mathematical analysis / Technology / Science

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.? V. Guffens1 and G. Bastin2 Intelligent Systems and Networks Research Group (ISN), Imp

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2006-09-06 11:10:36
944Application programming interfaces / Network file systems / Earth sciences graphics software / NetCDF / Hierarchical Data Format / Message Passing Interface / Multi-core processor / Lustre / XDMF / Computing / Computer file formats / Parallel computing

SCORPIO: A Scalable Two-Phase Parallel I/O Library With Application To A Large Scale Subsurface Simulator Sarat Sreepathi∗ , Vamsi Sripathi† , Richard Mills∗ , Glenn Hammond‡ , G. Kumar Mahinthakumar§ ∗ Oak Ri

Add to Reading List

Source URL: www.climatemodeling.org

Language: English - Date: 2014-03-18 17:02:08
945Electronics / Videotelephony / QSIG / Digital subscriber line / T-interface / ITU-T / Digital Subscriber System No. 1 / G.992.3 / Message Transfer Part / Integrated Services Digital Network / Electronic engineering / Telephony

S tandard ECMA-289 2nd Edition - September 2000 Standardizing Information and

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-10-28 01:21:01
946Neuropsychology / Computational neuroscience / Machine learning / Attention-deficit hyperactivity disorder / Functional magnetic resonance imaging / Statistical classification / Neural network / Prefrontal cortex / ACT-R / Neuroscience / Cognitive science / Mind

Characterization of brain states during task-switching using a neural network classifier. G30 A. Lenartowicz, G. Detre, S. Polyn, J. Chein, N. Yeung*, L. Nystrom, K.A. Norman, J.D. Cohen Princeton University, Princeton,

Add to Reading List

Source URL: compmem.princeton.edu

Language: English - Date: 2010-11-05 09:43:37
947Technology / Regional Reference Frame Sub-Commission for Europe / European Terrestrial Reference System / Satellite navigation / RTCM / EUREF Permanent Network / Geodesy / Cartography / Measurement

Real-time GNSS Issues, G. Weber & W. Söhne Real-time GNSS Issues by G. Weber and W. Söhne RTCM is about to release several new open standards these days which are of importance to EUREF.

Add to Reading List

Source URL: www.euref.eu

Language: English - Date: 2011-10-24 11:56:28
948Virtual private network / Secure Shell / Remote desktop software / RADIUS / SSL-Explorer: Community Edition / Mobile business intelligence / Computing / Computer network security / Array Networks

JUMP IN. THE MOBILE WATERS ARE FINE. A G S E R I E S D ATA S H E E T SECURE ACCESS GATEWAYS AG Series secure access gateways provide scalable and

Add to Reading List

Source URL: www.arraynetworks.com

Language: English - Date: 2014-09-03 16:21:50
949Dynamic programming / Partially observable Markov decision process / Stochastic control / Computer security / Advantage / Crowds / Control theory / Computer network security / Statistics / Security

C o m p u t i n g p r a c t i c e s Cybersecurity Strategies: The QuERIES Methodology

Add to Reading List

Source URL: www.dartmouth.edu

Language: English - Date: 2011-02-03 16:21:07
950Road transport / Broadband / Network congestion / Traffic congestion / Broadband networks / Quality of experience / Transport / Network performance / Teletraffic

RAN Congestion Control & the Road to QoE EXECUTIVE SUMMARY Measures to control or relieve congestion in the radio access network (RAN) are a fundamental requirement in any wireless network, but the topic has taken on a g

Add to Reading List

Source URL: img.lightreading.com

Language: English - Date: 2014-06-20 15:05:20
UPDATE