Link protocol

Results: 1042



#Item
71Wireless Traffic: The Failure of CBR Modeling Stefan Karpinski, Elizabeth M. Belding, Kevin C. Almeroth {sgk,ebelding,almeroth}@cs.ucsb.edu Department of Computer Science University of California, Santa Barbara

Wireless Traffic: The Failure of CBR Modeling Stefan Karpinski, Elizabeth M. Belding, Kevin C. Almeroth {sgk,ebelding,almeroth}@cs.ucsb.edu Department of Computer Science University of California, Santa Barbara

Add to Reading List

Source URL: karpinski.org

Language: English - Date: 2016-04-13 16:19:52
72Recommendation for Space Data System Standards  TC SPACE DATA LINK PROTOCOL  RECOMMENDED STANDARD

Recommendation for Space Data System Standards TC SPACE DATA LINK PROTOCOL RECOMMENDED STANDARD

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2015-10-01 11:18:28
    7303c_internet_internet_routing

    03c_internet_internet_routing

    Add to Reading List

    Source URL: comm-net.ethz.ch

    Language: English - Date: 2016-03-20 09:15:33
    74Recommendation for Space Data System Standards  CCSDS BUNDLE PROTOCOL SPECIFICATION RECOMMENDED STANDARD

    Recommendation for Space Data System Standards CCSDS BUNDLE PROTOCOL SPECIFICATION RECOMMENDED STANDARD

    Add to Reading List

    Source URL: public.ccsds.org

    Language: English - Date: 2015-10-03 17:26:06
    75ARTICLE IN PRESS Ad Hoc Networks xxxxxx–xxx Contents lists available at ScienceDirect  Ad Hoc Networks

    ARTICLE IN PRESS Ad Hoc Networks xxxxxx–xxx Contents lists available at ScienceDirect Ad Hoc Networks

    Add to Reading List

    Source URL: irl.cs.ucla.edu

    Language: English - Date: 2012-02-07 13:22:39
    76A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer Engineering and

    A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer Engineering and

    Add to Reading List

    Source URL: disco.ethz.ch

    Language: English - Date: 2014-09-26 08:36:46
    77Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio ∗, Laurent Vanbever †, Jennifer Rexford † ∗ ∗

    Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio ∗, Laurent Vanbever †, Jennifer Rexford † ∗ ∗

    Add to Reading List

    Source URL: fibbing.net

    Language: English - Date: 2016-05-11 12:31:01
    78Digium Phone User Guide Digium Phone firmware version 1.4 ©Digium, Inc. All rights reserved. This document is the sole property of Digium, Inc. It contains proprietary information of Digium. Digium reserves t

    Digium Phone User Guide Digium Phone firmware version 1.4 ©Digium, Inc. All rights reserved. This document is the sole property of Digium, Inc. It contains proprietary information of Digium. Digium reserves t

    Add to Reading List

    Source URL: www.digium.com

    Language: English - Date: 2015-03-23 14:26:29
    79Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

    Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

    Add to Reading List

    Source URL: www.dsn.jhu.edu

    Language: English - Date: 2016-04-28 20:17:25
    8003d_internet_bgp_policies

    03d_internet_bgp_policies

    Add to Reading List

    Source URL: comm-net.ethz.ch

    Language: English - Date: 2016-04-03 13:58:38