MORE protocol

Results: 287



#Item
41Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / IP-VPN Lite / Network architecture / Internet / Computing

ISP Workshop Lab Module 7 – BGP route filtering and advanced features Objective: Using the network configured in Module 6, use various configuration methods on BGP peerings to demonstrate neighbour filtering and more

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2014-12-03 20:19:03
42Software / Internet Message Access Protocol / Gmail / Mail / Password / Microsoft Entourage / Email client / Computing / Computer-mediated communication / Email

Set Up POP - Outlook for Mac 2011 If you would like to learn more about the differences between POP and IMAP, please see the help topic, “POP vs. IMAP”. For increased security, we recommend that you use our secure (S

Add to Reading List

Source URL: www.lawyermarketing.com

Language: English - Date: 2014-05-22 13:58:24
43Server appliance / Electronics / Router / Wi-Fi / Point-to-point protocol over Ethernet / IP address / Digital subscriber line / Virtual Router Redundancy Protocol / Interconnecting Cisco Networking Devices Part 1 / Computing / Networking hardware / Network architecture

Ayrstone AyrMesh™ Router Setup This guide should help you set up AyrMesh Router SP. The setup is relatively simple but should you need more detailed directions, such as slide shows, video, or troubleshooting hints, you

Add to Reading List

Source URL: www.ayrstone.com

Language: English - Date: 2013-08-28 15:44:47
44Network coding / Network performance / Wireless sensor network / MORE protocol / Transmission Control Protocol / Telecommunications engineering / Information / Technology / Coding theory / Finite fields / Information theory

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. TRANSACTION ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 2012

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2013-03-28 07:48:29
45Server appliance / Router / Wi-Fi / Point-to-point protocol over Ethernet / IP address / Virtual Router Redundancy Protocol / Residential gateway / Computing / Networking hardware / Network architecture

Ayrstone AyrMesh™ High-Power Router Setup This guide should help you set up AyrMesh Router HP. The setup is relatively simple but should you need more detailed directions, such as slide shows, video, or troubleshooting

Add to Reading List

Source URL: www.ayrstone.com

Language: English - Date: 2013-08-28 15:44:40
46Computing / Service set / Pcap / Transmission Control Protocol / IEEE 802.11 / Software / Wireless networking / Wi-Fi

Eye P. A . There’s a lot more slowing down your Wi-Fi traffic than you realized. Eye P.A. is antroubleshooting tool that looks at all of the conversations on a SOFTWARE

Add to Reading List

Source URL: www.streakwave.com

Language: English - Date: 2014-04-02 12:19:07
47Information / Concurrency control / Databases / Schedule / Serializability / Isolation / Two-phase locking / Two-phase commit protocol / Optimistic concurrency control / Transaction processing / Data management / Data

Extracting More Concurrency from Distributed Transactions

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-06-08 22:54:13
48ICSA / Intercollegiate Sailing Association

All, I would like to propose that we discuss the idea of adding flags to the starting protocol. It will be a very simple addition that will make college races much more interesting and exciting for observers and easier f

Add to Reading List

Source URL: collegesailing.org

Language: English - Date: 2014-12-30 15:34:15
49Computing / Service set / Pcap / Transmission Control Protocol / IEEE 802.11 / Software / Wireless networking / Wi-Fi

Eye P. A . There’s a lot more slowing down your Wi-Fi traffic than you realized. Eye P.A. is antroubleshooting tool that looks at all of the conversations on a SOFTWARE

Add to Reading List

Source URL: files.metageek.net

Language: English - Date: 2014-01-20 16:10:16
50Information theory / Theoretical computer science / Routing / Computing / Telecommunications engineering / Network coding / MORE protocol / Randomized algorithm / Packet forwarding / Wireless networking / Coding theory / Finite fields

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-05-06 01:09:23
UPDATE