Back to Results
First PageMeta Content
Computer hardware / Computer architecture / CPU cache / Cache / Session / Client–server model / Network file systems / Computing / Coda


Exploiting Weak Connectivity Lily B. Mummert,
Add to Reading List

Document Date: 2007-01-03 14:42:12


Open Document

File Size: 1,42 MB

Share Result on Facebook

City

Transport / Concord / /

Company

IBM / Xerox / AT&T / ACM Inc. / Andrew / To Corp / IBM AT&T Corp / Novell / Intel Corp. / /

Country

United States / /

Currency

pence / USD / /

Event

FDA Phase / /

Facility

For store / store Except / /

IndustryTerm

mobile computing / wireless media / software contrast / volume callback server / cache management / e-mad / intermittent protocols / important applications / good performance even when network / consistency caching network / slow networks / wireless lrnphes / performance protocols / computing / speed network / exploit networks / streaming protocol / /

Movie

Venus / /

OperatingSystem

Unix / DOS / /

Organization

Carnegie Mellon / Maria School for Mobile File Access R. Ebling / /

Person

Once / How / Object Callbacks / Patience Threshold / /

/

Position

driver / SLIP driver / /

Product

RPC2 / /

ProgrammingLanguage

SLIP / J / C / /

Technology

alpha / Ethernet / ISDN / LAN / Unix / performance protocols / mobile computing / caching / UDP / gershwin / /

SocialTag