Peer-to-Peer Protocol

Results: 361



#Item
271Public Health Service, HHS  Pt[removed]Nonconfidential data or other information submitted by interested persons pertaining to the health assessment or health effects study; (4) The protocol for the health effects

Public Health Service, HHS Pt[removed]Nonconfidential data or other information submitted by interested persons pertaining to the health assessment or health effects study; (4) The protocol for the health effects

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-10-20 03:30:04
272Information Leak in the Chord Lookup Protocol Charles W. O’Donnell and Vinod Vaikuntanathan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA 02139, USA {cwo,vinodv}@mit.edu Abstract

Information Leak in the Chord Lookup Protocol Charles W. O’Donnell and Vinod Vaikuntanathan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA 02139, USA {cwo,vinodv}@mit.edu Abstract

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:27:55
273OPERATIONS COMMITTEE IHC PROTOCOL The intent of the Operations Committee is to allow for an exchange of ideas and offer recommendations for operational issues with the Rocky Mountain Area IHCs as indicated in our charter

OPERATIONS COMMITTEE IHC PROTOCOL The intent of the Operations Committee is to allow for an exchange of ideas and offer recommendations for operational issues with the Rocky Mountain Area IHCs as indicated in our charter

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2014-06-20 16:19:24
274OFES Data Sharing Guidelines for Large-Scale Computational Projects

OFES Data Sharing Guidelines for Large-Scale Computational Projects

Add to Reading List

Source URL: science.energy.gov

Language: English - Date: 2011-04-26 15:21:40
275Skype Security Assessment Introduction Skype is a communication and collaboration application with more than 660 million users. The solution provides free voice and video conferencing between Skype clients and discount l

Skype Security Assessment Introduction Skype is a communication and collaboration application with more than 660 million users. The solution provides free voice and video conferencing between Skype clients and discount l

Add to Reading List

Source URL: cts.wa.gov

Language: English - Date: 2014-08-11 15:11:14
276Design for Verification for Asynchronously Communicating Web Services Tevfik Bultan Computer Science Department

Design for Verification for Asynchronously Communicating Web Services Tevfik Bultan Computer Science Department

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 09:09:20
277Preferential Walk: Towards Efficient and Scalable Search in Unstructured Peer-to-Peer Networks Hai Zhuge, Xue Chen and Xiaoping Sun China Knowledge Grid Research Group, Key Lab of Intelligent Information Processing Insti

Preferential Walk: Towards Efficient and Scalable Search in Unstructured Peer-to-Peer Networks Hai Zhuge, Xue Chen and Xiaoping Sun China Knowledge Grid Research Group, Key Lab of Intelligent Information Processing Insti

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 09:35:06
278AS Relationships, Customer Cones, and Validation Matthew Luckie Bradley Huffaker  Amogh Dhamdhere

AS Relationships, Customer Cones, and Validation Matthew Luckie Bradley Huffaker Amogh Dhamdhere

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2013-08-23 13:57:03
279Peer to Peer  E d i t o r : C h a r l e s Pe t r i e • p e t r i e @ s t a n fo rd . e d u Industrial Semantics and Magic

Peer to Peer E d i t o r : C h a r l e s Pe t r i e • p e t r i e @ s t a n fo rd . e d u Industrial Semantics and Magic

Add to Reading List

Source URL: www-cdr.stanford.edu

Language: English - Date: 2006-06-09 14:44:13
280Countering Hidden-Action Attacks on Networked Systems Tyler Moore University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom [removed]

Countering Hidden-Action Attacks on Networked Systems Tyler Moore University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom [removed]

Add to Reading List

Source URL: infosecon.net

Language: English - Date: 2006-03-16 20:15:32