Process control network

Results: 146



#Item
31Network performance / Internet protocols / Flow control / Inter-process communication / Transmission Control Protocol / Transport layer / Network congestion / TCP congestion avoidance algorithm / Throughput / Computing / Data / Network architecture

Coordinated Multi-streaming for 3D Tele-immersion David E. Ott and Ketan Mayer-Patel Department of Computer Science University of North Carolina at Chapel Hill ABSTRACT

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2004-10-18 07:41:58
32Internet protocols / Inter-process communication / Advanced Message Queuing Protocol / Middleware / Transmission Control Protocol / Internet Relay Chat / Computing / Network protocols / Network architecture

Table of Contents 1.AMQP version 0­9­1 specification.................................................................................................................6 1.1.AMQP­defined Domains....................

Add to Reading List

Source URL: www.rabbitmq.com

Language: English - Date: 2015-05-25 12:11:47
33Remote procedure call / Middleware / Wireless sensor network / Access control / Node / XML-RPC / Computing / Concurrent computing / Inter-process communication

A SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks PETER CHAPIN and CHRISTIAN SKALKA, University of Vermont We describe SpartanRPC, a secure middleware technology that supports cooperation bet

Add to Reading List

Source URL: web.vtc.edu

Language: English - Date: 2014-10-04 19:42:31
34Computer network security / Crime prevention / Computer crimes / International Multilateral Partnership Against Cyber Threats / Access control / Cyber security standards / Critical infrastructure protection / Security / Computer security / National security

Securing The Human for Utilities (STH.Utility): Version 5 Coming Soon! Securing The Human is currently in the process of finalizing STH.Utility Version 5 training. We plan to have Version 5 available this summer but wan

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-04-17 12:03:24
35Telecommunications engineering / Internet protocols / Inter-process communication / Adapter / Transmission Control Protocol / Computer network / Firewall / Traffic flow / Network packet / Computing / Network architecture / Data

Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications 1 Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard Guy, V. Ramakrishna, and Peter Reiher UCLA

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-05-20 12:07:13
36Computing / Network architecture / Hypertext Transfer Protocol / World Wide Web / Transmission Control Protocol

Evidence-Based Process Innovation How to make most out of big data? Wil van der Aalst DSC/e

Add to Reading List

Source URL: bpm-roundtable2014.eu

Language: English - Date: 2014-10-14 06:58:12
37Public safety / Computer network security / Crime prevention / National security / Information technology audit process / Common Criteria / Security / Data security / Computer security

STATE OF ILLINOIS OFFICE OF THE AUDITOR GENERAL SERVICE ORGANIZATION CONTROL REPORT DEPARTMENT OF CENTRAL MANAGEMENT SERVICES BUREAU OF COMMUNICATIONS & COMPUTER SERVICES

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2012-07-12 10:45:00
38Crime prevention / National security / Public safety / Computer security / Information technology management / Information technology audit process / Security / Data security / Computer network security

STATE OF ILLINOIS OFFICE OF THE AUDITOR GENERAL SERVICE ORGANIZATION CONTROL REPORT DEPARTMENT OF CENTRAL MANAGEMENT SERVICES BUREAU OF COMMUNICATIONS & COMPUTER SERVICES

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2013-07-24 10:25:00
39Accountancy / Risk / Crime prevention / National security / Computer network security / Internal control / Computer security / Statement on Auditing Standards No. 70: Service Organizations / Information technology audit process / Auditing / Information technology audit / Security

Microsoft Word - BCCS report 2011.doc

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2011-07-13 15:46:00
40Linux-based devices / Computers and the environment / Nettop / Nvidia / Nvidia Ion / Intel Atom

Perfect for Machine/Process Control and SCADA/Industrial Network Interface Features: • IP-65 Front with Stainless or Aluminum Bezels • Atom (Fanless) or Core 2

Add to Reading List

Source URL: www.industcomputing.com

Language: English - Date: 2012-06-08 17:00:10
UPDATE