Protocol analysis

Results: 1021



#Item
211Empirix xCentrix LTE Analysis Package

Empirix xCentrix LTE Analysis Package

Add to Reading List

Source URL: www.empirix.com

Language: English - Date: 2013-03-20 17:26:11
212VHDL Simulation: A Flexible Approach to Verification and Performance Analysis of Communication Protocols Mario Baldi Alberto Macii

VHDL Simulation: A Flexible Approach to Verification and Performance Analysis of Communication Protocols Mario Baldi Alberto Macii

Add to Reading List

Source URL: netgroup.polito.it

Language: English - Date: 2007-11-05 06:22:54
213Requirements Engineering Conference 2004, Kyoto, Japan  Composing Requirements Using Problem Frames Robin Laney, Leonor Barroca, Michael Jackson, Bashar Nuseibeh Dept. of Computing, The Open University,

Requirements Engineering Conference 2004, Kyoto, Japan Composing Requirements Using Problem Frames Robin Laney, Leonor Barroca, Michael Jackson, Bashar Nuseibeh Dept. of Computing, The Open University,

Add to Reading List

Source URL: mcs.open.ac.uk

Language: English - Date: 2004-05-21 13:08:10
214Answering Machine Detection and Call Progress Analysis for Asterisk-Based Call Centers Presented by

Answering Machine Detection and Call Progress Analysis for Asterisk-Based Call Centers Presented by

Add to Reading List

Source URL: www.vicidial.org

Language: English - Date: 2012-10-25 07:20:14
215ACM SIGOPS Operating Systems Review. Vol 40 Issue 3. July, 2006. ACM Press.  InteMon: Continuous Mining of Sensor Data in Large-scale Self-* Infrastructures Evan Hoke

ACM SIGOPS Operating Systems Review. Vol 40 Issue 3. July, 2006. ACM Press. InteMon: Continuous Mining of Sensor Data in Large-scale Self-* Infrastructures Evan Hoke

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2006-09-12 15:14:24
216Gossiping in a Multi-Channel Radio Network An Oblivious Approach to Coping with Malicious Interference (Extended Abstract) Shlomi Dolev1 , Seth Gilbert2 , Rachid Guerraoui3 , and Calvin Newport4 1

Gossiping in a Multi-Channel Radio Network An Oblivious Approach to Coping with Malicious Interference (Extended Abstract) Shlomi Dolev1 , Seth Gilbert2 , Rachid Guerraoui3 , and Calvin Newport4 1

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:21:17
217Microsoft Word - AppendixLa Grande PM10 Technical Analysis Protocol.…

Microsoft Word - AppendixLa Grande PM10 Technical Analysis Protocol.…

Add to Reading List

Source URL: www.deq.state.or.us

Language: English - Date: 2006-12-06 15:15:29
218Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks Antonis Papadogiannakis*, Michalis Polychronakis†, Evangelos P. Markatos* *  Institute of Computer Science, Foundation for Research and Techn

Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks Antonis Papadogiannakis*, Michalis Polychronakis†, Evangelos P. Markatos* * Institute of Computer Science, Foundation for Research and Techn

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:30:49
219Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:44:01
220Microsoft Word - OpPrincAndPF.doc

Microsoft Word - OpPrincAndPF.doc

Add to Reading List

Source URL: mcs.open.ac.uk

Language: English - Date: 2009-10-24 06:02:45