Protocol analysis

Results: 1021



#Item
291Computing / Audio codecs / Video compression / Videotelephony / MPEG-1 Audio Layer II / Moving Picture Experts Group / Motion compensation / JPEG / DVB-T / MPEG / Electronic engineering / Data compression

A Guide to MPEG Fundamentals and Protocol Analysis (Including DVB and ATSC) Copyright © 1997, Tektronix, Inc. All rights reserved.

Add to Reading List

Source URL: www.netmcmarine.co.uk

Language: English - Date: 2010-04-01 11:23:08
292Transmission Control Protocol / Traffic flow / P0f / Acknowledgement / Cooperative Association for Internet Data Analysis / Network architecture / Computing / TCP/IP / Computer network security

Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation Karyn Benson, Alberto Dainotti, kc claffy and Emile Aben TMA 2013 Turin, Italy

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:33:25
293Electronics / Broadband / Voice over IP / Call sign / Transmission Control Protocol / Electronic engineering / Videotelephony / Integrated Services Digital Network

Disconnect Cause Analysis - VoIP Analysis of Disconnection Causes showing the number of occurences at each calling Gateway Calls Betweenand

Add to Reading List

Source URL: www.extraxi.com

Language: English - Date: 2004-07-07 12:24:06
294Climate change / Earth / Carbon finance / Low-carbon economy / United Nations Framework Convention on Climate Change / Emission intensity / Carbon tax / Greenhouse gas / Kyoto Protocol / Environment / Climate change policy / Environmental economics

Making Input-Output Tables for Environmental Analysis for India: and ∗ Koichi Hikita †, Kazushige Shimpo ‡, Megha Shukla §, Kazunari Kainou ¶, Satoshi Nakano k, Asako Okamura ∗∗ May 2007 Versi

Add to Reading List

Source URL: www.iioa.org

Language: English - Date: 2007-10-09 05:39:55
295

Colony PCR analysis Protocol: 1. Add 20 μL of sterilized distilled water into each PCR tube. 2. Pick colonies with a sterile pipette tip and resuspend a colony in a PCR tube. 3. Bacterial cells were lysed by heating at

Add to Reading List

Source URL: 2014.igem.org

- Date: 2014-10-02 03:13:03
    296Routing protocols / Routing / Border Gateway Protocol / Resource Public Key Infrastructure / Email spam / Router / Anycast / Spam / Multihoming / Internet / Network architecture / Computing

    SPAMTRACER:   HOW  STEALTHY  ARE  SPAMMERS?   TRAFFIC  MONITORING  AND  ANALYSIS  (TMA)  2013   PIERRE-­‐ANTOINE  VERVIER,  OLIVIER  THONNARD    

    Add to Reading List

    Source URL: infocom.di.unimi.it

    Language: English - Date: 2013-04-29 06:33:08
    297Chemistry / Polymerase chain reaction / Biotechnology / Laboratory techniques / DNA replication / Primer / Variants of PCR / COLD-PCR / Biology / Molecular biology / Biochemistry

    Detection of TP53 mutations by Denaturing High Performance Liquid Chromatography (DHPLC) (IARC protocol) Principle DHPLC analysis is based on heteroduplexes (HD) formation between a wild-type and a

    Add to Reading List

    Source URL: p53.iarc.fr

    Language: English - Date: 2012-10-18 07:21:42
    298Internet protocols / Internet standards / Routing protocols / Border Gateway Protocol / Computer graphics / Scientific modeling / Cooperative Association for Internet Data Analysis / San Diego Supercomputer Center / Cisco Systems / Computing / Network architecture / Internet

    k claffy, CAIDA/SDSC: Connectivity Ranking of Autonomous Systems 1 1 Proposal Title A NALYSIS & VISUALIZATION OF BGP CONNECTIVITY AMONG AUTONOMOUS

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2015-05-04 18:48:32
    299Internet / Internet standards / Computer network security / Cyberwarfare / Streaming / Transmission Control Protocol / Port / Transport layer / Secure Shell / Computing / Internet protocols / Network architecture

    Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection Holger Dreger TU M¨unchen Anja Feldmann

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2009-04-11 23:28:18
    300Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Public-key cryptography / Cryptography / Secure communication / Cryptographic protocols

    Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    UPDATE