Protocol analysis

Results: 1021



#Item
41Social work / Family / Childhood / Child welfare / Child abuse / Crimes / Family therapy / Child Protective Services / Child protection / Safety / Child neglect

Illinois Child Endangerment Risk Assessment Protocol FY12 Annual Evaluation Safety Plan Analysis Tamara L. Fuller, Ph.D. Martin Nieto, M.A.

Add to Reading List

Source URL: cfrc.illinois.edu

Language: English - Date: 2014-05-19 13:04:24
42Computing / Network architecture / Internet / Routing protocols / Routing algorithms / Routing / Internet Standards / Internet protocols / Open Shortest Path First / Border Gateway Protocol / Router / Control plane

Fast Control Plane Analysis Using an Abstract Representation Aaron Gember-Jacobson∗◦ , Raajay Viswanathan∗◦ , Aditya Akella◦ , Ratul Mahajan† ◦ University of Wisconsin-Madison, † Microsoft Research

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2016-07-25 15:03:50
43Social work / Behavior / Misconduct / Human behavior / Chaos theory / Dynamical systems / Signal processing / Illinois Department of Children and Family Services / Child Protective Services / Child abuse / Violence / Recurrence quantification analysis

CHILDREN AND FAMILY RESEARCH CENTER Illinois Child Endangerment Risk Assessment Protocol: Impact on Short-term Recurrence Rates (FY03)

Add to Reading List

Source URL: cfrc.illinois.edu

Language: English - Date: 2012-04-04 11:31:46
44Biology / Chemistry / Hematology / DNA / Molecular biology / Laboratory techniques / Cell biology / Lysis buffer / Venipuncture / Blood / Sampling / DNA profiling

Protocol for Sampling Sea Duck Tissues for DNA analysis Provided by Sandy Talbot, USGS Alaska Science Center Characterization of genetic structure within and among breeding and wintering areas of sea ducks Molecular gene

Add to Reading List

Source URL: seaduckjv.org

Language: English - Date: 2015-01-22 15:53:51
45Software / Computing / System software / Web scraping / Wireshark / Computer networking / Cyberwarfare / Network forensics / Wireless networking / Internet protocol suite / Port scanner / Transmission Control Protocol

COURSE COST ESTIMATOR and QUOTE REQUEST PDF VersionWelcome to the Course Estimator and Quote Request Form Ready to train your team on Wireshark, TCP/IP analysis, troubleshooting and network forensics? Determi

Add to Reading List

Source URL: www.chappellu.com

Language: English - Date: 2012-07-03 17:20:13
46Wireless sensor network / Computing / Wireless networking / Computer networking / Data transmission / Sensor node / Collection Tree Protocol / Routing / TinyOS / Embedded system

EvAnT: Analysis and Checking of event traces for Wireless Sensor Networks Matthias Woehrle # , Christian Plessl ∗ , Roman Lim # , Jan Beutel # #

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:23
47Design of experiments / Scientific method / Experiments / Formal sciences / Data / Statistics / Research / Hypothesis / Data analysis / Statistical hypothesis testing / Clinical trial

Stanford University Scientific Review Protocol for Human Subjects ResearchNOTResearch Compliance Office (for projects not otherwise undergoing Scientific Review) Template language for use by IRB Ma

Add to Reading List

Source URL: humansubjects.stanford.edu

Language: English - Date: 2016-04-12 01:21:50
48Internet protocols / Message-oriented middleware / Log analysis / Hypertext Transfer Protocol / Publishsubscribe pattern

Proceedings of ICALEPCS2011, Grenoble, France MOPKN025 INTEGRATING THE EPICS IOC LOG INTO THE CSS MESSAGE LOG* K.U. Kasemir, E. Danilova, ORNL, Oak Ridge, TN 37831, U.S.A.

Add to Reading List

Source URL: accelconf.web.cern.ch

Language: English - Date: 2012-02-02 07:56:18
49Network management / Internet protocols / NetFlow / SFlow / IP Flow Information Export / Border Gateway Protocol / BMP / Telemetry / Bro / Pcap

Traffic analysis with NetFlow

Add to Reading List

Source URL: www.pmacct.net

Language: English - Date: 2016-06-24 09:59:32
50Internet protocols / Computer networking / Cache / File sharing / File sharing networks / Cache algorithms / Time to live / Information-centric networking / Peer-to-peer / Open Shortest Path First / Least frequently used / Hypertext Transfer Protocol

Trace-Driven Analysis of ICN Caching Algorithms on Video-on-Demand Workloads Yi Sun⊗ , Seyed K. Fayaz† , Yang Guo⊗ , Vyas Sekar† Yun Jin , Mohamed Ali Kaafar∗ , Steve Uhlig◦ ⊗

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:58:21
UPDATE