Ring network

Results: 198



#Item
61Software testing / Information theory / Principle of least privilege / Computer network security / Central processing unit / Sandbox / Vulnerability / Ring / Fetch / System software / Computer security / Software

Security-Oriented Analysis of Application Programs (SOAAP) Robert Watson, Khilan Gudka, Steven Hand, Ben Laurie (Google), Anil Madhavapeddy Workshop on Adaptive Host and Network Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-09-17 04:46:16
62Computer network security / Hacking / Hardware Trojan / Vulnerability / Ring / Computer security / Cyberwarfare / Security

HOSTIEEE International Symposium on

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2014-08-20 05:13:58
63Australia / Aboriginal Medical Services Alliance Northern Territory / Australian Aboriginal culture / Indigenous peoples of Australia / Indigenous Australians

MEDIA RING GUIDELINES FOR BECOMING A MEDIA RING MEMBER MEDIA RING GUIDELINES FOR BECOMING A MEDIA RING MEMBER Media RING (Reconciliation Industry Network Group) The Media RING was formed in 2008 and brings together many

Add to Reading List

Source URL: www.mediaring.com.au

Language: English - Date: 2015-03-23 20:52:30
64Network theory / Ring theory / Semiring / Routing algorithms / Search algorithms / Shortest path problem / A* search algorithm / Static single assignment form / External / Mathematics / Algebra / Graph theory

A General Method for Assessment of Security in Complex Services ⋆ Leanid Krautsevich1 , Fabio Martinelli2 , and Artsiom Yautsiukhin2 1 2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2011-08-10 05:58:47
65National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
66IEEE standards / Network performance / Media Access Control / Network topology / Token ring / Ethernet frame / Ethernet / Network packet / Priority queue / Computing / OSI protocols / Information

A Multipoint Communication Protocol based on Ethernet for Analyzable Distributed Real-Time Applications José María Martínez, Michael González Harbour, and J. Javier Gutiérrez Departamento de Electrónica y Computado

Add to Reading List

Source URL: marte.unican.es

Language: English - Date: 2007-06-04 04:17:18
67Computer networking / OpenFlow / Frenetic / Xen / Network virtualization / Hyper-V / Ring / Network switch / Hypervisor / System software / Computing / Software

1 Cost, Performance & Flexibility in OpenFlow: Pick Three Charalampos Rotsos,∗ Richard Mortier,† Anil Madhavapeddy,∗ Balraj Singh,∗ Andrew W. Moore∗ ∗ University of Cambridge † University of Nottingham

Add to Reading List

Source URL: anil.recoil.org

Language: English - Date: 2013-09-29 14:14:18
68Network architecture / Resilient Packet Ring / Computer architecture / Scheduling algorithms / Throughput / Transmission Control Protocol / Spatial Reuse Protocol / Network congestion / Network performance / Computing / IEEE 802

Performance Evaluation of Back-Pressure Fairness in RPR Stein Gjessing and Fredrik Davik Simula Research Laboratory Fornebu, Norway Email: [removed], [removed]

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2002-10-16 08:46:44
69OSI protocols / Network topology / IEEE 802 / Token ring / Integrated Services Digital Network / Ethernet / Business telephone system / Physical layer / PHY / Electronic engineering / Computing / IEEE standards

PDF Document

Add to Reading List

Source URL: www.psiber.com

Language: English - Date: 2009-12-18 20:17:19
70Network architecture / Local area networks / OSI protocols / Telecommunications engineering / Computer networking / Ring network / Token bus network / Token passing / Token ring / Computing / Network topology / IEEE 802

Performance of the HF Token Protocol Eric E. Johnson, Gary Anaya, Zibin Tang, Manikanden Balakrishnan, Huiyan Zhang, and Srugun Sreepuram Klipsch School of Electrical and Computer Engineering1 New Mexico State University

Add to Reading List

Source URL: tracebase.nmsu.edu

Language: English - Date: 2004-08-21 19:07:16
UPDATE