Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Packet-Network'
Packet-Network published presentations and documents on DocSlides.
BlindBox: Deep Packet Inspection Over Encrypted Traffic
by karlyn-bohler
SIGCOMM 2015. Raluca Ada Popa. Joint work with: J...
15-441 Computer Networking
by liane-varnes
Lecture 16 –TCP in detail. Eric Anderson. Fall ...
The Real Time Transport Protocol (RTP)
by myesha-ticknor
Jonathan Rosenberg. Chief Scientist. Talk Overvie...
DOMINO: Relative Scheduling in Enterprise Wireless LANs
by kittie-lecroy
Wenjie. . Zhou (. Co-Primary Author. ), . Dong L...
Hardware-Software Co-Design for
by giovanna-bartolotta
Network Performance Measurement. Srinivas Narayan...
NetSim Cognitive Radio Simulation
by marina-yarberry
Code Walkthrough in . 10 steps. This presentation...
15-441 Computer Networking
by min-jolicoeur
Lecture 16 –TCP in detail. Eric Anderson. Fall ...
Customizing OVS using P4
by briana-ranney
Muhammad Shahb. az. with Sean Choi, Ben Pfaff, . ...
Programmable Packet Scheduling at Line Rate
by tatyana-admore
Anirudh . Sivaraman. , . Suvinay. Subramanian, ....
Sdn Based Hardware accelerated
by lois-ondreau
FIREWALL. By. . Net Maniacs. Abhishek Katuluru....
A Generalized Processor Sharing Approach to Flow Control in Integrated Service
by min-jolicoeur
Networks:The. Single Node Case. .. Abhay.K.Parek...
1 Congestion Control for High-speed Extremely Shallow-buffered
by tawny-fly
Datacenter Networks. APNet. 2017, Hong Kong. Wei...
2 : Comparing IPv4 and IPv6
by min-jolicoeur
Rick Graziani. Cabrillo College. Rick.Graziani@ca...
Home Energy Management
by aaron
EML 4911C-Senior Design- Fall . 2015. Presentatio...
Security Breaches
by pamella-moone
Guiding principle is . CIA. :. C. onfidentiality....
Northern Tier 2015
by lindy-dunigan
Holiday Stay: December 27, 2015 – January 1, 20...
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting
by luanne-stotts
Muye. Liu, . Avishek. Mukherjee, Zhenghao Zhang...
Buddy Activity Day!
by conchita-marotz
By: Ty Turner. First Grade Mrs. Roland’s class....
DPDK Optimization Techniques
by aaron
and . Open . vSwitch. Enhancements for . Netdev....
P4 Language
by stefany-barnette
and . Software Switches. A Fixed-Function Switch....
Wang Zixiao
by test
School of Computing. National University of Singa...
A Journey through the Seas of
by ellena-manuel
Tenure . and Promotion. Spring 2017. T&P Cont...
American Romanticism: 1800-1860
by kittie-lecroy
Light Romanticism, Dark Romanticism, Transcendent...
Programmable Packet Scheduling at Line Rate
by debby-jeon
Anirudh . Sivaraman. , . Suvinay. Subramanian, M...
TWAMP Features – Reflect OCTETS draft
by celsa-spraggs
draft-ietf-ippm-reflect-octets-03. Al Morton and ...
1 Designing IP
by faustina-dinatale
EE122 Fall 2011. Scott Shenker. http://. inst.eec...
Communication Security
by cheryl-pisano
Lecture 3:. Introduction to . Cellular Mobile Net...
Data Center Networks and Switching and Queueing
by jane-oiler
Hakim Weatherspoon. Associate Professor, . Dept. ...
Meteorology
by alexa-scheidler
– A Forecast Fascination. Session 2. Douglas K....
Jennifer Rexford
by danika-pritchard
Princeton . University. MW 11:00am-12:20pm. Progr...
How can Smarties help us learn about Chance and Data?
by aaron
You will need to write your answers in your Maths...
All Natural Granola with Yogurt
by pamella-moone
Crispy Chicken Sandwich with Ketchup Packet. Stea...
NetSim
by briana-ranney
ZigBee Simulation. Code Walkthrough . in 10 steps...
PISCES: A Programmable, Protocol-Independent Software Switc
by aaron
Muhammad Shahbaz. Nick . Feamster. Jennifer Rexfo...
Programmable Packet Scheduling at Line Rate
by pasty-toler
Anirudh . Sivaraman. , . Suvinay. Subramanian, ....
Sex Determination Lab
by mitsue-stanley
Forensic Science 11/11/14. Drill. List the charac...
Packet Transactions: High-Level Programming for Line-Rate S
by stefany-barnette
Anirudh. . Sivaraman. , Alvin Cheung, Mihai . Bu...
Antonio Fernández Anta,
by yoshiko-marsland
Joint work with . C.Georgiou. , . D.Kowalski. , a...
In air they wander, we exist to blow their cover!!!!
by danika-pritchard
{An approach . to evil twin detection from a norm...
Reliability testing for Spark Streaming
by alida-meadow
… from POC to production. What does VideoAnalyt...
Load More...