Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Packets'
Packets published presentations and documents on DocSlides.
Role of Network Control Packets in
by ali782
Smartphone Energy Drainage. Chander. . Govindaraj...
INTERNET
by celsa-spraggs
BY RAKESH RANJAN KUMAR . MANDEEP HARODE. H...
CSCI-1680 :: Computer Networks
by jane-oiler
Rodrigo Fonseca (. rfonseca. ). http://www.cs.bro...
Packaging samples for irradiation
by mitsue-stanley
Packaging samples for irradiation. Overview. Care...
Top Problems
by phoebe-click
That Can Delay A Completion Packets Final Approva...
Random Early Detection
by tawny-fly
Gateways for Congestion Avoidance. *. Sally Floy...
Quiz 1 Posted on DEN
by stefany-barnette
8 multiple-choice questions. Open book but no Int...
RushNet
by pamella-moone
: Practical Traffic Prioritization for Saturated ...
WinPcap
by mitsue-stanley
Do’s and Don’ts. Wednesday, June 17. th. , 2...
Detection of Promiscuous nodes Using Arp Packets
by debby-jeon
By Engin Arslan. Introduction. Threats in local n...
What computers talk about and how.
by natalia-silvester
(Networking & the Internet.). COS 116, Spring...
RTP Payload Format for
by alexa-scheidler
Reed-Solomon FEC. draft-galanos-fecframe-rtp-reed...
Fine-Grained Latency and Loss Measurements in the
by danika-pritchard
Presence of Reordering. Myungjin. Lee. , Sharon ...
Mobile Communications
by liane-varnes
Chapter 9: Mobile Transport Layer. Motivation, TC...
Space Communications:
by mitsue-stanley
Congestion Control Methods. joe Kimbrell. James ....
Alan Shieh
by phoebe-click
Cornell University. Srikanth Kandula. Microsoft R...
Aaron
by luanne-stotts
Gember. -Jacobson. , . Chaithan. . Prakash. , . ...
Aaron
by ellena-manuel
Gember. , . Chaithan. . Prakash. , . Raajay. . ...
Quality of Service for Internet Telephony
by alida-meadow
Jonathan Rosenberg. Talk Overview. What is QoS. I...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
DetNet
by debby-jeon
Data . Plane. . using. . PseudoWires. Jouni Ko...
Random Early Detection
by tawny-fly
Gateways for Congestion Avoidance. *. Sally Floy...
Inferring Internet Denial-of-Service Activity
by lindy-dunigan
David Moore, Colleen Shannon, Douglas J. Brown, G...
Midterm
by pasty-toler
Score Distribution. You should worry. if you are ...
Rules of Packet Transmission
by olivia-moreira
(Role of packet switching and routers). Rules of ...
Inferring Internet Denial-of-Service Activity
by sherrill-nordquist
David Moore, Colleen Shannon, Douglas J. Brown, G...
Security Requirements of NVO3
by calandra-battersby
draft-hartman-nvo3-security-requirements-01. . S...
Packet PWE3 – Efficient for IP/MPLS
by lindy-dunigan
IeTF78 (Maastricht) – July 25-30 2010. Sriganes...
CS162
by tatyana-admore
Section 8. Administrivia. Spring Break: It was la...
OpenNF
by debby-jeon
: Enabling Innovation in Network Function Control...
Packet Chaining: Efficient Single-Cycle Allocation for On-C
by sherrill-nordquist
George . Michelogiannakis. , Nan Jiang,. Daniel B...
The Alpha 21364
by danika-pritchard
. Network Architecture. Shubhendu. S. . Mukherj...
Validity of
by conchita-marotz
a naïve approximation formula . for Bohmian velo...
Large Ray Packets for Real-time
by alida-meadow
Whitted. Ray Tracing. Ryan . Overbeck. . Columb...
Overcoming the Antennas-Per-AP Throughput Limit in MIMO
by lois-ondreau
Shyamnath Gollakota. Samuel David . Perli. and D...
Small Form Computing
by yoshiko-marsland
A bump in the wire . . The . questions. What can...
Multi-Core Packet Scattering to Disentangle Performance Bot
by myesha-ticknor
Yehuda. . Afek. . Tel-Aviv University. Anat. ....
Hacking Techniques & Intrusion Detection
by lois-ondreau
Ali . Al-. Shemery. arabnix. [at] . gmail. All m...
IETF88 Vancouver
by marina-yarberry
Congestion control for video and priority . d. ro...
Providing Ubiquitous Networks Securely
by myesha-ticknor
Using Host Identity Protocol (HIP). Akihiro Takah...
Load More...