Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Packets Tcp'
Packets Tcp published presentations and documents on DocSlides.
Packaging samples for irradiation
by mitsue-stanley
Packaging samples for irradiation. Overview. Care...
Top Problems
by phoebe-click
That Can Delay A Completion Packets Final Approva...
Random Early Detection
by tawny-fly
Gateways for Congestion Avoidance. *. Sally Floy...
RushNet
by pamella-moone
: Practical Traffic Prioritization for Saturated ...
WinPcap
by mitsue-stanley
Do’s and Don’ts. Wednesday, June 17. th. , 2...
Detection of Promiscuous nodes Using Arp Packets
by debby-jeon
By Engin Arslan. Introduction. Threats in local n...
RTP Payload Format for
by alexa-scheidler
Reed-Solomon FEC. draft-galanos-fecframe-rtp-reed...
Fine-Grained Latency and Loss Measurements in the
by danika-pritchard
Presence of Reordering. Myungjin. Lee. , Sharon ...
Space Communications:
by mitsue-stanley
Congestion Control Methods. joe Kimbrell. James ....
Alan Shieh
by phoebe-click
Cornell University. Srikanth Kandula. Microsoft R...
Aaron
by luanne-stotts
Gember. -Jacobson. , . Chaithan. . Prakash. , . ...
Aaron
by ellena-manuel
Gember. , . Chaithan. . Prakash. , . Raajay. . ...
Quality of Service for Internet Telephony
by alida-meadow
Jonathan Rosenberg. Talk Overview. What is QoS. I...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
DetNet
by debby-jeon
Data . Plane. . using. . PseudoWires. Jouni Ko...
Random Early Detection
by tawny-fly
Gateways for Congestion Avoidance. *. Sally Floy...
Inferring Internet Denial-of-Service Activity
by lindy-dunigan
David Moore, Colleen Shannon, Douglas J. Brown, G...
Rules of Packet Transmission
by olivia-moreira
(Role of packet switching and routers). Rules of ...
Security Requirements of NVO3
by calandra-battersby
draft-hartman-nvo3-security-requirements-01. . S...
Packet PWE3 – Efficient for IP/MPLS
by lindy-dunigan
IeTF78 (Maastricht) – July 25-30 2010. Sriganes...
CS162
by tatyana-admore
Section 8. Administrivia. Spring Break: It was la...
OpenNF
by debby-jeon
: Enabling Innovation in Network Function Control...
Packet Chaining: Efficient Single-Cycle Allocation for On-C
by sherrill-nordquist
George . Michelogiannakis. , Nan Jiang,. Daniel B...
The Alpha 21364
by danika-pritchard
. Network Architecture. Shubhendu. S. . Mukherj...
Validity of
by conchita-marotz
a naïve approximation formula . for Bohmian velo...
Large Ray Packets for Real-time
by alida-meadow
Whitted. Ray Tracing. Ryan . Overbeck. . Columb...
Overcoming the Antennas-Per-AP Throughput Limit in MIMO
by lois-ondreau
Shyamnath Gollakota. Samuel David . Perli. and D...
Multi-Core Packet Scattering to Disentangle Performance Bot
by myesha-ticknor
Yehuda. . Afek. . Tel-Aviv University. Anat. ....
IETF88 Vancouver
by marina-yarberry
Congestion control for video and priority . d. ro...
Providing Ubiquitous Networks Securely
by myesha-ticknor
Using Host Identity Protocol (HIP). Akihiro Takah...
draft-ietf-ippm-loss-episode-metrics-00
by sherrill-nordquist
Loss Episode Metrics for IPPM. Nick Duffield, . A...
LossRadar
by olivia-moreira
:. Fast. . Detection. . of. . Lost. . Packets...
Eliminating Gray Holes in Mobile Ad hoc Network Discovering
by stefany-barnette
a Secure Path by. Threshold Mechanism. Problem S...
Security Breaches
by pamella-moone
Guiding principle is . CIA. :. C. onfidentiality....
Wrapping Up IP
by tatiana-dople
+. The Transport Layer. EE 122, Fall 2013. Sylvia...
Artificial Intelligence in Networking:
by celsa-spraggs
Ant Colony Optimization. Matthew Guidry . Ant ...
Arash Saber Tehrani Alex
by tawny-fly
Dimakis. Mike Neely . University of Southern Cali...
Distributed Denial of Service
by luanne-stotts
(. DDoS. ). Defending against Flooding-Based . DD...
The Needle in the Haystack
by natalia-silvester
Jasper . Bongertz. 17 June 2015. The Haystack. In...
Internet of Things – Fall 2015
by trish-goza
Case Study on Intrusion of Sensor Networks. Anike...
Load More...