Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Packets'
Packets published presentations and documents on DocSlides.
Appendix
by tatiana-dople
1. Appendix. Appendix ...
Ananta:
by myesha-ticknor
Cloud Scale Load Balancing. Parveen Patel. Deepak...
CS 4700 / CS 5700
by phoebe-click
Network Fundamentals. Lecture . 7. : Bridging. (F...
Chorus: Collision
by stefany-barnette
Resolution . for Efficient Wireless Broadcast. Xi...
Eat all you can in an all-you-can-eat buffet:
by faustina-dinatale
A case for aggressive resource usage. Ratul Mahaj...
Intrusion Detection Research
by sherrill-nordquist
Stephen Huang. Sept. 20, 2013. News. 2. http://ar...
Compiling Path Queries in
by calandra-battersby
Software-Defined Networks. Srinivas Narayana. Jen...
A Perspective on Routing in
by tawny-fly
Wireless Mesh Networks. A. Bhorkar. University Q...
Reliable wireless connectivity on the go
by stefany-barnette
Ratul . Mahajan . Networking Research Group, MSR....
High-performance vehicular connectivity with opportunistic
by briana-ranney
Ratul Mahajan. Jitu Padhye. Sharad Agarwal. Brian...
VoCCN
by danika-pritchard
: Voice over Content-Centric Networks. Van Jacobs...
Why Is DDoS Hard to Solve?
by alida-meadow
A simple form of attack. Designed to prey on the ...
Presented by:
by celsa-spraggs
Priyank Gupta. 04/02/2012. Generic Low Latency . ...
Decontaminate Your Skin Using the Reactive Skin Decontamina
by tatyana-admore
PFC Powers, . Tifani. Decontaminate Your Skin Usi...
RADIUS Accounting Extensions on Traffic Statistics
by alida-meadow
draft-yeh-radext-ext-traffic-statistics-01 +. IE...
D eep Packet Inspection(DPI)
by trish-goza
E. ngineering for . E. nhanced . P. erformance of...
C10M:
by danika-pritchard
Defending the Internet at scale. by Robert David ...
Defending against Flooding-based Distributed Denial-of-Serv
by pamella-moone
Author Rocky K. C. Chang, The Hong Kong Polytechn...
The Good, the Bad and the Muffled: the Impact of Different
by lindy-dunigan
Anna Watson and M. Angela . Sasse. Department of ...
Probability
by pasty-toler
Review. Given. N = population. X = sample size . ...
John
by alida-meadow
DeHart. Computer Science & Engineering. Washi...
Network devises
by karlyn-bohler
H. ub. A hub is a devise that connects multiple c...
E-Mail Capturing & E-mail Encryption
by liane-varnes
60-564 Project. Mohit. . Sud. Dr. . Aggarwal. Un...
Collaborative Attacks on Routing Protocols in
by briana-ranney
Ad hoc Networks. . Neelima. . Gupta. University...
Switching
by briana-ranney
Switching breaks up large collision domains into ...
SD-Triggered Protection Switching in MPLS-TP
by briana-ranney
draft-zhl-mpls-tp-sd-01.txt. H. Zhang, J. He, Hu...
SDN Scalability Issues
by stefany-barnette
Last Class . Measuring with SDN. What are measure...
Implementing Inter-VLAN Routing
by conchita-marotz
Deploying Multilayer Switching with Cisco Express...
LocalFlow: Simple, Local Flow Routing
by alexa-scheidler
in Data Centers. Siddhartha Sen, DIMACS 2011. Joi...
Languages for
by celsa-spraggs
Software-Defined Networks. Nate Foster, . Arjun. ...
Modular SDN Programming w/ Pyretic
by giovanna-bartolotta
Joshua Reich. Princeton University. www.frenetic-...
Routing Techniques in Wireless Sensor Networks: A Survey
by mitsue-stanley
. Outline. Background. Classification of Routing...
Network Security
by calandra-battersby
aka . CyberSecurity. Monitor and manage security ...
IPv6 Fundamentals
by pasty-toler
Chapter . 2: IPv6 Protocol. Rick Graziani. Cabril...
DNS security
by karlyn-bohler
How DNS works. Ask local resolver first about nam...
Honeycomb –
by natalia-silvester
Creating Intrusion Detection. Signatures Using Ho...
Congestion Control
by liane-varnes
and. Resource Allocation. Lecture material taken ...
Are you secured in the network ?: a quick look at the TCP/I
by alida-meadow
Based on: A look back at “Security Problems in ...
Website Fingerprinting Attacks and Defenses
by briana-ranney
Touching from a . Distance. In a nutshell …. W...
Network Coding
by stefany-barnette
Testbed. Using Software-Defined Radio. Abstract....
Load More...