Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Packets'
Packets published presentations and documents on DocSlides.
Joint Tutorial
by marina-yarberry
IEEE . 802.3br . TF Interspersing . express traff...
Building Survivable Systems based on Intrusion Detection an
by sherrill-nordquist
Paper by: T. Bowen. Presented by: Tiyseer Al Homa...
The Feasibility of Launching and Detecting Jamming Attacks
by stefany-barnette
Authors: . Wenyuan. XU, Wade Trappe, . Yanyong. ...
A novel active network measurement utility for predicting g
by tatyana-admore
‘. Etuate. Cocker. ecoc005@aucklanduni.ac.nz. ...
Ch. 28 Q and A
by pamella-moone
CS 332. Spring 2016. A little quiz. Q: What is ne...
Low-Latency Adaptive Streaming Over TCP
by calandra-battersby
Kulkarni. . Ameya.s. . JongHwa. Song. As...
Safeguard the Family Project
by tawny-fly
Lilongwe Medical Relief Fund Trust . Safe . water...
NEIGHBORHOOD WATCH: SECURITY AND PRIVACY ANALYSIS OF AUTOMA
by test
ORIGINAL PAPER BY ROUF, I., MUSTAFA, H., XU, M., ...
CS 4700 / CS 5700
by lois-ondreau
Network Fundamentals. Lecture 12: Router-Aided Co...
Routing of Outgoing Packets with MP-TCP
by lois-ondreau
draft-handley-mptcp-routing-00. Mark Handley. Cos...
XORs in The Air:
by luanne-stotts
Practical Wireless Network Coding. Presented by G...
2015 Workshop
by danika-pritchard
Permanent Status and Promotion. Policy and Proced...
Hacking Techniques & Intrusion Detection
by luanne-stotts
Ali Al-. Shemery. (aka: . B!n@ry. ). arabnix. at...
Chapter 22 Q and A
by giovanna-bartolotta
Victor Norman. IS333. Spring 2016. Quiz. Q1: Expl...
CSCI-1680
by celsa-spraggs
Network Layer:. IP & Forwarding. Based partly...
IEEE HPSR 2014
by stefany-barnette
Scaling Multi-Core Network Processors Without the...
Reliable Transport
by faustina-dinatale
EE122 TAs Past and Present. Review of Principles....
Mobile TCP
by pasty-toler
CEG436: Mobile Computing. Prabhaker. . Mateti. T...
Gaining Control of Cellular Traffic Accounting by Spurious
by lois-ondreau
Younghwan. Go. , . Jongil. Won, Denis Foo . Kun...
Prof. Dr.-Ing. Jochen H. Schiller www.jochenschiller.de
by yoshiko-marsland
Mobile Communications . Chapter 9: Mobile Transpo...
IS333, Ch. 26: TCP
by briana-ranney
Victor Norman. Calvin College. 1. What are the im...
Disclaimer
by mitsue-stanley
No Packets where injured in the making of this ta...
CS 350
by conchita-marotz
Chapter-9,10. Implementation of Connectionless Se...
Recitation 8
by tawny-fly
Wireless Networks. Virtual carrier sensing. First...
Augmenting the Backpressure Collection Protocol to Support
by tatiana-dople
Varun Shimoga Prakash, Dr. Omprakash Gnawali. Net...
1 1 Network Measurements
by phoebe-click
Les Cottrell . – SLAC. University of . Helwan. ...
Sniffing the
by giovanna-bartolotta
Network. (Programming with . Libpcap. ). Dr. Ying...
Can you fool me? Towards automatically checking protocol gu
by lindy-dunigan
Milan Stanojević. Ratul Mahajan. Todd Millstein....
TCP Fast Recovery Strategies: Analysis and ImprovementsDong Lin and H.
by myesha-ticknor
retransmit multiple lost packets within the same r...
TCP: Congestion
by briana-ranney
Control. . (part II). EE 122, Fall 2013. Sylvia ...
TRUNKS
by pamella-moone
TRUNK. :. Trunking. is a layer 2 feature.. A Tru...
NET0183 Networks and Communications
by ellena-manuel
Lectures 17 and 18. Measurements of internet traf...
Networking – Pt I
by marina-yarberry
14 November 2015. CyberPatriot. – UT Dallas. O...
Mateti/PacketFilters
by ellena-manuel
1. Packet Filtering. Prabhaker Mateti. Mateti/Pac...
Unit 7, Chapter 13 & 14
by pamella-moone
How do they talk to each other?. . Wide A...
Decoding 802.11 Collisions
by pamella-moone
Shyamnath Gollakota. Dina Katabi. The Hidden Term...
PROJECT PRESENTATION
by danika-pritchard
“. Analyzing Factors that affect VoIP Call Qual...
Internet Service Providers (ISP)
by cheryl-pisano
How Internet service providers work. What is the ...
Anomalous Payload Based Worm Detection
by yoshiko-marsland
Ke Wang, Gabriela Cretu, Salvatore Stolfo. Comput...
Congestion Control
by tatyana-admore
T.Najah. Al-. Subaie. Kingdom of Saudi Arabia. ...
Load More...