Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Tcp-Computer'
Tcp-Computer published presentations and documents on DocSlides.
Leveraging State Information for Automated Attack Discovery In Transport Protocol Implementations
by ventuilog
Samuel Jero. , . Hyojeong. Lee, and Cristina Nita...
Advanced Congestion Control (Hosts)
by majerepr
14-740: Fundamentals of Computer Networks. Credit:...
Enterprise Networking Technologies
by dardtang
Sandeep Singhal, . Ph.D. Director. Windows Core Ne...
NVMe™/TCP Development
by aaron
NVMe™/TCP Development Status and a Case stud...
The War Between Mice and Elephants
by kittie-lecroy
The War Between Mice and Elephants Liang Guo, Ib...
1 Network Architecture Introductory material This module uses the example from the previous module to review important networking concepts: protocol architecture, protocol layers, encapsulation,
by tatyana-admore
1 Network Architecture Introductory material Thi...
1 Network Architecture Introductory material This module uses the example from the previous module to review important networking concepts: protocol architecture, protocol layers, encapsulation,
by mitsue-stanley
1 Network Architecture Introductory material Thi...
Artesunate for I njection
by yoshiko-marsland
Ipca. Rectal . artesunate. Strides . Pharma. Pyro...
Global Portfolio of Antimalarial Medicines
by stefany-barnette
Translational. Product development. Access. Precl...
Troubleshoot media flows in Skype for Business across online, server and hybrid
by conchita-marotz
Thomas Binder. Senior Program Manager. BRK4007. A...
An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance
by marina-yarberry
Authors: . Junxian. Huang, . Feng. . Qian. , . ...
CS 4700 / CS 5700 Network Fundamentals
by debby-jeon
Lecture 2: History. (Hint: Al Gore is not involve...
Rectal artesunate Strides
by conchita-marotz
. Shasun. Pyronaridine-. artesunate . granules. ...
Collaborative TCP Sequence Number Inference Attack —
by karlyn-bohler
How to Crack Sequence Number Under A Second. By. ...
CS 4700 / CS 5700 Network Fundamentals
by kittie-lecroy
Lecture 2: History. (Hint: Al Gore is not involve...
FIELDBUS J.-D. Chatelain
by phoebe-click
OSI model. TCP(UDP)/IP model. UDP: User Datagram ...
Jim Pierson Microsoft Principal Performance Test Engineer
by mitsue-stanley
JimPier@microsoft.com. Visual Round Trip Analyzer...
Intrusion Detection &
by jane-oiler
Snort. Dan Fleck, PhD. dfleck@gmu.edu. Intrusion ...
Developer Lightning Talks
by mitsue-stanley
Developer Track. Talking. . about. . things. ....
Understanding Bufferbloat in Cellular Networks
by marina-yarberry
Haiqing Jiang, Zeyu Liu, Yaogong Wang, Kyunghan L...
Improving Datacenter Performance and Robustness with Multipath TCP
by pasty-toler
Costin. . Raiciu. Department of Computer Science...
Think You Can Hack SharePoint?
by olivia-moreira
Liam Cleary. ATC-B315. About Me. Liam Cleary. Sol...
Preparation and Bioactivity evaluation of
by min-jolicoeur
bioresorbable. biphasic calcium phosphate . micr...
Selective ACKs Renegable & Non-renegable
by sherrill-nordquist
Madhusudhan Shyamlal. CISC 856. Computer & In...
Detecting P2P Traffic from the P2P Flow Graph
by stefany-barnette
Jonghyun. Kim. Khushboo. Shah. Stephen . Bohace...
ZygOS : Achieving Low Tail Latency for Microsecond-scale Networked Tasks
by trish-goza
George . Prekas. , . Marios. . Kogias. , Edouard...
Network Security Protocols and Defensive Mechanisms
by pasty-toler
John Mitchell. CS 155. Spring 2018. Network secur...
Instructions for TAs Add these entries to your ‘hosts’ file:
by danika-pritchard
67.18.184.147 nsa.gov. 67.18.184.147 . www.nsa.go...
Internet Security: How the Internet works and
by tawny-fly
. some basic vulnerabilities. Dan Boneh. CS ...
The history of the Internet
by olivia-moreira
1974: First draft of TCP/IP. “A protocol for pa...
Performance Troubleshooting across Networks
by sherrill-nordquist
Joe Breen. University of Utah. Center for High Pe...
Scoring the DNS Root Server System
by alida-meadow
Geoff Huston. APNIC. The KSK Roll. The current KS...
CS 4700 / CS 5700 Network Fundamentals
by lindy-dunigan
Lecture 2: History. (Hint: Al Gore *did* have a s...
Enumeration Local IP addresses
by phoebe-click
(review). Some special IP addresses. localhost ...
Read 2.3, 2.5 Problems 1.6, 2.6, 2.8
by tatyana-admore
Quiz #1, Lecture 12, 4 . February. Open book &...
Measuring OVS Performance
by tatyana-admore
. . Framework and Methodology. . . . Vasmi...
Transport Services (TAPS)
by liane-varnes
BOF plan. T. . Moncaster. , M. Welzl, D. Ros:. dr...
Learning Networking by Reproducing Network Results
by mitsue-stanley
Lisa Yan and Nick McKeown. Stanford University. 1...
Supporting iWARP Compatibility and Features for Regular Network Adapters
by jane-oiler
P. Balaji H. –W. Jin K. Vaidyanathan D. K. Pa...
CSCI-1680
by stefany-barnette
Transport Layer II. Data over TCP. Based partly o...
Load More...