Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Tcp-Thread'
Tcp-Thread published presentations and documents on DocSlides.
Adaptive Explicit Congestion Notification AECN for Heterogeneous Flows
by callie
Previous research on ECN and RED usually considere...
TcpHas : TCP for HTTP Adaptive Streaming
by jocelyn
Chiheb. BEN AMEUR. 1,2. Emanuel MORY. 2. Bernard ...
Bojie Li* 1,2 Tianyi
by provingintel
Cui*. 3 . Zibo Wang. 1,2 . Wei Bai. ...
Basics of NS-2 Training in TCL script
by iamamercy
TCL script. Presented by: M. Viju Prakash, M.E., P...
TCP Alternative Backoff with ECN (ABE)
by ryotheasy
draft-ietf-tcpm-alternativebackoff-ecn-06. Naeem K...
The FIRMS partnership Final workshop TCP/RAF/3512 “
by pongre
Strengthening routine fisheries data collection in...
1 XORs in the Air: Practical Wireless Network Coding
by rivernescafe
. Sachin. . Katti. HariharanRahul. , . WenjunHu. ...
Final Review! So how’s it all work?
by stylerson
I boot my machine. I open my browser and type . ww...
Számítógépes Hálózatok
by vamput
11. Előadás. : . Szállítói réteg II. . + DNS...
Department of Informatics
by jiggyhuman
Networks and Distributed Systems (ND) . group. Mod...
Violent Python MPICT Winter
by mercynaybor
2015 ICT Educator Conference. San Francisco. Mon. ...
Email Session 5 INST 346
by hirook
Technologies, Infrastructure and Architecture. Mud...
Grafting Routers to Accommodate Change
by araquant
Eric Keller. Princeton University. Oct12, 2010. Je...
Przemyslaw Radowiecki IT-DB
by kaptainpositive
-DBF. Oracle Architecture. Outline. . . Oracle D...
AMP: A Better Multipath TCP for Data Center Networks 1 Morteza
by lois-ondreau
AMP: A Better Multipath TCP for Data Center Net...
Firewalls and Intrusion Detection Systems David Brumley dbrumley@cmu.edu
by trish-goza
Firewalls and Intrusion Detection Systems David B...
CS 381 Introduction to computer networks
by conchita-marotz
Chapter 1 - Lecture 3. 2/2/2017. Introduction. Pr...
Prof. Maulik D. Trivedi
by stefany-barnette
9998265805. maulik.trivedi@darshan.ac.i...
Copyright 2012-2013 Kenneth M. Chipps Ph.D. www.chipps.com
by jane-oiler
Bandwidth. Management. Last . Update . 2013.07.1...
Enabling Distributed Threat Analysis: Common Attack Patterns and Malware Characterization
by liane-varnes
Sean Barnum. Penny Chase. Aug 2011. Premise. Buil...
Global Portfolio of Antimalarial Medicines
by phoebe-click
Translational. Product development. Access. Advan...
A Disruption-tolerant Transmission Protocol for Practical Mobile Data Offloading
by phoebe-click
Younghwan Go. , YoungGyoun Moon, Giyoung Nam, and...
TimeClock Plus UPDATES & ENHANCEMENTS
by lois-ondreau
TCP Version 7. Beta version now being . tested. C...
A Disruption-tolerant Transmission Protocol for Practical Mobile Data Offloading
by mitsue-stanley
Younghwan Go. , YoungGyoun Moon, Giyoung Nam, and...
Publishing Lync to the Internet
by lois-ondreau
“..taking you over the Edge”. Steve Moore. Ma...
Application Layer – Traditional
by marina-yarberry
UIUC CS438: Communication Networks. Summer 2014. ...
F lorida P ermanent R eference
by alida-meadow
N. etwork. Today and Tomorrow. Speaker: Ron Hanso...
15-744: Computer Networking
by alexa-scheidler
Data Center Networking II. Overview. Data Center ...
RDMA in Data Centers: From Cloud Computing to Machine Learning
by calandra-battersby
Chuanxiong Guo. February 21 2018. Toutiao. (. By...
Designing Highly Efficient LXI-based Systems
by tawny-fly
Tom Sarfi, VTI In. strumen. ts. The Case for LAN ...
Introduction to HTML (or how to build a webpage)
by test
What we will do tonight. A few . definitions. A l...
COMP2322 Lab 4 Socket Programming
by faustina-dinatale
Yuvraj. . Sahni. March 8, 2017. 2. Requirement. ...
Network Guide to Networks
by danika-pritchard
6. th. Edition. Chapter 4. Introduction to TCP/I...
XMPP/TCP Extensible Messaging and Presence Protocol
by alida-meadow
95-733 Internet Technologies. 1. Who Uses XMPP?. ...
Revisiting Transport Congestion Control
by briana-ranney
Jian He. UT Austin. 1. Why is Congestion Control ...
Large-Scale Passive Network
by marina-yarberry
Monitoring using Ordinary Switches. Justin Scott....
Introduction 1 Lecture
by pamella-moone
14. Transport Layer . (Transmission Control Proto...
Defining Networks with the OSI Model
by lindy-dunigan
Module . 2. Objectives. Skills Concepts. Objectiv...
1 Unwanted Traffic: Denial of
by stefany-barnette
Service Attacks. Dan Boneh. CS 155. 2. What is ne...
CIT 1100 Connecting to the Internet
by pamella-moone
In this . chapter you . will learn how . to:. Des...
Load More...