Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Packet-Aces'
Packet-Aces published presentations and documents on DocSlides.
Small Form Computing
by yoshiko-marsland
A bump in the wire . . The . questions. What can...
Multi-Core Packet Scattering to Disentangle Performance Bot
by myesha-ticknor
Yehuda. . Afek. . Tel-Aviv University. Anat. ....
Probability
by pasty-toler
Review. Given. N = population. X = sample size . ...
Hacking Techniques & Intrusion Detection
by lois-ondreau
Ali . Al-. Shemery. arabnix. [at] . gmail. All m...
Data-Driven
by luanne-stotts
Network Connectivity. Junda Liu, Scott Shenker, B...
1 If the Internet is the answer,
by alida-meadow
then what was the question?. EE122 Fall 2011. Sco...
E-Mail Capturing & E-mail Encryption
by liane-varnes
60-564 Project. Mohit. . Sud. Dr. . Aggarwal. Un...
Switching
by briana-ranney
Switching breaks up large collision domains into ...
CS162
by tatyana-admore
Section 8. Administrivia. Spring Break: It was la...
Interconnect simulation
by sherrill-nordquist
Different levels for Evaluating an architecture. ...
Routing Techniques in Wireless Sensor Networks: A Survey
by mitsue-stanley
. Outline. Background. Classification of Routing...
Gymnázium, Broumov, Hradební 218
by test
. Vzdělávací oblast: . Anglický jazyk – g...
NDN-TLV Packet Spec
by sherrill-nordquist
v0.1.1. http://named-data.net/doc/ndn-tlv/. Pres...
IPv6 Fundamentals
by pasty-toler
Chapter . 2: IPv6 Protocol. Rick Graziani. Cabril...
I Know
by test
W. hat . Y. our Packet Did Last Hop: Using Packet...
ORACLE DATA SHEET
by myesha-ticknor
ACME PACKET 6000 SERIES Acme Packet 6000 Series co...
ETTM:
by tatyana-admore
A . Scalable, Fault-tolerant . Network Manager. C...
Lecture 12
by conchita-marotz
Firewalls and Intrusion Prevention. modified from...
Equipping Today’s Instructors
by calandra-battersby
for Tomorrow’s Students. Cisco Networking Acade...
Networks: Sample Performance Problems
by tatyana-admore
1. Sample . Network Performance. Problems. Networ...
Random Early Detection
by tawny-fly
Gateways for Congestion Avoidance. *. Sally Floy...
Introduction
by kittie-lecroy
CS. 3516 – Computer Networks. Chapter 1. Intro...
RushNet
by pamella-moone
: Practical Traffic Prioritization for Saturated ...
WinPcap
by mitsue-stanley
Do’s and Don’ts. Wednesday, June 17. th. , 2...
Analysis of WSN Routing Protocols for Multiple Traffic Patt
by phoebe-click
Presenter: . Rizwan. . Mumtaz. University of Tre...
SDN App Development
by myesha-ticknor
Tutorial. November, 2013. 1. Srini. . Seetharama...
Detection of Promiscuous nodes Using Arp Packets
by debby-jeon
By Engin Arslan. Introduction. Threats in local n...
08 January 2015
by tatyana-admore
Stephen Horan. . Cube Quest . Kick-off: . Commun...
Hacking Techniques & Intrusion Detection
by luanne-stotts
Ali Al-. Shemery. (aka: . B!n@ry. ). arabnix. at...
Chapter 22 Q and A
by test
Victor Norman. CS332. Spring . 2016. Quiz. Q1: Ex...
Chapter 22 Q and A
by giovanna-bartolotta
Victor Norman. IS333. Spring 2016. Quiz. Q1: Expl...
Redundancy in Network Traffic: Findings and Implications
by myesha-ticknor
Ashok Anand. . Ramachandran. . Ramjee. ...
Fine-Grained Latency and Loss Measurements in the
by danika-pritchard
Presence of Reordering. Myungjin. Lee. , Sharon ...
Multipath TCP under
by tawny-fly
MASSIVE. Packet Reordering. Nathan Farrington. J...
IEEE HPSR 2014
by stefany-barnette
Scaling Multi-Core Network Processors Without the...
Reliable Transport
by faustina-dinatale
EE122 TAs Past and Present. Review of Principles....
Gaining Control of Cellular Traffic Accounting by Spurious
by lois-ondreau
Younghwan. Go. , . Jongil. Won, Denis Foo . Kun...
IS333, Ch. 26: TCP
by briana-ranney
Victor Norman. Calvin College. 1. What are the im...
Space Communications:
by mitsue-stanley
Congestion Control Methods. joe Kimbrell. James ....
SDN Aditya Akella
by briana-ranney
(Based on slides from Aaron . Gember. and Nick ....
Load More...