Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Packets Internet'
Packets Internet published presentations and documents on DocSlides.
Role of Network Control Packets in
by ali782
Smartphone Energy Drainage. Chander. . Govindaraj...
Packaging samples for irradiation
by mitsue-stanley
Packaging samples for irradiation. Overview. Care...
Top Problems
by phoebe-click
That Can Delay A Completion Packets Final Approva...
Random Early Detection
by tawny-fly
Gateways for Congestion Avoidance. *. Sally Floy...
Quiz 1 Posted on DEN
by stefany-barnette
8 multiple-choice questions. Open book but no Int...
RushNet
by pamella-moone
: Practical Traffic Prioritization for Saturated ...
WinPcap
by mitsue-stanley
Do’s and Don’ts. Wednesday, June 17. th. , 2...
Detection of Promiscuous nodes Using Arp Packets
by debby-jeon
By Engin Arslan. Introduction. Threats in local n...
RTP Payload Format for
by alexa-scheidler
Reed-Solomon FEC. draft-galanos-fecframe-rtp-reed...
Fine-Grained Latency and Loss Measurements in the
by danika-pritchard
Presence of Reordering. Myungjin. Lee. , Sharon ...
Mobile Communications
by liane-varnes
Chapter 9: Mobile Transport Layer. Motivation, TC...
Space Communications:
by mitsue-stanley
Congestion Control Methods. joe Kimbrell. James ....
Alan Shieh
by phoebe-click
Cornell University. Srikanth Kandula. Microsoft R...
Aaron
by luanne-stotts
Gember. -Jacobson. , . Chaithan. . Prakash. , . ...
Aaron
by ellena-manuel
Gember. , . Chaithan. . Prakash. , . Raajay. . ...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
DetNet
by debby-jeon
Data . Plane. . using. . PseudoWires. Jouni Ko...
Random Early Detection
by tawny-fly
Gateways for Congestion Avoidance. *. Sally Floy...
Midterm
by pasty-toler
Score Distribution. You should worry. if you are ...
Security Requirements of NVO3
by calandra-battersby
draft-hartman-nvo3-security-requirements-01. . S...
Packet PWE3 – Efficient for IP/MPLS
by lindy-dunigan
IeTF78 (Maastricht) – July 25-30 2010. Sriganes...
CS162
by tatyana-admore
Section 8. Administrivia. Spring Break: It was la...
OpenNF
by debby-jeon
: Enabling Innovation in Network Function Control...
Packet Chaining: Efficient Single-Cycle Allocation for On-C
by sherrill-nordquist
George . Michelogiannakis. , Nan Jiang,. Daniel B...
The Alpha 21364
by danika-pritchard
. Network Architecture. Shubhendu. S. . Mukherj...
Validity of
by conchita-marotz
a naïve approximation formula . for Bohmian velo...
Large Ray Packets for Real-time
by alida-meadow
Whitted. Ray Tracing. Ryan . Overbeck. . Columb...
Overcoming the Antennas-Per-AP Throughput Limit in MIMO
by lois-ondreau
Shyamnath Gollakota. Samuel David . Perli. and D...
Small Form Computing
by yoshiko-marsland
A bump in the wire . . The . questions. What can...
Multi-Core Packet Scattering to Disentangle Performance Bot
by myesha-ticknor
Yehuda. . Afek. . Tel-Aviv University. Anat. ....
Hacking Techniques & Intrusion Detection
by lois-ondreau
Ali . Al-. Shemery. arabnix. [at] . gmail. All m...
IETF88 Vancouver
by marina-yarberry
Congestion control for video and priority . d. ro...
Providing Ubiquitous Networks Securely
by myesha-ticknor
Using Host Identity Protocol (HIP). Akihiro Takah...
draft-ietf-ippm-loss-episode-metrics-00
by sherrill-nordquist
Loss Episode Metrics for IPPM. Nick Duffield, . A...
BGP security
by alida-meadow
some slides borrowed from Jen Rexford (Princeton ...
LossRadar
by olivia-moreira
:. Fast. . Detection. . of. . Lost. . Packets...
Eliminating Gray Holes in Mobile Ad hoc Network Discovering
by stefany-barnette
a Secure Path by. Threshold Mechanism. Problem S...
Security Breaches
by pamella-moone
Guiding principle is . CIA. :. C. onfidentiality....
Wrapping Up IP
by tatiana-dople
+. The Transport Layer. EE 122, Fall 2013. Sylvia...
Artificial Intelligence in Networking:
by celsa-spraggs
Ant Colony Optimization. Matthew Guidry . Ant ...
Load More...