Search

Your search keyword '"COMPUTER network protocols"' showing total 48 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publisher association for computing machinery Remove constraint Publisher: association for computing machinery
48 results on '"COMPUTER network protocols"'

Search Results

1. Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: A Survey.

2. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.

3. Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services.

4. SKIP+: A Self-Stabilizing Skip Graph.

5. A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling.

6. On the Trade-Off between Network Connectivity, Round Complexity, and Communication Complexity of Reliable Message Transmission.

7. Optimal Maintenance of a Spanning Tree.

8. On the Composition of Authenticated Byzantine Agreement.

9. Trade-Offs in Probabilistic Packet Marking for IP Traceback.

10. Analyzing Security Protocols with Secrecy Types and Logic Programs.

11. Formal Verification of Standards for Distance Vector Routing Protocols.

12. Understanding TCP Vegas: A Duality Model.

13. On-Line Analysis of the TCP Acknowledgment Delay Problem.

14. The Fault Span of Crash Failures.

15. VPN Everything is New Again.

16. Underwater Wireless Sensor Networks: A New Challenge for Topology Control-Based Systems.

17. On Choosing Server- or Client-Side Solutions for BFT.

18. Survey of Automatic Protocol Reverse Engineering Tools.

19. A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming, and Epidemics.

20. Paxos Made Moderately Complex.

21. Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols.

22. A Survey of User Interaction for Spontaneous Device Association.

23. There is No Now.

24. The State of Peer-to-Peer Network Simulators.

25. Virtualization: Issues, Security Threats, and Solutions.

26. A Survey and Projection on Medium Access Control Protocols for Wireless Sensor Networks.

27. A Taxonomy and Survey of SCTP Research.

28. On the Stability of Interdomain Routing.

29. One Step Forward: Linking Wireless Self-Organizing Network Validation Techniques with Formal Testing Approaches.

30. On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems.

31. A Survey on Peer-to-Peer Key Management for Mobile Ad Hoc Networks.

32. A Survey of Rollback-Recovery Protocols in Message-Passing Systems.

33. Improving TCP Performance over Mobile Networks.

34. The Transport Layer: Tutorial and Survey.

35. High-Speed Local Area Networks and Their Performance: A Survey.

36. Multiple-Access Protocols and Time-Constrained Communication.

37. Local Networks.

38. Network Protocols.

39. The Recovery Manager of the System R Database Manager.

40. Encryption and Secure Computer Networks.

41. Verification Techniques for Cache Coherence Protocols.

42. Network Front-end Processors, Yet Again.

43. Standardizing Storage Clusters.

44. Toward a Commodity Enterprise Middleware.

45. Interoperability.

46. Semantic Interoperability.

47. A Survey on Personalized TV and NGN Services through Context-Awareness.

48. The Network Protocol Battle.

Catalog

Books, media, physical & digital resources