Search

Your search keyword '"COMPUTER network protocols"' showing total 1,401 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer networks Remove constraint Topic: computer networks
1,401 results on '"COMPUTER network protocols"'

Search Results

1. A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers.

2. Standards to Secure the Sensors That Power IoT: Existing security standards do not always offer sufficient protection to secure the Internet of Things.

3. EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT.

4. A Firewall Policy Anomaly Detection Framework for Reliable Network Security.

5. A N-binary Classification and Grouping-based Approach to Improve the Performance of Anomaly Detection.

6. Modified QUIC protocol with congestion control for improved network performance.

7. Communication optimization strategies for distributed deep neural network training: A survey.

8. Securing Network Time Protocol.

9. Suitability of Transport Techniques for Video Transmission in IP Networks.

10. Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols.

11. Improved MAC layer protocol of Wifi for satellite network.

12. Computer network security evaluation simulation model based on neural network.

13. Scalable Blockchain Protocol Based on Proof of Stake and Sharding.

14. Passively Measuring TCP Round-Trip Times.

15. On the achievable rate bounds in multi-pair massive antenna relaying with correlated antennas.

16. Efficient Communication Induced Checkpointing Protocol for Broadcast Network-based Distributed Systems.

17. Declarative Networking.

18. Anonymizing the Net.

19. AN ASTURIAN VIEW of Networking 2015.

20. BREAKING LOOSE.

21. THE USE OF NETWORK PROTOCOLS FOR STEGANOGRAPHICAL PURPOSES.

22. Serviceability of large-Scale systems.

23. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

24. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

25. Undecidability of asynchronous session subtyping.

26. Multi-Phased Carrier Sense Multiple Access with Collision Resolution and its Extension to Dynamic Multi-Phases.

27. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

28. A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET.

29. PASLAUGŲ KOKYBĖS UŽTIKRINIMAS NAUDOJANT OPENFLOW PROTOKOLĄ.

30. A kernel-space POF virtual switch.

31. Wi-Fi Self-Organizing Networks: Challenges and Use Cases.

32. Distributing Trust with the Rampart Toolkit.

33. VIP: A Protocol Providing Host Mobility.

34. Practical Considerations for Network Addressing Using CIDR.

35. FIDNOT: TECHNOLOGY, TOOLS, AND HISTORY.

36. Bounding Delay on a Multifarious Token Ring Network.

37. A Randomized Protocol for Signing Contracts.

38. First Passage Times in M[X]2 |G|1|R Queue with Hysteretic Overload Control Policy.

39. SIMULATED OPERATION OF THE COMPUTER NETWORK.

40. Scheduling analysis of tasks constrained by TDMA: Application to software radio protocols.

41. Edge-independent spanning trees in augmented cubes.

42. Verification of population protocols.

43. Desarrollo de protocolo de comunicaciones para redes HAN en SmartGrids.

44. A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication in WSN.

45. A Distributed File System with Variable Sized Objects for Enhanced Random Writes.

46. Cluster-Based MAC Protocol for Collision Avoidance and TDMA Scheduling in Underwater Wireless Sensor Networks.

47. Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software.

48. Loop-Free Alternates with Loop Detection for Fast Reroute in Software-Defined Carrier and Data Center Networks.

49. A Virtual Id Routing Protocol for Future Dynamics Networks and Its Implementation Using the SDN Paradigm.

50. Network softwarization and parallel networks: beyond software-defined networks.

Catalog

Books, media, physical & digital resources