Token ring

Results: 40



#Item
1Black Hole Search with Finite Automata Scattered in a Synchronous Torus J´er´emie Chalopin1 , Shantanu Das1 , Arnaud Labourel1 , and Euripides Markou2 1  2

Black Hole Search with Finite Automata Scattered in a Synchronous Torus J´er´emie Chalopin1 , Shantanu Das1 , Arnaud Labourel1 , and Euripides Markou2 1 2

Add to Reading List

Source URL: emarkou.users.uth.gr

Language: English - Date: 2016-05-24 11:28:43
2Using RMON to Manage Remote Networks Previous screen Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring

Using RMON to Manage Remote Networks Previous screen Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2013-06-03 13:28:23
    3A  TYPICAL local a k a network (LAN)todayhasthe following characteristics:  Transmits bits serially rather than in parallel.

    A TYPICAL local a k a network (LAN)todayhasthe following characteristics: Transmits bits serially rather than in parallel.

    Add to Reading List

    Source URL: www.signallake.com

    Language: English - Date: 2013-03-16 17:12:40
    4IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token  Severity

    IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

    Add to Reading List

    Source URL: ioactive.com

    Language: English
    5ShadowCash: Zero­knowledge Anonymous Distributed E­Cash   via Traceable Ring Signatures    Rynomster and Tecnovert  http://www.shadow.cash   

    ShadowCash: Zero­knowledge Anonymous Distributed E­Cash   via Traceable Ring Signatures    Rynomster and Tecnovert  http://www.shadow.cash   

    Add to Reading List

    Source URL: shadow.cash

    Language: English - Date: 2014-12-15 21:08:51
    6All employees have the responsibility to:

    All employees have the responsibility to:

    Add to Reading List

    Source URL: icbs.nwcg.gov

    Language: English - Date: 2008-06-04 13:20:46
    7La rete Token Ring e lo standard IEEELA RETE TOKEN RING E LO STANDARD IEEE 802.5

    La rete Token Ring e lo standard IEEELA RETE TOKEN RING E LO STANDARD IEEE 802.5

    Add to Reading List

    Source URL: www.homolaicus.com

    Language: Italian - Date: 2011-08-09 02:01:22
      8IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token  Severity

      IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

      Add to Reading List

      Source URL: www.ioactive.com

      Language: English
      9■ Token Ring ■  Le réseau local : Token Ring par Bernard COUSIN

      ■ Token Ring ■ Le réseau local : Token Ring par Bernard COUSIN

      Add to Reading List

      Source URL: www.irisa.fr

      Language: French - Date: 1999-07-08 05:37:00
        10Real-time communication protocols: an overview∗ Ferdy Hanssen and Pierre G. Jansen October 2003 Abstract This paper describes several existing data link layer protocols that provide

        Real-time communication protocols: an overview∗ Ferdy Hanssen and Pierre G. Jansen October 2003 Abstract This paper describes several existing data link layer protocols that provide

        Add to Reading List

        Source URL: www.croky.net

        Language: English - Date: 2003-11-03 08:20:38