Transmission Control Protocol

Results: 5242



#Item
941Packet-Hiding Methods for Preventing Selective Jamming Attacks ˜ and Loukas Lazos Alejandro Proano Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA E-mail:{aaproano, llazos}@ece.arizo

Packet-Hiding Methods for Preventing Selective Jamming Attacks ˜ and Loukas Lazos Alejandro Proano Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA E-mail:{aaproano, llazos}@ece.arizo

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-07-22 20:05:52
942Microsoft Word - AnnualRepTCP39.rtf

Microsoft Word - AnnualRepTCP39.rtf

Add to Reading List

Source URL: www.tcp.gov.pk

Language: English - Date: 2010-03-24 12:14:36
943Incremental Network Programming for Wireless Sensors

Incremental Network Programming for Wireless Sensors

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-12-13 20:16:42
944E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks Xinyu Zhang and Kang G. Shin Department of Electrical Engineering and Computer Science The University of Michigan  {xyzhang, kgshin}@eecs.umich.edu

E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks Xinyu Zhang and Kang G. Shin Department of Electrical Engineering and Computer Science The University of Michigan {xyzhang, kgshin}@eecs.umich.edu

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:30
945A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email:

A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email:

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2009-06-11 20:30:09
946Tolerating Byzantine Faulty Clients in a Quorum System Barbara Liskov MIT CSAIL Cambridge, MA, USA  Rodrigo Rodrigues

Tolerating Byzantine Faulty Clients in a Quorum System Barbara Liskov MIT CSAIL Cambridge, MA, USA Rodrigo Rodrigues

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2008-08-05 15:03:35
947Operational and Performance Issues of a CBQ router Fulvio Rissoand Panos Gevros Department of Computer Science, University College London, Gower Street WC1E 6BT, London, U.K.

Operational and Performance Issues of a CBQ router Fulvio Rissoand Panos Gevros Department of Computer Science, University College London, Gower Street WC1E 6BT, London, U.K.

Add to Reading List

Source URL: netgroup.polito.it

Language: English - Date: 2007-11-05 08:41:16
948Multipath routing with adaptive playback scheduling for Voice over IP in Service Overlay Networks Hong Li and Lorne Mason Electrical and Computer Engineering Department McGill University, Montreal, Canada Email: viselia.

Multipath routing with adaptive playback scheduling for Voice over IP in Service Overlay Networks Hong Li and Lorne Mason Electrical and Computer Engineering Department McGill University, Montreal, Canada Email: viselia.

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Language: English - Date: 2008-06-03 14:23:26
949Deterministic Packet Marking for Time-Varying Congestion Price Estimation R.W. Thommes and M.J. Coates Department of Electrical and Computer Engineering McGill University 3480 University St

Deterministic Packet Marking for Time-Varying Congestion Price Estimation R.W. Thommes and M.J. Coates Department of Electrical and Computer Engineering McGill University 3480 University St

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Language: English - Date: 2005-07-21 12:49:28
950DSock – DOS TCP/IP by by ICOP ICOP // DMP DMP Group Group

DSock – DOS TCP/IP by by ICOP ICOP // DMP DMP Group Group

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2003-03-15 15:19:58