Works matching Computer network protocols
Results: 5000
Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1168, doi. 10.14569/ijacsa.2024.01503116
- By:
- Publication type:
- Article
PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM.
- Published in:
- Washington University Global Studies Law Review, 2014, v. 13, n. 1, p. 127
- By:
- Publication type:
- Article
Data security in smart devices: Advancement, constraints and future recommendations.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 6, p. 269, doi. 10.1049/ntw2.12091
- By:
- Publication type:
- Article
BACnet® Has Leading Role With Siemens.
- Published in:
- ASHRAE Journal, 2004, v. 46, n. 8, p. 12
- Publication type:
- Article
Efficient and Effective Directed Minimum Spanning Tree Queries.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 9, p. 2200, doi. 10.3390/math11092200
- By:
- Publication type:
- Article
Overview of Transport Control Protocol/ Internet Protocol communications.
- Published in:
- American Journal of Health-System Pharmacy, 2009, v. 66, n. 5, p. 446, doi. 10.2146/ajhp070591
- By:
- Publication type:
- Article
BITTORRENT COPYRIGHT TROLLS: A DEFICIENCY IN THE FEDERAL RULES OF CIVIL PROCEDURE?
- Published in:
- Rutgers Computer & Technology Law Journal, 2014, v. 40, n. 2, p. 190
- By:
- Publication type:
- Article
Computing: The wireless epidemic.
- Published in:
- Nature, 2007, v. 449, n. 7160, p. 287, doi. 10.1038/449287a
- By:
- Publication type:
- Article
Analysis and Design of Cisco Packet Tracer Interconnections Between Autonomous Systems (AS) Using the Border Gateway Protocol at Campus 3 Khairun University.
- Published in:
- Technium, 2023, v. 17, p. 205, doi. 10.47577/technium.v17i.10075
- By:
- Publication type:
- Article
Editorial: Industrial Internet of Things (I2oT).
- Published in:
- Mobile Networks & Applications, 2018, v. 23, n. 4, p. 806, doi. 10.1007/s11036-017-0937-3
- By:
- Publication type:
- Article
Special Issue: Recent Advances in Wireless Communication Systems.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
Greener PCs for the Enterprise.
- Published in:
- IT Professional, 2009, v. 11, n. 4, p. 28, doi. 10.1109/MITP.2009.71
- By:
- Publication type:
- Article
Packet Inter-arrival Time Distribution in Academic Computer Network.
- Published in:
- Electronics & Electrical Engineering, 2014, v. 20, n. 3, p. 87, doi. 10.5755/j01.eee.20.3.6683
- By:
- Publication type:
- Article
The Open Achives Initiative: Realizing Simple and Effective Digital Library Interoperability.
- Published in:
- Journal of Library Administration, 2001, v. 35, n. 1-2, p. 125, doi. 10.1300/j111v35n01_08
- By:
- Publication type:
- Article
Analyzing BACnet.
- Published in:
- ASHRAE Journal, 2008, v. 50, n. 11, p. B24
- By:
- Publication type:
- Article
BACnet Passes Test.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B36
- By:
- Publication type:
- Article
BACnet: A Capital Idea.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B34
- By:
- Publication type:
- Article
BACnet Down Under.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B26
- By:
- Publication type:
- Article
BACnet for Megachurch.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B24
- By:
- Publication type:
- Article
BACnet at Georgia Tech.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B18
- By:
- Publication type:
- Article
BACnet for Cleanrooms.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B15
- By:
- Publication type:
- Article
BACnet Measures Up.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B11
- By:
- Publication type:
- Article
BACnet at Cornell.
- Published in:
- ASHRAE Journal, 2007, v. 49, n. 11, p. B4
- By:
- Publication type:
- Article
A NEW TOKEN RING PROTOCOL AND ITS PERFORMANCE FOR SINGLE AND DUAL RING LAN SYSTEMS.
- Published in:
- International Journal of Communication Systems, 1994, v. 7, n. 3, p. 247, doi. 10.1002/dac.4500070308
- By:
- Publication type:
- Article
Quantum anonymous notification for network-based applications.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 12, p. 1, doi. 10.1007/s11128-021-03339-y
- By:
- Publication type:
- Article
REALISTIC LARGE-SCALE ONLINE NETWORK SIMULATION.
- Published in:
- International Journal of High Performance Computing Applications, 2006, v. 20, n. 3, p. 383, doi. 10.1177/1094342006067814
- By:
- Publication type:
- Article
PBQ-Enhanced QUIC: QUIC with Deep Reinforcement Learning Congestion Control Mechanism.
- Published in:
- Entropy, 2023, v. 25, n. 2, p. 294, doi. 10.3390/e25020294
- By:
- Publication type:
- Article
Detecting Brute Force Attacks on SSH and FTP Protocol Using Machine Learning: A Survey.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2024, v. 16, n. 1, p. 21, doi. 10.29304/jqcsm.2024.16.11432
- By:
- Publication type:
- Article
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2972, doi. 10.1002/sec.1500
- By:
- Publication type:
- Article
Security analysis of network protocols through model checking: a case study on mobile IPv6.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1072, doi. 10.1002/sec.1401
- By:
- Publication type:
- Article
The Mac retakes technical leadership.
- Published in:
- Seybold Report: Analyzing Publishing Technologies, 2002, v. 2, n. 9, p. 19
- Publication type:
- Article
Análisis de rendimiento en redes IPv6.
- Published in:
- Revista Entramado, 2015, v. 11, n. 1, p. 214, doi. 10.18041/entramado.2015v11n1.21118
- By:
- Publication type:
- Article
A Survey on the Development of Network Protocol Fuzzing Techniques.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 13, p. 2904, doi. 10.3390/electronics12132904
- By:
- Publication type:
- Article
A Note on the Time.
- Published in:
- Art Journal, 2011, v. 70, n. 2, p. 1, doi. 10.1080/00043249.2011.10790994
- By:
- Publication type:
- Article
Examination of Traditional Botnet Detection on IoT-Based Bots.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 3, p. 1027, doi. 10.3390/s24031027
- By:
- Publication type:
- Article
What Technologies Are Reshaping GIS?
- Published in:
- Geospatial Solutions, 2005, v. 15, n. 12, p. 10
- By:
- Publication type:
- Article
Open Communication Protocols for Elevators, Part 1.
- Published in:
- Elevator World, 2014, v. 62, n. 7, p. 73
- By:
- Publication type:
- Article
Proposed Framework for Official Document Sharing and Verification in Egovernment Environment Based on Blockchain Technology.
- Published in:
- Baghdad Science Journal, 2022, v. 19, p. 1592, doi. 10.21123/bsj.2022.7513
- By:
- Publication type:
- Article
Analysis of a time-out protocol and its applications in a single server environment.
- Published in:
- International Journal of Computer Integrated Manufacturing, 2003, v. 16, n. 1, p. 1, doi. 10.1080/713804980
- By:
- Publication type:
- Article
Miniproject-Based Learning as an Effective Tool for Teaching Computer Networks to Graduate Students.
- Published in:
- International Journal of Information & Communication Technology Education, 2009, v. 5, n. 1, p. 1, doi. 10.4018/jicte.2009010101
- By:
- Publication type:
- Article
Application of Security Technologies in the Public Websites of Banks in Serbia.
- Published in:
- Izvestia Journal of the Union of Scientists - Varna. Economic Sciences Series, 2018, v. 7, n. 2, p. 298
- By:
- Publication type:
- Article
The once and future internet: infrastructural tragedy and ambiguity in the case of IPv6.
- Published in:
- Internet Histories, 2018, v. 2, n. 1/2, p. 55, doi. 10.1080/24701475.2018.1455311
- By:
- Publication type:
- Article
Comparison of group key establishment protocols.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 1, p. 46, doi. 10.3906/elk-1407-213
- By:
- Publication type:
- Article
Efficient ID-based authentication and key agreement protocols for the session initiation protocol.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. 2, p. 560, doi. 10.3906/elk-1207-102
- By:
- Publication type:
- Article
https://everywhere! ENCRYPTING THE INTERNET.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 66
- By:
- Publication type:
- Article
Distributed Control Plane Architecture for Network Elements.
- Published in:
- Intel Technology Journal, 2003, v. 7, n. 4, p. 51
- By:
- Publication type:
- Article
FTR: Performance-Aware and Energy-Efficient Communication Protocol for Integrating Sensor Networks into the Internet.
- Published in:
- Journal of ICT Research & Applications, 2013, v. 7, n. 1, p. 82, doi. 10.5614/itbj.ict.res.appl.2013.7.1.5
- By:
- Publication type:
- Article
Efficient techniques and tools for intra-domain traffic engineering.
- Published in:
- International Transactions in Operational Research, 2011, v. 18, n. 3, p. 359, doi. 10.1111/j.1475-3995.2010.00769.x
- By:
- Publication type:
- Article
On the Internet routing protocol Enhanced Interior Gateway Routing Protocol: is it optimal?
- Published in:
- International Transactions in Operational Research, 2006, v. 13, n. 3, p. 177, doi. 10.1111/j.1475-3995.2006.00543.x
- By:
- Publication type:
- Article
Gigabit Ethernet-based time transfer system.
- Published in:
- Electrical Engineering in Japan, 2007, v. 160, n. 3, p. 39, doi. 10.1002/eej.20383
- By:
- Publication type:
- Article