Search

Your search keyword '"C.2.6"' showing total 198 results

Search Constraints

Start Over You searched for: Descriptor "C.2.6" Remove constraint Descriptor: "C.2.6"
198 results on '"C.2.6"'

Search Results

1. A Promise Theory Perspective on the Role of Intent in Group Dynamics

2. Causal evidence for social group sizes from Wikipedia editing data

3. Hummingbird: Fast, Flexible, and Fair Inter-Domain Bandwidth Reservations

4. Exploring IoT for real-time CO2 monitoring and analysis

5. Routing over QUIC: Bringing transport innovations to routing protocols

6. Techno-Economic Assessment in Communications: New Challenges

7. Four Algorithms on the Swapped Dragonfly

8. A Reflection on the Organic Growth of the Internet Protocol Stack

9. Six Insights into 6G: Orientation and Input for Developing Your Strategic 6G Research Plan

10. The Swapped Dragonfly

11. Six Questions about 6G

12. BGP-Multipath Routing in the Internet

13. CCID5: An implementation of the BBR Congestion Control algorithm for DCCP and its impact over multi-path scenarios

14. Cyber Security in Cloud: Risk Assessment Models

15. Techno-Economic Assessment Models for 5G

16. Remote Sensing to Control Respiratory Viral Diseases Outbreaks using Internet of Vehicles

17. Model for Techno-Economic Assessment of Access Technologies. Doctoral Dissertation for PhD, Telecommunications Engineering (EECS)

18. Techno-Economic Assessment in Communications: Models for Access Network Technologies

19. Model-Free Control as a Service in the Industrial Internet of Things: Packet loss and latency issues via preliminary experiments

20. SoK: Beyond IoT MUD Deployments -- Challenges and Future Directions

21. A Reproducibility Study of 'IP Spoofing Detection in Inter-Domain Traffic'

22. Software-Defined Network-Based Vehicular Networks: A Position Paper on Their Modeling and Implementation

23. MIN: Co-Governing Multi-Identifier Network Architecture and its Prototype on Operator's Network

24. Socially-Aware Congestion Control in Ad-Hoc Networks: Current Status and The Way Forward

25. Decentralized Periodic Approach for Adaptive Fault Diagnosis in Distributed Systems

26. A Stochastic Model for File Lifetime and Security in Data Center Networks

27. Network-Coding Approach for Information-Centric Networking

28. A Distributed Architecture for Edge Service Orchestration with Guarantees

29. Rigorous statistical analysis of HTTPS reachability

30. SNMP for Common Lisp

31. A Survey on Honeypot Software and Data Analysis

32. HEAP: Reliable Assessment of BGP Hijacking Attacks

33. Revealing Utilization at Internet Interconnection Points

34. Kulfi: Robust Traffic Engineering Using Semi-Oblivious Routing

35. Reward Processes and Performance Simulation in Supermarket Models with Different Servers

36. Performance Evaluation of netfilter: A Study on the Performance Loss When Using netfilter as a Firewall

37. TLS Proxies: Friend or Foe?

38. Information Centric Networking in the IoT: Experiments with NDN in the Wild

39. Uniform definition of comparable and searchable information on the web

40. Impact of Two Realistic Mobility Models for Vehicular Safety Applications

41. TRAIL: Topology Authentication in RPL

42. Forecasting and Event Detection in Internet Resource Dynamics using Time Series Models

43. Design, Implementation, and Operation of a Mobile Honeypot

44. Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking

45. Slick Packets

46. Why We Shouldn't Forget Multicast in Name-oriented Publish/Subscribe

47. Packet flow analysis in IP networks via abstract interpretation

48. Multifaceted Faculty Network Design and Management: Practice and Experience Report

49. NetFence: Preventing Internet Denial of Service from Inside Out

50. Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe

Catalog

Books, media, physical & digital resources