Search results

From Navigators

Jump to: navigation, search

  • Main Page
    ... launch social media [https://www.lasige.pt/smart2b-launching-social-media Link]. |link=none
    5 KB (663 words) - 13:17, 28 March 2022
  • Publications/All
    |link=none
    732 B (82 words) - 19:07, 14 November 2012
  • Publications
    |link=none |link=none
    7 KB (836 words) - 13:12, 28 March 2022
  • Project:RC-Clouds
    ...al clouds. This poses its own set of problems, for instance congestion and link failures in some of the internet connections between these clouds may lead
    5 KB (771 words) - 09:35, 26 July 2014
  • October 2005: It was twenty years ago today
    ...urnals}} and elements of the team have co-authored several international {{Link Publications by Type|book|books}}.
    7 KB (929 words) - 12:04, 7 December 2012
  • Quinta Hardware
    ...verversion=3.102 duplex=half firmware=5721-v3.47a, ASFIPMI v6.10 latency=0 link=yes module=tg3 multicast=yes port=twisted pair <br /> ...ion=2.0.2 duplex=full firmware=5.0.11 NCSI 2.0.5 ip=192.168.2.21 latency=0 link=yes module=bnx2 multicast=yes port=twisted pair speed=1GB/s<br />
    9 KB (1,408 words) - 15:32, 17 August 2022
  • Publication:Pasin09odd
    ... respect to minimizing overall network congestion (i.e. minimizing maximum link utilization). The challenge in this optimization is to jointly address rout
    2 KB (259 words) - 14:41, 14 January 2013
  • Publication:Pan-jieke2007specification-based-intrusion-191
    ...igher layers can be impaired. This paper is about the security of the Data Link Layer, which can affect the reliability of higher layers, like TCP, HTTP an
    1 KB (146 words) - 18:18, 14 January 2013
  • Publication:Rufino93msc
    ...on of the Abstract Network, includes components from the physical and data link layers. In this work we will identify the main problems in Abstract Networ
    1 KB (200 words) - 10:44, 17 January 2013
  • INFLICT
    *[http://localhost INFLICT Application - LINK TBD] ...ed in order to install automatically all the features of INFLICT. Download link will be available soon.
    6 KB (932 words) - 00:56, 13 December 2015
  • Publication:Vasco2013SDNApp
    ...tralized network control permitted in SDN allows the collection of updated link information to be used by the same logically centralized entity that makes
    2 KB (302 words) - 10:52, 12 January 2016
  • Publication:Magalhaes2015SecSDN
    ...re. In this sense, control plane communications represent the most crucial link between network devices and, at the same time, one of the weakest links fro
    2 KB (339 words) - 11:03, 12 January 2016
  • Publication:Ramos2011iptv
    ...achieved with a negligible increase of bandwidth utilisation in the access link. Other more complex schemes where user behaviour is tracked were also evalu
    2 KB (350 words) - 11:42, 12 January 2016
  • Publication:Ramos2010ChannelSmurfing
    ...ideal predictor, while the increase of bandwidth utilisation in the access link is negligible.
    2 KB (266 words) - 11:45, 12 January 2016
  • Publication:Ramos2009PowerExcursion
    ...r GMPLS-based WSONs to mitigate the effects of power transients due to WDM link failures. Simulations show that power transients are considerably reduced w
    602 B (80 words) - 11:49, 12 January 2016
  • Publication:Msc Thesis FredericoBrito
    ...), a solution that provides traffic engineering by minimizing the maximum link load. The results indeed show that by using CAS reduces network congestion
    2 KB (352 words) - 21:43, 13 November 2016
  • Publication:Mantas2016
    ...e the network performance (e.g., packets can be forwarded through a failed link) and create problems such as network loops or security failures. As in any
    3 KB (408 words) - 15:28, 5 January 2017
  • Publication:2017 DPinto MSc
    (to packet losses, link failures and node departures) and the support of quality of service,
    3 KB (423 words) - 14:57, 2 October 2018
  • Publication:Rufino18C
    ...cription language (Verilog) checking the underlying property. Finally, the link between the SoC and the monitoring unit is explained. Overall, a self-obser
    1 KB (168 words) - 12:37, 1 May 2019
  • Publication:Sa2020Sensors
    ... controlled data injection attacks by a Man-in-the-Middle hosted in an NCS link. The countermeasure is based on a bioinspired metaheuristic, called Backtra
    2 KB (265 words) - 16:47, 24 September 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Views
Personal tools
Toolbox
Navigators toolbox