Showing 2,581 - 2,600 results of 5,202 for search '"campus"', query time: 0.05s Refine Results
  1. 2581
  2. 2582
  3. 2583
  4. 2584
  5. 2585
  6. 2586

    Teaching and international competitions: objectives, methods and experiences by Simona Colajanni

    Published 2018-06-01
    “…The paper presents, in a wider European panorama about methodologies used for university teaching inside the schools of Engineering and Architecture, the outcomes of a collaboration started in 2005 between the Polytechnic of Milano – Lecco Regional Campus and the University of Palermo which has as its object the participation of teachers and students coming from European and Asian Universities to an International Competition of Sustainable Design. …”
    Get full text
    Article
  7. 2587
  8. 2588

    Asymmetric routing detection based on flow records by Hao-liang LAN, Wei DING, Zhen XIA

    Published 2014-10-01
    “…The misconfiguration of border routers may cause asymmetric routing in campus networks which connect to multiple ISP.A method FARD was proposed according to the phenomenon.This method uses TCP connection-oriented transmission characteristics combined with the home IP address,locating the possible asymmetric routing IP address in the network based on the flow records provided by the router.Experiment on the access router flow records from the main pointof CERNET network to demonstrate the proposed method.…”
    Get full text
    Article
  9. 2589
  10. 2590

    Vector space embedding of DNS query behaviors by deep learning by Chang-ling ZHOU, Xing-long LUAN, Jian-guo XIAO

    Published 2016-03-01
    “…A novel approach to analyze DNS query behaviors was introduced.This approach embeds queried domains or querying hosts to vector space by deep learning mechan then the relationship between querying of domains or hosts was mapped to vector space operations.By processing two real campus network DNS log datasets,it is found that this method maintains relationships very well.After doing mension reduction and clustering analysis,researchers can not only easily explore hidden relationships intuitively,but also discover abnormal network events like botnet.…”
    Get full text
    Article
  11. 2591
  12. 2592
  13. 2593
  14. 2594
  15. 2595
  16. 2596
  17. 2597
  18. 2598
  19. 2599
  20. 2600