×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [use of opportunistic]
CSC774 - NCSU ADVANCED NETWORK SECURITY Mitigation of Primary User Emulation Attack using Time of Emission Estimation Natraj Jaganmohan (njaganm) Sandeep
218 views
OSG Council Meeting, August 2nd 2011 1 Executive Director Report to the OSG Council Executive Director Report to the OSG Council August 2 nd 2011, Ruth
219 views
The ATHA Environment: Experience with a User Friendly Environment for Opportunistic Computing M.A.R.Dantas Department of Informatics (INE) University of
219 views
Tier-1 experience with provisioning virtualised worker nodes on demand Andrew Lahiff, Ian Collier STFC Rutherford Appleton Laboratory, Harwell Oxford,
231 views
The ATHA Environment: Experience with a User Friendly Environment for Opportunistic Computing
32 views
Topics for the future
45 views
Mitigation of Primary User Emulation Attack using Time of Emission Estimation
41 views