Network Endpoint

An individual user device on a data communication network.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
  • 2017
(75) Inventors: James Rutherford, Cypress, TX (US); Paul Wehnert, Kemah, TX (US); Steve Chancey, Houston, TX (57) ABSTRACT (US) A… (More)
Is this relevant?
2015
2015
This paper describes the key components for implementing a modern network for intra-satellite communications at the backplane and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Nowadays every device is becoming available as a USB device. As a result of that these devices may be used to attack a network… (More)
  • figure 1
  • figure 2
Is this relevant?
2012
2012
Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb… (More)
Is this relevant?
2012
2012
We describe a new distributed I/O software architecture to support remote applications interacting with local I/O devices based… (More)
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
2011
2011
This paper extends the discussion of potential damage that can be done by Hardware Trojan Horse devices by discussing the… (More)
  • table I
  • figure 1
  • figure 2
Is this relevant?
2008
2008
Trusted computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Online techniques are presented for estimating the source and destination of a suspect transmission through a network based on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2006
2006
The objective of the network endpoint localization problem is to estimate the endpoints (source and destination) of some message… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
This paper proposes to improve a memory registration strategy for Remote DMA operations over pinningbased networks in the context… (More)
  • table 1
  • figure 1
  • table 2
  • figure 3
  • figure 4
Is this relevant?