Results 81 to 90 of about 37,863 (232)
The use of maxLength in the RPKI [PDF]
This document recommends that operators avoid using the maxLength attribute when issuing Route Origin Authorizations (ROAs) in the Resource Public Key Infrastructure (RPKI). These recommendations complement those in [RFC7115].https://datatracker.ietf.org/
Gilad, Yossi +4 more
core
Abstract Satellite‐based earth observation is a robust tool for tracking change in ecosystems. While terrestrially focused applications of remote sensing have empowered wide adoption for research and management, remote sensing of inland aquatic ecosystems remains comparably nascent.
Scott D. Ducar +9 more
wiley +1 more source
Study of BGP secure scheme based on divide and conquer strategy
A new approach was studied for BGP security:SE-BGP.By analyzing the security of SE-BGP,was found it had some secure leaks which couldnt resist active attack.To solve these secure problems of SE-BGP,an AS-alliance-based secure BGP scheme :SA-BGP was ...
Bin WANG +3 more
doaj +2 more sources
Jaringan komputer adalah himpunan "interkoneksi" antara dua komputer otonom atau lebih yang terhubung dengan media transmisi kabel (kabel) atau tanpa kabel (nirkabel). Jaringan komputer dalam melakukan komunikasi data antar user.
Akhmad Zulfikar Al Ghivani
doaj +1 more source
IDLB: An SDN‐Based Load‐Balancing Routing Protocol for Autonomous Satellite Constellation Networks
ABSTRACT Routing in satellite constellation networks with intersatellite links has become an important aspect to enable broadband Internet access and to integrate into terrestrial networks. However, their dynamic characteristics and large physical size require specifically tailored solutions.
Manuel M. H. Roth +4 more
wiley +1 more source
Counterfactual Explanations in Education: A Systematic Review
Main challenges on counterfactual explanations in education. ABSTRACT Counterfactuals are a type of explanations based on hypothetical scenarios used in Explainable Artificial Intelligence (XAI), showing what changes in input variables could have led to different outcomes in predictive problems.
Pamela Buñay‐Guisñan +2 more
wiley +1 more source
For deep prospects in the foreland thrust belt, southern Junggar Basin, NW China, there are uncertainties in factors controlling the structural deformation, distribution of paleo-structures and detachment layers, and distribution of major hydrocarbon ...
Baoli YU +8 more
doaj +1 more source
Comparing Machine Learning Algorithms for BGP Anomaly Detection using Graph Features
The Border Gateway Protocol (BGP) coordinates the connectivity and reachability among Autonomous Systems, providing efficient operation of the global Internet.
Odnan Ref Sanchez +3 more
semanticscholar +1 more source
Hemostatic Comparison of a Polysaccharide Powder and a Gelatin Powder
Purpose/Aim: Powdered hemostats have been widely adopted for their ease-of-use; however, their efficacy has been limited resulting in applications restricted to low-level bleeds.
Rahul K. Singh +6 more
doaj +1 more source
A low‐cost clip gauge extensometer for crack mouth opening displacement was developed from accessible procedures and materials. Accuracy and repeatability comparable to commercial devices were demonstrated in calibration and fracture tests, enabling reliable measurement in CT specimens for resource‐constrained laboratories.
Isaías Chamorro‐Cruz +8 more
wiley +1 more source

