Results 21 to 30 of about 4,651,731 (290)

Multi-user Internet environment for gear design optimization [PDF]

open access: yes, 2003
A Web based multi-user system has been developed to remotely execute a large size software package via the Internet. The software implements genetic algorithm to optimize the design of spur and helical gears.
Amin, N, Hull, BN, Ji, S, Su, D
core   +1 more source

Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions

open access: yesCryptography, 2023
A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages.
Janaka Alawatugoda
doaj   +1 more source

Self-healing topology discovery protocol for software defined networks [PDF]

open access: yes, 2018
“© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Cervelló Pastor, Cristina   +2 more
core   +2 more sources

Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP)

open access: yesJurnal Elkomika, 2015
ABSTRAKHypertext Transfer Protocol (HTTP) merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW).
RATNA SUSANA   +2 more
doaj   +1 more source

SWI-Prolog and the Web [PDF]

open access: yes, 2007
Where Prolog is commonly seen as a component in a Web application that is either embedded or communicates using a proprietary protocol, we propose an architecture where Prolog communicates to other components in a Web application using the standard HTTP ...
Gras   +9 more
core   +3 more sources

HTTP/2 Tsunami: Investigating HTTP/2 Proxy Amplification DDoS Attacks [PDF]

open access: yes, 2017
Distributed Denial of Service (DDoS) attacks cause significant damage to computer systems by taking a system of-fline. Hypertext Transfer Protocol (HTTP), is the most commonly used protocol for web services.
Beckett, David, Sezer, Sakir
core   +1 more source

A High Throughput BFV-Encryption-Based Secure Comparison Protocol

open access: yesMathematics, 2023
Secure comparison is a fundamental problem in multiparty computation. There are two different parties, each holding an l-bit integer, denoted by a and b, respectively.
Tzu-Hsiang Kuo, Ja-Ling Wu
doaj   +1 more source

Incorporating Clinical Imaging into the Delivery of Microbeam Radiation Therapy

open access: yesApplied Sciences, 2021
Synchrotron microbeam radiation therapy is a promising pre-clinical radiation treatment modality; however, it comes with many technical challenges. This study describes the image guidance protocol used for Australia’s first long-term pre-clinical MRT ...
Jason Paino   +11 more
doaj   +1 more source

Towards property-based testing of RESTful web services [PDF]

open access: yes, 2013
Developing APIs as Web Services over HTTP implies adding an extra layer to software, compared to the ones that we would need to develop an API distributed as, for example, a library. This additional layer must be included in testing too, but this implies
Lamela Seijas, Pablo   +2 more
core   +2 more sources

Enhancing the quality of experience of Arduino-based multiplayer online game using MQTT server

open access: yesJurnal Teknologi dan Sistem Komputer, 2020
Online multiplayer games require internet networks to play with opposing players more exciting because multiple players can fight each other. The game experiences lag, which is expressed as the quality of experience (QoE), is one of the most common ...
Gabe Dimas Wicaksana   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy