Results 21 to 30 of about 4,651,731 (290)
Multi-user Internet environment for gear design optimization [PDF]
A Web based multi-user system has been developed to remotely execute a large size software package via the Internet. The software implements genetic algorithm to optimize the design of spur and helical gears.
Amin, N, Hull, BN, Ji, S, Su, D
core +1 more source
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages.
Janaka Alawatugoda
doaj +1 more source
Self-healing topology discovery protocol for software defined networks [PDF]
“© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Cervelló Pastor, Cristina +2 more
core +2 more sources
ABSTRAKHypertext Transfer Protocol (HTTP) merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW).
RATNA SUSANA +2 more
doaj +1 more source
Where Prolog is commonly seen as a component in a Web application that is either embedded or communicates using a proprietary protocol, we propose an architecture where Prolog communicates to other components in a Web application using the standard HTTP ...
Gras +9 more
core +3 more sources
HTTP/2 Tsunami: Investigating HTTP/2 Proxy Amplification DDoS Attacks [PDF]
Distributed Denial of Service (DDoS) attacks cause significant damage to computer systems by taking a system of-fline. Hypertext Transfer Protocol (HTTP), is the most commonly used protocol for web services.
Beckett, David, Sezer, Sakir
core +1 more source
A High Throughput BFV-Encryption-Based Secure Comparison Protocol
Secure comparison is a fundamental problem in multiparty computation. There are two different parties, each holding an l-bit integer, denoted by a and b, respectively.
Tzu-Hsiang Kuo, Ja-Ling Wu
doaj +1 more source
Incorporating Clinical Imaging into the Delivery of Microbeam Radiation Therapy
Synchrotron microbeam radiation therapy is a promising pre-clinical radiation treatment modality; however, it comes with many technical challenges. This study describes the image guidance protocol used for Australia’s first long-term pre-clinical MRT ...
Jason Paino +11 more
doaj +1 more source
Towards property-based testing of RESTful web services [PDF]
Developing APIs as Web Services over HTTP implies adding an extra layer to software, compared to the ones that we would need to develop an API distributed as, for example, a library. This additional layer must be included in testing too, but this implies
Lamela Seijas, Pablo +2 more
core +2 more sources
Enhancing the quality of experience of Arduino-based multiplayer online game using MQTT server
Online multiplayer games require internet networks to play with opposing players more exciting because multiple players can fight each other. The game experiences lag, which is expressed as the quality of experience (QoE), is one of the most common ...
Gabe Dimas Wicaksana +2 more
doaj +1 more source

