Results 31 to 40 of about 4,651,731 (290)

Demon Dynamics: Deterministic Chaos, the Szilard Map, and the Intelligence of Thermodynamic Systems [PDF]

open access: yes, 2015
We introduce a deterministic chaotic system---the Szilard Map---that encapsulates the measurement, control, and erasure protocol by which Maxwellian Demons extract work from a heat reservoir.
Boyd, Alexander B.   +1 more
core   +2 more sources

HTTP Parameter Sorting Covert Channel Detection Method Based on Markov Model [PDF]

open access: yesJisuanji gongcheng, 2020
The network covert channel is a communication channel that establishes secret message transmission between different hosts on the network by utilizing reserved,optional or undefined fields in the network protocols.HTTP protocol,as one of the most ...
SHEN Guoliang, ZHAI Jiangtao, DAI Yuewei
doaj   +1 more source

Efficient HTTP based I/O on very large datasets for high performance computing with the libdavix library

open access: yes, 2014
Remote data access for data analysis in high performance computing is commonly done with specialized data access protocols and storage systems. These protocols are highly optimized for high throughput on very large datasets, multi-streams, high ...
C Coarfa   +11 more
core   +1 more source

Tripartite Quantum Key Distribution Implemented with Imperfect Sources

open access: yesOptics, 2022
Multipartite quantum key distribution (QKD) is a promising area of quantum networks that provides unconditional secret keys among multiple parties, enabling only legitimate users to decrypt the encrypted message.
Comfort Sekga, Mhlambululi Mafu
doaj   +1 more source

Web intrusion detection system combined with feature analysis and SVM optimization

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
The current network traffic is large, and the network attacks have multiple types. Therefore, anomaly detection model combined with machine learning is developing rapidly.
Chao Liu, Jing Yang, Jinqiu Wu
doaj   +1 more source

Quantifying subjective quality evaluations for mobile video watching in a semi-living lab context [PDF]

open access: yes, 2012
This paper discusses results from an exploratory study in which Quality of Experience aspects related to mobile video watching were investigated in a semi-living lab setting.
De Marez, Lieven   +4 more
core   +2 more sources

A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications

open access: yesSensors, 2015
In this paper, we present the design of a Constrained Application Protocol (CoAP) proxy able to interconnect Web applications based on Hypertext Transfer Protocol (HTTP) and WebSocket with CoAP based Wireless Sensor Networks. Sensor networks are commonly
Alessandro Ludovici, Anna Calveras
doaj   +1 more source

Observing the Evolution of QUIC Implementations

open access: yes, 2018
The QUIC protocol combines features that were initially found inside the TCP, TLS and HTTP/2 protocols. The IETF is currently finalising a complete specification of this protocol.
Bonaventure, Olivier   +2 more
core   +1 more source

A Protocol Review for IPTV and WebTV Multimedia Delivery Systems

open access: yesCommunications, 2012
This paper reviews the key protocols used for multimedia delivery both over privately owned managed IP Networks such as IPTV and public non-managed IP Networks such as WebTV.
Lourdes Beloqui Yuste, Hugh Melvin
doaj   +1 more source

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy