Results 71 to 80 of about 6,802 (157)

Crawling en redes anónimas: I2P

open access: yes, 2023
This research work will address the development of a crawler for the I2P anonymous network. It will explore the concept of anonymous networks, their differences from public networks and the role of crawling. The paper will provide a comprehensive breakdown of the code architecture and its operation.
openaire   +1 more source

The Universal Cardinal Ordering of Fixed Points

open access: yes, 2008
We present the theorem which determines, by a permutation, the cardinal ordering of fixed points for any orbit of a period doubling cascade. The inverse permutation generates the orbit and the symbolic sequence of the orbit is obtained as a corollary ...
A. González Gómez   +20 more
core   +1 more source

Improving Content Availability in the I2P Anonymous File-Sharing Environment [PDF]

open access: yes, 2012
Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated
Timpanaro, Juan Pablo   +2 more
openaire   +1 more source

Optimal Error Estimates for the hp–Version Interior Penalty Discontinuous Galerkin Finite Element Method [PDF]

open access: yes, 2003
We consider the hp-version interior penalty discontinuous Galerkin finite element method (hp-DGFEM) for second-order linear reaction-diffusion equations.
Georgoulis, Emmanuil H., Suli, Endre
core   +2 more sources

АНОНИМНАЯ СЕТЬ INVISIBLE INTERNET PROGECT [PDF]

open access: yes, 2011
Рассмотрены структурные особенности анонимной сети I2P и алгоритм передачи сообщений.
Авчинникова, А.И.
core  

Two laws of large numbers for sublinear expectations

open access: yes, 2015
In this paper, we consider the sublinear expectation on bounded random vari- ables. With the notion of uncorrelatedness for random variables under the sublinear expectation, a weak law of large numbers is obtained.
Sun, Chuanfeng
core  

Effectiveness of Interventions for Internet, Smartphone, and Gaming Addictions: Umbrella Review and Meta–Meta-Analysis

open access: yesJournal of Medical Internet Research
BackgroundDigital addiction, including internet, smartphone, and gaming addiction, has emerged as a significant global health concern. Although a wide range of interventions has been evaluated, the fragmented and siloed nature of existing meta-analyses ...
Minggang Zhang   +3 more
doaj   +1 more source

van Douwen's problems related to the Bohr topology [PDF]

open access: yes, 2001
We comment van Douwen's problems on the Bohr topology of the abelian groups raised in his paper (The maximal totally bounded group topology on G and the biggest minimal G-space for Abelian groups G) as well as the steps in the solution of some of them ...
Dikranjan, Dikran
core   +1 more source

Monitoring the I2P network

open access: yes, 2011
We present the rst monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and show through a one week long experiment the ability of the system identify a signi cant number of all running applications, among web ...
Timpanaro, Juan Pablo   +2 more
openaire   +1 more source

S-ID: Implementing Intelligent Interoperability for Heterogeneous IoT Identifiers Through a Semantic-Based Framework

open access: yesIEEE Access
In the Internet of Things (IoT), each object (i.e., an IoT instance) requires a unique identifier to serve as its digital fingerprint, enabling users to access detailed information about the object.
Shujuan You   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy