Results 71 to 80 of about 6,802 (157)
Crawling en redes anónimas: I2P
This research work will address the development of a crawler for the I2P anonymous network. It will explore the concept of anonymous networks, their differences from public networks and the role of crawling. The paper will provide a comprehensive breakdown of the code architecture and its operation.
openaire +1 more source
The Universal Cardinal Ordering of Fixed Points
We present the theorem which determines, by a permutation, the cardinal ordering of fixed points for any orbit of a period doubling cascade. The inverse permutation generates the orbit and the symbolic sequence of the orbit is obtained as a corollary ...
A. González Gómez +20 more
core +1 more source
Improving Content Availability in the I2P Anonymous File-Sharing Environment [PDF]
Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated
Timpanaro, Juan Pablo +2 more
openaire +1 more source
Optimal Error Estimates for the hp–Version Interior Penalty Discontinuous Galerkin Finite Element Method [PDF]
We consider the hp-version interior penalty discontinuous Galerkin finite element method (hp-DGFEM) for second-order linear reaction-diffusion equations.
Georgoulis, Emmanuil H., Suli, Endre
core +2 more sources
АНОНИМНАЯ СЕТЬ INVISIBLE INTERNET PROGECT [PDF]
Рассмотрены структурные особенности анонимной сети I2P и алгоритм передачи сообщений.
Авчинникова, А.И.
core
Two laws of large numbers for sublinear expectations
In this paper, we consider the sublinear expectation on bounded random vari- ables. With the notion of uncorrelatedness for random variables under the sublinear expectation, a weak law of large numbers is obtained.
Sun, Chuanfeng
core
BackgroundDigital addiction, including internet, smartphone, and gaming addiction, has emerged as a significant global health concern. Although a wide range of interventions has been evaluated, the fragmented and siloed nature of existing meta-analyses ...
Minggang Zhang +3 more
doaj +1 more source
van Douwen's problems related to the Bohr topology [PDF]
We comment van Douwen's problems on the Bohr topology of the abelian groups raised in his paper (The maximal totally bounded group topology on G and the biggest minimal G-space for Abelian groups G) as well as the steps in the solution of some of them ...
Dikranjan, Dikran
core +1 more source
We present the rst monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and show through a one week long experiment the ability of the system identify a signi cant number of all running applications, among web ...
Timpanaro, Juan Pablo +2 more
openaire +1 more source
In the Internet of Things (IoT), each object (i.e., an IoT instance) requires a unique identifier to serve as its digital fingerprint, enabling users to access detailed information about the object.
Shujuan You +3 more
doaj +1 more source

