Results 1 to 10 of about 1,167,811 (290)
Identification of Criminal Networks Via External Identifier-Based Clustering on the Dark Web
The dark web’s anonymity infrastructure facilitates serious crimes, including drug trafficking, arms dealing, and the distribution of child sexual abuse material.
Dong-Won Kang, Jiyeon Kim
doaj +1 more source
Identifier Data Layout Strategy in Identifier Resolution System of Internet of Data [PDF]
The Internet of Data(IoD) is a new information infrastructure proposed to address low transmission efficiency, high coordination costs, and challenging security controls in current internet data resource sharing and interactions. The key to enabling data
ZHOU Chunlei, SONG Jimeng, SHEN Ziqi, YU Han, LEI Jie, LIN Bing
doaj +1 more source
Cross-Domain Discovery of Communication Peers. Identity Mapping and Discovery Services (IMaDS)
The upcoming WebRTC-based browser-to-browser communication services present new challenges for user discovery in peer-to-peer mode. Even more so, if we wish to enable different web communication services to interact.
Beierle, Felix +6 more
core +1 more source
Actionable Persistent Identifier Collections
Persistent Identifiers (PIDs) have lately received a lot of attention from scientific infrastructure projects and communities that aim to employ them for management of massive amounts of research data and metadata objects.
Tobias Weigel +2 more
doaj +1 more source
Object unified identifier method in logistics resource integration
Purpose: The status which many programs for object identifier are not incompatible with each other has become a bottleneck for integrating logistics resources. Scholars have done some relevant studies in terms of coding and conversion mechanisms, but the
Huiqi Zhu, Hanping Hou
doaj +1 more source
Parsing MetaMap Files in Hadoop [PDF]
The UMLS::Association CUICollector module identifies UMLS Concept Unique Identifier bigrams and their frequencies in a biomedical text corpus. CUICollector was re-implemented in Hadoop MapReduce to improve algorithm speed, flexibility, and scalability ...
Cano, Alberto +2 more
core +1 more source
The identification and traceability of assets throughout their lifecycle is an important prerequisite for the efficient management of circular value creation and the reuse of components and products.
Palm, Daniel +3 more
doaj +1 more source
Exposing and harvesting metadata using the OAI metadata harvesting protocol: A tutorial [PDF]
In this article I outline the ideas behind the Open Archives Initiative metadata harvesting protocol (OAIMH), and attempt to clarify some common misconceptions. I then consider how the OAIMH protocol can be used to expose and harvest metadata.
Warner, Simeon
core +1 more source
ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things
RFID systems are among the major infrastructures of the Internet of Things, which follow ISO and EPC standards. In addition, ISO standard constitutes the main layers of supply chain, and many RFID systems benefit from ISO standard for different purposes.
Imani, Mehdi, Moghadam, Abolfazl Qiyasi
core +1 more source
Researcb on Progress of Identifier Mecbanisms in Future Internet Arcbitecture
The identifier system of current internet is based on IP address and characterized by binding the identity and location, so it can't adapt well to multi-demands of future internet, such as scalability, mobility and safety.
Ling Cai, Jinkuan Wang
doaj +2 more sources

