Results 21 to 30 of about 53,277 (266)

Network Layer Solutions for a Content-Centric Internet [PDF]

open access: yes, 2011
Nowadays most people exploit the Internet to get contents such as web pages, music or video files. These users only value “what” they download and are not interested about “where” content is actually stored. The IP layer does the opposite and cares about the “where” and not about the “what”.
DETTI, ANDREA, BLEFARI MELAZZI, NICOLA
openaire   +3 more sources

Proving Properties of Rich Internet Applications [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2013
We introduce application layer specifications, which allow us to reason about the state and transactions of rich Internet applications. We define variants of the state/event based logic UCTL* along with two example applications to demonstrate this ...
James Smith
doaj   +1 more source

Decentralized internet infrastructure

open access: yesDianxin kexue, 2019
Inter-domain routing system,domain name system (DNS) and public key infrastructure (PKI) are the fundamental infrastructures of the internet.These infrastructures help to provide network connectivity,service availability and communication trusts between ...
Bingyang LIU   +6 more
doaj   +2 more sources

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Multi-layer DDoS attacks detection with mitigation in IoT-enabled sensor network

open access: yesCybersecurity
The Internet of Things enabled Wireless Sensor Networks (IoT-enabled WSNs) are highly susceptible to a wide range of Distributed Denial of Service (DDoS) attacks.
Kavita S. Kumavat, Joanne Gomes
doaj   +1 more source

Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain

open access: yesInternational Journal of Distributed Sensor Networks, 2019
The developments of Narrow Band Internet of Things have attracted much attention from both academia and industry nowadays. While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security ...
Hanshu Hong, Bing Hu, Zhixin Sun
doaj   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions

open access: yesFEBS Letters, EarlyView.
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva   +10 more
wiley   +1 more source

Network-Layer Accountability Protocols: A Survey

open access: yesIEEE Access, 2018
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj   +1 more source

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy