Results 31 to 40 of about 95,461 (252)

The battle between standards: TCP/IP vs OSI victory through path dependency or by quality? [PDF]

open access: yes, 2003
Between the end of the 1970s and 1994 a fierce competition existed between two possible standards, TCP/IP and OSI, to solve the problem of interoperability of computer networks.
Maathuis, I.J.H., Smit, W.A.
core   +3 more sources

Co-Creating Knowledge Online: Approaches for Community Artists

open access: yesCultural Science, 2013
Forming peer alliances to share and build knowledge is an important aspect of community arts practice, and these co-creation processes are increasingly being mediated by the Internet.
Shea Pip
doaj   +1 more source

Ontology generation for flight safety messages in air traffic management

open access: yesJournal of Big Data, 2021
The analysis of various data is a challenging issue in the field of air traffic flow management (ATFM). Managing a large volume of data and their correct interpretation plays a key role in the prevention of air accidents, human errors, and flight ...
Mahdi Yousefzadeh Aghdam   +3 more
doaj   +1 more source

Post-COVID condition or “long COVID”, return-to work, and occupational health research

open access: yesScandinavian Journal of Work, Environment & Health, 2023
Since the beginning of the COVID-19 pandemic, there has been a growing literature on COVID and work (1). Major editorials (2–4) and reports from international associations and agencies (5–8) have highlighted the importance of ...
Alexis Descatha   +2 more
doaj   +1 more source

Developing Library of Internet Protocol suite on CUDA Platform [PDF]

open access: yes, 2015
Presently, Computational power of Graphics processing Units (GPUs) has turned them into an attractive platform for general purpose application at significant speed using CUDA.
, Taralkumar Mistry, Rahul Bhivare
core   +2 more sources

Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]

open access: yes, 2015
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet   +4 more
core   +1 more source

CoAP conformance testing based on TTCN-3

open access: yesTongxin xuebao, 2013
Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic ...
Hong-qing DU   +2 more
doaj   +2 more sources

AoI-Based Multicast Routing Over Voronoi Overlays With Minimal Overhead

open access: yesIEEE Access, 2020
The increasing pervasive and ubiquitous presence of devices at the edge of the Internet is creating new scenarios for the emergence of novel services and applications. This is particularly true for location and context-aware services. These services call
Michele Albano   +2 more
doaj   +1 more source

Quantum Cryptography in Practice [PDF]

open access: yes, 2003
BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks.
Elliott, Chip   +2 more
core   +2 more sources

NewIP:new connectivity and capabilities of upgrading future data network

open access: yesDianxin kexue, 2019
Internet applications deeply affect people’s work and life.As the booming of internet applications,the data network faces more and more challenges.Based on the requirements of future applications,the trend for inheritance development based on traditional
Xiuli ZHENG, Sheng JIANG, Chuang WANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy