Results 41 to 50 of about 90,307 (120)

Conformance test suite for implementations of the security protocol suite IPsec v2

open access: yesТруды Института системного программирования РАН, 2018
The paper presents conformance test suite for new Internet Protocol Security Suite IPsec v2. The test suite was constructed by means of the UniTESK automated testing technology and its implementation, CTESK toolkit.The work was done in the Institute for ...
A. V. Nikeshin   +2 more
doaj  

Improved routing strategies for Internet traffic delivery [PDF]

open access: yes, 2004
We analyze different strategies aimed at optimizing routing policies in the Internet. We first show that for a simple deterministic algorithm the local properties of the network deeply influence the time needed for packet delivery between two arbitrarily
Jesús Gómez-Gardeñes   +5 more
core   +3 more sources

Towards a Secure Smart Grid Storage Communications Gateway

open access: yes, 2017
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core   +1 more source

Mobile support in CSCW applications and groupware development frameworks

open access: yes, 2013
Computer Supported Cooperative Work (CSCW) is an established subset of the field of Human Computer Interaction that deals with the how people use computing technology to enhance group interaction and collaboration.
Johnson, D
core   +1 more source

Simulation of undular bores evolution with damping [PDF]

open access: yes, 2017
Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent ...
Chiew, K.L.   +3 more
core   +3 more sources

Internet Predictions [PDF]

open access: yes, 2010
More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the
Barroso, Luiz André   +14 more
core   +1 more source

Tobacco surveillance through electronic data collection on the Android operating system - evidence from the Global Adult Tobacco Survey

open access: yesTobacco Induced Diseases, 2018
Background The Global Adult Tobacco Survey (GATS), a nationally representative household survey launched in 2007, could benefit from a cost-effective and easy to use platform that included support for multiple-languages, the ability to field surveys in ...
Edward Rainey   +5 more
doaj   +1 more source

Model-based testing of Internet Mail Protocols

open access: yesТруды Института системного программирования РАН, 2018
The paper discusses model-based testing of the modern Internet e-mail protocols, including the method of protocol modeling by means of formal notations, peculiarities of e-mail protocols in the context of testing.
N. V. Pakulin, A. N. Tugaenko
doaj  

The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)

open access: yes, 2017
Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself,
Ling, Xinhua   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy