Results 51 to 60 of about 30,144 (245)

Propuesta de métrica para evaluar los protocolos de enrutamiento y direccionamiento IP

open access: yesAvances, 2019
El presente artículo compara el rendimiento de los direccionamientos IPV4 e IPV6 usando los protocolos de enrutamiento RIP, BGP y OSPF en dos escenarios: 1) teórico, usando la métrica propuesta en el presente artículo, y 2) con la herramienta de JMeter ...
Joel Carroll Vargas   +2 more
doaj   +1 more source

Towards autonomous device protection using behavioural profiling and generative artificial intelligence

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley   +1 more source

DESAIN DAN IMPLEMENTASI IPv6 OVER IPv4 TUNNELING PADA BACKBONE JARINGAN LAN/WAN DI UNIVERSITAS MUHAMMADIYAH MALANG [PDF]

open access: yes, 2007
IPv6 over IPv4 Tunneling merupakan salah satu metode untuk mengatasi\ud masa transisi dari IPv4 ke IPv6. Fungsi ini digunakan agar host yang\ud diimplementasikan IPv6 dapat berkomunikasi dengan host yang di\ud implementasikan IPv4 melalui jaringan router
Nur Fajri, Hendra
core  

A QoS-Driven ISP Selection Mechanism for IPv6 Multi-homed Sites [PDF]

open access: yes, 2001
A global solution for the provision of QoS in IPng sites must include ISP selection based on per-application requirements. In this article we present a new site-local architecture for QoS-driven ISP selection in multi-homed domains, performed in a per ...
Azcorra Saloña, Arturo   +3 more
core   +3 more sources

Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2011
   Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj   +1 more source

On the EPA's Radar: The Role of Financial Reports in Environmental Regulatory Oversight

open access: yesJournal of Accounting Research, Volume 62, Issue 5, Page 1849-1900, December 2024.
ABSTRACT This paper investigates the role of corporate financial reports in the Environmental Protection Agency's (EPA) regulatory activities. By tracking the EPA's direct retrieval of SEC filings, we identify three key findings. First, the EPA retrieves a large volume of financial reports, especially from firms in high‐pollution industries.
BIN LI, ANNIKA YU WANG
wiley   +1 more source

Case Study - IPv6 based building automation solution integration into an IPv4 Network Service Provider infrastructure [PDF]

open access: yes, 2012
The case study presents a case study describing an Internet Protocol (IP) version 6 (v6) introduction to an IPv4 Internet Service Provider (ISP) network infrastructure.
Bogomilov, Ivan, Milovanov, Nikolay
core  

Network layer access control for context-aware IPv6 applications [PDF]

open access: yes, 2003
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith   +5 more
core   +2 more sources

Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM)

open access: yesIET Networks, Volume 13, Issue 5-6, Page 486-512, September-November 2024.
The authors propose the Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM), a novel multicast routing protocol that keeps the design principles of PIM‐SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees.
Ana Catarina Grilo   +2 more
wiley   +1 more source

Decentralization in Bitcoin and Ethereum Networks

open access: yes, 2018
Blockchain-based cryptocurrencies have demonstrated how to securely implement traditionally centralized systems, such as currencies, in a decentralized fashion.
AE Gencer   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy