Results 61 to 70 of about 30,144 (245)
Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000.
Riza Azmi
doaj +1 more source
Core concerns: The need for a governance framework to protect global Internet infrastructure
Abstract The war in Ukraine has underscored the risks and threats to global Internet infrastructure from geopolitically motivated cyber operations. The Domain Name System and core protocols responsible for the routing, forwarding, and security of Internet traffic have been exploited by actors in Russia and Ukraine for denial‐of‐service attacks ...
Dennis Broeders, Arun Sukumar
wiley +1 more source
Regional Address Registries, Governance and Internet Freedom [PDF]
Regional Internet Address Registries (RIRs) are private, nonprofit and transnational governance entities that evolved organically with the growth of the Internet to manage and coordinate Internet Protocol addresses.
Brenden Kuerbis, Milton Mueller
core
HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks
Geographically locating an IP address is of interest for many purposes. There are two major ways to obtain the location of an IP address: querying commercial databases or conducting latency measurements.
bottger+7 more
core +1 more source
Novel wireless communication protocol for e-health applications. [PDF]
Evolution from wired to wireless communication systems has brought great advantages to healthcare services. Mobility support function for e-Health applications gives practitioners, medical centres, and hospitals new tools for managing patients’ care ...
Mihaylova, L., Zvikhachevskaya, A.
core +2 more sources
The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation) is IPv6. Many methods for the implementation of IPv6, one with tunneling.
Siswo Wardoyo+2 more
doaj
This study outlines a method for using surveillance cameras and an algorithm that calls a deep learning model to generate video segments featuring salmon and trout in small streams. This automated process greatly reduces the need for human intervention in video surveillance.
Konrad Karlsson
wiley +1 more source
Multi-homing tunnel broker [PDF]
A proper support for communications has to provide fault tolerance capabilities such as the preservation of established connections in case of failures.
Azcorra, Arturo+3 more
core +3 more sources
Parsing millions of URLs per second
Abstract URLs are fundamental elements of web applications. By applying vector algorithms, we built a fast standard‐compliant C++ implementation. Our parser uses three times fewer instructions than competing parsers following the WHATWG standard (e.g., Servo's rust‐url) and up to eight times fewer instructions than the popular curl parser.
Yagiz Nizipli, Daniel Lemire
wiley +1 more source
A Framework for Rapid Development and Portable Execution of Packet-Handling Applications [PDF]
This paper presents a framework that enables the execution of packet-handling applications (such as sniffers, firewalls, intrusion detectors, etc.) on different hardware platforms.
Baldi, Mario+1 more
core +1 more source