Results 61 to 70 of about 30,144 (245)

Analisis Kematangan Implementasi Internet Protocol versi 6 (IPv6) di Indonesia dengan Interim Maturity Level (IML)

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2012
Cepat atau lambat, IPv6 akan menggantikan IPv4 dalam penomoran internet. Hal ini dikarenakan IANA telah mengalokasikan blok IPv4 terakhirnya pada Januari 2011 lalu. Pesatnya permintaan terhadap IP ini dikarenakan boomingnya .com sejak tahun 2000.
Riza Azmi
doaj   +1 more source

Core concerns: The need for a governance framework to protect global Internet infrastructure

open access: yesPolicy &Internet, Volume 16, Issue 2, Page 411-427, June 2024.
Abstract The war in Ukraine has underscored the risks and threats to global Internet infrastructure from geopolitically motivated cyber operations. The Domain Name System and core protocols responsible for the routing, forwarding, and security of Internet traffic have been exploited by actors in Russia and Ukraine for denial‐of‐service attacks ...
Dennis Broeders, Arun Sukumar
wiley   +1 more source

Regional Address Registries, Governance and Internet Freedom [PDF]

open access: yes, 2008
Regional Internet Address Registries (RIRs) are private, nonprofit and transnational governance entities that evolved organically with the growth of the Internet to manage and coordinate Internet Protocol addresses.
Brenden Kuerbis, Milton Mueller
core  

HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks

open access: yes, 2017
Geographically locating an IP address is of interest for many purposes. There are two major ways to obtain the location of an IP address: querying commercial databases or conducting latency measurements.
bottger   +7 more
core   +1 more source

Novel wireless communication protocol for e-health applications. [PDF]

open access: yes, 2011
Evolution from wired to wireless communication systems has brought great advantages to healthcare services. Mobility support function for e-Health applications gives practitioners, medical centres, and hospitals new tools for managing patients’ care ...
Mihaylova, L., Zvikhachevskaya, A.
core   +2 more sources

Analisis Performa File Transport Protocol pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

open access: yesJurnal Nasional Teknik Elektro, 2014
The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation) is IPv6. Many methods for the implementation of IPv6, one with tunneling.
Siswo Wardoyo   +2 more
doaj  

A hands‐on guide to use network video recorders, internet protocol cameras, and deep learning models for dynamic monitoring of trout and salmon in small streams

open access: yesEcology and Evolution, Volume 14, Issue 5, May 2024.
This study outlines a method for using surveillance cameras and an algorithm that calls a deep learning model to generate video segments featuring salmon and trout in small streams. This automated process greatly reduces the need for human intervention in video surveillance.
Konrad Karlsson
wiley   +1 more source

Multi-homing tunnel broker [PDF]

open access: yes, 2004
A proper support for communications has to provide fault tolerance capabilities such as the preservation of established connections in case of failures.
Azcorra, Arturo   +3 more
core   +3 more sources

Parsing millions of URLs per second

open access: yesSoftware: Practice and Experience, Volume 54, Issue 5, Page 744-758, May 2024.
Abstract URLs are fundamental elements of web applications. By applying vector algorithms, we built a fast standard‐compliant C++ implementation. Our parser uses three times fewer instructions than competing parsers following the WHATWG standard (e.g., Servo's rust‐url) and up to eight times fewer instructions than the popular curl parser.
Yagiz Nizipli, Daniel Lemire
wiley   +1 more source

A Framework for Rapid Development and Portable Execution of Packet-Handling Applications [PDF]

open access: yes, 2005
This paper presents a framework that enables the execution of packet-handling applications (such as sniffers, firewalls, intrusion detectors, etc.) on different hardware platforms.
Baldi, Mario   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy