Results 91 to 100 of about 1,441,412 (342)

When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance

open access: yes, 2017
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed   +2 more
core   +1 more source

RAD50 missense variants differentially affect the DNA damage response and mitotic progression

open access: yesFEBS Letters, EarlyView.
RAD50 incorporates into the MRN complex and initiates the DNA damage response. Furthermore, RAD50 promotes mitotic progression. RAD50 missense variants capable of forming an MRN complex supported the DNA damage response and mitotic features to different extents in complementation experiments, indicating these functions are separable and might impact ...
Hanna Redeker   +9 more
wiley   +1 more source

Protection of IP-telefony networks on the basis of Asterisk from interception of data

open access: yesҚарағанды университетінің хабаршысы. Физика сериясы, 2017
Nowadays the new round of technologies development on voice transfer, and IP-telephony is observed. In a type of the growing levels of demand and popularity of IP-telephony as bases of corporate communication infrastructure creation there is a question ...
M.Z. Yakubova   +3 more
doaj  

Comparación de la implementación en plataformas tradicionales y en nube: sistema de reportes meteorológicos

open access: yesCiencia y Poder Aéreo, 2019
When developing a project in the field of information and communications technologies (ICT), critical infrastructure represents significant costs. One must also consider problems such as intercommunication latency, or the scalability and stability of ...
Jimmy Anderson Flórez Zuluaga   +4 more
doaj   +1 more source

Address resolution protocol optimization [PDF]

open access: yes, 2009
This paper proposes an improved Address Resolution Protocol (ARP) for Ethernet-based networks. In the proposed alternative method, the ARP request packets are not broadcasted but instead unicasted to an ARP server which will have all the mappings of all
J.L.Tai,   +2 more
core  

Continuations and Web Servers [PDF]

open access: yesHigher-Order and Symbolic Computation, 2004
Programming web applications in direct style with the help of continuations is a much simpler, safer, modular and better-performing technology than the current dominating “page-centric” technology combining CGI scripts, active pages or servlets. This paper discusses the use of continuations in the context of web applications, the problems they solve as
openaire   +3 more sources

Plasmodium falciparum gametogenesis essential protein 1 (GEP1) is a transmission‐blocking target

open access: yesFEBS Letters, EarlyView.
This study shows Plasmodium falciparum GEP1 is vital for activating sexual stages of malarial parasites even independently of a mosquito factor. Knockout parasites completely fail gamete formation even when a phosphodiesterase inhibitor is added. Two single‐nucleotide polymorphisms (V241L and S263P) are found in 12%–20% of field samples.
Frederik Huppertz   +5 more
wiley   +1 more source

IP PBX Asterisk NOW telecommunication network and choice of tools for carrying out attacks. Development and research of the attack scheme to the developed client–server network on the basis of Wi-Fi

open access: yesҚарағанды университетінің хабаршысы. Физика сериясы, 2016
Communication of clients with the server passes through a wireless point of Wi-Fi access. The attacking device is the laptop which has the software package of CommView for Wi-Fi.
M.Z. Yakubova, T.G. Serikov
doaj  

Home - About - Disclaimer - Privacy