Sciweavers

4812 search results - page 876 / 963
» Superimposed Information for the Internet
Sort
View
CN
2007
96views more  CN 2007»
15 years 1 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
COMSUR
2007
101views more  COMSUR 2007»
15 years 1 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CORR
2007
Springer
94views Education» more  CORR 2007»
15 years 1 months ago
Exploring the academic invisible web
Purpose: To provide a critical review of Bergman’s 2001 study on the Deep Web. In addition, we bring a new concept into the discussion, the Academic Invisible Web (AIW). We defi...
Dirk Lewandowski, Philipp Mayr
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
15 years 1 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
JTAER
2008
80views more  JTAER 2008»
15 years 1 months ago
Web 2.0 as Syndication
There is considerable excitement about the notion of 'Web 2.0', particularly among Internet businesspeople. In contrast, there is an almost complete lack of formal liter...
Roger Clarke