A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
HIRE: Hidden Inter-packet Red-shift Effect
2020
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
This is achieved by injecting packets trains with intermediate TTL-expiring packets which decrease the train rate when they cross the narrow link (red-shift effect). ...
into account both inter-packet time and packet propagation delay. ...
In this case, four iterations are needed to determine Schematic example of the Hidden Inter-packet Red-shift Effect (HIRE) over a non-congested path. ...
doi:10.1109/globecom42002.2020.9348165
fatcat:u5uniyhmofcrvdkrgyrshasvqe
Security Management Model in Cloud Computing Environment
[article]
2016
arXiv
pre-print
This figure shows that the virtual machine at a time, there are 106,242 in the inter-chip connection request SYN and 3 FIN + RST packet is returned, but after the calculated thresholds and no more than ...
FUNCTIONAL TEST Test environment is as follows: three physical servers, Red hat enterprise Linux 4 operating system. ...
arXiv:1611.08889v1
fatcat:5viqykksxfeuzkmnawvvelcmse
The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core
[article]
2021
arXiv
pre-print
Second, we assess the effectiveness of observed DNS attacks by studying IXP traces jointly with diverse data from independent measurement infrastructures. ...
Such infrastructures are usually the hidden back-end of booter websites. ...
Also, it is unlikely that this shift is caused by unrelated routing updates as the paths to all amplifiers would have to change simultaneously for such a homogeneous effect. ...
arXiv:2109.01104v2
fatcat:un7f23p3afa5jggikhcthyonrq
Protection Against Denial of Service Attacks: A Survey
2009
Computer journal
The damage inflicted by "Code Red" was estimated at about $2.6 billion. ...
The usefulness of selected features vary with the number of hidden neurons and with the selection and mutation probabilities. ...
doi:10.1093/comjnl/bxp078
fatcat:ohslj352kfcpfnfvki2a2wxorm
A Text Steganography Method Using Pangram and Image Mediums
[article]
2012
arXiv
pre-print
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and the receiver would realize that a secret communicating is taking place. ...
In effect, SSL allows safe data transmission between browsers and online applications while impeding packet eavesdropping, data tampering, and other malicious attacks. ...
Line and Word Shifting: In this technique, text lines are shifted vertically and words are shifted horizontally by a fixed space of n inches. ...
arXiv:1212.2908v1
fatcat:emus35syzzfyxkvpmgu6ic42ua
Page 120 of Albion, a Journal of News, Politics, and Literature Vol. 3, Issue 15
[page]
1835
Albion, a Journal of News, Politics, and Literature
Here he is at hiring and starting.
“ For our own parts, the Commissioner and myself were desirous, before set- ting out, to procure another attendant well versed in wood-craft, who might serve as a hunter ...
We were assured that he was ac- quainted with all parts of the country, having traversed it in all directions both in hunting and war parties ; that he would be of use both as guide and inter- yreter, ...
Digital Environments and the Future of Ethnography An Introduction
[chapter]
2017
Digital Environments
People who are addicted to Red Packets always say, "don't speak of Red Packets as being a solution", or "if one Red Packet is not enough, then send two". ...
Prior to the emergence of WeChat Red Packets, the giving of Red Packets was normally confined to happy occasions. Today, Red Packets are also used in other situations. ...
Juris, writes in his study: Reflections on #Occupy Everywhere, "...digital tools facilitated the diffusion of global justice movements and enhanced their scale of operation by allowing activists to more effectively ...
doi:10.14361/9783839434970-002
fatcat:gdok5nc5b5adrg7smb6ywtdy5y
Enabling Integrity for the Compressed Files in Cloud Server
2013
IOSR Journal of Computer Engineering
Also, 53 per cent of those who hired an agent failed the independent test versus 25 per cent of those who did not hire an agent. ...
Worm attack causes an attacker to record to packets in one location and transmit them to another location and again retransmit them there into the network, since it launched in hidden mode. ...
doi:10.9790/0661-1240105
fatcat:suxx6aa5kneybiskk2z4n6guce
Dependency-based Mixture Language Models
[article]
2022
arXiv
pre-print
Extensive experiments and human evaluations show that our method can be easily and effectively applied to different neural language models while improving neural text generation on various tasks. ...
These results further confirm the effectiveness our method. ...
We left-shift the sentence by one step in the y-axis to better display the attention between the predicted next-token and the context in each row. ...
arXiv:2203.10256v1
fatcat:cnkmww3qdff5xjc7r2cozyy54a
Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs
2021
PLoS ONE
Shift Keying (QPSK), etc. ...
Cyclic prefix property of OFDM To reduce the effect of inter-symbol interference (ISI) due to multipath propagation OFDM prepends a copy of the end of the OFDM symbol into the beginning of the symbol known ...
doi:10.1371/journal.pone.0254903
pmid:34324521
pmcid:PMC8321131
fatcat:5z5k6ic4wzfylo55bdq5xprgvq
Speaker & Gavel Speaker & Gavel Special Issue on Forensic Pedagogy Genesis of a Special Issue Daniel Cronn-Mills (Re)Building a Team Culture "It's Only a Hired": An Instructional Look at the Forensic Ballot The First-Year Coach Hosting a Tournament Speaker & Gavel Special Issue Editor
2015
unpublished
Two coaches can work in shifts making sure one coach is before the students and another is present when the last student leaves. ...
In her paper she points out too often forensics programs are the best kept secret on campus, the hidden crown jewel of scholastic success. ...
A few ways to approach this are contained in the following questions: Thus, the fee necessary to cover the cost of hired judges must be handled very carefully so the tournament does not run in the red. ...
fatcat:7yznu57ys5cqbiturghowk2atm
Search for new physics with atoms and molecules
2018
Reviews of Modern Physics
The photon field and the hidden-photon field couple to standard model particles in the essentially the same way: observable effects of the hidden-photon field are nearly entirely through the effects of ...
However, they still can not entirely explain the Keck/HIRES result (19). ...
doi:10.1103/revmodphys.90.025008
fatcat:swok63t6ibgxbhlgtkhiqczw3y
Cortical reliability amid noise and chaos
[article]
2018
bioRxiv
pre-print
We show that this effect relies on recurrent cortical connectivity, and is not a simple effect of feed-forward thalamocortical input. ...
The majority of the shifted spikes were shifted by less than 0.05 ms (59.1%: < 0.05; 33.1%: < 1 ms.; 5.5%: < 20 ms; 1.8%: < 100 s; 0.5%: < 1 s). Finally, 3 ± 2 neurons had extra or missing spikes. ...
(B3) Quantifying edge effects. ...
doi:10.1101/304121
fatcat:wxvbsqivgffntdzmnn5bzfor4i
From Zero to Hero: How Zero-Rating Became a Debate about Human Rights
2016
IEEE Internet Computing
The red curve shows the measured routes. ...
An example can help to understand this effect. ...
Finding the best computing job or hire shouldn't be left to chance. ...
doi:10.1109/mic.2016.88
fatcat:imrhaaoac5gifool7wjegaxl5q
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alcohol Nanocomposite Thin Films
2015
International Journal of Science and Engineering Applications
This protocol is a true thin client protocol because it has very low bandwidth requirements and shifts all processing demands to the RFB server instead of the RFB client (Kerai, 2010). ...
Effects of low frequency noise in closed space on the human., In: Proceedings of the Inter-Noise 2011. The 40th International Congress and Exposition on Noise Control Engineering. ...
transmission data rate, DIFS stands for the Distributed Inter-Frame Spacing , SIFS stands for the Short Inter-Frame Spacing and TACK represents the transmission delay of acknowledge frame. ...
doi:10.7753/ijsea0404.1001
fatcat:2fr7pbjz5ngsplez7cvthiht5e
« Previous
Showing results 1 — 15 out of 951 results