Filters








951 Hits in 5.3 sec

HIRE: Hidden Inter-packet Red-shift Effect

Francesco Ciaccia, Ivan Romero, Rene Serral-Gracia, Mario Nemirovsky
2020 GLOBECOM 2020 - 2020 IEEE Global Communications Conference  
This is achieved by injecting packets trains with intermediate TTL-expiring packets which decrease the train rate when they cross the narrow link (red-shift effect).  ...  into account both inter-packet time and packet propagation delay.  ...  In this case, four iterations are needed to determine Schematic example of the Hidden Inter-packet Red-shift Effect (HIRE) over a non-congested path.  ... 
doi:10.1109/globecom42002.2020.9348165 fatcat:u5uniyhmofcrvdkrgyrshasvqe

Security Management Model in Cloud Computing Environment [article]

Seyed Hossein Ahmadpanah
2016 arXiv   pre-print
This figure shows that the virtual machine at a time, there are 106,242 in the inter-chip connection request SYN and 3 FIN + RST packet is returned, but after the calculated thresholds and no more than  ...  FUNCTIONAL TEST Test environment is as follows: three physical servers, Red hat enterprise Linux 4 operating system.  ... 
arXiv:1611.08889v1 fatcat:5viqykksxfeuzkmnawvvelcmse

The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core [article]

Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch
2021 arXiv   pre-print
Second, we assess the effectiveness of observed DNS attacks by studying IXP traces jointly with diverse data from independent measurement infrastructures.  ...  Such infrastructures are usually the hidden back-end of booter websites.  ...  Also, it is unlikely that this shift is caused by unrelated routing updates as the paths to all amplifiers would have to change simultaneously for such a homogeneous effect.  ... 
arXiv:2109.01104v2 fatcat:un7f23p3afa5jggikhcthyonrq

Protection Against Denial of Service Attacks: A Survey

G. Loukas, G. Oke
2009 Computer journal  
The damage inflicted by "Code Red" was estimated at about $2.6 billion.  ...  The usefulness of selected features vary with the number of hidden neurons and with the selection and mutation probabilities.  ... 
doi:10.1093/comjnl/bxp078 fatcat:ohslj352kfcpfnfvki2a2wxorm

A Text Steganography Method Using Pangram and Image Mediums [article]

Youssef Bassil
2012 arXiv   pre-print
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and the receiver would realize that a secret communicating is taking place.  ...  In effect, SSL allows safe data transmission between browsers and online applications while impeding packet eavesdropping, data tampering, and other malicious attacks.  ...  Line and Word Shifting: In this technique, text lines are shifted vertically and words are shifted horizontally by a fixed space of n inches.  ... 
arXiv:1212.2908v1 fatcat:emus35syzzfyxkvpmgu6ic42ua

Page 120 of Albion, a Journal of News, Politics, and Literature Vol. 3, Issue 15 [page]

1835 Albion, a Journal of News, Politics, and Literature  
Here he is at hiring and starting. “ For our own parts, the Commissioner and myself were desirous, before set- ting out, to procure another attendant well versed in wood-craft, who might serve as a hunter  ...  We were assured that he was ac- quainted with all parts of the country, having traversed it in all directions both in hunting and war parties ; that he would be of use both as guide and inter- yreter,  ... 

Digital Environments and the Future of Ethnography An Introduction [chapter]

Urte Undine Frömming, Steffen Köhn, Samantha Fox, Mike Terry, Urte Undine Frömming, Steffen Köhn, Samantha Fox, Mike Terry
2017 Digital Environments  
People who are addicted to Red Packets always say, "don't speak of Red Packets as being a solution", or "if one Red Packet is not enough, then send two".  ...  Prior to the emergence of WeChat Red Packets, the giving of Red Packets was normally confined to happy occasions. Today, Red Packets are also used in other situations.  ...  Juris, writes in his study: Reflections on #Occupy Everywhere, "...digital tools facilitated the diffusion of global justice movements and enhanced their scale of operation by allowing activists to more effectively  ... 
doi:10.14361/9783839434970-002 fatcat:gdok5nc5b5adrg7smb6ywtdy5y

Enabling Integrity for the Compressed Files in Cloud Server

S.K Prashanth
2013 IOSR Journal of Computer Engineering  
Also, 53 per cent of those who hired an agent failed the independent test versus 25 per cent of those who did not hire an agent.  ...  Worm attack causes an attacker to record to packets in one location and transmit them to another location and again retransmit them there into the network, since it launched in hidden mode.  ... 
doi:10.9790/0661-1240105 fatcat:suxx6aa5kneybiskk2z4n6guce

Dependency-based Mixture Language Models [article]

Zhixian Yang, Xiaojun Wan
2022 arXiv   pre-print
Extensive experiments and human evaluations show that our method can be easily and effectively applied to different neural language models while improving neural text generation on various tasks.  ...  These results further confirm the effectiveness our method.  ...  We left-shift the sentence by one step in the y-axis to better display the attention between the predicted next-token and the context in each row.  ... 
arXiv:2203.10256v1 fatcat:cnkmww3qdff5xjc7r2cozyy54a

Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs

Liakot Ali, Farshad, Jun Ma
2021 PLoS ONE  
Shift Keying (QPSK), etc.  ...  Cyclic prefix property of OFDM To reduce the effect of inter-symbol interference (ISI) due to multipath propagation OFDM prepends a copy of the end of the OFDM symbol into the beginning of the symbol known  ... 
doi:10.1371/journal.pone.0254903 pmid:34324521 pmcid:PMC8321131 fatcat:5z5k6ic4wzfylo55bdq5xprgvq

Speaker & Gavel Speaker & Gavel Special Issue on Forensic Pedagogy Genesis of a Special Issue Daniel Cronn-Mills (Re)Building a Team Culture "It's Only a Hired": An Instructional Look at the Forensic Ballot The First-Year Coach Hosting a Tournament Speaker & Gavel Special Issue Editor

Todd Holm, Kittie Grace, Todd Holm, Justin Foote, Larry Schnoor, Keith Bistodeau, Larrry Schnoor, Ben Stewart, Delta Sigma, Rho-Tau Kappa, Alpha, Daniel Cronn-Mills
2015 unpublished
Two coaches can work in shifts making sure one coach is before the students and another is present when the last student leaves.  ...  In her paper she points out too often forensics programs are the best kept secret on campus, the hidden crown jewel of scholastic success.  ...  A few ways to approach this are contained in the following questions: Thus, the fee necessary to cover the cost of hired judges must be handled very carefully so the tournament does not run in the red.  ... 
fatcat:7yznu57ys5cqbiturghowk2atm

Search for new physics with atoms and molecules

M. S. Safronova, D. Budker, D. DeMille, Derek F. Jackson Kimball, A. Derevianko, Charles W. Clark
2018 Reviews of Modern Physics  
The photon field and the hidden-photon field couple to standard model particles in the essentially the same way: observable effects of the hidden-photon field are nearly entirely through the effects of  ...  However, they still can not entirely explain the Keck/HIRES result (19).  ... 
doi:10.1103/revmodphys.90.025008 fatcat:swok63t6ibgxbhlgtkhiqczw3y

Cortical reliability amid noise and chaos [article]

Max Nolte, Michael W Reimann, James G King, Henry Markram, Eilif B Muller
2018 bioRxiv   pre-print
We show that this effect relies on recurrent cortical connectivity, and is not a simple effect of feed-forward thalamocortical input.  ...  The majority of the shifted spikes were shifted by less than 0.05 ms (59.1%: < 0.05; 33.1%: < 1 ms.; 5.5%: < 20 ms; 1.8%: < 100 s; 0.5%: < 1 s). Finally, 3 ± 2 neurons had extra or missing spikes.  ...  (B3) Quantifying edge effects.  ... 
doi:10.1101/304121 fatcat:wxvbsqivgffntdzmnn5bzfor4i

From Zero to Hero: How Zero-Rating Became a Debate about Human Rights

Linnet Taylor
2016 IEEE Internet Computing  
The red curve shows the measured routes.  ...  An example can help to understand this effect.  ...  Finding the best computing job or hire shouldn't be left to chance.  ... 
doi:10.1109/mic.2016.88 fatcat:imrhaaoac5gifool7wjegaxl5q

Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alcohol Nanocomposite Thin Films

A.M. Shehap, Dana.S. Akil
2015 International Journal of Science and Engineering Applications  
This protocol is a true thin client protocol because it has very low bandwidth requirements and shifts all processing demands to the RFB server instead of the RFB client (Kerai, 2010).  ...  Effects of low frequency noise in closed space on the human., In: Proceedings of the Inter-Noise 2011. The 40th International Congress and Exposition on Noise Control Engineering.  ...  transmission data rate, DIFS stands for the Distributed Inter-Frame Spacing , SIFS stands for the Short Inter-Frame Spacing and TACK represents the transmission delay of acknowledge frame.  ... 
doi:10.7753/ijsea0404.1001 fatcat:2fr7pbjz5ngsplez7cvthiht5e
« Previous Showing results 1 — 15 out of 951 results