نتایج جستجو برای: http

تعداد نتایج: 132199  

2012
Fatma E. Agha Mohamed O. El-Badry Dina A. A. Hassan Amira Abd Elraouf

Excessive fluoride ingestion has been identified as a risk factor for fluorosis and oxidative stress. The present study was aimed to evaluate vitamin E in combination with methionine and Lcarnosine as a potential natural antioxidant to mitigate the effects of sodium fluoride on hematological indices, DNA damage, pancreatic digestive enzyme activities and histological structure of pancreas throu...

2001
Joachim Charzinski

Recent work has emphasized the importance of pure delay components as well as rate components in the user perceived performance of elastic Internet applications, namely Web browsing. “Fun factors” have been previously introduced to describe the obtained performance with respect to the maximum possible performance on a scale of zero (no fun) to one (maximum fun). In this paper, several options f...

2007
Manuel Ebert Maxime Louvel Vassilis Vassiliades

2 Robot Design 3 2.1 Mechanical Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Localisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Rubbish detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.4 Classification of Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.5 The main control cycle . ....

2003
Constantine Daicos Scott Knight

It has been understood for some time that arbitrary data, including the communications associated with malicious backdoors and Trojan horses, can be tunnelled by subverting the HTTP protocol. Although there are a number of demonstration programs openly available, the risks associated with this vulnerability have not been characterised in the literature. This research investigates the nature of ...

Journal: :Computer Networks 2010
Chuan Yue Mengjun Xie Haining Wang

HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies have raised public concerns on Internet privacy because they can be exploited by third-parties to track user behaviors and build user profiles. In addition, stolen cookies may also incur severe security problems. However,...

2000
Clinton Wong

That's it, a book to wait for in this month. Even you have wanted for long time for releasing this book http pocket reference hypertext transfer protocol; you may not be able to get in some stress. Should you go around and seek fro the book until you really get it? Are you sure? Are you that free? This condition will force you to always end up to get a book. But now, we are coming to give you e...

2006
Jörg Ott Dirk Kutscher

Mobile users traveling by car, bus, or train usually experience varying connectivity characteristics while they are on their way, including unpredictable (loss of) network access, changes in a data rate, and the like. In short, they operate in a challenged networking environment that is not well suited for many Internet applications. While different approaches have been developed to specificall...

2016
Matteo Varvello Kyle Schomp David Naylor Jeremy Blackburn Alessandro Finamore Konstantina Papagiannaki

Version 2 of the Hypertext Transfer Protocol (HTTP/2) was finalized in May 2015 as RFC 7540. It addresses well-known problems with HTTP/1.1 (e.g., head of line blocking and redundant headers) and introduces new features (e.g., server push and content priority). Though HTTP/2 is designed to be the future of the web, it remains unclear whether the web will—or should—hop on board. To shed light on...

2000
R. Khare

This memo explains how to use the Upgrade mechanism in HTTP/1.1 to initiate Transport Layer Security (TLS) over an existing TCP connection. This allows unsecured and secured HTTP traffic to share the same well known port (in this case, http: at 80 rather than https: at 443). It also enables "virtual hosting," so a single HTTP + TLS server can disambiguate traffic intended for several hostnames ...

Journal: :Zeitschrift für Australienstudien / Australian Studies Journal 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید