نتایج جستجو برای: http
تعداد نتایج: 132199 فیلتر نتایج به سال:
Petri nets are often used to model and analyze workflows. Many workflow languages have been mapped onto Petri nets in order to provide formal semantics or to verify correctness properties. Typically, the so-called Workflow nets are used to model and analyze workflows and variants of the classical soundness property are used as a correctness notion. Since many workflow languages have cancelation...
I argue that Gregg Rosenberg’s panexperientialism is either extremely implausible or irrelevant to the mystery of consciousness by introducing metaphysical and conceptual objections to his appeal to the notion of ‘protoconsciousness’.
This paper presents a HTTP based multimedia content streaming architecture able to provide large scale WebTV services to end users connected over several access network technologies. The architecture features smooth Rate Adaptation, context Personalization information (Channel Suggestions), fast program channel switching, Network Portability (Vertical Handover) and Terminal Portability capabili...
This paper presents a new HTTP traffic model based on the aggregation concept. The model development, evaluation and application are shown. In addition to the basic HTTP traffic characteristics, the traffic model has an easy and accurate load control. Some examples are provided to present the traffic model usage.
Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HTTP streams that is surprisingly effective in identifying the source of the traffic. An attacker starts by creating a profile of the statistical characteristics of web requests from interesting sites, including distributions of p...
This document describes a set of private header (P-header) Session Initiation Protocol (SIP) fields used by the 3GPP, along with their applicability, which is limited to particular environments. The P-header fields are used for a variety of purposes within the networks that the partners implement, including charging and information about the networks a call traverses. This document obsoletes RF...
Web browsers are the most common tool to perform various activities over the internet. Along with normal mode, all modern browsers have private browsing mode. The name of the mode varies from browser to browser but the purpose of the private mode remains same in every browser. In normal browsing mode, the browser keeps track of users’ activity and related data such as browsing histories, cookie...
In this short paper we briefly describe the results of analyzing a large-scale data set of actual YouTube stall patterns collected world-wide as part of Columbia University’s YouSlow project, and how we used it to create a simple model for generating realistic stalling patterns with a given number of stalls, a given average stall duration, and a pattern structure (describing the relative length...
The ability of communication technologies to favor certain societal concerns, such as privacy, is widely recognized. This paper argues a central factor in how a technology favors a societal concern stems from its institutional origin. A case study of the cookies technology, which allows web sites to maintain surveillance on their visitors, shows the differing influences of universities, firms, ...
We study the limit state of the inhomogeneous Ginzburg-Landau model as the Ginzburg-Landau parameter κ = 1/ →∞, and derive an equation to describe the limit state. We analyze the properties of solutions of the limit equation, and investigate the convergence of (local) minimizers of the Ginzburg-Landau energy with large κ. Our results verify the pinning effect of an inhomogeneous superconductor ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید