نتایج جستجو برای: http

تعداد نتایج: 132199  

2010
Blazej Bulka Evren Sirin

Using OWL2 reasoning services with Pellet requires either interacting with Pellet by using the command line or writing code in Java to invoke its interfaces. Both of these solutions can be impractical in some cases. We present a solution for easier, lightweight integration of Pellet, especially in enterprise environments, by providing access to reasoning services using a RESTful HTTP interface....

Journal: :RFC 2015
Rifaat Shekh-Yusef David Ahrens Sophie Bremer

The Hypertext Transfer Protocol (HTTP) provides a simple challenge-response authentication mechanism that may be used by a server to challenge a client request and by a client to provide authentication information. This document defines the HTTP Digest Authentication scheme that can be used with the HTTP authentication mechanism.

Abtahi, Seyed Hamidreza, Hashemi, Seyed Mostafa, Nemati, Shadman, Okhovvat, Ahmadreza, Yaghoubi Hamgini, Maryam,

This is a Correction to:  http://irjns.org/article-1-52-en.html&sw=Evaluation+of+Two+Facial+Nerve+Landmarks+Frequency+in+Parotidectomy

2010
Yuchen Zhou David Evans

HTTP-only cookies were introduced eight years ago as a simple way to prevent cookie-stealing through cross-site scripting attacks. Adopting HTTP-only cookies seems to be an easy task with no significant costs or drawbacks, but many major websites still do not use HTTP-only cookies. This paper reports on a survey of HTTP-only cookie use in popular websites, and considers reasons why HTTP-only co...

2006
Joseph U. Neisser

Subjectivity is essential to consciousness. But though subjectivity is necessary for consciousness it is not sufficient. In part one I derive a distinction between conscious awareness and unconscious subjectivity from a critique of Block’s (1995) distinction between access and phenomenal consciousness. In part two I contrast two historically influential models of unconscious thought: cognitive ...

2013
Henning Klevjer Kent A. Varmedal Audun Jøsang

User authentication to a server is typically done by presenting a username and a password in some protected form to the server, and having the server verify that those credentials correspond to an identity previously registered and authorized for access. It is crucial that attackers never get access to operational passwords, which typically is achieved by encryption in transit, or through a cha...

2006
Mark Rowlands Kevin O’Regan

This paper explores the concept of sensorimotor activity that is central to the enactive model of visual perception developed in Alva Noë’s book, Action in Perception. The appeal to sensorimotor activity is, I shall argue, subject to a dilemma. On one interpretation, such activity presupposes representational states, and therefore is unable to aid us in the project of understanding how an organ...

2010
Franziska Roesner Ivayla Dermendjieva

In this project, we examine HTTP-level duplication. We first report on our initial measurement study, analyzing the amount and types of duplication in the Internet today. We then discuss several opportunities for deduplication: in particular, we implement two versions of a simple server-client architecture that takes advantage of HTML5 client-side storage for value-based caching and deduplication.

Journal: :Int. J. Adv. Comp. Techn. 2010
Nils Gruschka Luigi Lo Iacono Namhi Kang

The steadily increasing beautification of the Web causes some unique issues. Web pages following contemporary visual design patterns require several tens of resources in order to be rendered. This poses challenges in terms of data transfer costs and (user-perceived) latency in particular. This paper proposes an approach to address this issue by reducing the amount of required requests per page ...

2017
Yan Jia Yuqing Zhang

Currently, HTTP Strict Transport Security, used to harden HTTPS, has gained increasing adoption in browsers and servers. We conduct an in-depth empirical security study of HSTS implementation in browsers, then successfully discover several new flaws in storage implementation and interaction with certificates. These flaws enable cookies theft, DoS, and bypassing problems. Moreover, we point out ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید