• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 39
Next 10 →

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

by Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Technische Universität München, Freie Universität Berlin
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Name:

by Vorgelegt Am Januar, Oliver Schneider, Fachbereich Informatik, Oliver Schneider Contents
"... ..."
Abstract - Add to MetaCart
Abstract not found

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
reconstruction by humans of the sources and purpose of their action, always constrained but never pre-scripted. So, production can be oriented towards glorifying God (and punishing the in dels), as well as religious belief can be twisted to the service of capital accumulation. What actually happens, when

Has the ice man arrived? Tact on the Internet

by Jonathan Grudin
"... Several years ago at Bellcore, researchers thought it would be great to access newsgroup contributions by people they admired. They wrote a program to archive and search newsgroups. They tested it by entering the names of a few colleagues. "We soon found," one recounted, "that we wer ..."
Abstract - Add to MetaCart
available; also, we read what people say and how others respond, receive indications of what people have done or are doing, and so on. The Internet's greatness resides in this extremely efficient spread of information. It is efficient, but it is not discrete, not tactful. Even when communicating

Crossing a digital divide: AACR2 and unaddressed problems of networked resources. Retrieved November 20, 2004, from http://www.loc.gov/catdir/bibcontrol/beacom_paper.html

by Matthew Beacom - Data & Knowledge Engineering , 2000
"... INTRODUCTION The advent of the World Wide Web marks profound changes in how we use sources of information such as databases, indexes, and archives and how we use representations of knowledge such as maps, pictures, sounds, books, and journal articles. We are using the Web to change how we communica ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
was based on our experiences with traditional-tangible--media. On the other side-the one we are crossing to-we have the new media, the Web, the Internet. The new media are intangible, untouchable. We still have such familiar kinds of content as texts, images, and sounds, but with a difference. Our

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law

guidance of Prof. Raj Jain)

by A Survey Of Kerberos V, Public-key Kerberos
"... Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aime ..."
Abstract - Add to MetaCart
Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. Also, Kerberos has continued to evolve as new functionalities are added to the basic protocol and one of well-known these protocols is PKINIT. First, I review and analyze the structure of Kerberos recently proposed and the cross-realm authentication model of Kerberos. Also, I discuss PKINT, an extension version of Kerberos, which modifies the basic protocol to allow public-key authentication. Although Kerberos has been proven its strengths so far, it also has a number of limitations and some flaws. I dedicate my efforts to an analysis of PKINIT and mainly focus on a number of vulnerability, flaws and attacks lately discovered on Kerberos as well as PKINIT in this paper. Lastly, I introduce several possible solutions to

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 39
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University