LISA: Lightweight context-aware IoT service architecture
Abstract Internet-of-Things (IoT) promises to provide services to the end users by connecting
physical things around them through Internet. The conventional services build for web are …
physical things around them through Internet. The conventional services build for web are …
Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements
Abstract The deployment of Internet Protocol Version 6 (IPv6) has progressed at a rapid
pace. IPv6 has introduced new features and capabilities that is not available in IPv4 …
pace. IPv6 has introduced new features and capabilities that is not available in IPv4 …
e-Dictionaries in a Network of Information Tools in the e-Environment: e-Woordeboeke in'n netwerk van inligtingswerktuie in die e-omgewing.
TJD Bothma, RH Gouws - Lexikos, 2020 - ajol.info
Traditional dictionaries offer curated data to users. Users should therefore be able to find the
correct data to solve their information need. However, users don't necessarily know the exact …
correct data to solve their information need. However, users don't necessarily know the exact …
A web-based sensor network system with distributed data processing approach via web application
T Fukatsu, T Kiura, M Hirafuji - Computer Standards & Interfaces, 2011 - Elsevier
We have proposed a Web-based sensor network constructed of Web-based sensor nodes
and a remote management system. The Web-based sensor nodes consist of communication …
and a remote management system. The Web-based sensor nodes consist of communication …
Expanding the use of corpora in the lexicographic process of online dictionaries
RH Gouws, M Piosik, J Taborek… - Korpora in der …, 2021 - degruyter.com
The transition from printed to online dictionaries demands a new and critical look at the
prevailing theory of lexicography that was primarily formulated for printed dictionaries. This …
prevailing theory of lexicography that was primarily formulated for printed dictionaries. This …
[PDF][PDF] Significance of duplicate address detection mechanism in Ipv6 and its security issues: A survey
SU Rehman, S Manickam - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
IPv6 deployment is currently under way at a rapid pace. IPv6 introduced new features and
capabilities lacking in IPv4 but as with any new technology, there are always security risks …
capabilities lacking in IPv4 but as with any new technology, there are always security risks …
Dynamic pull-based load balancing for autonomic servers
R Badonnel, M Burgess - NOMS 2008-2008 IEEE Network …, 2008 - ieeexplore.ieee.org
The growing autonomy of servers may significantly deteriorate the performance of traditional
load-balancing strategies. Indeed, the authoritative decision belongs to the load-balancer …
load-balancing strategies. Indeed, the authoritative decision belongs to the load-balancer …
Behavioral characteristics of spammers and their network reachability properties
By analyzing a two-month trace of more than 25 million emails received at a large US
university campus network, of which more than 18 million are spam messages, we …
university campus network, of which more than 18 million are spam messages, we …
A pull model IPv6 duplicate address detection
In IPv6 network, before configuring any address, a node must perform Duplicate Address
Detection (DAD) to ensure the address is unique on link. However, original DAD is …
Detection (DAD) to ensure the address is unique on link. However, original DAD is …
[PDF][PDF] DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.
Duplicate Address Detection (DAD) is one of the core procedures in Internet Protocol
version 6 (IPv6). It allows all the nodes locate on the same link to communicate and join the …
version 6 (IPv6). It allows all the nodes locate on the same link to communicate and join the …