LISA: Lightweight context-aware IoT service architecture

SP Gochhayat, P Kaliyar, M Conti, P Tiwari… - Journal of cleaner …, 2019 - Elsevier
Abstract Internet-of-Things (IoT) promises to provide services to the end users by connecting
physical things around them through Internet. The conventional services build for web are …

Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements

AK Al-Ani, M Anbar, S Manickam, CY Wey… - Arabian Journal for …, 2019 - Springer
Abstract The deployment of Internet Protocol Version 6 (IPv6) has progressed at a rapid
pace. IPv6 has introduced new features and capabilities that is not available in IPv4 …

e-Dictionaries in a Network of Information Tools in the e-Environment: e-Woordeboeke in'n netwerk van inligtingswerktuie in die e-omgewing.

TJD Bothma, RH Gouws - Lexikos, 2020 - ajol.info
Traditional dictionaries offer curated data to users. Users should therefore be able to find the
correct data to solve their information need. However, users don't necessarily know the exact …

A web-based sensor network system with distributed data processing approach via web application

T Fukatsu, T Kiura, M Hirafuji - Computer Standards & Interfaces, 2011 - Elsevier
We have proposed a Web-based sensor network constructed of Web-based sensor nodes
and a remote management system. The Web-based sensor nodes consist of communication …

Expanding the use of corpora in the lexicographic process of online dictionaries

RH Gouws, M Piosik, J Taborek… - Korpora in der …, 2021 - degruyter.com
The transition from printed to online dictionaries demands a new and critical look at the
prevailing theory of lexicography that was primarily formulated for printed dictionaries. This …

[PDF][PDF] Significance of duplicate address detection mechanism in Ipv6 and its security issues: A survey

SU Rehman, S Manickam - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
IPv6 deployment is currently under way at a rapid pace. IPv6 introduced new features and
capabilities lacking in IPv4 but as with any new technology, there are always security risks …

Dynamic pull-based load balancing for autonomic servers

R Badonnel, M Burgess - NOMS 2008-2008 IEEE Network …, 2008 - ieeexplore.ieee.org
The growing autonomy of servers may significantly deteriorate the performance of traditional
load-balancing strategies. Indeed, the authoritative decision belongs to the load-balancer …

Behavioral characteristics of spammers and their network reachability properties

Z Duan, K Gopalan, X Yuan - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
By analyzing a two-month trace of more than 25 million emails received at a large US
university campus network, of which more than 18 million are spam messages, we …

A pull model IPv6 duplicate address detection

G Yao, J Bi, S Wang, Y Zhang… - IEEE Local Computer …, 2010 - ieeexplore.ieee.org
In IPv6 network, before configuring any address, a node must perform Duplicate Address
Detection (DAD) to ensure the address is unique on link. However, original DAD is …

[PDF][PDF] DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.

AK Al-Ani, M Anbar, S Manickam, A Al-Ani - J. Commun., 2018 - researchgate.net
Duplicate Address Detection (DAD) is one of the core procedures in Internet Protocol
version 6 (IPv6). It allows all the nodes locate on the same link to communicate and join the …