992 resultados para drive-thru internet
Resumo:
Sistema MIPWeb. Arquitetura do sistema. Versão cliente ou local. Versão servidor. Requisitos computacionais. Dados gerenciados. Operação do sistema. Operações realizadas na versão local do sistema. Operações realizadas na versão servidor.
Resumo:
Questões sobre arquitetura da aplicação. Ambiente Web e a tecnologia da mapas. O que já existe no mercado.
Resumo:
Os Sistemas de Informação Geográfica (SIG) promoveram uma revolução nas operações de armazenamento e manipulação de informações espaciais e a Internet fomenta a atividade de disseminação desse tipo de informação para um público mais numeroso, heterogêneo e com diferentes interesses.
Resumo:
2009
Resumo:
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the IoT and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to secure multicast communications. Our protocol is simple and it reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy. To assess our protocol, we conduct a detailed analysis with respect to its communcation and storage costs. This analysis is validated through simulation to highlight energy gains. The obtained results show that our protocol outperforms its peers with respect to keying overhead and the mobility of members.
Resumo:
Diane Rowland, Griping, Bitching and Speaking Your Mind: Defamation and Free Expression on the Internet, Pennsylvania State Law Review Symposium Issue 110, no. 3 (2006): 519?538; RAE2008
Resumo:
Kohl, U. (2002). Eggs, Jurisdiction and the Internet', International and Comparative Law Quarterly, 51 (3), 556-582. RAE2008
Resumo:
International Review of Law, Computers & Technology, Volume 17, Issue 2 July 2003 , pages 163 - 174 RAE2008
Resumo:
null RAE2008
Resumo:
Salmon, Naomi, 'The Internet and the Human Right to Food: The European Rapid Alert System for Food and Feed', Information and Communications Technology Law, (2005) 14 (1), pp. 43-57 Special Issue: GATED COMMUNITIES RAE2008
Resumo:
Jones, E. H. G., Thomas, Ned, and King, Alan, 'Machine Translation and the Internet', Mercator Media Forums (2001) 5(1) pp.84-98 RAE2008
Resumo:
Wydział Neofilologii: Instytut Filologii Angielskiej
Resumo:
The Google AdSense Program is a successful internet advertisement program where Google places contextual adverts on third-party websites and shares the resulting revenue with each publisher. Advertisers have budgets and bid on ad slots while publishers set reserve prices for the ad slots on their websites. Following previous modelling efforts, we model the program as a two-sided market with advertisers on one side and publishers on the other. We show a reduction from the Generalised Assignment Problem (GAP) to the problem of computing the revenue maximising allocation and pricing of publisher slots under a first-price auction. GAP is APX-hard but a (1-1/e) approximation is known. We compute truthful and revenue-maximizing prices and allocation of ad slots to advertisers under a second-price auction. The auctioneer's revenue is within (1-1/e) second-price optimal.
Resumo:
Internet Traffic Managers (ITMs) are special machines placed at strategic places in the Internet. itmBench is an interface that allows users (e.g. network managers, service providers, or experimental researchers) to register different traffic control functionalities to run on one ITM or an overlay of ITMs. Thus itmBench offers a tool that is extensible and powerful yet easy to maintain. ITM traffic control applications could be developed either using a kernel API so they run in kernel space, or using a user-space API so they run in user space. We demonstrate the flexibility of itmBench by showing the implementation of both a kernel module that provides a differentiated network service, and a user-space module that provides an overlay routing service. Our itmBench Linux-based prototype is free software and can be obtained from http://www.cs.bu.edu/groups/itm/.
Resumo:
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp contrast to traditional brute-force, sustained high-rate DoS attacks, as well as recently proposed attacks that exploit specific protocol settings such as TCP timeouts. We exemplify what we term as Reduction of Quality (RoQ) attacks by exposing the vulnerabilities of common adaptation mechanisms. We develop control-theoretic models and associated metrics to quantify these vulnerabilities. We present numerical and simulation results, which we validate with observations from real Internet experiments. Our findings motivate the need for the development of adaptation mechanisms that are resilient to these new forms of attacks.