Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Surbhi Dangi
In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …
Analyzing WiFi P2p In The Context Of A Hangman Game, William L. Honig
Analyzing WiFi P2p In The Context Of A Hangman Game, William L. Honig
William L Honig
WiFi P2P , which complies with the WiFi Alliance's WiFi Direct™ certification
2 3
program, is a relatively new addition to wireless communications systems. It is now
supported in Android operating system (since version 4.0). In theory, WiFi Direct offers
advantages for ad hoc communications between mobile apps. A key goal of this project
was to evaluate the ability of WiFi P2P for interconnecting mobile apps by using a
common game suitable to mobile screens and devices.
The application allows the user to interconnect two devices using WiFi P2P and
play the classic hangman game. The players search for devices …
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Maurice Dawson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …