Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
- Computer Law (2)
- Electrical and Computer Engineering (2)
- Information Security (2)
-
- Law (2)
- Business (1)
- Business Law, Public Responsibility, and Ethics (1)
- Business Organizations Law (1)
- Computational Engineering (1)
- Consumer Protection Law (1)
- Digital Communications and Networking (1)
- Forensic Science and Technology (1)
- Internet Law (1)
- Law and Economics (1)
- Law and Society (1)
- Legal Studies (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Social and Behavioral Sciences (1)
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Diseño E Implementación De Un Sistema De Monitoreo Y Control Vía Internet Para Una Planta Piloto De Refrigeración, Edwin Alexander Rincón Molina, Ivan Dario Luengas Castañeda
Diseño E Implementación De Un Sistema De Monitoreo Y Control Vía Internet Para Una Planta Piloto De Refrigeración, Edwin Alexander Rincón Molina, Ivan Dario Luengas Castañeda
Ingeniería en Automatización
En el presente documento se presenta el Diseño E Implementación De Un Sistema De Monitoreo Y Control Vía Internet Para Una Planta Piloto De Refrigeración. Durante el transcurso del proyecto se tuvo como objetivo el monitoreo vía internet de a planta piloto y como visualizar y controlar las variables en el sistema.
Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch
Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch
Theses and Dissertations
Malicious logic, specifically worms, has caused monetary expenditure problems to network users in the past. Worms, like Slammer and Code Red, have infected thousands of systems and brought the Internet to a standstill. This research examines the ability of the original Slammer worm, the Slammer based routing worm proposed by Zou et al, and a new Single Slash Eight (SSE) routing worm proposed by this research to infect vulnerable systems within a given address space. This research investigates the Slammer worm's ability to generate a uniform random IP addresses in a given address space. Finally, a comparison of the speed …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Law Faculty Scholarship
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin
An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin
Electrical & Computer Engineering and Computer Science Faculty Publications
Hashing algorithms have been widely adopted for fast address look-up, which involves a search through a database to find a record associated with a given key. Hashing algorithms transforms a key into a hash value hoping that the hashing renders the database a uniform distribution with respect to the hash value. The closer to uniform hash values, the less search time required for a query. When the database is key-wise uniformly distributed, any regular hashing algorithm (bit-extraction, bit-group XOR, etc.) leads to a statistically perfect uniform hash distribution. When the database has keys with a non-uniform distribution, performance of regular …