Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ident protocol

Known as: Identd, Identification protocol, Port 113 
The Ident Protocol (Identification Protocol, IDENT), specified in , is an Internet protocol that helps identify the user of a particular TCP… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
The pollution of the environment with microplastics (plastic pieces ,5 mm) is a problem of increasing concern. However, although… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Review
2011
Review
2011
DNA barcoding is a technique for identifying organisms based on a short, standardized fragment of genomic DNA. The standardized… Expand
Highly Cited
2010
Highly Cited
2010
We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which… Expand
  • figure 1
  • table I
  • figure 3
  • figure 5
  • figure 4
Highly Cited
2009
Highly Cited
2009
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2000
Highly Cited
2000
  • P. Grünbacher
  • Proceedings 11th International Workshop on…
  • 2000
  • Corpus ID: 1200469
The EasyWinWin methodology supports collaborative elaboration, prioritization, and negotiation of system requirements. The… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
Review
1998
Review
1998
  • V. Paxson
  • Comput. Networks
  • 1998
  • Corpus ID: 215753449
Abstract We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network… Expand
  • figure 1
  • figure 2
1993
1993
class $DIST{T} is -supertype of all distributed data structures to be used -with the dist-statement nr_of_chunks: INT… Expand
Highly Cited
1990
Highly Cited
1990
ABSTRACTIn this article the construct of generalized expectancies for internal versus external control of reinforcement is used… Expand
Highly Cited
1989
Highly Cited
1989
Suppose a new high growth segment opens up in your industry. Should you enter that segment? Many other firms are likely to enter… Expand
Highly Cited
1989
Highly Cited
1989
A precise definition is provided for general configuration tasks. Two important assumptions are identified: (i) functional… Expand