Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,536 papers from all fields of science
Search
Sign In
Create Free Account
POST (HTTP)
Known as:
HTTP POST
, POST request
, Post
Expand
In computing, POST is one of many request methods supported by the HTTP protocol used by the World Wide Web. By design, the POST request method…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Adobe Flash Player
Create, read, update and delete
Denial-of-service attack
Drupal
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Multi-Temporal Site-Specific Weed Control of Cirsium arvense (L.) Scop. and Rumex crispus L. in Maize and Sugar Beet Using Unmanned Aerial Vehicle Based Mapping
R. Mink
,
A. Dutta
,
+4 authors
R. Gerhards
2018
Corpus ID: 90446008
Sensor-based weed mapping in arable fields is a key element for site-specific herbicide management strategies. In this study, we…
Expand
2017
2017
Rational Proofs of Space-Time
T. Moran
,
I. Orlov
2017
Corpus ID: 28592547
We introduce a new cryptographic primitive: Proofs of Space-Time (PoSTs) and construct a practical protocol for implementing…
Expand
2016
2016
How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection
Nikhil Tripathi
,
N. Hubballi
,
Yogendra Singh
ARES
2016
Corpus ID: 17516170
Slow HTTP Denial of Service (DoS) is an application layer DoS attack in which large number of incomplete HTTP requests are sent…
Expand
2016
2016
Analysis of web application security mechanism and Attack Detection using Vulnerability injection technique
R. V. Bhor
,
H. Khanuja
International Conference on Computing…
2016
Corpus ID: 18479503
The internet is growing rapidly and interconnected different wired and wireless networks with each other. By using a client…
Expand
Review
2014
Review
2014
Behavioral Ethics: Can It Help Lawyers (and Others) Be Their Best Selves?
R. Prentice
2014
Corpus ID: 54531210
Using the principles of behavioral psychology and related fields, marketers have changed human behavior in order to increase…
Expand
2013
2013
Does PCAOB Inspection Exposure Affect Auditor Reporting Decisions
Phillip T. Lamoreaux
2013
Corpus ID: 166678838
To gain insight into the Public Company Accounting Oversight Board’s (PCAOB) impact on audit quality, this study investigates the…
Expand
Highly Cited
2013
Highly Cited
2013
ICT investments and productivity: Measuring the contribution of ICTS to growth
V. Spiezia
2013
Corpus ID: 31253206
This study uses an econometric approach to estimate the contribution of three types of ICT investments (computer, software and…
Expand
2010
2010
Design and Performance of a Webmail Server on Bare PC
Patrick Appiah-Kubi
,
R. Karne
,
A. Wijesinha
IEEE International Conference on High Performance…
2010
Corpus ID: 10186990
We describe a Webmail server that runs on a bare PC without an operating system (OS) or kernel, and give details of its…
Expand
Highly Cited
1998
Highly Cited
1998
Addressing the challenges of web data transport
V. Padmanabhan
,
R. Katz
1998
Corpus ID: 2113165
In just a few years since its inception, the World Wide Web has grown to be the most dominant application in the Internet. Since…
Expand
1997
1997
Scenes from the Southside: A Desegregation Drama in Five Acts
Jennifer E Spreng
1997
Corpus ID: 96480679
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE