Telnet
National Institutes of Health
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
As intrusion detection techniques based on malicious traffic signature are unable to detect unknown attacks, the methods derived…
Most of the Organizations such as public and private sectors have started deploying computers to their employees to perform their…
There are a number of methods that can be used to efficiently build dimensional models for business intelligence systems using…
Current paper attempts to answer an “exotic” question of usability of OPACs'. The possibilities of implementation of a web…
We present a portable Ethernet frame analyzer for monitoring and managing IEEE 802.3 Ethernet - Fast Ethernet - networks. The…
Foreword. Preface. 1.Introduction to the Internet. What Is the Internet? History of the Internet. The Internet Architecture…
Introduction Digital library services: an overview of the hybrid approach Staffing the special library Organising access to…
The LANDMAP Project has created the first IfSAR DEM covering the entire British Isles. That DEM and associated orthorectified ERS…
Abstract In this paper we present an extension of the TCP stack that allows a sequence of TCP connections between the same…