Telnet
National Institutes of Health
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
With the wireless technologies being widely used, it is for sure that all types of wireless networking will become more and more…
Intruders on the Internet often prefer to launch network intrusions indirectly, i.e., using a chain of hosts on the Internet as…
センター利用者の皆様は,インターネットにおける通信内容は他者に傍受される可能性がある事を御存知でしょ うか.例えば通信にイーサネットを用いる場合,他の計算機から通信内容を傍受することが可能です.イーサネッ トは同じ通信線を共有して通信を行なう CSMA/CD…
Abstract Since August 1995, near-infrared images of Neptune have regularly been obtained with the University-of-Hawaii telescope…
A MUD (Multi-User Dungeon or, sometimes, Multi-User Dimension) is a network-accessible, multi-participant, user-extensible…
The chapter begins by describing the fundamental concepts of hypertext and gives a brief overview of the different philosophical…
In the last few years, an explosive growth in computer telecommunications has been brought about by advances in computer…
Analyzes 3 million TCP connections that occurred during 15 wide-area traffic traces. The traces were gathered at five "stub…
The protocol discussed in this paper was developed by many members of the ARPANET community starting in 1969 and continuing…