Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Multipath TCP: from theory to practice
The IETF is develo** a new transport layer solution, MultiPath TCP (MPTCP), which
allows to efficiently exploit several Internet paths between a pair of hosts, while presenting a …
allows to efficiently exploit several Internet paths between a pair of hosts, while presenting a …
Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model
Directly modeling the inherent hierarchy and shared structures of human behaviors, we
present an application of the hierarchical hidden Markov model (HHMM) for the problem of …
present an application of the hierarchical hidden Markov model (HHMM) for the problem of …
[SÁCH][B] Professional Linux kernel architecture
W Mauerer - 2010 - books.google.com
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in
Professional Linux Kernel Architecture, a guide to the kernel sources and large number of …
Professional Linux Kernel Architecture, a guide to the kernel sources and large number of …
Analysis of open source drivers for IEEE 802.11 WLANs
M Vipin, S Srikanth - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
The purpose of this study is to analyze the open source IEEE 802.11 wireless local area
network (WLAN) stack implementation for further enhancement and implementations. We …
network (WLAN) stack implementation for further enhancement and implementations. We …
The performance analysis of Linux networking–packet receiving
W Wu, M Crawford, M Bowden - Computer Communications, 2007 - Elsevier
The computing models for high-energy physics experiments are becoming ever more
globally distributed and grid-based, both for technical reasons (eg, to place computational …
globally distributed and grid-based, both for technical reasons (eg, to place computational …
Connecting the world of embedded mobiles: The riot approach to ubiquitous networking for the internet of things
The Internet of Things (IoT) is rapidly evolving based on low-power compliant protocol
standards that extend the Internet into the embedded world. Pioneering implementations …
standards that extend the Internet into the embedded world. Pioneering implementations …
GuaranTEE: Introducing control-flow attestation for trusted execution environments
Many cloud providers offer Trusted Execution Environments (TEEs) to protect critical data
and processes from high privileged adversaries. Unfortunately, TEEs can only be attested at …
and processes from high privileged adversaries. Unfortunately, TEEs can only be attested at …
[PDF][PDF] Linux Software Router: Data Plane Optimization and Performance Evaluation.
Recent technological advances provide an excellent opportunity to achieve truly effective
results in the field of open Internet devices, also known as Open Routers or ORs. Even …
results in the field of open Internet devices, also known as Open Routers or ORs. Even …
A network-based intrusion detection and prevention system with multi-mode counteractions
RM Yousufi, P Lalwani… - … Conference on Innovations …, 2017 - ieeexplore.ieee.org
Recently, as result of dramatic connectivity between devices from a computer to mobile
systems, security of information and availability of the services become more and more …
systems, security of information and availability of the services become more and more …
[PDF][PDF] Live memory forensics on android with volatility
H Macht - Friedrich-Alexander University Erlangen-Nuremberg, 2013 - homac.github.io
More and more people rely on smartphones to manage their personal data. For many, it has
become a constant companion for a variety of tasks, such as making calls, surfing the web …
become a constant companion for a variety of tasks, such as making calls, surfing the web …