The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The honeybee relies on its sensitive olfaction to perform the foraging activities in the field. In the antennal chemoreception system of honeybee, odorant-binding proteins (OBPs) and chemosensory protein (CSPs) are major two protein families capable of binding with some plant volatiles and chemical ligands. However, the chemical binding interaction of plant odors with OBPs and CSPs in the honeybee...
The capabilities technique offers a new direction to defend against DDoS attacks. As a typical capabilities scheme, Traffic Validation Architecture (TVA) shows much good performances. However, the management of capabilities in TVA has not been fully taken into account and results in more difficult in actual deployment. So we propose a novel scheme based on index and the Least-Recently-Used (LRU) algorithm...
With the continuous development and sharpening of smart terminals, the Android Operating System has gradually become one of the mainstream system on mobile platforms for its Open Source and superiority. Since users on-going increasing, it has attracted more and more developers to take part in the development of Android applications. Along with the prosperity of games industry, the games development...
The ongoing development of information security makes the traditional single-system experimental environment facing severe challenges. It is insufficient to meet the requirements of multi-machine or multi-system. And it is difficult to accomplish some kinds of experiments under a traditionally experimental desktop environment. Therefore, we try to utilize a new experimental mode, using Virtual Machine...
Distributed Denial of Service (DDoS) attacks have resulted in huge economic loss and great harms to networks. In this paper, we in-depth analyze the shortcomings and lacks of capabilities existing in the router-based Traffic Validation Architecture (TVA) scheme and propose a new scheme with adjustable pre-capabilities and capabilities. It is able to effectively reduce the overall cost of run-time...
The ongoing development of wireless networking produces a lot of new technologies and applications, such as Ultra Wideband (UWB) and Wireless Sensor Networks (WSN). For traditional wired networking curriculums, the teaching is relatively easy due to the mature and stable measures. However, different from the traditional wired networking teaching, the Wireless Networking Teaching (WNT) is facing new...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.