منابع مشابه
Fixing Two BSD TCP Bugs
This note outlines two bugs found in the BSD 4.4 Lite TCP implementation, as well as the implications of these bugs and possible ways to correct them. The rst problem encountered in this particular TCP implementation is the use of a 2 segment initial congestion window, rather than the standard 1 segment initial window. The second problem is that the receiver delays ACKs in violation of the dela...
متن کاملBSD: the Biodegradative Strain Database
The Biodegradative Strain Database (BSD) is a freely-accessible, web-based database providing detailed information on degradative bacteria and the hazardous substances that they degrade, including corresponding literature citations, relevant patents and links to additional web-based biological and chemical data. The BSD (http://bsd.cme.msu.edu) is being developed within the phylogenetic framewo...
متن کاملMusik für interaktive Medien: Arrangement- und Interpretationstechniken
Music is applied in manifold ways in scoring interactive media. The biggest challenge in this respect is posed by the interactive manipulation of music. This so-called nonlinear music must provide for flexible mutability even while it is playing. The following research study addresses some media-theoretical issues and presents technical approaches. The different manifestations and functions of ...
متن کاملImplementing Lightweight Routing for BSD TCP/IP
We present a lightweight leaf node routing algorithm and implementation for the BSD networking stack and discuss why the new approach was difficult to implement. The key idea in the algorithm was to observe that end hosts will always send packets to the default gateway and therefore are not required to do actual routing. By removing routing functionality not required for embedded devices, the s...
متن کاملDefeating Countermeasures Based on Randomized BSD Representations
The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiation, or scalar multiplication on elliptic curves. A new class of countermeasures is based on inserting random decisions when choosing one representation of the secret scalar out of a large set of representations of the same valu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Sains, Teknologi, Urban, Perancangan, Arsitektur (Stupa)
سال: 2020
ISSN: 2685-6263,2685-5631
DOI: 10.24912/stupa.v1i2.4371