نتایج جستجو برای: internet relay chats

تعداد نتایج: 191305  

Journal: :RFC 2005
Stewart Bryant Prayson Pate

Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes an architecture for Pseudo Wire Emulation Edge-to-Edge (PWE3). It discusses the emulation of services such as Frame Relay, ATM, Ethernet...

2003
Alan P. Schmidt Trevor K. M. Stone

We attack the problem of topic segmentation in the domain of Internet Relay Chat logs. In this process, we examine the previous work in text segmentation using a variety of methods. After considering the pros and cons of the methods, we employ Text Tiling, pause detection, and latent semantic analysis because they did not require the usage of large pre-tagged corpora. With these systems in plac...

Journal: :J. of Management Information Systems 2016
Victor A. Benjamin Bin Zhang Jay F. Nunamaker Hsinchun Chen

To further cybersecurity, there is interest in studying online cybercriminal communities to learn more about emerging cyber threats. Literature documents the existence of many online Internet Relay Chat (IRC) cybercriminal communities where cybercriminals congregate and share hacking tools, malware, and more. However, many cybercriminal community participants appear unskilled and have fleeting ...

2012
B. Kothari

Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document...

Journal: :Comput. J. 2014
Monowar H. Bhuyan Hirak Kashyap Dhruba Kumar Bhattacharyya Jugal K. Kalita

The minimal processing and best-e↵ort forwarding of any packet, malicious or not, was the prime concern when the Internet was designed. This architecture creates an unregulated network path, which can be exploited by any cyber attacker motivated by revenge, prestige, politics or money. Denial-of-service (DoS) attacks exploit this to target critical Web services [1, 2, 3, 4, 5]. This type of att...

2012
Anaïs Cadilhac Nicholas Asher Farah Benamara

This paper describes an annotation scheme for expressions of preferences in on-line chats concerning bargaining negotiations in the online version of the competitive game Settlers of Catan.

2008
Micha Elsner Eugene Charniak

When multiple conversations occur simultaneously, a listener must decide which conversation each utterance is part of in order to interpret and respond to it appropriately. We refer to this task as disentanglement. We present a corpus of Internet Relay Chat (IRC) dialogue in which the various conversations have been manually disentangled, and evaluate annotator reliability. This is, to our know...

2010
Michael Menth Matthias Hartmann Michael Höfling

The locator/identifier split is a design principle for new routing architectures that make Internet routing more scalable. To find the location of a host, it requires a mapping system that returns appropriate locators in response to maprequests for specific identifiers. In this paper, we propose FIRMS, a “Future InteRnet Mapping System”. It is fast, scalable, reliable, secure, and it is able to...

2012
Hongbo Zhou Matt W. Mutka

A MANET is a temporary multi-hop wireless network composed of mobile nodes without an underlying infrastructure. The mobile nodes in a MANET are not connected to an access point to access the Internet (although in some special cases a MANET and the Internet may co-exist). Instead, their wireless network interface cards operate in ad-hoc mode. The nodes that are within the transmission range of ...

Journal: :Computers in Human Behavior 2007
Beatriz Lia Avila Mileham

Internet chat rooms have introduced unprecedented dynamics into marital relationships: never in history has it been so easy to enjoy both the stability of marriage and the thrills of the dating scene at the same time. This study examined the phenomenon of online infidelity in chat rooms, a process whereby individuals involved in a long-term committed relationship seek computer synchronous, inte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید