Journal articles on the topic 'Client application for Domain Name System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Client application for Domain Name System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ma, Liang, and Xiaole Zhao. "Research on the multi-terminal adapting Web system construction." MATEC Web of Conferences 232 (2018): 01028. http://dx.doi.org/10.1051/matecconf/201823201028.
Full textYunianta, Arda, Norazah Yusof, Arif Bramantoro, Haviluddin Haviluddin, Mohd Shahizan Othman, and Nataniel Dengen. "Data mapping process to handle semantic data problem on student grading system." International Journal of Advances in Intelligent Informatics 2, no. 3 (December 1, 2016): 157. http://dx.doi.org/10.26555/ijain.v2i3.84.
Full textKhudoyberdiev, Jin, and Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS." Electronics 8, no. 4 (April 17, 2019): 442. http://dx.doi.org/10.3390/electronics8040442.
Full textVictors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (January 1, 2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.
Full textXiao, Yu Zhi. "On the Research of Internet Equipment Naming Methods." Advanced Materials Research 664 (February 2013): 1021–27. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1021.
Full textJi, Hong. "Research on Design and Security Strategy of DNS." Applied Mechanics and Materials 378 (August 2013): 510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.378.510.
Full textDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (July 26, 2019): 3292. http://dx.doi.org/10.3390/s19153292.
Full textZhang, Chen Guang, Yu Lan Zhao, Feng Xian Jiang, and Chao Ji. "The Research and Application of Short Message Name and Address System." Advanced Materials Research 225-226 (April 2011): 1008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.1008.
Full textBein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.
Full textJia, Bin. "The Research and Application of Short Message Name and Address Technology." Applied Mechanics and Materials 432 (September 2013): 571–74. http://dx.doi.org/10.4028/www.scientific.net/amm.432.571.
Full textTian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.
Full textAuer, Michael, and Alexander Zipf. "3D WebGIS: From Visualization to Analysis. An Efficient Browser-Based 3D Line-of-Sight Analysis." ISPRS International Journal of Geo-Information 7, no. 7 (July 21, 2018): 279. http://dx.doi.org/10.3390/ijgi7070279.
Full textSchmitt, Paul, Anne Edmundson, Allison Mankin, and Nick Feamster. "Oblivious DNS: Practical Privacy for DNS Queries." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (April 1, 2019): 228–44. http://dx.doi.org/10.2478/popets-2019-0028.
Full textZhang, Zhi Chun, Song Yan Lu, Kun Xu, Zhuang Xiong, and Yun He. "A Transparent Communication System in Distributed Systems." Advanced Materials Research 909 (March 2014): 311–16. http://dx.doi.org/10.4028/www.scientific.net/amr.909.311.
Full textJeong, Taikyeong Ted. "Highly scalable intelligent sensory application and time domain matrix for safety-critical system design." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771774110. http://dx.doi.org/10.1177/1550147717741102.
Full textSinganamalla, Sudheesh, Suphanat Chunhapanya, Jonathan Hoyland, Marek Vavruša, Tanya Verma, Peter Wu, Marwan Fayed, Kurtis Heimerl, Nick Sullivan, and Christopher Wood. "Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 575–92. http://dx.doi.org/10.2478/popets-2021-0085.
Full textHussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9479476.
Full textSetiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (February 2, 2017): 7. http://dx.doi.org/10.24843/jteei.v01i01p02.
Full textSetiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (February 2, 2017): 7. http://dx.doi.org/10.24843/jeei.2017.v01.i01.p02.
Full textSetiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (February 2, 2017): 7. http://dx.doi.org/10.24843/jeei.v01i01p02.
Full textGoularas, Dionysis, Khalifa Djemal, and Yannis Mannoussakis. "3D Image Modelling and Specific Treatments in Orthodontics Domain." Applied Bionics and Biomechanics 4, no. 3 (2007): 111–24. http://dx.doi.org/10.1155/2007/248715.
Full textArdiyanto, Yudhi, and Muhamad Yusvin Mustar. "Color Blindness Testing Using A Client-Server Based on The Ishihara Method." Journal of Electrical Technology UMY 4, no. 2 (December 8, 2020): 46–52. http://dx.doi.org/10.18196/jet.v4i2.10993.
Full textJ, Ravikumar, and Ramakanth Kumar P. "A framework for named entity recognition of clinical data." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (May 1, 2020): 946. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp946-952.
Full textPallavi, P., and Shaik Salam. "Online Command Area Water Resource Management System." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (April 30, 2020): 70–74. http://dx.doi.org/10.34306/csit.v5i2.141.
Full textAdler, Jeffrey L., and Eknauth Persaud. "Knowledge Acquisition for Large-Scale Expert Systems in Transportation." Transportation Research Record: Journal of the Transportation Research Board 1651, no. 1 (January 1998): 59–65. http://dx.doi.org/10.3141/1651-09.
Full textKart, Özge, Alp Kut, and Vladimir Radevski. "Decision Support System For A Customer Relationship Management Case Study." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 2 (August 1, 2014): 88. http://dx.doi.org/10.11591/ijict.v3i2.pp88-96.
Full textRhodus*, Tim, and Bud Witney. "Developing New Approaches and Tools for Improved Management and Delivery of Online Digital Photos." HortScience 39, no. 4 (July 2004): 875C—875. http://dx.doi.org/10.21273/hortsci.39.4.875c.
Full textCresswell, Stephen N., Thomas L. McCluskey, and Margaret M. West. "Acquiring planning domain models using LOCM." Knowledge Engineering Review 28, no. 2 (February 22, 2013): 195–213. http://dx.doi.org/10.1017/s0269888912000422.
Full textSanthanavanich, T., P. Wuerstle, J. Silberer, V. Loidl, P. Rodrigues, and V. Coors. "3D SAFE ROUTING NAVIGATION APPLICATION FOR PEDESTRIANS AND CYCLISTS BASED ON OPEN SOURCE TOOLS." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences VI-4/W2-2020 (September 15, 2020): 143–47. http://dx.doi.org/10.5194/isprs-annals-vi-4-w2-2020-143-2020.
Full textS, Priyadharshini, and Catherine Joy. R. "Design and Implementation of an Automated Hotel Management System." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 37–42. http://dx.doi.org/10.35940/ijeat.e2569.0610521.
Full textPandey, Divyanshu, Adithya Venugopal, and Harry Leib. "Multi-Domain Communication Systems and Networks: A Tensor-Based Approach." Network 1, no. 2 (July 7, 2021): 50–74. http://dx.doi.org/10.3390/network1020005.
Full textMunkhdalai, Lkhagvadorj, Tsendsuren Munkhdalai, Oyun-Erdene Namsrai, Jong Lee, and Keun Ryu. "An Empirical Comparison of Machine-Learning Methods on Bank Client Credit Assessments." Sustainability 11, no. 3 (January 29, 2019): 699. http://dx.doi.org/10.3390/su11030699.
Full textAlshaer, Abdulaziz, David O’Hare, Philippe Archambault, Mark Shirley, and Holger Regenbrecht. "How to Observe Users’ Movements in Virtual Environments: Viewpoint Control in a Power Wheelchair Simulator." Human Factors: The Journal of the Human Factors and Ergonomics Society 62, no. 4 (July 15, 2019): 656–70. http://dx.doi.org/10.1177/0018720819853682.
Full textTelagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan, and Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server." International Journal of Online Engineering (iJOE) 13, no. 11 (November 22, 2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.
Full textManvi, Sunilkumar S. "Resource Monitoring for Wireless Sensor Networks using ANFIS." Journal of Applied Computer Science Methods 8, no. 1 (June 1, 2016): 41–67. http://dx.doi.org/10.1515/jacsm-2016-0004.
Full textHong, Yang, David Gochis, Jiang-tao Cheng, Kuo-lin Hsu, and Soroosh Sorooshian. "Evaluation of PERSIANN-CCS Rainfall Measurement Using the NAME Event Rain Gauge Network." Journal of Hydrometeorology 8, no. 3 (June 1, 2007): 469–82. http://dx.doi.org/10.1175/jhm574.1.
Full textOuedraogo, Moussa, Haralambos Mouratidis, Eric Dubois, and Djamel Khadraoui. "Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality." International Journal of Handheld Computing Research 2, no. 4 (October 2011): 59–81. http://dx.doi.org/10.4018/jhcr.2011100104.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textFierro Abella, Jorge Alberto. "Nombre de dominios y otros signos distintivos. Aproximación teórica y análisis practico." Revista Jurídica Piélagus 6 (December 3, 2007): 39–63. http://dx.doi.org/10.25054/16576799.579.
Full textKhan, Basit, Sabine Banzhaf, Edward C. Chan, Renate Forkel, Farah Kanani-Sühring, Klaus Ketelsen, Mona Kurppa, et al. "Development of an atmospheric chemistry model coupled to the PALM model system 6.0: implementation and first applications." Geoscientific Model Development 14, no. 2 (March 1, 2021): 1171–93. http://dx.doi.org/10.5194/gmd-14-1171-2021.
Full textPustišek, Matevž, Dejan Dolenc, and Andrej Kos. "LDAF: Low-Bandwidth Distributed Applications Framework in a Use Case of Blockchain-Enabled IoT Devices." Sensors 19, no. 10 (May 21, 2019): 2337. http://dx.doi.org/10.3390/s19102337.
Full textVats, Satvik, and B. B. Sagar. "An independent time optimized hybrid infrastructure for big data analytics." Modern Physics Letters B 34, no. 28 (July 21, 2020): 2050311. http://dx.doi.org/10.1142/s021798492050311x.
Full textKonan, Martin, and Wenyong Wang. "A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN." Sensors 19, no. 7 (April 3, 2019): 1608. http://dx.doi.org/10.3390/s19071608.
Full textFacco Rodrigues, Vinicius, Ivam Guilherme Wendt, Rodrigo da Rosa Righi, Cristiano André da Costa, Jorge Luis Victória Barbosa, and Antonio Marcos Alberti. "Brokel: Towards enabling multi-level cloud elasticity on publish/subscribe brokers." International Journal of Distributed Sensor Networks 13, no. 8 (August 2017): 155014771772886. http://dx.doi.org/10.1177/1550147717728863.
Full textMekkanen, Mike, and Kimmo Kauhaniemi. "Wireless Light-Weight IEC 61850 Based Loss of Mains Protection for Smart Grid." Open Engineering 8, no. 1 (July 14, 2018): 182–92. http://dx.doi.org/10.1515/eng-2018-0022.
Full textMaxwell, Deborah, Chris Speed, and Larissa Pschetz. "Story Blocks." Convergence: The International Journal of Research into New Media Technologies 23, no. 1 (January 24, 2017): 79–97. http://dx.doi.org/10.1177/1354856516675263.
Full textKocsis, Imre. "Blokklánc alkalmazási lehetőségek a biztonság területén és bevezetés-tervezésük." Scientia et Securitas 1, no. 1 (December 17, 2020): 12–20. http://dx.doi.org/10.1556/112.2020.00003.
Full textKlots, Y. P., I. V. Muliar, V. M. Cheshun, and O. V. Burdyug. "USE OF DISTRIBUTED HASH TABLES TO PROVIDE ACCESS TO CLOUD SERVICES." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 85–95. http://dx.doi.org/10.17721/2519-481x/2020/67-09.
Full textShen, Hong. "11 YEARS OF BIOSTEREOLOGY IN CHINA." Image Analysis & Stereology 19, no. 3 (May 3, 2011): 157. http://dx.doi.org/10.5566/ias.v19.p157-161.
Full textJara, Antonio J., Miguel A. Zamora, and Antonio Skarmeta. "Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things." Mobile Information Systems 8, no. 3 (2012): 177–97. http://dx.doi.org/10.1155/2012/819250.
Full text