Academic literature on the topic 'Internet addresses'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet addresses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet addresses"

1

&NA;. "INTERNET ADDRESSES." Gastroenterology Nursing 33, Supplement (April 2010): 70–71. http://dx.doi.org/10.1097/sga.0b013e3181da8c6f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Collinson, Helen. "Summit addresses growth, security issues for internet." Computers & Security 14, no. 3 (January 1995): 218. http://dx.doi.org/10.1016/0167-4048(95)90375-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huston, Geoff. "Metadata Retention and the Internet." Australian Journal of Telecommunications and the Digital Economy 3, no. 1 (April 27, 2015): 31. http://dx.doi.org/10.18080/ajtde.v3n1.4.

Full text
Abstract:
The Metadata Retention measures being considered in Australia make some sweeping assumptions about the semantics of IP addresses and their association with individual subscribers to the Internet. But are these assumptions warranted? The exhaustion of the free pool of IPv4 addresses has prompted a new generation of Internet services that treat IP addresses as ephemeral shared conversation tokens, and retaining address use metadata in such an environment is an exercise in futility. The regulatory environment persists in treating the Internet in the same manner as the telephone network, and as a network-centric service utility, while the revolutionary change that the Internet bought to the communications environment was to reverse the roles of network and attached device, and form a device-centric model of communications. Unless our regulators can grasp the implications of this essential architectural change we will continue to see misplaced and ultimately futile regulatory measures imposed on the Internet, to the ultimate cost of the consumer.
APA, Harvard, Vancouver, ISO, and other styles
4

Huston, Geoff. "Metadata Retention and the Internet." Journal of Telecommunications and the Digital Economy 3, no. 1 (April 27, 2015): 31–44. http://dx.doi.org/10.18080/jtde.v3n1.4.

Full text
Abstract:
The Metadata Retention measures being considered in Australia make some sweeping assumptions about the semantics of IP addresses and their association with individual subscribers to the Internet. But are these assumptions warranted? The exhaustion of the free pool of IPv4 addresses has prompted a new generation of Internet services that treat IP addresses as ephemeral shared conversation tokens, and retaining address use metadata in such an environment is an exercise in futility. The regulatory environment persists in treating the Internet in the same manner as the telephone network, and as a network-centric service utility, while the revolutionary change that the Internet bought to the communications environment was to reverse the roles of network and attached device, and form a device-centric model of communications. Unless our regulators can grasp the implications of this essential architectural change we will continue to see misplaced and ultimately futile regulatory measures imposed on the Internet, to the ultimate cost of the consumer.
APA, Harvard, Vancouver, ISO, and other styles
5

Prokhvatilova, Olga A. "ON THE EXTERNAL DIALOGUENESS OF ORTHODOX INTERNET PREACHING." RSUH/RGGU Bulletin. "Literary Theory. Linguistics. Cultural Studies" Series, no. 9 (2023): 172–82. http://dx.doi.org/10.28995/2686-7249-2023-9-172-182.

Full text
Abstract:
The article is dealing with the Internet sermon, an important and dynamically developing genre of the modern Orthodox tradition. The paper reveals the specifics of dialogueness as an essential feature of Orthodox preaching. It is proved that external dialogueness is a type of dialogueness of the genre of religious style and it also updates the addressing of the utterance. The specifics of the external dialogueness of Internet sermons are investigated on the material of the video blog “Batushka will answer”. It establishes the linguistic means by which the orientation of the Internet sermon to the addressee is realized. It is demonstrated that, along with the consistent rendition of constitutive language markers of external dialogueness for the genre, it is possible to modify individual means, in particular addresses and greetings, as well as to attract new ways of dialogization. It is proved that the use of classical means of external dialogueness in Internet preaching makes it possible to indicate the presence of a second participant in communication, to stimulate active perception of information, to convey the coexistence of hierarchy and symmetry inherent in the genre in the relationship of the addresser and the addressee. The author reveals that the use of new methods in organizing a priest’s dialogue with his audience weakens the semantics of motivation, levels the solemnly elevated register of communication familiar to this genre, adds intimacy to the linguistic space of religious communication and reduces its stylistic quality.
APA, Harvard, Vancouver, ISO, and other styles
6

Kalenyuk, Svitlana. "THE STYLISTIC FUNCTIONS OF ADDRESSES IN INTERNET COMMUNICATION." Naukovì zapiski Nacìonalʹnogo unìversitetu «Ostrozʹka akademìâ». Serìâ «Fìlologìâ» 1, no. 3(71) (October 25, 2018): 85–87. http://dx.doi.org/10.25264/2519-2558-2018-3(71)-85-87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Salamatian, Loqman, Todd Arnold, Ítalo Cunha, Jiangchen Zhu, Yunfan Zhang, Ethan Katz-Bassett, and Matt Calder. "Who Squats IPv4 Addresses?" ACM SIGCOMM Computer Communication Review 53, no. 1 (January 2023): 48–72. http://dx.doi.org/10.1145/3594255.3594260.

Full text
Abstract:
To mitigate IPv4 exhaustion, IPv6 provides expanded address space, and NAT allows a single public IPv4 address to suffice for many devices assigned private IPv4 address space. Even though NAT has greatly extended the shelf-life of IPv4, some networks need more private IPv4 space than what is officially allocated by IANA due to their size and/or network management practices. Some of these networks resort to using squat space , a term the network operations community uses for large public IPv4 address blocks allocated to organizations but historically never announced to the Internet. While squatting of IP addresses is an open secret, it introduces ethical, legal, and technical problems. In this work we examine billions of traceroutes to identify thousands of organizations squatting. We examine how they are using it and what happened when the US Department of Defense suddenly started announcing what had traditionally been squat space. In addition to shining light on a dirty secret of operational practices, our paper shows that squatting distorts common Internet measurement methodologies, which we argue have to be re-examined to account for squat space.
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Kuo Hsien, Chang Fan Wang, and Chien Chung Wang. "IPv4 and IPv6 Coexist in Unified Threat Management." Applied Mechanics and Materials 121-126 (October 2011): 923–27. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.923.

Full text
Abstract:
IP is the primary protocol that establishes the Internet; it is responsible for routing packets across network. IPv4 is the first version of the protocol to be widely deployed. IPv4 uses 4 bytes addresses, which limits the address space to more than 4 billion possible unique addresses. All of network devices construct on the IPv4. While the Internet widely deployed and used. IP addresses are being incrementally delegated to end users, an IPv4 address shortage has been developing. IPv4 addresses were insufficient for the Internet. IPv6 provide 2128 address and provide sufficient IPs for the Internet. But now the software and devices are only supporting IPv4. In this paper, we developed a new UTM appliance. The proposed system considers the integration of IPv4 network and IPv6 network in the Internet.
APA, Harvard, Vancouver, ISO, and other styles
9

Król, Karol. "Internet domains promoting agrotourist farms." Turyzm/Tourism 27, no. 1 (June 30, 2017): 23–29. http://dx.doi.org/10.18778/0867-5856.27.1.11.

Full text
Abstract:
Many agrotourist farms use the potential of websites to distinguish their offer from others to attract as many guests as possible. However, maintaining a website is connected with a range of costs, e.g. registering the domain and the hosting package. Searching for cost savings, the owners of agrotourist farms often face the dilemma of choosing between a payable website and its free equivalent. The aim of this article is to analyse internet addresses as regards their type and potential, both informative and marketing. The surveys were carried out on a set of 1,121 websites. The analysis included domain names (main names) as well as domain extensions, paying special attention to type and indicating sub-domains at the same time. Division into payable and free was looked for as well. In conclusion, it is shown that the owners of agrotourist farms mostly use national domains, choosing addresses in functional, regional or European domains less frequently. Moreover, they relatively rarely use addresses created on free services. In their place, they choose free sub-domains often created in the domain of the provider hosting a regional (informative) portal or another.
APA, Harvard, Vancouver, ISO, and other styles
10

Król, Karol. "INTERNET DOMAINS PROMOTING AGROTOURIST FARMS." Turyzm 27, no. 1 (January 26, 2017): 23–29. http://dx.doi.org/10.1515/tour-2017-0003.

Full text
Abstract:
Abstract Many agrotourist farms use the potential of websites to distinguish their offer from others to attract as many guests as possible. However, maintaining a website is connected with a range of costs, e.g. registering the domain and the hosting package. Searching for cost savings, the owners of agrotourist farms often face the dilemma of choosing between a payable website and its free equivalent. The aim of this article is to analyse internet addresses as regards their type and potential, both informative and marketing. The surveys were carried out on a set of 1,121 websites. The analysis included domain names (main names) as well as domain extensions, paying special attention to type and indicating sub-domains at the same time. Division into payable and free was looked for as well. In conclusion, it is shown that the owners of agrotourist farms mostly use national domains, choosing addresses in functional, regional or European domains less frequently. Moreover, they relatively rarely use addresses created on free services. In their place, they choose free sub-domains often created in the domain of the provider hosting a regional (informative) portal or another.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Internet addresses"

1

Shue, Craig A. "A better Internet without IP addresses." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3358945.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, Dept. of Computer Science, 2009.
Title from PDF t.p. (viewed on Feb. 10, 2010). Source: Dissertation Abstracts International, Volume: 70-05, Section: B, page: 3011. Adviser: Minaxi Gupta.
APA, Harvard, Vancouver, ISO, and other styles
2

Phillips, Matthew D. W., and Trevor J. Baumgartner. "Implementation of a network address translation mechanism over IPv6." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1607.

Full text
Abstract:
Approved for public release; distribution is unlimited
Network Address Translation (NAT) for IPv4 was developed primarily to curb overcrowding of the Internet due to dwindling global IP addresses; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet. IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing. While IPv6 does not need NAT for connectivity, other NAT features such as address hiding are valuable. There is currently no NAT implementation for IPv6. The focus of this research was the design and development of a NAT implementation for IPv6. This implementation will be used within a multilevel testbed. In addition, the NAT implementation developed here can facilitate the Department of Defense (DoD) transition to IPv6 planned for 2008 by providing services currently not available for IPv6. A working implementation of NAT for IPv6 within the Linux kernel has been produced. The NAT development created here has been tested for support of the protocols of TCP, UDP and ICMP for IPv6.
Ensign, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
3

Baumgartner, Trevor J. Phillips Matthew D. W. "Implementation of a Network Address Translation Mechanism Over IPv6 /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBaumgartner%5fPhillips.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004.
Thesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 81-83). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Snyder, Mark E. "Critical infrastructure protection and the Domain Name Service (DNS) system." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2008. http://scholarsmine.mst.edu/thesis/pdf/Snyder_09007dcc805e0f32.pdf.

Full text
Abstract:
Thesis (M.S.)--Missouri University of Science and Technology, 2008.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 15, 2009) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
5

Dunlop, Matthew William. "Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77333.

Full text
Abstract:
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An attacker can collect this information to build a profile of where people go, what their interests are, and even what they are saying to each other. For certain government and corporate entities, the exposure of this information could risk national security or loss of capital. This work identifies vulnerabilities in the way the Internet Protocol version 6 (IPv6) forms addresses. These vulnerabilities provide attackers with the ability to track a node's physical location, correlate network traffic with specific users, and even launch attacks against users' systems. A Moving Target IPv6 Defense (MT6D) that rotates through dynamically obscured network addresses while maintaining existing connections was developed to prevent these addressing vulnerabilities.MT6D is resistant to the IPv6 addressing vulnerabilities since addresses are not tied to host identities and continuously change. MT6D leverages the immense address space of IPv6 to provide an environment that is infeasible to search efficiently. Address obscuration in MT6D occurs throughout ongoing sessions to provide continued anonymity, confidentiality, and security to communicating hosts. Rotating addresses mid-session prevents an attacker from determining that the same two hosts are communicating. The dynamic addresses also force an attacker to repeatedly reacquire the target node before he or she can launch a successful attack. A proof of concept was developed that demonstrates the feasibility of MT6D and its ability to seamlessly bind new IPv6 addresses. Also demonstrated is MT6D's ability to rotate addresses mid-session without dropping or renegotiating sessions.This work makes three contributions to the state-of-the-art IPv6 research. First, it fully explores the security vulnerabilities associated with IPv6 address formation and demonstrates them on a production IPv6 network. Second, it provides a method for dynamically rotating network addresses that defeats these vulnerabilities. Finally, a functioning prototype is presented that proves how network addresses can be dynamically rotated without losing established network connections. If IPv6 is to be globally deployed, it must not provide additional attack vectors that expose user information.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
6

AbuGhazaleh, Shereen N. A. "The resolution of domain name disputes : a comparison of Jordan, United Kingdom, United States, and ICANN rules." Thesis, University of Aberdeen, 2010. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=158341.

Full text
Abstract:
Domain names constitute a valuable key element in electronic commerce. However, some intend to benefit from this fact by registering identical or similar trademarks as domain names, thereby depriving the legitimate owners from obtaining the domain name. This thesis aims to evaluate the protection provided for domain names, by illustrating several models that are under civil, common and international jurisdiction, namely, Jordan, the United Kingdom, the United States and by ICANN. In the first model there are no special regulations. In the second model alternative regulations are applied while, in the third model, a special act is provided; the fourth model constitutes a global protection for specific types of domain name disputes. It is concluded that the absence of a unified legal identity for domain names is the reason why diverse positions are required to protect them; concomitantly, domain name disputes have not been sufficiently addressed, and there is a necessity to provide domain names with a globally comprehensive protection mechanism.
APA, Harvard, Vancouver, ISO, and other styles
7

Rattananon, Sanchai Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "RPX ??? a system for extending the IPv4 address range." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/30210.

Full text
Abstract:
In recent times, the imminent lack of public IPv4 addresses has attracted the attention of both the research community and industry. The cellular industry has decided to combat this problem by using IPv6 for all new terminals. However, the success of 3G network deployment will depend on the services offered to end users. Currently, almost all services reside in the IPv4 address space, making them inaccessible to users in IPv6 networks. Thus, an intermediate translation mechanism is required. Previous studies on network address translation methods have shown that Realm Base Kluge Address Heuristic-IP, REBEKAH-IP supports all types of services that can be offered to IPv6 hosts from the public IPv4 based Internet, and provides excellent scalability. However, the method suffers from an ambiguity problem which may lead to call blocking. This thesis presents an improvement to REBEKAH-IP scheme in which the side effect is removed, creating a robust and fully scalable system. The improvement can be divided into two major tasks including a full investigation on the scalability of addressing and improvements to the REBEKAH-IP scheme that allow it to support important features such as ICMP and IP mobility. To address the first task a method called REBEKAH-IP with Port Extension (RPX) is introduced. RPX is extended from the original REBEKAH-IP scheme to incorporate centralised management of both IP address and port numbers. This method overcomes the ambiguity problem, and improves scalability. We propose a priority queue algorithm to further increase scalability. Finally, we present extensive simulation results on the practical scalability of RPX with different traffic compositions, to provide a guideline of the expected scalability in large-scale networks. The second task concerns enabling IP based communication. Firstly, we propose an ICMP translation mechanism which allows the RPX server to support important end-toend control functions. Secondly, we extend the RPX scheme with a mobility support scheme based on Mobile IP. In addition, we have augmented Mobile IP with a new tunneling mechanism called IP-in-FQDN tunneling. The mechanism allows for unique mapping despite the sharing of IP addresses while maintaining the scalability of RPX. We examine the viability of our design through our experimental implementation.
APA, Harvard, Vancouver, ISO, and other styles
8

Samiuddin, Asim. "IPAM : a web-based IP/DNS management system /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1422961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Full text
Abstract:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and maintained easily. In this thesis, we mainly consider Mobile IPv4, instead of Mobile IPv6. Three research topics are discussed. In each topic, the challenges are investigated and the new solutions are presented. The first research topic solves the firewall traversal problems in Mobile IP. A mobile node cannot access its firewall-protected home network if it fails the authentication by the firewall. We propose that an IPsec tunnel be established between the firewall and the foreign agent for firewall traversal and that an IPsec transport security association be shared by the mobile node and a correspondent node for end-to-end security. The second topic researches further on firewall traversal problems and investigates the way of establishing security associations among network entities. A new security model and a new key distribution method are developed. With the help of the security model and keys, the firewall and the relevant network entities set up IPsec security associations to achieve firewall traversal. A mobile node from a private home network cannot communicate with other hosts with its private home address when it is visiting a public foreign network. A novel and useful solution is presented in the third research topic. We suggest that the mobile node use its Network Access Identifier (NAI) as its identification and obtain a public home address from its home agent. In addition, a new tunnel between the mobile node and its home agent is proposed.
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmed, Ejaz. "Monitoring and analysis of internet traffic targeting unused address spaces." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/34075/1/Ejaz_Ahmed_Thesis.pdf.

Full text
Abstract:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Internet addresses"

1

A, Manning William, ed. Internet terms and popular Internet addresses. 2nd ed. [S.l.]: The Dryden Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gündüz, Osman. İnternet: Azärbaycan internet resursları. Bakı: Multimedia Märkäzi, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Publishing, New Riders, ed. Internet directory. 6th ed. Indianapolis, IN: New Riders Pub., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trans-European Research and Education Networking Association. and Netskills, eds. Internet users' reference. 2nd ed. Harlow, England: Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sirkov, Li︠u︡bomir. Bŭlgarski internet adresi 2001. Sofii︠a︡: Softpres Izdatelstvo, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

(Firm), MESA Group, ed. The Original Internet address book. Englewood Cliffs, NJ: Prentice Hall, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Genovesi, Robert. The Wilson guide to Internet experts. New York: H.W. Wilson, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hahn, Harley. The Internet golden directory. 2nd ed. Berkeley: Osborne, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hahn, Harley. The Internet golden directory. 3rd ed. Berkeley: Osborne McGraw-Hill, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hahn, Harley. The Internet golden directory. 2nd ed. Berkeley, Calif: Osborne McGraw-Hill, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Internet addresses"

1

Moro-Visconti, Roberto. "Internet Protocol Addresses Valuation." In Augmented Corporate Valuation, 541–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97117-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Domaszewicz, Jaroslaw, Michal Koziuk, and Radoslaw Olgierd Schoeneich. "Context-Addressable Messaging Service with Ontology-Driven Addresses." In On the Move to Meaningful Internet Systems: OTM 2008, 1471–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88873-4_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rüppel, Adrian Karl, Muzaffer Ay, Benedikt Biernat, Ike Kunze, Markus Landwehr, Samuel Mann, Jan Pennekamp, et al. "Model-Based Controlling Approaches for Manufacturing Processes." In Internet of Production, 1–26. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-030-98062-7_7-2.

Full text
Abstract:
AbstractThe main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).
APA, Harvard, Vancouver, ISO, and other styles
4

Rüppel, Adrian Karl, Muzaffer Ay, Benedikt Biernat, Ike Kunze, Markus Landwehr, Samuel Mann, Jan Pennekamp, et al. "Model-Based Controlling Approaches for Manufacturing Processes." In Internet of Production, 1–26. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-030-98062-7_7-1.

Full text
Abstract:
AbstractThe main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).
APA, Harvard, Vancouver, ISO, and other styles
5

Rüppel, Adrian Karl, Muzaffer Ay, Benedikt Biernat, Ike Kunze, Markus Landwehr, Samuel Mann, Jan Pennekamp, et al. "Model-Based Controlling Approaches for Manufacturing Processes." In Internet of Production, 221–46. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-44497-5_7.

Full text
Abstract:
AbstractThe main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).
APA, Harvard, Vancouver, ISO, and other styles
6

Lipford, Heather Richter, Madiha Tabassum, Paritosh Bahirat, Yaxing Yao, and Bart P. Knijnenburg. "Privacy and the Internet of Things." In Modern Socio-Technical Perspectives on Privacy, 233–64. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82786-1_11.

Full text
Abstract:
AbstractUsing networks of Internet-connected sensors, the Internet of Things (IoT) makes technologies “smart” by enabling automation, personalization, and remote control. At the same time, IoT technologies introduce challenging privacy issues that may frustrate their widespread adoption. This chapter addresses the privacy challenges of IoT technologies from a user-centered perspective and demonstrates these prevalent issues in the domains of wearables (e.g., fitness trackers), household technologies (e.g., smart voice assistants), and devices that exist in the public domain (e.g., security cameras). The chapter ends with a comprehensive list of solutions and guidelines that can help researchers and practitioners introduce usable privacy to the domain of IoT.
APA, Harvard, Vancouver, ISO, and other styles
7

"Internet addresses." In Learning, Teaching and Researching on the Internet, 45–50. Routledge, 2014. http://dx.doi.org/10.4324/9781315840291-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Useful Internet addresses." In Digital Imaging for Photographers, 203–5. Elsevier, 2001. http://dx.doi.org/10.1016/b978-0-240-51590-8.50013-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Useful Internet addresses." In Food Safety in the Hospitality Industry, 321. Elsevier, 2002. http://dx.doi.org/10.1016/b978-0-7506-5349-7.50014-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Useful (Internet) Addresses." In Handbook of Alcoholism, 482–83. CRC Press, 2000. http://dx.doi.org/10.1201/9781420036961-57.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet addresses"

1

Padmanabhan, Ramakrishna, Amogh Dhamdhere, Emile Aben, kc claffy, and Neil Spring. "Reasons Dynamic Addresses Change." In IMC 2016: Internet Measurement Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2987443.2987461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhatti, Saleem N., Ditchaphong Phoomikiattisak, and Bruce Simpson. "IP without IP addresses." In AINTEC '16: Asian Internet Engineering Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3012695.3012701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Keynote Addresses." In 2021 International Conference on Cyber Security and Internet of Things (ICSIoT). IEEE, 2021. http://dx.doi.org/10.1109/icsiot55070.2021.00008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shenoy, Nirmala, Shreyas Madapura Chandraiah, and Peter Willis. "Internet Routing with Auto-Assigned Addresses." In 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2022. http://dx.doi.org/10.1109/itnac55475.2022.9998334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Plonka, David, and Arthur Berger. "Temporal and Spatial Classification of Active IPv6 Addresses." In IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Xun, and John Heidemann. "Selecting representative IP addresses for internet topology studies." In the 10th annual conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1879141.1879195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tang, Yi, and Yuanyuan Wu. "Anonymizing Network Addresses Based on Clustering Subnets." In 2010 International Conference on Internet Technology and Applications (iTAP). IEEE, 2010. http://dx.doi.org/10.1109/itapp.2010.5566245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sevilla, Spencer, and J. J. Garcia-Luna-Aceves. "Freeing the IP Internet Architecture from Fixed IP Addresses." In 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, 2015. http://dx.doi.org/10.1109/icnp.2015.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Wai Kok, Ji-Jian Chin, and Vik Tor Goh. "Evolution of Bitcoin Addresses from Security Perspectives." In 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2020. http://dx.doi.org/10.23919/icitst51030.2020.9351346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Evtimova, Mariya. "Validation algorithm for aligning postal addresses available on the Internet*." In 2023 International Conference on Applied Mathematics & Computer Science (ICAMCS). IEEE, 2023. http://dx.doi.org/10.1109/icamcs59110.2023.00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet addresses"

1

Daniele, M., B. Haberman, S. Routhier, and J. Schoenwaelder. Textual Conventions for Internet Network Addresses. RFC Editor, June 2000. http://dx.doi.org/10.17487/rfc2851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daniele, M., B. Haberman, S. Routhier, and J. Schoenwaelder. Textual Conventions for Internet Network Addresses. RFC Editor, May 2002. http://dx.doi.org/10.17487/rfc3291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Daniele, M., B. Haberman, S. Routhier, and J. Schoenwaelder. Textual Conventions for Internet Network Addresses. RFC Editor, February 2005. http://dx.doi.org/10.17487/rfc4001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Plonka, D. Embedding Globally-Routable Internet Addresses Considered Harmful. RFC Editor, June 2005. http://dx.doi.org/10.17487/rfc4085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gray, E., J. Rutemiller, and G. Swallow. Internet Code Point (ICP) Assignments for NSAP Addresses. RFC Editor, May 2006. http://dx.doi.org/10.17487/rfc4548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cobb, S. PPP Internet Protocol Control Protocol Extensions for Name Server Addresses. RFC Editor, December 1995. http://dx.doi.org/10.17487/rfc1877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bush, R., A. Durand, B. Fink, O. Gudmundsson, and T. Hain. Representing Internet Protocol version 6 (IPv6) Addresses in the Domain Name System (DNS). RFC Editor, August 2002. http://dx.doi.org/10.17487/rfc3363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Callon, R. W., and H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, June 1986. http://dx.doi.org/10.17487/rfc0986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Callon, R. W., and H. W. Braun. Guidelines for the use of Internet-IP addresses in the ISO Connectionless-Mode Network Protocol. RFC Editor, February 1989. http://dx.doi.org/10.17487/rfc1069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Callon, R. TCP and UDP with Bigger Addresses (TUBA), A Simple Proposal for Internet Addressing and Routing. RFC Editor, June 1992. http://dx.doi.org/10.17487/rfc1347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography