Rating
COMPUTER ARCHITECTURES
Computer Architectures for Public-Key C and Secret-Key Crypto Systems
Computer Architectures for Public-Key C and Secret-Key Crypto Systems
Introduction
Growing demands for security are characterizing the vast majority of communication and computer systems. In order to secure a system, various cryptographic protocols are required. These protocols can be implemented in hard ...
Rating
Computer Activities: Ping sweeps and Port Scans
Computer Activities: Ping Sweeps and Port Scans
Introduction
A port scanner is name given to a software application which is basically designed to probe a host or server for open ports. The main purpose of this software application is to be utilized by the administrators to ...
Rating
DIGITAL DIVIDE
Digital Divide
Digital Divide
What the Digital Divide
Digital divide refers to the socioeconomic difference between those communities that have access to Internet and those without, although such inequalities can also refer to all the new technologies of information and communication technologies (ICTs), such as personal computer, the telephone mobile, the ...
Rating
MULTIWAY TREES
Multiway Trees
Name
Date
Multiway Trees
Introduction
Binary trees and tries represent different approaches to looking up strings. In a binary tree, each node represents one string in the data set. Thus, the number of nodes is minimized. Also, each node contains links to only two other nodes. Thus, the size of ...
Rating
Cloud Computing
Abstract
This paper seeks to demonstrate the meaning, description, scope, impacts on network management, effectiveness, advantages and disadvantages provided by the technology of cloud computing on the field of networking as well as the users of cloud computing. Furthermore, the various methods of achieving cloud computing are also presented. Lastly, ...
Rating
Cloud Computing
Table of Contents
Introduction3
Discussion5
Some Working Definitions of Cloud Computing6
Layers of Cloud Computing7
IaaS Layer7
PaaS Layer8
SaaS Layer8
Implications of the Transition to Cloud Computing9
Cloud Performance and Security Concerns10
Cloud Computing Drives Creation of New Businesses10
Using the Cloud for Business Advantage11
Business Applications with the Greatest Potential12
Cloud Cost Considerations14
The Cloud is a Platform for Managing Business ...
Rating
Research the pornography and obscenity laws
Pornography
For thousands of years man has created works with lewd purpose to arouse sexual desires. While there was a time when pornography was difficult to produce and therefore was more available to the rich and wealthy class, with the advent of large printing, photography and ...
Rating
CYBER ATTACK
Cyber Attack
Cyber Attack
Introduction
Cybercrime is criminal activity, using computers and the Internet to steal, whether directly or indirectly, from consumers or businesses. The global scale of the cybercrime problem is not known, although by most estimates it is running at several billion dollars (USD) per year. This paper focuses ...
Rating
Forensic Science
What Is Forensic Science?
Forensic sciences encompass disciplines belonging to the exact sciences and medical sciences. The practice of forensic science as an application of judicial affairs used to investigate the crime and, therefore, serves to identify the offender. The sine qua non of the forensic investigation is to discover. ...
Rating
Abstract
This paper presents a low-cost multi-robot system for large populations of soccer robots, a new coordinate system for the soccer robots based on angles between robots and a series of experiments validating robot performance. The new robot platform, the r-one will serve as an educational, outreach and research platform for ...