Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Network analysis“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Network analysis" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Network analysis"
Kilkenny, Maureen, und Nerys Fuller Love. „Network analysis and business networks“. International Journal of Entrepreneurship and Small Business 21, Nr. 3 (2014): 303. http://dx.doi.org/10.1504/ijesb.2014.060894.
Der volle Inhalt der QuelleJadhav, Pranavati, und Dr Burra Vijaya Babu. „Detection of Community within Social Networks with Diverse Features of Network Analysis“. Journal of Advanced Research in Dynamical and Control Systems 11, Nr. 12-SPECIAL ISSUE (31.12.2019): 366–71. http://dx.doi.org/10.5373/jardcs/v11sp12/20193232.
Der volle Inhalt der QuelleCVS, Rajesh, und Nadikoppula Pardhasaradhi. „Analysis of Artificial Neural-Network“. International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (31.10.2018): 418–28. http://dx.doi.org/10.31142/ijtsrd18482.
Der volle Inhalt der QuelleKalaiSelvi, Dr B., und Aruna K. „Network Traffic Analysis Using Wireshark“. International Journal of Research Publication and Reviews 4, Nr. 12 (18.12.2023): 1960–65. http://dx.doi.org/10.55248/gengpi.4.1223.123506.
Der volle Inhalt der QuelleBlair, Alan D., und Jordan B. Pollack. „Analysis of Dynamical Recognizers“. Neural Computation 9, Nr. 5 (01.07.1997): 1127–42. http://dx.doi.org/10.1162/neco.1997.9.5.1127.
Der volle Inhalt der QuelleKarimi, Faezeh, David Green, Petr Matous, Manos Varvarigos und Kaveh R. Khalilpour. „Network of networks: A bibliometric analysis“. Physica D: Nonlinear Phenomena 421 (Juli 2021): 132889. http://dx.doi.org/10.1016/j.physd.2021.132889.
Der volle Inhalt der QuelleLobastova, M., A. Matyukhin und A. Muthanna. „Analysis of Network Reliability of Network Synchronization“. Telecom IT 8, Nr. 4 (23.12.2020): 93–99. http://dx.doi.org/10.31854/2307-1303-2020-8-4-93-99.
Der volle Inhalt der QuelleTarapata, Zbigniew. „Modelling and analysis of transportation networks using complex networks: Poland case study“. Archives of Transport 36, Nr. 4 (31.12.2015): 55–65. http://dx.doi.org/10.5604/08669546.1185207.
Der volle Inhalt der QuelleWEN, HAO, ZHENG-FU HAN, GUANG-CAN GUO und PEI-LIN HONG. „QKD NETWORKS WITH PASSIVE OPTICAL ELEMENTS: ANALYSIS AND ASSESSMENT“. International Journal of Quantum Information 07, Nr. 06 (September 2009): 1217–31. http://dx.doi.org/10.1142/s0219749909005730.
Der volle Inhalt der QuelleHafner-Burton, Emilie M., Miles Kahler und Alexander H. Montgomery. „Network Analysis for International Relations“. International Organization 63, Nr. 3 (Juli 2009): 559–92. http://dx.doi.org/10.1017/s0020818309090195.
Der volle Inhalt der QuelleDissertationen zum Thema "Network analysis"
Oesterheld, Matthias. „Analysis of biomolecular networks using a generic network analysis suite“. kostenfrei, 2008. http://mediatum2.ub.tum.de/doc/646475/646475.pdf.
Der volle Inhalt der QuellePost, David L. „Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks“. Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Der volle Inhalt der QuelleLim, Kok Seng. „Analysis of network management protocols in optical networks“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FLim%5FK.pdf.
Der volle Inhalt der QuelleSilva, do Monte Lima Jennifer. „Performance analysis of network composition in ambient networks“. Universidade Federal de Pernambuco, 2007. https://repositorio.ufpe.br/handle/123456789/2637.
Der volle Inhalt der QuelleConselho Nacional de Desenvolvimento Científico e Tecnológico
Atualmente, o compartilhamento de recursos e oferta de serviços entre redes são permitidos apenas através de intensa configuração manual e acordos prévios entre as redes envolvidas. Devido às diferentes tecnologias de acesso, à heterogeneidade dos dispositivos e dos serviços e a mobilidade dos usuários, o gerenciamento dos recursos se torna uma tarefa ainda mais complexa. As Redes de Ambiente surgem para permitir a cooperação instantânea e dinâmica de redes heterogêneas pertencentes a diferentes domínios administrativos e tecnológicos, através de um novo conceito chamado de Composição de Redes. A Composição permite a disponibilização de serviços e o compartilhamento de recursos entre redes, via Acordo de Composição. O desempenho da composição tem um fator crucial na viabilidade das Redes de Ambiente, devido à alta demanda por composição em uma interação de um usuário típico com a rede. Estas composições de redes mudam todo o cenário e trazem novas complicações para o processo tornando necessária a avaliação da estabilidade e da escalabilidade das mesmas. Diante da impossibilidade de testar tais conceitos de forma prática e real, optouse por fazê-lo através de simulação. Para atingir este objetivo foi especificado e implementado um simulador para Composições de Redes de Ambiente. Este simulador tem como objetivo principal avaliar o desempenho da composição mostrando que a mesma não representa um gargalo para a implantação das Redes de Ambiente
Woodbury, Nathan Scott. „Network Reconstruction and Vulnerability Analysis of Financial Networks“. BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6370.
Der volle Inhalt der QuelleJunuthula, Ruthwik Reddy. „Modeling, Evaluation and Analysis of Dynamic Networks for Social Network Analysis“. University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1544819215833249.
Der volle Inhalt der QuelleHassan, Aamir, und Fida Mohammad. „Network Security Analysis“. Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002.
Der volle Inhalt der QuelleSecurity is the second step after that a successful network has been deployed. There are many types of attacks that could potentially harm the network and an administrator should carefully document and plan the weak areas, where the network could be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security. This thesis addresses all the possible tools and techniques that attackers use to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable tools to get the results. It is important to note that most of the attention in network security is given to the router, but far less attention is given to securing a switch. This thesis will also address some more ways of securing a switch, if there is no router in the network.
The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.
Mei, Jonathan B. „Principal Network Analysis“. Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1175.
Der volle Inhalt der QuelleZhou, Lin. „Active network management and uncertainty analysis in distribution networks“. Thesis, University of Bath, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.675697.
Der volle Inhalt der Quelle鄧沛權 und Pui-kuen Tang. „Business network: network marketing : analysis of network marketing using business network theories“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31268316.
Der volle Inhalt der QuelleBücher zum Thema "Network analysis"
Brandes, Ulrik, und Thomas Erlebach, Hrsg. Network Analysis. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b106453.
Der volle Inhalt der QuelleCombined Higher Education Software Team., Environmental Systems Research Institute und Manchester Computing Centre, Hrsg. Network analysis. Manchester: Manchester Computing Centre, 1993.
Den vollen Inhalt der Quelle findenHodgson. Novell Netware protocol and network analysis. Manchester: University of Manchester, Department of Computer Science, 1996.
Den vollen Inhalt der Quelle findenFreeman, Linton. Social Network Analysis. 1 Oliver's Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications Ltd, 2008. http://dx.doi.org/10.4135/9781446263464.
Der volle Inhalt der QuelleKnoke, David, und Song Yang. Social Network Analysis. 2455 Teller Road, Thousand Oaks California 91320 United States of America: SAGE Publications, Inc., 2008. http://dx.doi.org/10.4135/9781412985864.
Der volle Inhalt der QuelleXu, Kuai. Network Behavior Analysis. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8325-1.
Der volle Inhalt der QuelleHolt, Alan. Network Performance Analysis. London: Springer London, 2008. http://dx.doi.org/10.1007/978-1-84628-823-4.
Der volle Inhalt der QuelleFellin, Tommaso, und Michael Halassa, Hrsg. Neuronal Network Analysis. Totowa, NJ: Humana Press, 2012. http://dx.doi.org/10.1007/978-1-61779-633-3.
Der volle Inhalt der QuelleBonald, Thomas, und Mathieu Feuillet. Network Performance Analysis. Hoboken, NJ, USA: John Wiley & Sons, Inc, 2011. http://dx.doi.org/10.1002/9781118602911.
Der volle Inhalt der QuelleHorvath, Steve. Weighted Network Analysis. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-8819-5.
Der volle Inhalt der QuelleBuchteile zum Thema "Network analysis"
Cellerino, Alessandro, und Michele Sanguanini. „Network analysis“. In Transcriptome Analysis, 99–119. Pisa: Scuola Normale Superiore, 2018. http://dx.doi.org/10.1007/978-88-7642-642-1_7.
Der volle Inhalt der QuelleBrinkmeier, Michael, und Thomas Schank. „Network Statistics“. In Network Analysis, 293–317. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31955-9_11.
Der volle Inhalt der QuelleBaur, Michael, und Marc Benkert. „Network Comparison“. In Network Analysis, 318–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31955-9_12.
Der volle Inhalt der QuelleBaumann, Nadine, und Sebastian Stiller. „Network Models“. In Network Analysis, 341–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31955-9_13.
Der volle Inhalt der QuelleCostantini, Giulio, und Marco Perugini. „Network Analysis“. In The Wiley Handbook of Personality Assessment, 74–89. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781119173489.ch6.
Der volle Inhalt der QuelleRennels, Donald C., und Hobart M. Hudson. „Network Analysis“. In Pipe Flow, 49–60. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118275276.ch5.
Der volle Inhalt der QuelleCostantini, Giulio, und Marco Perugini. „Network Analysis“. In Encyclopedia of Personality and Individual Differences, 3184–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-24612-3_1332.
Der volle Inhalt der QuelleVanhoucke, Mario. „Network Analysis“. In Integrated Project Management Sourcebook, 11–27. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27373-0_3.
Der volle Inhalt der QuelleGallupe, Owen. „Network Analysis“. In The Handbook of Measurement Issues in Criminology and Criminal Justice, 555–75. Hoboken, NJ: John Wiley & Sons, Inc, 2016. http://dx.doi.org/10.1002/9781118868799.ch25.
Der volle Inhalt der QuelleMorrissey, Sean. „Network Analysis“. In iOS Forensic Analysis for iPhone, iPad, and iPod touch, 323–42. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3343-5_10.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Network analysis"
Melo, Renato Silva, und André Luís Vignatti. „Preprocessing Rules for Target Set Selection in Complex Networks“. In Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/brasnam.2020.11167.
Der volle Inhalt der QuelleBursztyn, Victor S., Marcelo Granja Nunes und Daniel R. Figueiredo. „How Congressmen Connect: Analyzing Voting and Donation Networks in the Brazilian Congress“. In Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6451.
Der volle Inhalt der QuelleMaruyama, William Takahiro, und Luciano Antonio Digiampietri. „Co-authorship prediction in academic social network“. In Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6445.
Der volle Inhalt der QuelleBrandão, Michele A., Matheus A. Diniz und Mirella M. Moro. „Using Topological Properties to Measure the Strength of Co-authorship Ties“. In Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6455.
Der volle Inhalt der QuelleSoares, Rafael Henrique Santos, Jorge H. C. Fernandes und Ricardo Sampaio. „Formal Information Flows Among Top Authorities of the Brazilian Federal Government based on Co-word Analysis of Data Published in the Official Gazette“. In Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6450.
Der volle Inhalt der QuelleOliveira, Davi Alves, Erica dos Santos Rodrigues und Hernane Borges de Barros Pereira. „Affinity Networks as a Tool for Assessing Writing Processes: A Novel Method Utilizing Pause-Based Visibility Graphs“. In Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/brasnam.2023.229991.
Der volle Inhalt der QuelleSilva, Mariana O., Gabriel P. Oliveira und Mirella M. Moro. „Analyzing Character Networks in Portuguese-language Literary Works“. In Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/brasnam.2023.230585.
Der volle Inhalt der QuellePopescu, Daniela, Elena Serban, Carmen-Ema Panaite und Abel Herna´ndez-Guerrero. „Hydraulic Analysis of a District Heating Network“. In ASME 2008 9th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2008. http://dx.doi.org/10.1115/esda2008-59352.
Der volle Inhalt der QuelleAshjaee, Mehdi, Reza Afzali, Mohammad Niknami, Mehdi Amiri und Tooraj Yousefi. „Neural Network Analysis of Free Convection Around Isothermal Elliptic Tube“. In ASME 8th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2006. http://dx.doi.org/10.1115/esda2006-95238.
Der volle Inhalt der QuelleMasys, Anthony. „Networks and network analysis for defence and security“. In ASONAM '13: Advances in Social Networks Analysis and Mining 2013. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2492517.2492602.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Network analysis"
Kalb, Jeffrey L., und David S. Lee. Network topology analysis. Office of Scientific and Technical Information (OSTI), Januar 2008. http://dx.doi.org/10.2172/1028919.
Der volle Inhalt der QuelleBonnett, Michaela, Chimdi Ezeigwe, Meaghan Kennedy und Teri Garstka. Using Social Network Analysis to Link Community Health and Network Strength. Orange Sparkle Ball, Juli 2023. http://dx.doi.org/10.61152/scsf6662.
Der volle Inhalt der QuelleR.T. Rosche. IDCS NETWORK ALTERNATIVES ANALYSIS. Office of Scientific and Technical Information (OSTI), Februar 1995. http://dx.doi.org/10.2172/883443.
Der volle Inhalt der QuelleMeyer, Robert A., und David A. Perreault. Communication Network Software Analysis. Fort Belvoir, VA: Defense Technical Information Center, Juni 1994. http://dx.doi.org/10.21236/ada281019.
Der volle Inhalt der QuelleZinilli, Antonio. From Basic to Advanced Network Analysis in R. Instats Inc., 2024. http://dx.doi.org/10.61700/t68209rotxkow930.
Der volle Inhalt der QuelleLee, Hyun-Jung, HyunJu Shin, Kyu-Hye Lee, Seulah Lee und Ye-Jin In. Semantic Network Analysis of Gorpcore. Ames (Iowa): Iowa State University. Library, Januar 2019. http://dx.doi.org/10.31274/itaa.8218.
Der volle Inhalt der QuelleChristie, Alan M. Network Survivability Analysis Using Easel. Fort Belvoir, VA: Defense Technical Information Center, Dezember 2002. http://dx.doi.org/10.21236/ada413664.
Der volle Inhalt der QuelleJohannes, James D., Tim Lewis, Kyle Hoover, Andrew Fanning und Chad Williams. Computer Network Analysis and Implementation. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1998. http://dx.doi.org/10.21236/ada391962.
Der volle Inhalt der QuellePowell, Bruce C. Artificial Neural Network Analysis System. Fort Belvoir, VA: Defense Technical Information Center, Februar 2001. http://dx.doi.org/10.21236/ada392390.
Der volle Inhalt der QuelleBrunner, James, Aaron Robinson und Chain Patrick Sam Guy. Is Transkingdom Network Analysis Possible? Office of Scientific and Technical Information (OSTI), November 2023. http://dx.doi.org/10.2172/2377943.
Der volle Inhalt der Quelle