Academic literature on the topic 'Computer network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network"

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Kobayashi, Shin-ya. "‘Computer’ × n + ‘Network’ ⇒ ‘Computer & Network’ ≠ ‘Computer Netwok’." IEEJ Transactions on Electronics, Information and Systems 121, no. 1 (2001): 52. http://dx.doi.org/10.1541/ieejeiss1987.121.1_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Full text
Abstract:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Xiaohui, Iftikhar Ahmed, and Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (August 1, 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Full text
Abstract:
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we aim to compute topological invariants of some computer related graph networks. We computed various irregularities indices for the graphs of OTIS swapped network \(OP_a\) and Biswapped Networks \(Bsw(Pa).\)
APA, Harvard, Vancouver, ISO, and other styles
5

Refaee, Eshrag A., and Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors." Complexity 2021 (April 26, 2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.

Full text
Abstract:
There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but not to one another. As such, any failure in the central computer will result in a failure of the entire network and computers in star network will not be able to communicate. The star topology design can be represented by a graph where vertices represent the computer nodes and edges represent the links between the computer nodes. In this paper, we study the vertex-edge-based topological descriptor for a newly designed hexagon star network.
APA, Harvard, Vancouver, ISO, and other styles
6

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
APA, Harvard, Vancouver, ISO, and other styles
7

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Full text
Abstract:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
APA, Harvard, Vancouver, ISO, and other styles
8

Yeh, Wei-Chang, Edward Lin, and Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus." Complexity 2021 (July 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.

Full text
Abstract:
With the rapid development of network technology, computer viruses have developed at a fast pace. The threat of computer viruses persists because of the constant demand for computers and networks. When a computer virus infects a facility, the virus seeks to invade other facilities in the network by exploiting the convenience of the network protocol and the high connectivity of the network. Hence, there is an increasing need for accurate calculation of the probability of computer-virus-infected areas for developing corresponding strategies, for example, based on the possible virus-infected areas, to interrupt the relevant connections between the uninfected and infected computers in time. The spread of the computer virus forms a scale-free network whose node degree follows the power rule. A novel algorithm based on the binary-addition tree algorithm (BAT) is proposed to effectively predict the spread of computer viruses. The proposed BAT utilizes the probability derived from PageRank from the scale-free network together with the consideration of state vectors with both the temporal and learning effects. The performance of the proposed algorithm was verified via numerous experiments.
APA, Harvard, Vancouver, ISO, and other styles
9

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Full text
Abstract:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
APA, Harvard, Vancouver, ISO, and other styles
10

M, Priyanand. "Computer Network." International Journal for Research in Applied Science and Engineering Technology 9, no. 3 (March 31, 2021): 1302–5. http://dx.doi.org/10.22214/ijraset.2021.33227.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer network"

1

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brande, Julia K. Jr. "Computer Network Routing with a Fuzzy Neural Network." Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/29685.

Full text
Abstract:
The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. As more individuals transmit data through a computer network, the quality of service received by the users begins to degrade. A major aspect of computer networks that is vital to quality of service is data routing. A more effective method for routing data through a computer network can assist with the new problems being encountered with today's growing networks. Effective routing algorithms use various techniques to determine the most appropriate route for transmitting data. Determining the best route through a wide area network (WAN), requires the routing algorithm to obtain information concerning all of the nodes, links, and devices present on the network. The most relevant routing information involves various measures that are often obtained in an imprecise or inaccurate manner, thus suggesting that fuzzy reasoning is a natural method to employ in an improved routing scheme. The neural network is deemed as a suitable accompaniment because it maintains the ability to learn in dynamic situations. Once the neural network is initially designed, any alterations in the computer routing environment can easily be learned by this adaptive artificial intelligence method. The capability to learn and adapt is essential in today's rapidly growing and changing computer networks. These techniques, fuzzy reasoning and neural networks, when combined together provide a very effective routing algorithm for computer networks. Computer simulation is employed to prove the new fuzzy routing algorithm outperforms the Shortest Path First (SPF) algorithm in most computer network situations. The benefits increase as the computer network migrates from a stable network to a more variable one. The advantages of applying this fuzzy routing algorithm are apparent when considering the dynamic nature of modern computer networks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
3

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Full text
Abstract:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of computer network port vulnerabilities from NIST’s Network Vulnerability Database (NVD) are conducted, and via utilization of NVD’s Common Vulnerability Scoring System values, composite scores are created for each computer on the network, and then collectively a composite score is computed for the entire network, which accurately represents the health of the entire network. Special concerns about small numbers of highly vulnerable computers or especially critical members of the network are confronted.
APA, Harvard, Vancouver, ISO, and other styles
5

Somalingam, Ramesh Ramvel. "Network performance monitoring for multimedia networks." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23939.

Full text
Abstract:
Multimedia applications require certain guarantees from the underlying system concerning quality of various parameters, such as the throughput, delay, loss rate etc. We assume that such quality of service (QoS) parameters are normally agreed upon for the duration of a session, and should be maintained throughout that session. If a QoS violation occurs, possibly due to the temporary overload of one of the system components, either the user will notice this and may request a renegotiation of the quality and cost parameters, or the system will automatically do some internal reconfiguration in order to recover from the problem. In the latter case, the system needs to continuously monitor the relevant performance parameters. In this thesis, we develop means for performing such monitoring in the context of a News-on-Demand application. We have designed and implemented a distributed QoS monitoring facility that can be used by distributed multimedia applications for QoS monitoring and QoS violation detection. The system consists of a measurement component and an administrative component. The measurement component is responsible for continuously measuring the end-to-end QoS parameters of connections between the server and client application, while the administrative component is responsible for the overall administration of the monitoring system, which includes raising QoS violation notifications if the quality of service is violated.
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Anthony Eli. "On network coding capacity : matroidal networks and network capacity regions." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62657.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 68-70).
One fundamental problem in the field of network coding is to determine the network coding capacity of networks under various network coding schemes. In this thesis, we address the problem with two approaches: matroidal networks and capacity regions. In our matroidal approach, we prove the converse of the theorem which states that, if a network is scalar-linearly solvable then it is a matroidal network associated with a representable matroid over a finite field. As a consequence, we obtain a correspondence between scalar-linearly solvable networks and representable matroids over finite fields in the framework of matroidal networks. We prove a theorem about the scalar-linear solvability of networks and field characteristics. We provide a method for generating scalar-linearly solvable networks that are potentially different from the networks that we already know are scalar-linearly solvable. In our capacity region approach, we define a multi-dimensional object, called the network capacity region, associated with networks that is analogous to the rate regions in information theory. For the network routing capacity region, we show that the region is a computable rational polytope and provide exact algorithms and approximation heuristics for computing the region. For the network linear coding capacity region, we construct a computable rational polytope, with respect to a given finite field, that inner bounds the linear coding capacity region and provide exact algorithms and approximation heuristics for computing the polytope. The exact algorithms and approximation heuristics we present are not polynomial time schemes and may depend on the output size.
by Anthony Eli Kim.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Geha, Abbas. "Computer enhanced network design." Thesis, University of Sussex, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.344069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vega, Juan Carlos. "Computer network operations methodology." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FVega.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer network"

1

Shinde, S. S. Computer network. New Delhi: New Age International, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dean, Tamara. Network+ guide to networks. Cambridge, MA: Course Technology, Thomson Learning, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Network+ guide to networks. Cambridge, MA: Course Technology, Thomson Learning, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

W, Thomas Blair, ed. The Network Press QuickPath to NetWare 4.11 networks. 2nd ed. San Francisco: Network Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Network+ guide to networks. 4th ed. Boston, Mass: Thomson/Course Technology, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Network+ guide to networks. 3rd ed. Boston, Mass: Thomson/Course Technology, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Isachyenko, Olyeg. Computer network software. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1033087.

Full text
Abstract:
The tutorial includes information about the main types of computer network software, modern Web technologies, and popular Web application development tools. Meets the requirements of the Federal state educational standards of secondary professional education of the last generation. Designed for students of secondary professional education, enrolled in the enlarged group of specialties 09.02.00 "computer science" and studying discipline "Software, computer networks and Software, computer networks and Web servers." It can also be useful for students of higher educational institutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Kotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gorodetsky, Vladimir, Igor Kotenko, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer network"

1

Kale, Vivek. "Computer Networks." In Agile Network Businesses, 55–80. New York : CRC Press, 2017.: Auerbach Publications, 2017. http://dx.doi.org/10.4324/9781315368559-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cole, Robert. "Computer Network Technology." In Computer Communications, 84–103. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cole, Robert. "The Computer Network." In Computer Communications, 119–40. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Computer Network Fundamentals." In Guide to Computer Network Security, 3–40. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizza, Joseph Migga. "Computer Network Fundamentals." In Texts in Computer Science, 3–40. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kizza, Joseph Migga. "Computer Network Fundamentals." In Guide to Computer Network Security, 3–41. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. "Computer Network Vulnerabilities." In Guide to Computer Network Security, 89–105. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Computer Network Fundamentals." In Guide to Computer Network Security, 3–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lefebvre, E. "Computer Network Security." In Multisensor Fusion, 765–78. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dieminger, Walter, Gerd K. Hartmann, and Reinhart Leitinger. "Computer Network Communications." In The Upper Atmosphere, 942–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/978-3-642-78717-1_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network"

1

Bates, Richard J. S., and Anujan Varma. "Broadband Computer Network Based on Optical Subcarrier Multiplexing." In Photonic Switching. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/phs.1991.fd4.

Full text
Abstract:
An optical passive-star network consists of a number of stations interconnected in a star topology by means of a central passive optical coupler. These networks offer a reliable and inexpensive means for implementation of local-area and room-area networks, multiprocessor interconnection networks, I/O buses, and workstation clusters. Optical subcarrier multiplexing (SCM) provides a means to divide the aggregate bandwidth of the optical medium in an optical passive-star network into multiple channels, each offering a fraction of the aggregate bandwidth. A network testbed to evaluate the SCM technology and its likely applications to computer-system interconnection are the subject of this paper.
APA, Harvard, Vancouver, ISO, and other styles
2

Pham, Nam, Hao Yu, and Bogdan M. Wilamowski. "Neural Network Trainer through Computer Networks." In 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE, 2010. http://dx.doi.org/10.1109/aina.2010.169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Youssef, M. W. "Securing computer networks communication by modifying computer network communication protocols." In 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elenbogen, Bruce S. "Computer network management." In The proceedings of the thirtieth SIGCSE technical symposium. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/299649.299713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pan, Jianping. "Teaching computer networks in a real network." In the 41st ACM technical symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1734263.1734311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, Mariusz Kamola, Krzysztof Malinowski, Przemyslaw Jaskola, and Michal Marks. "Network-wide power management in computer networks." In 2013 22nd ITC Specialist Seminar on Energy Efficient and Green Networking (SSEEGN). IEEE, 2013. http://dx.doi.org/10.1109/sseegn.2013.6705398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nanda, Priyadarsi, and Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)." In IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/3258155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wellman, Barry. "For a social network analysis of computer networks." In the 1996 ACM SIGCPR/SIGMIS conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238857.238860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vakaliuk, Tetiana, Oleksii Chyzhmotria, Olena Chyzhmotria, Dmytro Antoniuk, Valerii Kontsedailo, and Viacheslav Kryvohyzha. "Simulator of Computer Networks and Basic Network Protocols." In 5th Workshop for Young Scientists in Computer Science & Software Engineering. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0012009800003561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cotter, David. "Ultrafast Computer Networking." In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.ofb.1.

Full text
Abstract:
In recent years research on ‘optics in computing’ has focused increasingly on the use of optical interconnects within future electronic computers, packet switches and routers to enhance their power and performance as stand-alone machines. At the same time, however, the interconnection between computers today has undergone a revolution; the widespread adoption of common network transport protocols has stimulated the rapidly increasing and extensive use of inter-networking, and this is manifest by the explosive growth of the global Internet. Increasingly, intelligence— data, applications, computing power itself—is becoming distributed across networks of machines. The efficiency with which machines are interconnected becomes vitally important for acceptable performance of these advanced distributed applications. The interconnection must certainly provide sufficient bandwidth, but equally important is the need to minimise latency. A simple and common example of the inadequacy of today’s computer networks is the frustratingly poor performance often experienced by users of the Worldwide Web. Increasingly in the future there will be a demand for multi-media applications that can operate with a slick and seamless interface to the network, and that provide long interaction periods with human immersion in computer generated environments, synthesised from wide-ranging distributed intelligence. There will also be an increasing volume of computer-to-computer interaction with little human intervention, using software agents. For these applications, interconnection latency must be minimised and should ideally be dominated by the fundamental delay due to the optical transmission time-of-flight.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer network"

1

Lydon, Michael, and Jessie Ford. Computer Science Career Network. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada578200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Piergrossi, Todd M. Optimizing Computer Network Defense Training. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada388382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johannes, James D., Tim Lewis, Kyle Hoover, Andrew Fanning, and Chad Williams. Computer Network Analysis and Implementation. Fort Belvoir, VA: Defense Technical Information Center, October 1998. http://dx.doi.org/10.21236/ada391962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Enslow, P. H., Hamond Jr., Schlag J. L., and J. H. Microprocessor Local Computer Network Evaluation. Fort Belvoir, VA: Defense Technical Information Center, April 1985. http://dx.doi.org/10.21236/ada159914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reed, D. A Discussion on Computer Network Conferencing. RFC Editor, May 1992. http://dx.doi.org/10.17487/rfc1324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lenderman, Curtis C. Computer Network Attack: An Operational Tool? Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada415427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kaetzel, Lawrence J. Computer-integrated knowledge system (CIKS) network:. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Busby, Daniel J. Peacetime Use of Computer Network Attack. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada377624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Robinson, David J. Characterization and Planning for Computer Network Operations. Fort Belvoir, VA: Defense Technical Information Center, July 2010. http://dx.doi.org/10.21236/ada577860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis, and Marsha Robinson. Computer Network Security and Directory Services Architecture. Fort Belvoir, VA: Defense Technical Information Center, March 2000. http://dx.doi.org/10.21236/ada392366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography