Academic literature on the topic 'Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks":

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
2

Hyman, William A. "Medical Devices, Computers, and Computer Networks." Biomedical Safety & Standards 39, no. 1 (January 2009): 1–4. http://dx.doi.org/10.1097/01.bmsas.0000342710.32111.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ren, Xiaohui, Iftikhar Ahmed, and Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (August 1, 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we aim to compute topological invariants of some computer related graph networks. We computed various irregularities indices for the graphs of OTIS swapped network \(OP_a\) and Biswapped Networks \(Bsw(Pa).\)
4

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
5

Bogucki, Peter. "Computer Networks." Anthropology News 27, no. 6 (September 1986): 2. http://dx.doi.org/10.1111/an.1986.27.6.2.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brinn, L. W. "Computer Networks." ACM SIGCSE Bulletin 17, no. 1 (March 1985): 135–39. http://dx.doi.org/10.1145/323275.323305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jensen, Pamela S. "Computer Networks." Investigative Radiology 20, no. 6 (September 1985): 648. http://dx.doi.org/10.1097/00004424-198509000-00026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mathew, Jincy C. "Review on Architecture of Computer Networks." International Journal of Psychosocial Rehabilitation 24, no. 4 (April 30, 2020): 6997–7001. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

GOTO, Eiji. "Using Computers and Computer Networks in U.S.A." Journal of Agricultural Meteorology 50, no. 2 (1994): 135–39. http://dx.doi.org/10.2480/agrmet.50.135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.

Dissertations / Theses on the topic "Computer networks":

1

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Watson, Jason. "Monitoring computer-based training over computer networks." Thesis, University of Huddersfield, 1999. http://eprints.hud.ac.uk/id/eprint/6910/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As time is becoming an ever more precious commodity in today's workplace, effective training is also taking on an increasingly important role, but finding the time to train today's workforce is becoming increasingly difficult. With employees in diverse locations across the country and across the world and some working from home, on the road or "hot-desking" we have to take a new approach to training. Fortunately computer-based training can solve many of the traditional problems such as the need to bring all trainees together in the same location at the same time. With today's sophisticated computer-based training applications motivated employees can train where they want, at home or at work, and when they want, at lunchtime or after work. However, there is also a basic legal and pedagogical requirement to record who has been trained and in what. This is very easy in a traditional training scenario, but much more difficult in today's training environments. This problem is currently the major obstacle to the widespread adoption of computer-based training, and looking for a solution to these problems was the aim of this research. This research began by investigating the processes used by multimedia developers when creating Computer Based Training (CBT) applications, identifying the current methodologies, techniques and tools that they use. Very quickly it was easy to see that developers use a whole range of development tools and that their expertise is primarily in the design of training applications, not in programming. Similarly the students want credit for the training that they undergo but do not want to be distracted by an intrusive monitoring system. The role of the Training Manager is equally important. He or she needs to be able to quickly assess the situation of an individual or a group of students and take remedial action where necessary. Balancing all of these needs in a single generic solution to the monitored training problem was the single biggest challenge. This research has addressed these important problems and has developed a solution that permits the monitoring of student training progress in any location and at any time in a way that is totally transparent to the user. The author integrates this additional functionality into a new or existing training through a drag-and-drop interface which is very easy to use, creating a monitoring experience which is totally transparent to the trainee and the Training Manager receives a summary database of student progress. Specifically the system uses a library of C++ functions that interface to Authorware, Director, Toolbook or a C++ application. The functions permit an author to open a monitoring database at the start of a training session and close it at the end. Whilst the database is open we can record any data that we require regarding student progress and performance. On closing the session the resulting database is sent to a central collation point using FTP. Students are identified automatically through their IP address, from their network login or ask them to logon to the training session manually. The system can write any database format that is required and if the network is unavailable when the session ends the database will be saved locally until the next training session. At the central collation point a specially written application takes the many databases created by individual training sessions and collates them into one large database that can be queried by the training manager. Small trials were initially performed with a prototype system at the collaborating company, CBL Technology Ltd, which in turn led to larger trials at both Cable and Wireless Communication PLC and the University of Huddersfield. In these trials authors of CBT applications found the system extremely easy to integrate into their applications and the training managers and course leaders responsible for training outcomes, found the feedback on student performance, that the system provided, invaluable. This research had demonstrated that it is possible to create a generic monitored training solution that balances the needs of the trainee, the author and the Training Manager. Trainees can train at any time, anywhere in the world, over the Internet or from CDROM and a training manager can monitor their progress provided that at some time they connect to a computer network.
4

Somalingam, Ramesh Ramvel. "Network performance monitoring for multimedia networks." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Multimedia applications require certain guarantees from the underlying system concerning quality of various parameters, such as the throughput, delay, loss rate etc. We assume that such quality of service (QoS) parameters are normally agreed upon for the duration of a session, and should be maintained throughout that session. If a QoS violation occurs, possibly due to the temporary overload of one of the system components, either the user will notice this and may request a renegotiation of the quality and cost parameters, or the system will automatically do some internal reconfiguration in order to recover from the problem. In the latter case, the system needs to continuously monitor the relevant performance parameters. In this thesis, we develop means for performing such monitoring in the context of a News-on-Demand application. We have designed and implemented a distributed QoS monitoring facility that can be used by distributed multimedia applications for QoS monitoring and QoS violation detection. The system consists of a measurement component and an administrative component. The measurement component is responsible for continuously measuring the end-to-end QoS parameters of connections between the server and client application, while the administrative component is responsible for the overall administration of the monitoring system, which includes raising QoS violation notifications if the quality of service is violated.
5

Denda, Robert. "Fairness in computer networks /." Aachen : Shaker, 2004. http://www.loc.gov/catdir/toc/fy0715/2007464042.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2007.
Thesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
7

Otten, Fred. "Network simulation for professional audio networks." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Audio Engineers are required to design and deploy large multi-channel sound systems which meet a set of requirements and use networking technologies such as Firewire and Ethernet AVB. Bandwidth utilisation and parameter groupings are among the factors which need to be considered in these designs. An implementation of an extensible, generic simulation framework would allow audio engineers to easily compare protocols and networking technologies and get near real time responses with regards to bandwidth utilisation. Our hypothesis is that an application-level capability can be developed which uses a network simulation framework to enable this process and enhances the audio engineer’s experience of designing and configuring a network. This thesis presents a new, extensible simulation framework which can be utilised to simulate professional audio networks. This framework is utilised to develop an application - AudioNetSim - based on the requirements of an audio engineer. The thesis describes the AudioNetSim models and implementations for Ethernet AVB, Firewire and the AES- 64 control protocol. AudioNetSim enables bandwidth usage determination for any network configuration and connection scenario and is used to compare Firewire and Ethernet AVB bandwidth utilisation. It also applies graph theory to the circular join problem and provides a solution to detect circular joins.
8

Brande, Julia K. Jr. "Computer Network Routing with a Fuzzy Neural Network." Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/29685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. As more individuals transmit data through a computer network, the quality of service received by the users begins to degrade. A major aspect of computer networks that is vital to quality of service is data routing. A more effective method for routing data through a computer network can assist with the new problems being encountered with today's growing networks. Effective routing algorithms use various techniques to determine the most appropriate route for transmitting data. Determining the best route through a wide area network (WAN), requires the routing algorithm to obtain information concerning all of the nodes, links, and devices present on the network. The most relevant routing information involves various measures that are often obtained in an imprecise or inaccurate manner, thus suggesting that fuzzy reasoning is a natural method to employ in an improved routing scheme. The neural network is deemed as a suitable accompaniment because it maintains the ability to learn in dynamic situations. Once the neural network is initially designed, any alterations in the computer routing environment can easily be learned by this adaptive artificial intelligence method. The capability to learn and adapt is essential in today's rapidly growing and changing computer networks. These techniques, fuzzy reasoning and neural networks, when combined together provide a very effective routing algorithm for computer networks. Computer simulation is employed to prove the new fuzzy routing algorithm outperforms the Shortest Path First (SPF) algorithm in most computer network situations. The benefits increase as the computer network migrates from a stable network to a more variable one. The advantages of applying this fuzzy routing algorithm are apparent when considering the dynamic nature of modern computer networks.
Ph. D.
9

Kusetoğulları, Hüseyin. "Network routing optimisation and effective multimedia transmission to enhance QoS in communication networks." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/46802/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the increased usage of communication services in networks, finding routes for reliable transmission and providing effective multimedia communication have become very challenging problems. This has been a strong motivation to examine and develop methods and techniques to find routing paths efficiently and to provide effective multimedia communication. This thesis is mainly concerned with designing, implementing and adapting intelligent algorithms to solve the computational complexity of network routing problems and testing the performance of intelligent algorithms’ applications. It also introduces hybrid algorithms which are developed by using the similarities of genetic algorithm (GA) and particle swarm optimization (PSO) intelligent systems algorithms. Furthermore, it examines the design of a new encoding/decoding method to offer a solution for the problem of unachievable multimedia information in multimedia multicast networks. The techniques presented and developed within the thesis aim to provide maximum utilization of network resources for handling communication problems. This thesis first proposes GA and PSO implementations which are adapted to solve the single and multi-objective functions in network routing problems. To offer solutions for network routing problems, binary variable-length and priority based encoding methods are used in intelligent algorithms to construct valid paths or potential solutions. The performance of generation operators in GA and PSO is examined and analyzed by solving the various shortest path routing problems and it is shown that the performance of algorithms varies based on the operators selected. Moreover, a hybrid algorithm is developed based on the lack of search capability of intelligent algorithms and implemented to solve the single objective function. The proposed method uses a strategy of sharing information between GA and PSO to achieve significant performance enhancement to solve routing optimization problems. The simulation results demonstrate the efficiency of the hybrid algorithm by optimizing the shortest path routing problem. Furthermore, intelligent algorithms are implemented to solve a multi-objective function which involves more constraints of resources in communication networks. The algorithms are adapted to find the multi-optimal paths to provide effective multimedia communication in lossy networks. The simulation results verify that the implemented algorithms are shown as efficient and accurate methods to solve the multi-objective function and find multi-optimal paths to deliver multimedia packets in lossy networks. Furthermore, the thesis proposes a new encoding/decoding method to maximize throughput in multimedia multicast networks. The proposed method is combined with two most used Multiple Description Coding (MDC) methods. The utilization of the proposed method is discussed by comparing two the MDC methods. Through analyzing the simulation results using these intelligent systems algorithms, it has been shown that feasible solutions can be obtained by optimizing complex network problems. Moreover, the methods proposed and developed, which are hybrid algorithms and the encoding/decoding method also demonstrate their efficiency and effectiveness as compared with other techniques.
10

Ekici, Eylem. "Routing and multicasting in satellite IP networks." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15605.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer networks":

1

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaj, Piotr, Michał Sawicki, and Andrzej Kwiecień, eds. Computer Networks. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21952-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gaj, Piotr, Andrzej Kwiecień, and Piotr Stera, eds. Computer Networks. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tanenbaum, Andrew S. Computer networks. 3rd ed. New Delhi, India: Prentice Hall of India Private Ltd., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gaj, Piotr, Wojciech Gumiński, and Andrzej Kwiecień, eds. Computer Networks. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50719-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gaj, Piotr, Michał Sawicki, Grażyna Suchacka, and Andrzej Kwiecień, eds. Computer Networks. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer networks":

1

Ashley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security, 45–59. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rathore, Heena. "Computer Networks." In Mapping Biological Systems to Network Systems, 11–25. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29782-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Taylor, Graham. "Computer Networks." In Making Sense of Information Technology, 128–50. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-10649-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lewin, Douglas, and David Noaks. "Computer networks." In Theory and Design of Digital Computer Systems, 349–74. Dordrecht: Springer Netherlands, 1992. http://dx.doi.org/10.1007/978-94-011-1576-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zane Gray, R. "Computer Networks." In Informatics for the Clinical Laboratory, 125–43. New York, NY: Springer New York, 2005. http://dx.doi.org/10.1007/978-0-387-22629-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fox, Richard. "Computer Networks." In Information Technology, 193–238. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kale, Vivek. "Computer Networks." In Agile Network Businesses, 55–80. New York : CRC Press, 2017.: Auerbach Publications, 2017. http://dx.doi.org/10.4324/9781315368559-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

de Alencar, Marcelo Sampaio. "Computer Networks." In Cryptography and Network Security, 91–121. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Graham, Fan Chung, and Edward K. Blum. "Computer Networks." In Computer Science, 105–37. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1168-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Poshtkohi, Alireza, and M. B. Ghaznavi-Ghoushchi. "Computer Networks." In Implementing Parallel and Distributed Systems, 179–236. Boca Raton: Auerbach Publications, 2023. http://dx.doi.org/10.1201/9781003379041-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks":

1

Brinn, L. W. "Computer Networks." In the sixteenth SIGCSE technical symposium. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/323287.323305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pham, Nam, Hao Yu, and Bogdan M. Wilamowski. "Neural Network Trainer through Computer Networks." In 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE, 2010. http://dx.doi.org/10.1109/aina.2010.169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Youssef, M. W. "Securing computer networks communication by modifying computer network communication protocols." In 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pan, Jianping. "Teaching computer networks in a real network." In the 41st ACM technical symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1734263.1734311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, Mariusz Kamola, Krzysztof Malinowski, Przemyslaw Jaskola, and Michal Marks. "Network-wide power management in computer networks." In 2013 22nd ITC Specialist Seminar on Energy Efficient and Green Networking (SSEEGN). IEEE, 2013. http://dx.doi.org/10.1109/sseegn.2013.6705398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhong, G., K. Takahashi, S. Amamiya, D. Matsuno, T. Mine, and M. Amamiya. "From computer networks to agent networks." In 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the. IEEE, 2003. http://dx.doi.org/10.1109/hicss.2003.1174210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Seshadri, P., and Larry C. Witte. "Computer Aided Optimal Design of Heat Exchanger Networks." In ASME 1991 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1991. http://dx.doi.org/10.1115/cie1991-0076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract A method for finding the best (optimal) operating layout of heat exchangers in complicated thermal networks is developed in this paper. Computer algorithms are developed that take advantage of pinch technology and economic considerations, and exergetic constraints as well as conventional heat and mass balances. Our goals were to achieve minimum loss of exergy between hot and cold streams subject to practical system constraints. Furthermore, resulting networks should be limited to no more units than the theoretical minimum. The ultimate goal was to minimize investment and operating costs for a set of fixed overall system constaints. These goals were realized by developing a computer-based nonlinear multiple objective optimization algorithm that included the elements discussed above. The final solution is a synthesis of the best system using the above-described mathematical formulation. Results for a 4-stream heat exchanger network are presented in terms of the minimum temperature difference at the pinch point. The influence of the minimum temperature difference on capital cost, heat transfer area, exergetic losses and second law efficiency of various heat exchangers in the network is presented.
9

Cotter, David. "Ultrafast Computer Networking." In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.ofb.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In recent years research on ‘optics in computing’ has focused increasingly on the use of optical interconnects within future electronic computers, packet switches and routers to enhance their power and performance as stand-alone machines. At the same time, however, the interconnection between computers today has undergone a revolution; the widespread adoption of common network transport protocols has stimulated the rapidly increasing and extensive use of inter-networking, and this is manifest by the explosive growth of the global Internet. Increasingly, intelligence— data, applications, computing power itself—is becoming distributed across networks of machines. The efficiency with which machines are interconnected becomes vitally important for acceptable performance of these advanced distributed applications. The interconnection must certainly provide sufficient bandwidth, but equally important is the need to minimise latency. A simple and common example of the inadequacy of today’s computer networks is the frustratingly poor performance often experienced by users of the Worldwide Web. Increasingly in the future there will be a demand for multi-media applications that can operate with a slick and seamless interface to the network, and that provide long interaction periods with human immersion in computer generated environments, synthesised from wide-ranging distributed intelligence. There will also be an increasing volume of computer-to-computer interaction with little human intervention, using software agents. For these applications, interconnection latency must be minimised and should ideally be dominated by the fundamental delay due to the optical transmission time-of-flight.
10

Wellman, Barry. "For a social network analysis of computer networks." In the 1996 ACM SIGCPR/SIGMIS conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238857.238860.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer networks":

1

Barkley, John. Personal computer networks. Gaithersburg, MD: National Bureau of Standards, 1986. http://dx.doi.org/10.6028/nbs.sp.500-140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pabrai, Uday, Cary Dowat, and Janet Carlson. Understanding and using computer networks. Office of Scientific and Technical Information (OSTI), January 1990. http://dx.doi.org/10.2172/1128743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Corley, Michael J. Anomaly Detection in Disparate Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, December 2005. http://dx.doi.org/10.21236/ada443328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raychev, Nikolay. Neuromorphic computer networks with synaptic connections. Web of Open Science, July 2020. http://dx.doi.org/10.37686/nrl.v1i1.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tolmie, D. E., W. St. John, and D. H. DuBois. Super-speed computer interfaces and networks. Office of Scientific and Technical Information (OSTI), October 1997. http://dx.doi.org/10.2172/534509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cradduck, Trevor D., Martin S. Weinhous, and Neal Tobochnik. E-Mail and Academic Computer Networks. AAPM, 1990. http://dx.doi.org/10.37206/29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Berry, Nina M., and Teresa H. Ko. On computer vision in wireless sensor networks. Office of Scientific and Technical Information (OSTI), September 2004. http://dx.doi.org/10.2172/919195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Franklin, Derek L. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Van Randwyk, Jamie A. Position paper on active countermeasures for computer networks. Office of Scientific and Technical Information (OSTI), July 2003. http://dx.doi.org/10.2172/918333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Grimmell, W. C. Computing Path Tables for Quickest Multipaths In Computer Networks. Office of Scientific and Technical Information (OSTI), December 2004. http://dx.doi.org/10.2172/885861.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography