Academic literature on the topic 'Computer networks – Europe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Europe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks – Europe"
Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Full textEverett, Cath. "Lancope networks into Europe." Infosecurity Today 3, no. 1 (January 2006): 42–44. http://dx.doi.org/10.1016/s1742-6847(06)70367-6.
Full textMalighetti, Paolo, Gianmaria Martini, Renato Redondi, and Davide Scotti. "Integrators’ Air Transport Networks in Europe." Networks and Spatial Economics 19, no. 2 (February 15, 2018): 557–81. http://dx.doi.org/10.1007/s11067-018-9390-5.
Full textMAIXÉ-ALTÉS, J. CARLES. "The Digitalization of Banking: A New Perspective from the European Savings Banks Industry before the Internet." Enterprise & Society 20, no. 1 (September 4, 2018): 159–98. http://dx.doi.org/10.1017/eso.2018.18.
Full textKruit, Dirk, and Paul A. Cooper. "SHINE: Strategic health informatics networks for Europe." Computer Methods and Programs in Biomedicine 45, no. 1-2 (October 1994): 155–58. http://dx.doi.org/10.1016/0169-2607(94)90039-6.
Full textCherkaoui, Soumaya. "Research Landscape – 6G Networks Research in Europe." IEEE Network 35, no. 6 (November 2021): 4–6. http://dx.doi.org/10.1109/mnet.2021.9687530.
Full textChadwick, Andrew. "Applications of neural networks for industry in Europe." Neurocomputing 1, no. 1 (January 1989): 34. http://dx.doi.org/10.1016/s0925-2312(89)80016-5.
Full textGródek-Szostak, Zofia, Marcin Suder, Rafał Kusa, Anna Szeląg-Sikora, Joanna Duda, and Marcin Niemiec. "Renewable Energy Promotion Instruments Used by Innovation Brokers in a Technology Transfer Network. Case Study of the Enterprise Europe Network." Energies 13, no. 21 (November 3, 2020): 5752. http://dx.doi.org/10.3390/en13215752.
Full textSun, Haosen, and Markus H. Schafer. "WHEN CLOSE TIES LIVE FAR AWAY: PATTERNS AND PREDICTORS OF GEOGRAPHIC NETWORK RANGE AMONG OLDER EUROPEANS." Innovation in Aging 3, Supplement_1 (November 2019): S755. http://dx.doi.org/10.1093/geroni/igz038.2771.
Full textDearlove, Marion J. "The adoption of electronic trading in Western Europe." Computer Communications 17, no. 5 (May 1994): 369–74. http://dx.doi.org/10.1016/0140-3664(94)90051-5.
Full textDissertations / Theses on the topic "Computer networks – Europe"
Schmitz, Ralf. "Advanced transport protocols for wireless and mobile ad hoc networks dissertation in co-operation between Faculty of Computer Science IV, University of Mannheim, Germany and NEC Europe Ltd., Network Laboratories Heidelberg, Germany /." [S.l. : s.n.], 2006. http://madoc.bib.uni-mannheim.de/madoc/volltexte/2007/1410/.
Full textYang, Guangguang. "Rainfall field modelling for European satellite networks." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/rainfall-field-modelling-for-european-satellite-networks(5c9b2bc0-b2df-4787-ac35-4852c2577237).html.
Full textTobal, Marc. "Network Sharing Strategies and Regulations in Europe and the Middle East." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177158.
Full textHaefke, Christian. "The European unemployment puzzle /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2000. http://wwwlib.umi.com/cr/ucsd/fullcit?p9975888.
Full textJung, Francis. "La cartographie assistee par ordinateur du reseau de transport d'electricite de france." Paris 6, 1987. http://www.theses.fr/1987PA066108.
Full textLububu, Steven. "Perception of employees concerning information security policy compliance : case studies of a European and South African university." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2802.
Full textThis study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem is that information leakages have serious consequences for institutions, especially those that rely on information for its sustainability, functionality and competitiveness. As such, institutions ensure that information about their processes, activities and services are secured, which they do through enforcement and compliance of policies. The aim of this study is to explore the extent of non-compliance with information security policy in an institution. The study followed an interpretive, qualitative case study approach to understand the meaningful characteristics of the actual situations of security breaches in institutions. Qualitative data was collected from two universities, using semi-structured interviews, with 17 participants. Two departments were selected: Human Resources and the Administrative office. These two departments were selected based on the following criteria: they both play key roles within an institution, they maintain and improve the university’s policies, and both departments manage and keep confidential university information (Human Resources transects and keeps employees’ information, whilst the Administrative office manages students’ records). This study used structuration theory as a lens to view and interpret the data. The qualitative content analysis was used to analyse documentation, such as brochures and information obtained from the websites of the case study’s universities. The documentation was then further used to support the data from the interviews. The findings revealed some factors that influence non-compliance with regards to information security policy, such as a lack of leadership skills, favouritism, fraud, corruption, insufficiency of infrastructure, lack of security education and miscommunication. In the context of this study, these factors have severe consequences on an institution, such as the loss of the institution’s credibility or the institution’s closure. Recommendations for further study are also made available.
Socrates, Vimig. "Neuro-Integrative Connectivity: A Scientific Workflow-Based Neuroinformatics Platform For Brain Network Connectivity Studies Using EEG Data." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1561655750151063.
Full textGaskell, Gary Ian. "Integrating smart cards into Kerberos." Thesis, Queensland University of Technology, 1999. https://eprints.qut.edu.au/36848/1/36848_Gaskell_2000.pdf.
Full textAshley, Paul. "Security technologies for intranet computing." Thesis, Queensland University of Technology, 1999.
Find full textJaume, Bennasar Andrés. "Las nuevas tecnologías en la administración de justicia. La validez y eficacia del documento electrónico en sede procesal." Doctoral thesis, Universitat de les Illes Balears, 2009. http://hdl.handle.net/10803/9415.
Full textLa primera cuestión se centra en la configuración de los Sistemas de Información de la Oficina Judicial y del Ministerio Fiscal, así como de la informatización de los Registros Civiles, donde el art. 230 LOPJ es la pieza clave. Se estudian sus programas, aplicaciones, la videoconferencia, los ficheros judiciales y las redes de telecomunicaciones que poseen la cobertura de la firma electrónica reconocida, donde cobran gran relevancia los convenios de colaboración tecnológica. La digitalización de las vistas quizá sea una de las cuestiones con más trascendencia, teniendo en cuenta que el juicio es el acto que culmina el proceso. Aunque no todos los proyectos adoptados en el ámbito de la e.justicia se han desarrollado de forma integral, ni han llegado a la totalidad de los órganos judiciales. El objetivo final es lograr una Justicia más ágil y de calidad, a lo cual aspira el Plan Estratégico de Modernización de la Justicia 2009-2012 aprobado recientemente.
En referencia a la segunda perspectiva, no cabe duda que el Ordenamiento jurídico y los tribunales, en el ámbito de la justicia material, otorgan plena validez y eficacia al documento electrónico. Nuestra línea de investigación se justifica porque cada vez son más los procesos que incorporan soportes electrónicos de todo tipo, ya sea al plantearse la acción o posteriormente como medio de prueba (art. 299.2 LEC). Entre otros temas examinamos el documento informático, la problemática que rodea al fax, los sistemas de videograbación y el contrato electrónico.
La tesi s'encarrega d'analitzar, per una part, la integració i el desenvolupament de les noves tecnologies dins l´Administració de Justícia; i, per l'altra, els paràmetres que constitueixen la validesa i l'eficàcia del document electrònic.
La primera qüestió es centra en la configuració dels Sistemes d´Informació de l´Oficina Judicial i del Ministeri Fiscal, així com de la informatització dels Registres Civils, on l'art. 230 LOPJ es la peça clau. S'estudien els seus programes, aplicacions, la videoconferència, el fitxers judicials i les xarxes de telecomunicacions que tenen la cobertura de la firma electrònica reconeguda, on cobren gran rellevància els convenis de col·laboració tecnològica. La digitalització de les vistes tal vegada sigui una de les qüestions amb més transcendència, tenint amb compte que el judici es l'acte que culmina el procés. Però no tots el projectes adoptats en l'àmbit de la e.justicia s'han desenvolupat d'una manera integral ni han arribat a la totalitat dels òrgans judicials. L'objectiu final es assolir una Justícia més àgil i de qualitat, al que aspira el Pla Estratègic de Modernització de la Justícia 2009-2012 aprovat recentment.
En referència a la segona perspectiva, no hi ha dubte que l´Ordenament jurídic i els tribunals, en l'àmbit de la justícia material, donen plena validesa i eficàcia al document electrònic. La nostra línia d'investigació es justifica perquè cada vegada son més el processos que incorporen suports electrònics de tot tipus, ja sigui quant es planteja l'acció o posteriorment como a medi de prova (art. 299.2 LEC). Entre altres temes examinem el document informàtic, la problemàtica que envolta al fax, els sistemes de videogravació i el contracte electrònic.
The thesis seeks to analyse, on the one hand, the integration and development of the new technologies in the Administration of Justice; and, on the other, the parameters which constitute the validity and efficiency of the electronic document.
The first question centres on the configuration of the Information Systems of the Judicial Office and the Public Prosecutor, as well as the computerisation of the Civil Registers, where the art. 230 LOPJ it's the part key. Their programmes, applications, the Video Conferencing, the judicial registers and the telecommunication networks which are covered by the recognised electronic signatures, are studied, where the agreements on technological collaboration gain great relevance. The digitalisation of evidence might perhaps be one of the questions with most consequence, bearing in mind that the judgment is the act by which the process is culminated. Although not all the projects adopted within the compass of e.justice have developed completely nor have reached all the judicial organs. The final objective is to achieve an agile, quality Justice, to which the recently approved Strategic Plan for the Modernisation of Justice aspires.
With reference to the second perspective, there is no doubt that the juridical Ordinance and the tribunals within the compass of material justice grant full validity and efficacy to the electronic document. Our line of investigation is justified because there are more and more processes which are sustained by electronic supports of all kinds, whether it be at the establishment of the action or later, as a proof of it (art. 299.2 LEC). Amongst other things, we examine the computerised document, the problems which surround the fax, the systems for video recording and the electronic contract.
Books on the topic "Computer networks – Europe"
Ewers, Andy. Libraries, networks and Europe: A European networking study. Edited by Ewers Andy, Dempsey Lorcan, Kessler Jack, Smith Neil, and British Library. Research and Development Department. [London]: British Library Research and Development Department, 1994.
Find full textNabil, Abdennadher, Kordon Fabrice, and Ada-Europe (Organization), eds. Reliable software technologies: Ada-Europe 2007 : 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007 : proceedings. Berlin: Springer, 2007.
Find full text(Firm), INPUT, ed. The Network service market: Western Europe, 1990-1995. London: INPUT, 1991.
Find full textRomanovsky, Alexander. Reliable Software Technologies - Ada-Europe 2011: 16th Ada-Europe International Conference on Reliable Software Technologies, Edinburgh, UK, June 20-24, 2011. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textIndira, Carr, ed. Computer crime. Aldershot, Hants, England: Ashgate, 2009.
Find full textHans-Peter, Geh, Walckiers Marc, and European Foundation for Library Cooperation., eds. Library networking in Europe: European conference, 12-14 October 1994, Brussels : proceedings. London: TFPL Pub., 1995.
Find full text1946-, Strohmeier Alfred, ed. Reliable software technologies, Ada-Europe '96: 1996 Ada-Europe International Conference on Reliable Software Technologies, Montreux, Switzerland, June 10-14, 1996 : proceedings. Berlin: Springer, 1996.
Find full textAda-Europe International Conference on Reliable Software Technologies (15th 2010 Valencia, Spain). Reliable software technologies, Ada-Europe 2010: 15th Ada-Europe International Conference on Reliabel Software Technologies, Valencia, Spain, June 14-18, 2010 ; proceedings. Berlin: Springer, 2010.
Find full textInternational, Conference and Exhibition on High Performance Computing and Networking (1996 Brussels Belgium). High-performance computing and networking: International Conference and Exhibition, HPCN EUROPE 1996, Brussels, Belgium, April 15-19, 1996 : proceedings. Berlin: Springer, 1996.
Find full textMiguel, Pinho Luís, and SpringerLink (Online service), eds. Reliable Software Technologies – Ada-Europe 2012: 17th Ada-Europe International Conference on Reliable Software Technologies, Stockholm, Sweden, June 11-15, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textBook chapters on the topic "Computer networks – Europe"
Burchinsky, Sergei G., and Yuri K. Duplenko. "Computer-Aided Cluster Analysis of Citation Networks as a Tool of Research Policy in Biomedicine." In Medical Informatics Europe 1991, 919–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-93503-9_164.
Full textBailey, Michael, Drew Johnston, Theresa Kuchler, Dominic Russel, Bogdan State, and Johannes Stroebel. "The Determinants of Social Connectedness in Europe." In Lecture Notes in Computer Science, 1–14. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60975-7_1.
Full textJennett, Penny, I. J. T. Parboosingh, William R. Maes, and Jocelyn M. Lockyer. "Medical Rural/Academic Computer And Communication Networks: Their Potential to Assist with the Health of the Community i.e., Their Health Added Value." In Medical Informatics Europe ’90, 391–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-642-51659-7_73.
Full textKokkinen, Topias, Heikki Kokkinen, and Seppo Yrjölä. "Location Dependent Spectrum Valuation of Private LTE and 5G Networks in Europe." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 306–19. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25748-4_23.
Full textGajdošík, Tomáš. "Contribution of Network Approach to Tourism Destination Governance." In Information and Communication Technologies in Tourism 2023, 179–91. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25752-0_21.
Full textRadoniewicz, Filip. "International Regulations of Cybersecurity." In Cybersecurity in Poland, 53–71. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_5.
Full textRehn, S. "Computers and Creativity — A Case Study." In Creativity and Innovation: towards a European Network, 203–5. Dordrecht: Springer Netherlands, 1988. http://dx.doi.org/10.1007/978-94-009-2827-5_34.
Full textGeschka, H. "Development of Morphological Solutions Using a Personal Computer Program." In Creativity and Innovation: towards a European Network, 197–200. Dordrecht: Springer Netherlands, 1988. http://dx.doi.org/10.1007/978-94-009-2827-5_32.
Full textDekker, D. "The Role of Computers, Simulations & Games." In Creativity and Innovation: towards a European Network, 189–90. Dordrecht: Springer Netherlands, 1988. http://dx.doi.org/10.1007/978-94-009-2827-5_30.
Full textMiesenberger, Klaus, Eric Velleman, David Crombie, Helen Petrie, Jenny S. Darzentas, and Carlos A. Velasco. "The eAccess+ Network: Enhancing the Take-Up of eAccessibility in Europe." In Lecture Notes in Computer Science, 325–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31522-0_49.
Full textConference papers on the topic "Computer networks – Europe"
Koerner, Marc. "The OFELIA TUB-island an Europe-wide connected OpenFlow testbed." In 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/lcn.2013.6761259.
Full textBarmparitsas, Nikolaos, Alice Baronchelli, Sotirios Karellas, Platon Pallis, and Sotirios Thanopoulos. "Retradeables: the first online marketplace for used F-gases in Europe." In 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2022. http://dx.doi.org/10.1109/seeda-cecnsm57760.2022.9932956.
Full textBurkus, Viktória, Attila Kárpáti, and László Szécsi. "Particle-Based Fluid Surface Rendering with Neural Networks." In WSCG'2021 - 29. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2021. Západočeská univerzita v Plzni, 2021. http://dx.doi.org/10.24132/csrn.2021.3101.26.
Full textVangelista, Lorenzo, Luca Dell'Anna, and Ivano Calabrese. "On the coexistence of LoRaWAN and legacy short range devices in unlicensed bands in Europe." In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2019. http://dx.doi.org/10.23919/softcom.2019.8903757.
Full textGanganna Ravindra, Darshan, Dinges Laslo, Ayoub Al-Hamadi, and Vasili Baranau. "Fast and Precise Binary Instance Segmentation of 2D Objects for Automotive Applications." In WSCG'2022 - 30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2022. Západočeská univerzita, 2022. http://dx.doi.org/10.24132/csrn.3201.38.
Full textMezzini, Mauro. "Empirical study on label smoothing in neural networks." In 26. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2017. Západočeská univerzita, 2018. http://dx.doi.org/10.24132/csrn.2018.2802.25.
Full textHemani, Mayur, Abhishek Sinha, and Balaji Krishnamurthy. "Stylized Sketch Generation using Convolutional Networks." In WSCG'2019 - 27. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2019. Západočeská univerzita, 2019. http://dx.doi.org/10.24132/csrn.2019.2901.1.5.
Full textMpantola, Ekaterina, John Vardakas, and Malamati Louta. "Performance evaluation of Cloud Radio Access Networks by jointly considering communicational and computational network resources." In 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2021. http://dx.doi.org/10.1109/seeda-cecnsm53056.2021.9566269.
Full textTewari, Aditya, Bertram Taetz, and Frédéric Grandidier. "Combination of Temporal Neural Networks for Improved Hand Gesture Classification." In 26. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2017. Západočeská univerzita, 2018. http://dx.doi.org/10.24132/csrn.2018.2802.14.
Full textBadis, Chafaa, Welton Souza, Mohammad Abadullah Yasir, and Perminder Sabharwal. "Machine Learning/Artificial Intelligence Driven Computer Vision for Cuttings Analysis Under Drilling and Completions." In SPE Eastern Europe Subsurface Conference. SPE, 2021. http://dx.doi.org/10.2118/208509-ms.
Full text