Journal articles on the topic 'In-network computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'In-network computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gupta, Sachin. "Network Security in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 8, no. 11 (November 30, 2020): 636–41. http://dx.doi.org/10.22214/ijraset.2020.32244.
Full textWu, Yulei, Guojun Wang, and Ahmed Al-Dubai. "Advances in trusted network computing." Security and Communication Networks 7, no. 9 (May 30, 2014): 1311–12. http://dx.doi.org/10.1002/sec.1050.
Full textChen, Yu. "MEC Network Resource Allocation Strategy Based on Improved PSO in 5G Communication Network." International Journal on Semantic Web and Information Systems 19, no. 1 (August 18, 2023): 1–17. http://dx.doi.org/10.4018/ijswis.328526.
Full textProf. Krishnakumar L, Prof Krishnakumar L., and Nisha Mariam Varughese. "Intrusion Detection Using Collaborative Network Security Management System in Cloud Computing." Indian Journal of Applied Research 4, no. 3 (October 1, 2011): 145–47. http://dx.doi.org/10.15373/2249555x/mar2014/42.
Full textZheng, Changgang, Haoyue Tang, Mingyuan Zang, Xinpeng Hong, Aosong Feng, Leandros Tassiulas, and Noa Zilberman. "DINC: Toward Distributed In-Network Computing." Proceedings of the ACM on Networking 1, CoNEXT3 (November 27, 2023): 1–25. http://dx.doi.org/10.1145/3629136.
Full textHamdy, Noha, Amal Elsayed Aboutabl, Nahla ElHaggar, and Mostafa-Sami M. Mostafa. "Dynamic Task Scheduling Method in Cloud Computing Environment Using Optimized Neural Network." International Journal of Future Computer and Communication 6, no. 4 (December 2017): 143–47. http://dx.doi.org/10.18178/ijfcc.2017.6.4.507.
Full textXiaochun, Xu, Xu Guanghui, and Xu Yongsen. "Architectural issues in network-centric computing." ACM SIGSOFT Software Engineering Notes 27, no. 1 (January 2002): 53–57. http://dx.doi.org/10.1145/566493.1148030.
Full textFerrari, Adam. "JPVM: network parallel computing in Java." Concurrency: Practice and Experience 10, no. 11-13 (September 1998): 985–92. http://dx.doi.org/10.1002/(sici)1096-9128(199809/11)10:11/13<985::aid-cpe404>3.0.co;2-a.
Full textAlzahrani, Ali, Theyazn H. H. Aldhyani, Saleh Nagi Alsubari, and Ans D. Alghamdi. "Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model." Security and Communication Networks 2022 (June 20, 2022): 1–14. http://dx.doi.org/10.1155/2022/3553622.
Full textMehibs, Shawq Malik, and Soukaena Hassan Hashim. "Proposed Network Intrusion Detection System In Cloud Environment Based on Back Propagation Neural Network." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 1 (December 19, 2017): 29–40. http://dx.doi.org/10.29196/jub.v26i1.351.
Full textGao, Weiting, Yuxiang Xiao, and Haoxu Yin. "Cloud computing technology applied in 5G mobile communication network." Applied and Computational Engineering 19, no. 1 (October 23, 2023): 1–8. http://dx.doi.org/10.54254/2755-2721/19/20230999.
Full textLee, Yang Yang, and Zaini Abdul Halim. "Stochastic computing in convolutional neural network implementation: a review." PeerJ Computer Science 6 (November 9, 2020): e309. http://dx.doi.org/10.7717/peerj-cs.309.
Full textand Communication Networks, Security. "Retracted: Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model." Security and Communication Networks 2023 (December 6, 2023): 1. http://dx.doi.org/10.1155/2023/9801076.
Full textPardi, Silvio. "Network in Belle II." EPJ Web of Conferences 245 (2020): 07019. http://dx.doi.org/10.1051/epjconf/202024507019.
Full textAli, Ali. "Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure." Journal of Intelligent Systems and Internet of Things 12, no. 2 (2024): 75–88. http://dx.doi.org/10.54216/jisiot.120206.
Full textFan, Zhou. "Analysis of Computer Network Security Issues in Cloud Computing Environment." Lifelong Education 9, no. 6 (September 28, 2020): 57. http://dx.doi.org/10.18282/le.v9i6.1297.
Full textKorniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.
Full textPiotrowski, Dominik Mirosław. "Cloud Computing as Network Environment in Students Work." Bilgi Dünyası 14, no. 1 (April 30, 2013): 191–98. http://dx.doi.org/10.15612/bd.2013.142.
Full textQianying Zhao, Bo Lei, and Min Wei. "Survey of computing power network." ITU Journal on Future and Evolving Technologies 3, no. 3 (December 7, 2022): 632–44. http://dx.doi.org/10.52953/bxbj6384.
Full textZhao, Zhongyu. "Neural Network Training in Distribution Computing Method." Journal of Physics: Conference Series 1802, no. 3 (March 1, 2021): 032056. http://dx.doi.org/10.1088/1742-6596/1802/3/032056.
Full textChen, Xiaogui. "Application of Cloud Computing in Network Platform." Journal of Physics: Conference Series 1927, no. 1 (May 1, 2021): 012028. http://dx.doi.org/10.1088/1742-6596/1927/1/012028.
Full textReddy, S. Bharath. "Anomaly Detection System in Cloud Computing Network." HELIX 8, no. 2 (February 28, 2018): 3188–97. http://dx.doi.org/10.29042/2018-3188-3197.
Full textarsh, Utk, Vaibhav Gupta, Yashwant Kumar Singh, and Shashi Kant Singh. "Data Leakage Detection in Cloud Computing Network." International Journal of Engineering Trends and Technology 46, no. 1 (April 25, 2017): 6–11. http://dx.doi.org/10.14445/22315381/ijett-v46p202.
Full textMesheryakov, Roman, Alexander Moiseev, Anton Demin, Vadim Dorofeev, and Vasily Sorokin. "Using Parallel Computing in Queueing Network Simulation." Key Engineering Materials 685 (February 2016): 943–47. http://dx.doi.org/10.4028/www.scientific.net/kem.685.943.
Full textDonaldson, V., F. Berman, and R. Paturi. "Program Speedup in a Heterogeneous Computing Network." Journal of Parallel and Distributed Computing 21, no. 3 (June 1994): 316–22. http://dx.doi.org/10.1006/jpdc.1994.1062.
Full textZhao, Shi Yi, Hui Jun Yang, and Kai Yin. "Application and Challenge of Cloud Computing in Army Informationization Network." Advanced Materials Research 546-547 (July 2012): 1119–23. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1119.
Full textCheng, Yongbing. "Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology." Security and Communication Networks 2022 (August 30, 2022): 1–7. http://dx.doi.org/10.1155/2022/7876199.
Full textZeng, Pan. "Neural Computing in Mechanics." Applied Mechanics Reviews 51, no. 2 (February 1, 1998): 173–97. http://dx.doi.org/10.1115/1.3098995.
Full textZhang, Zhenzhong, Wei Sun, and Yanliang Yu. "Research on Intelligent Scheduling Mechanism in Edge Network for Industrial Internet of Things." Security and Communication Networks 2022 (January 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/5358873.
Full textXia, Yao Wen. "Network Teaching System Trial Based on Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1903–7. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1903.
Full textWang, Xiaofeng, Wei Zhu, and Yueming Dai. "Network simulation task partition method in heterogeneous computing environment." International Journal of Modeling, Simulation, and Scientific Computing 05, no. 03 (May 5, 2014): 1450010. http://dx.doi.org/10.1142/s179396231450010x.
Full textPradhananga, Yanish, and Pothuraju Rajarajeswari. "Tiarrah Computing: The Next Generation of Computing." International Journal of Informatics and Communication Technology (IJ-ICT) 6, no. 2 (August 1, 2017): 129. http://dx.doi.org/10.11591/ijict.v6i2.pp129-138.
Full textPradhananga, Yanish, and Pothuraju Rajarajeswari. "Tiarrah Computing: The Next Generation of Computing." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 1247. http://dx.doi.org/10.11591/ijece.v8i2.pp1247-1255.
Full textXu, Dawei, Qing Liu, Liehuang Zhu, Zhonghua Tan, Feng Gao, and Jian Zhao. "GCNRDM: A Social Network Rumor Detection Method Based on Graph Convolutional Network in Mobile Computing." Wireless Communications and Mobile Computing 2021 (October 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/1690669.
Full textYu, Qiu Dong, Yun Chen Tian, and Xu Feng Hua. "Research on Security of Agricultural Information Model Based on Cloud Computing." Applied Mechanics and Materials 687-691 (November 2014): 1970–73. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1970.
Full textWen, Lin Bin. "Research on Multilayer Security Audit Research Based on Attack Graph in Cloud Computing." Applied Mechanics and Materials 644-650 (September 2014): 3408–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3408.
Full textGong, Xiaomin, Shuangyin Ren, Chunjiang Wang, and Jingchao Wang. "Research on Computing Resource Measurement and Routing Methods in Software Defined Computing First Network." Sensors 24, no. 4 (February 7, 2024): 1086. http://dx.doi.org/10.3390/s24041086.
Full textHoang, Nguyen Van. "Multi-Access Edge Computing Architecture and Smart Agriculture Application in Ubiquitous Power Internet of Things." International Journal of Mobile Network Communications & Telematics 13, no. 4 (August 27, 2023): 01–19. http://dx.doi.org/10.5121/ijmnct.2023.13401.
Full textZheng, Zhe, Yu Han, Yingying Chi, Fusheng Yuan, Wenpeng Cui, Hailong Zhu, Yi Zhang, and Peiying Zhang. "Network Resource Allocation Algorithm Using Reinforcement Learning Policy-Based Network in a Smart Grid Scenario." Electronics 12, no. 15 (August 3, 2023): 3330. http://dx.doi.org/10.3390/electronics12153330.
Full textMangla, Cherry, Shalli Rani, and Henry Kwame Atiglah. "Secure Data Transmission Using Quantum Cryptography in Fog Computing." Wireless Communications and Mobile Computing 2022 (January 22, 2022): 1–8. http://dx.doi.org/10.1155/2022/3426811.
Full textBai, ChenChen, XiaoMing Gong, ShuangYin Ren, Tianji Xu, and JingChao Wang. "A Routing Algorithm Based on Software-Defined Computing First Network." Journal of Physics: Conference Series 2670, no. 1 (December 1, 2023): 012017. http://dx.doi.org/10.1088/1742-6596/2670/1/012017.
Full textLi, Yong Xia, Guang Xia Xu, and Shuang Yan Liu. "Research on Dependable Level in Network Computing System." Applied Mechanics and Materials 513-517 (February 2014): 1105–8. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1105.
Full textQingping*, Guo, Yakup Paker, Dennis Parkinson, and Xiao JinSheng. "Network computing performance evaluation in message passing environment." Parallel Algorithms and Applications 18, no. 4 (December 2003): 217–24. http://dx.doi.org/10.1080/10637190310001639767.
Full textKanaan Kadhim, Qusay, Hamid Sadeq Mahdi, and Haitham Ail. "Storage Architecture for Network Security in Cloud Computing." Diyala Journal For Pure Science 14, no. 1 (January 1, 2018): 1–17. http://dx.doi.org/10.24237/djps.1401.205c.
Full textPekergin, M. F. "Parallel computing optimization in the Apollo domain network." IEEE Transactions on Software Engineering 18, no. 4 (April 1992): 296–303. http://dx.doi.org/10.1109/32.129218.
Full textChen, Jiming, Kaoru Ota, Lu Wang, and Jianping He. "Big data and smart computing in network systems." Peer-to-Peer Networking and Applications 12, no. 5 (July 11, 2019): 1308–10. http://dx.doi.org/10.1007/s12083-019-00784-6.
Full textLi, Chengzhi, and Huaiyu Dai. "Efficient In-Network Computing with Noisy Wireless Channels." IEEE Transactions on Mobile Computing 12, no. 11 (November 2013): 2167–77. http://dx.doi.org/10.1109/tmc.2012.185.
Full textWang, Wenyi, and Hongfen Zhang. "The methods of reduction in network reliability computing." Microelectronics Reliability 37, no. 3 (March 1997): 461–65. http://dx.doi.org/10.1016/s0026-2714(96)00019-4.
Full textGolick, Jerry. "Network computing in the new thin-client age." netWorker 3, no. 1 (March 1999): 30–40. http://dx.doi.org/10.1145/294626.294637.
Full textSueyoshi, Toshiyuki, and Takashi Honma. "DEA network computing in multi-stage parallel processes." International Transactions in Operational Research 10, no. 3 (May 2003): 217–44. http://dx.doi.org/10.1111/1475-3995.00405.
Full text