Letteratura scientifica selezionata sul tema "Computer networks"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Computer networks".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Computer networks"

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, n. 9 (30 settembre 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Testo completo
Abstract (sommario):
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Sireesha, Manchoori, e Gobi N. "Computer Networks". International Journal of Research Publication and Reviews 5, n. 3 (2 marzo 2024): 1020–24. http://dx.doi.org/10.55248/gengpi.5.0324.0640.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Hyman, William A. "Medical Devices, Computers, and Computer Networks". Biomedical Safety & Standards 39, n. 1 (gennaio 2009): 1–4. http://dx.doi.org/10.1097/01.bmsas.0000342710.32111.54.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Ren, Xiaohui, Iftikhar Ahmed e Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs". Journal of Combinatorial Mathematics and Combinatorial Computing 117 (1 agosto 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Testo completo
Abstract (sommario):
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we aim to compute topological invariants of some computer related graph networks. We computed various irregularities indices for the graphs of OTIS swapped network \(OP_a\) and Biswapped Networks \(Bsw(Pa).\)
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Qin, Peng. "Analysis of a Model for Computer Virus Transmission". Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Testo completo
Abstract (sommario):
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

GOTO, Eiji. "Using Computers and Computer Networks in U.S.A." Journal of Agricultural Meteorology 50, n. 2 (1994): 135–39. http://dx.doi.org/10.2480/agrmet.50.135.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Bogucki, Peter. "Computer Networks". Anthropology News 27, n. 6 (settembre 1986): 2. http://dx.doi.org/10.1111/an.1986.27.6.2.1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Brinn, L. W. "Computer Networks". ACM SIGCSE Bulletin 17, n. 1 (marzo 1985): 135–39. http://dx.doi.org/10.1145/323275.323305.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Jensen, Pamela S. "Computer Networks". Investigative Radiology 20, n. 6 (settembre 1985): 648. http://dx.doi.org/10.1097/00004424-198509000-00026.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael e Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET". UKH Journal of Science and Engineering 3, n. 1 (22 maggio 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Testo completo
Abstract (sommario):
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Computer networks"

1

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks". Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /". Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Watson, Jason. "Monitoring computer-based training over computer networks". Thesis, University of Huddersfield, 1999. http://eprints.hud.ac.uk/id/eprint/6910/.

Testo completo
Abstract (sommario):
As time is becoming an ever more precious commodity in today's workplace, effective training is also taking on an increasingly important role, but finding the time to train today's workforce is becoming increasingly difficult. With employees in diverse locations across the country and across the world and some working from home, on the road or "hot-desking" we have to take a new approach to training. Fortunately computer-based training can solve many of the traditional problems such as the need to bring all trainees together in the same location at the same time. With today's sophisticated computer-based training applications motivated employees can train where they want, at home or at work, and when they want, at lunchtime or after work. However, there is also a basic legal and pedagogical requirement to record who has been trained and in what. This is very easy in a traditional training scenario, but much more difficult in today's training environments. This problem is currently the major obstacle to the widespread adoption of computer-based training, and looking for a solution to these problems was the aim of this research. This research began by investigating the processes used by multimedia developers when creating Computer Based Training (CBT) applications, identifying the current methodologies, techniques and tools that they use. Very quickly it was easy to see that developers use a whole range of development tools and that their expertise is primarily in the design of training applications, not in programming. Similarly the students want credit for the training that they undergo but do not want to be distracted by an intrusive monitoring system. The role of the Training Manager is equally important. He or she needs to be able to quickly assess the situation of an individual or a group of students and take remedial action where necessary. Balancing all of these needs in a single generic solution to the monitored training problem was the single biggest challenge. This research has addressed these important problems and has developed a solution that permits the monitoring of student training progress in any location and at any time in a way that is totally transparent to the user. The author integrates this additional functionality into a new or existing training through a drag-and-drop interface which is very easy to use, creating a monitoring experience which is totally transparent to the trainee and the Training Manager receives a summary database of student progress. Specifically the system uses a library of C++ functions that interface to Authorware, Director, Toolbook or a C++ application. The functions permit an author to open a monitoring database at the start of a training session and close it at the end. Whilst the database is open we can record any data that we require regarding student progress and performance. On closing the session the resulting database is sent to a central collation point using FTP. Students are identified automatically through their IP address, from their network login or ask them to logon to the training session manually. The system can write any database format that is required and if the network is unavailable when the session ends the database will be saved locally until the next training session. At the central collation point a specially written application takes the many databases created by individual training sessions and collates them into one large database that can be queried by the training manager. Small trials were initially performed with a prototype system at the collaborating company, CBL Technology Ltd, which in turn led to larger trials at both Cable and Wireless Communication PLC and the University of Huddersfield. In these trials authors of CBT applications found the system extremely easy to integrate into their applications and the training managers and course leaders responsible for training outcomes, found the feedback on student performance, that the system provided, invaluable. This research had demonstrated that it is possible to create a generic monitored training solution that balances the needs of the trainee, the author and the Training Manager. Trainees can train at any time, anywhere in the world, over the Internet or from CDROM and a training manager can monitor their progress provided that at some time they connect to a computer network.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Somalingam, Ramesh Ramvel. "Network performance monitoring for multimedia networks". Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23939.

Testo completo
Abstract (sommario):
Multimedia applications require certain guarantees from the underlying system concerning quality of various parameters, such as the throughput, delay, loss rate etc. We assume that such quality of service (QoS) parameters are normally agreed upon for the duration of a session, and should be maintained throughout that session. If a QoS violation occurs, possibly due to the temporary overload of one of the system components, either the user will notice this and may request a renegotiation of the quality and cost parameters, or the system will automatically do some internal reconfiguration in order to recover from the problem. In the latter case, the system needs to continuously monitor the relevant performance parameters. In this thesis, we develop means for performing such monitoring in the context of a News-on-Demand application. We have designed and implemented a distributed QoS monitoring facility that can be used by distributed multimedia applications for QoS monitoring and QoS violation detection. The system consists of a measurement component and an administrative component. The measurement component is responsible for continuously measuring the end-to-end QoS parameters of connections between the server and client application, while the administrative component is responsible for the overall administration of the monitoring system, which includes raising QoS violation notifications if the quality of service is violated.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Denda, Robert. "Fairness in computer networks /". Aachen : Shaker, 2004. http://www.loc.gov/catdir/toc/fy0715/2007464042.html.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.

Testo completo
Abstract (sommario):
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2007.
Thesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Otten, Fred. "Network simulation for professional audio networks". Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017935.

Testo completo
Abstract (sommario):
Audio Engineers are required to design and deploy large multi-channel sound systems which meet a set of requirements and use networking technologies such as Firewire and Ethernet AVB. Bandwidth utilisation and parameter groupings are among the factors which need to be considered in these designs. An implementation of an extensible, generic simulation framework would allow audio engineers to easily compare protocols and networking technologies and get near real time responses with regards to bandwidth utilisation. Our hypothesis is that an application-level capability can be developed which uses a network simulation framework to enable this process and enhances the audio engineer’s experience of designing and configuring a network. This thesis presents a new, extensible simulation framework which can be utilised to simulate professional audio networks. This framework is utilised to develop an application - AudioNetSim - based on the requirements of an audio engineer. The thesis describes the AudioNetSim models and implementations for Ethernet AVB, Firewire and the AES- 64 control protocol. AudioNetSim enables bandwidth usage determination for any network configuration and connection scenario and is used to compare Firewire and Ethernet AVB bandwidth utilisation. It also applies graph theory to the circular join problem and provides a solution to detect circular joins.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Brande, Julia K. Jr. "Computer Network Routing with a Fuzzy Neural Network". Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/29685.

Testo completo
Abstract (sommario):
The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. As more individuals transmit data through a computer network, the quality of service received by the users begins to degrade. A major aspect of computer networks that is vital to quality of service is data routing. A more effective method for routing data through a computer network can assist with the new problems being encountered with today's growing networks. Effective routing algorithms use various techniques to determine the most appropriate route for transmitting data. Determining the best route through a wide area network (WAN), requires the routing algorithm to obtain information concerning all of the nodes, links, and devices present on the network. The most relevant routing information involves various measures that are often obtained in an imprecise or inaccurate manner, thus suggesting that fuzzy reasoning is a natural method to employ in an improved routing scheme. The neural network is deemed as a suitable accompaniment because it maintains the ability to learn in dynamic situations. Once the neural network is initially designed, any alterations in the computer routing environment can easily be learned by this adaptive artificial intelligence method. The capability to learn and adapt is essential in today's rapidly growing and changing computer networks. These techniques, fuzzy reasoning and neural networks, when combined together provide a very effective routing algorithm for computer networks. Computer simulation is employed to prove the new fuzzy routing algorithm outperforms the Shortest Path First (SPF) algorithm in most computer network situations. The benefits increase as the computer network migrates from a stable network to a more variable one. The advantages of applying this fuzzy routing algorithm are apparent when considering the dynamic nature of modern computer networks.
Ph. D.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kusetoğulları, Hüseyin. "Network routing optimisation and effective multimedia transmission to enhance QoS in communication networks". Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/46802/.

Testo completo
Abstract (sommario):
With the increased usage of communication services in networks, finding routes for reliable transmission and providing effective multimedia communication have become very challenging problems. This has been a strong motivation to examine and develop methods and techniques to find routing paths efficiently and to provide effective multimedia communication. This thesis is mainly concerned with designing, implementing and adapting intelligent algorithms to solve the computational complexity of network routing problems and testing the performance of intelligent algorithms’ applications. It also introduces hybrid algorithms which are developed by using the similarities of genetic algorithm (GA) and particle swarm optimization (PSO) intelligent systems algorithms. Furthermore, it examines the design of a new encoding/decoding method to offer a solution for the problem of unachievable multimedia information in multimedia multicast networks. The techniques presented and developed within the thesis aim to provide maximum utilization of network resources for handling communication problems. This thesis first proposes GA and PSO implementations which are adapted to solve the single and multi-objective functions in network routing problems. To offer solutions for network routing problems, binary variable-length and priority based encoding methods are used in intelligent algorithms to construct valid paths or potential solutions. The performance of generation operators in GA and PSO is examined and analyzed by solving the various shortest path routing problems and it is shown that the performance of algorithms varies based on the operators selected. Moreover, a hybrid algorithm is developed based on the lack of search capability of intelligent algorithms and implemented to solve the single objective function. The proposed method uses a strategy of sharing information between GA and PSO to achieve significant performance enhancement to solve routing optimization problems. The simulation results demonstrate the efficiency of the hybrid algorithm by optimizing the shortest path routing problem. Furthermore, intelligent algorithms are implemented to solve a multi-objective function which involves more constraints of resources in communication networks. The algorithms are adapted to find the multi-optimal paths to provide effective multimedia communication in lossy networks. The simulation results verify that the implemented algorithms are shown as efficient and accurate methods to solve the multi-objective function and find multi-optimal paths to deliver multimedia packets in lossy networks. Furthermore, the thesis proposes a new encoding/decoding method to maximize throughput in multimedia multicast networks. The proposed method is combined with two most used Multiple Description Coding (MDC) methods. The utilization of the proposed method is discussed by comparing two the MDC methods. Through analyzing the simulation results using these intelligent systems algorithms, it has been shown that feasible solutions can be obtained by optimizing complex network problems. Moreover, the methods proposed and developed, which are hybrid algorithms and the encoding/decoding method also demonstrate their efficiency and effectiveness as compared with other techniques.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Ekici, Eylem. "Routing and multicasting in satellite IP networks". Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15605.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Computer networks"

1

Kwiecień, Andrzej, Piotr Gaj e Piotr Stera, a cura di. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Gaj, Piotr, Michał Sawicki e Andrzej Kwiecień, a cura di. Computer Networks. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21952-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Gaj, Piotr, Andrzej Kwiecień e Piotr Stera, a cura di. Computer Networks. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kwiecień, Andrzej, Piotr Gaj e Piotr Stera, a cura di. Computer Networks. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Kwiecień, Andrzej, Piotr Gaj e Piotr Stera, a cura di. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Kwiecień, Andrzej, Piotr Gaj e Piotr Stera, a cura di. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kwiecień, Andrzej, Piotr Gaj e Piotr Stera, a cura di. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Gaj, Piotr, Wojciech Gumiński e Andrzej Kwiecień, a cura di. Computer Networks. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50719-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Gaj, Piotr, Michał Sawicki, Grażyna Suchacka e Andrzej Kwiecień, a cura di. Computer Networks. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Gaj, Piotr, Andrzej Kwiecień e Michał Sawicki, a cura di. Computer Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59767-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Computer networks"

1

Ashley, Paul, e Mark Vandenwauver. "Computer Networks". In Practical Intranet Security, 45–59. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Rathore, Heena. "Computer Networks". In Mapping Biological Systems to Network Systems, 11–25. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29782-8_2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Taylor, Graham. "Computer Networks". In Making Sense of Information Technology, 128–50. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-10649-3_8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Lewin, Douglas, e David Noaks. "Computer networks". In Theory and Design of Digital Computer Systems, 349–74. Dordrecht: Springer Netherlands, 1992. http://dx.doi.org/10.1007/978-94-011-1576-6_9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Zane Gray, R. "Computer Networks". In Informatics for the Clinical Laboratory, 125–43. New York, NY: Springer New York, 2005. http://dx.doi.org/10.1007/978-0-387-22629-3_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Fox, Richard. "Computer Networks". In Information Technology, 193–238. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kale, Vivek. "Computer Networks". In Agile Network Businesses, 55–80. New York : CRC Press, 2017.: Auerbach Publications, 2017. http://dx.doi.org/10.4324/9781315368559-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

de Alencar, Marcelo Sampaio. "Computer Networks". In Cryptography and Network Security, 91–121. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Graham, Fan Chung, e Edward K. Blum. "Computer Networks". In Computer Science, 105–37. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1168-0_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Poshtkohi, Alireza, e M. B. Ghaznavi-Ghoushchi. "Computer Networks". In Implementing Parallel and Distributed Systems, 179–236. Boca Raton: Auerbach Publications, 2023. http://dx.doi.org/10.1201/9781003379041-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Computer networks"

1

Brinn, L. W. "Computer Networks". In the sixteenth SIGCSE technical symposium. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/323287.323305.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Pham, Nam, Hao Yu e Bogdan M. Wilamowski. "Neural Network Trainer through Computer Networks". In 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE, 2010. http://dx.doi.org/10.1109/aina.2010.169.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Youssef, M. W. "Securing computer networks communication by modifying computer network communication protocols". In 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Pan, Jianping. "Teaching computer networks in a real network". In the 41st ACM technical symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1734263.1734311.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, Mariusz Kamola, Krzysztof Malinowski, Przemyslaw Jaskola e Michal Marks. "Network-wide power management in computer networks". In 2013 22nd ITC Specialist Seminar on Energy Efficient and Green Networking (SSEEGN). IEEE, 2013. http://dx.doi.org/10.1109/sseegn.2013.6705398.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Das, Divyajyoti, e Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares". In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Zhong, G., K. Takahashi, S. Amamiya, D. Matsuno, T. Mine e M. Amamiya. "From computer networks to agent networks". In 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the. IEEE, 2003. http://dx.doi.org/10.1109/hicss.2003.1174210.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Seshadri, P., e Larry C. Witte. "Computer Aided Optimal Design of Heat Exchanger Networks". In ASME 1991 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1991. http://dx.doi.org/10.1115/cie1991-0076.

Testo completo
Abstract (sommario):
Abstract A method for finding the best (optimal) operating layout of heat exchangers in complicated thermal networks is developed in this paper. Computer algorithms are developed that take advantage of pinch technology and economic considerations, and exergetic constraints as well as conventional heat and mass balances. Our goals were to achieve minimum loss of exergy between hot and cold streams subject to practical system constraints. Furthermore, resulting networks should be limited to no more units than the theoretical minimum. The ultimate goal was to minimize investment and operating costs for a set of fixed overall system constaints. These goals were realized by developing a computer-based nonlinear multiple objective optimization algorithm that included the elements discussed above. The final solution is a synthesis of the best system using the above-described mathematical formulation. Results for a 4-stream heat exchanger network are presented in terms of the minimum temperature difference at the pinch point. The influence of the minimum temperature difference on capital cost, heat transfer area, exergetic losses and second law efficiency of various heat exchangers in the network is presented.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Cotter, David. "Ultrafast Computer Networking". In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.ofb.1.

Testo completo
Abstract (sommario):
In recent years research on ‘optics in computing’ has focused increasingly on the use of optical interconnects within future electronic computers, packet switches and routers to enhance their power and performance as stand-alone machines. At the same time, however, the interconnection between computers today has undergone a revolution; the widespread adoption of common network transport protocols has stimulated the rapidly increasing and extensive use of inter-networking, and this is manifest by the explosive growth of the global Internet. Increasingly, intelligence— data, applications, computing power itself—is becoming distributed across networks of machines. The efficiency with which machines are interconnected becomes vitally important for acceptable performance of these advanced distributed applications. The interconnection must certainly provide sufficient bandwidth, but equally important is the need to minimise latency. A simple and common example of the inadequacy of today’s computer networks is the frustratingly poor performance often experienced by users of the Worldwide Web. Increasingly in the future there will be a demand for multi-media applications that can operate with a slick and seamless interface to the network, and that provide long interaction periods with human immersion in computer generated environments, synthesised from wide-ranging distributed intelligence. There will also be an increasing volume of computer-to-computer interaction with little human intervention, using software agents. For these applications, interconnection latency must be minimised and should ideally be dominated by the fundamental delay due to the optical transmission time-of-flight.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Vakaliuk, Tetiana, Oleksii Chyzhmotria, Olena Chyzhmotria, Dmytro Antoniuk, Valerii Kontsedailo e Viacheslav Kryvohyzha. "Simulator of Computer Networks and Basic Network Protocols". In 5th Workshop for Young Scientists in Computer Science & Software Engineering. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0012009800003561.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Computer networks"

1

Barkley, John. Personal computer networks. Gaithersburg, MD: National Bureau of Standards, 1986. http://dx.doi.org/10.6028/nbs.sp.500-140.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Pabrai, Uday, Cary Dowat e Janet Carlson. Understanding and using computer networks. Office of Scientific and Technical Information (OSTI), gennaio 1990. http://dx.doi.org/10.2172/1128743.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Corley, Michael J. Anomaly Detection in Disparate Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, dicembre 2005. http://dx.doi.org/10.21236/ada443328.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Raychev, Nikolay. Neuromorphic computer networks with synaptic connections. Web of Open Science, luglio 2020. http://dx.doi.org/10.37686/nrl.v1i1.56.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Tolmie, D. E., W. St. John e D. H. DuBois. Super-speed computer interfaces and networks. Office of Scientific and Technical Information (OSTI), ottobre 1997. http://dx.doi.org/10.2172/534509.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Cradduck, Trevor D., Martin S. Weinhous e Neal Tobochnik. E-Mail and Academic Computer Networks. AAPM, 1990. http://dx.doi.org/10.37206/29.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Berry, Nina M., e Teresa H. Ko. On computer vision in wireless sensor networks. Office of Scientific and Technical Information (OSTI), settembre 2004. http://dx.doi.org/10.2172/919195.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Franklin, Derek L. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, aprile 2002. http://dx.doi.org/10.21236/ada404740.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Van Randwyk, Jamie A. Position paper on active countermeasures for computer networks. Office of Scientific and Technical Information (OSTI), luglio 2003. http://dx.doi.org/10.2172/918333.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Grimmell, W. C. Computing Path Tables for Quickest Multipaths In Computer Networks. Office of Scientific and Technical Information (OSTI), dicembre 2004. http://dx.doi.org/10.2172/885861.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia