Letteratura scientifica selezionata sul tema "Extranets (Computer networks)"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Extranets (Computer networks)".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Extranets (Computer networks)"

1

Morgan, David. "Deploying extranets?" Network Security 2004, n. 12 (dicembre 2004): 12–14. http://dx.doi.org/10.1016/s1353-4858(04)00170-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Liu, Nan, Zhi Zeng e Ruoyu Jin. "A Survey on Users' Perspectives to Functionalities of Web-Based Construction Collaboration Extranets". International Journal of e-Collaboration 15, n. 4 (ottobre 2019): 1–17. http://dx.doi.org/10.4018/ijec.2019100101.

Testo completo
Abstract (sommario):
Construction collaboration extranets (CCEs) provide various functionalities depending on the vendors' origins, history, experiences, and financial status. Previous research has listed and described the functionalities that extranet systems can be capable of providing. However, no publication was found so far to systematically analyze users' perspectives to the provided functionalities. This article is to bridge this gap through a questionnaire survey to the users. It aims at examining user's attitude to functionalities of CCEs. The result may be useful to information system vendors, end-users and researchers involved in CCEs development and implementation.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Phaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets". EDPACS 27, n. 12 (giugno 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Guo, Jie, Xihao Fu, Liqiang Lin, Hengjun Ma, Yanwen Guo, Shiqiu Liu e Ling-Qi Yan. "ExtraNet". ACM Transactions on Graphics 40, n. 6 (dicembre 2021): 1–16. http://dx.doi.org/10.1145/3478513.3480531.

Testo completo
Abstract (sommario):
Both the frame rate and the latency are crucial to the performance of realtime rendering applications such as video games. Spatial supersampling methods, such as the Deep Learning SuperSampling (DLSS), have been proven successful at decreasing the rendering time of each frame by rendering at a lower resolution. But temporal supersampling methods that directly aim at producing more frames on the fly are still not practically available. This is mainly due to both its own computational cost and the latency introduced by interpolating frames from the future. In this paper, we present ExtraNet, an efficient neural network that predicts accurate shading results on an extrapolated frame, to minimize both the performance overhead and the latency. With the help of the rendered auxiliary geometry buffers of the extrapolated frame, and the temporally reliable motion vectors, we train our ExtraNet to perform two tasks simultaneously: irradiance in-painting for regions that cannot find historical correspondences, and accurate ghosting-free shading prediction for regions where temporal information is available. We present a robust hole-marking strategy to automate the classification of these tasks, as well as the data generation from a series of high-quality production-ready scenes. Finally, we use lightweight gated convolutions to enable fast inference. As a result, our ExtraNet is able to produce plausibly extrapolated frames without easily noticeable artifacts, delivering a 1.5× to near 2× increase in frame rates with minimized latency in practice.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Ahmed Ali, Adel, e Ahmed M. Al-Naamany. "Converged Networking: A Review of Concepts and Technologies". Sultan Qaboos University Journal for Science [SQUJS] 5 (1 dicembre 2000): 209. http://dx.doi.org/10.24200/squjs.vol5iss0pp209-225.

Testo completo
Abstract (sommario):
Converged networking is an emerging technology thrust that integrates voice, video, and data traffic on a single network. Converged networking encompasses several aspects, all of which are related to the aggregation of networking activity. Such aspects include, Payload convergence, Protocol convergence, Physical convergence, Device convergence, Application convergence, Technology convergence, etc. In recent years the Internet has developed into a global data network that is highly accepted as a multimedia information platform, which has the potential to develop into an alternative carrier network in the future. Several convergence scenarios have been recently proposed, ranging from integrating communication services and computer application into two separate networks, to building a seamless multimedia network, which converges the Central Office based network and the Internet in a single network, thereby enabling telecommunications operators and service provider's tremendous investment in existing network infrastructure to be fully utilized. This paper offers introduction and review of the networking technologies. The paper presents the existing multiple networks into two infrastructures: an ATM/Frame Relay (Ethernet)- based corporate network with integrated voice, video, and data traffic and an Internet-based network for secure intranet, extranet and remote access. This work is aimed at summarizing the internetworking basics and technologies which are essential for the emerging converged networking systems. The specific areas addressed here are networking basics, networking technologies, types of traffic, and convergence of computer and communication networks.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Hu, Xiujian, Guanglei Sheng, Piao Shi e Yuanyuan Ding. "TbsNet: the importance of thin-branch structures in CNNs". PeerJ Computer Science 9 (16 giugno 2023): e1429. http://dx.doi.org/10.7717/peerj-cs.1429.

Testo completo
Abstract (sommario):
The performance of a convolutional neural network (CNN) model is influenced by several factors, such as depth, width, network structure, size of the receptive field, and feature map scaling. The optimization of the best combination of these factors poses as the main difficulty in designing a viable architecture. This article presents an analysis of key factors influencing network performance, offers several strategies for constructing an efficient convolutional network, and introduces a novel architecture named TbsNet (thin-branch structure network). In order to minimize computation costs and feature redundancy, lightweight operators such as asymmetric convolution, pointwise convolution, depthwise convolution, and group convolution are implemented to further reduce the network’s weight. Unlike previous studies, the TbsNet architecture design rejects the reparameterization method and adopts a plain, simplified structure which eliminates extraneous branches. We conduct extensive experiments, including network depth, width, etc. TbsNet performs well on benchmark platforms, Top 1 Accuracy on CIFAR-10 is 97.02%, on CIFAR-100 is 83.56%, and on ImageNet-1K is 86.17%. Tbs-UNet’s DSC on the Synapse dataset is 78.39%, higher than TransUNet’s 0.91%. TbsNet can be competent for some downstream tasks in computer vision, such as medical image segmentation, and thus is competitive with prior state-of-the-art deep networks such as ResNet, ResNeXt, RepVgg, ParNet, ConvNeXt, and MobileNet.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Ababneh, Nedal. "Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks". International Journal of Distributed Sensor Networks 6, n. 1 (1 gennaio 2010): 671385. http://dx.doi.org/10.1155/2010/671385.

Testo completo
Abstract (sommario):
A main design challenge in the area of sensor networks is energy efficiency to prolong the network operable lifetime. Since most of the energy is spent for radio communication, an effective approach for energy conservation is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. Assuming that node position information is unavailable, we present a topology control algorithm, termed OTC, for sensor networks. It uses two-hop neighborhood information to select a subset of nodes to be active among all nodes in the neighborhood. Each node in the network selects its own set of active neighbors from among its one-hop neighbors. This set is determined such that it covers all two-hop neighbors. OTC does not assume the network graph to be a Unit Disk Graph; OTC also works well on general weighted network graphs. OTC is evaluated against two well-known algorithms from the literature, namely, Span and GAF through realistic simulations using TOSSIM. In terms of operational lifetime, load balancing and Spanner property OTC shows promising results. Apart from being symmetric and connected, the resulting graph when employing OTC shows good spanner properties.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Karamysheva, N. S., D. S. Svishchev, K. V. Popov e S. A. Zinkin. "Implementation of Agent-Based Metacomputersystems and Applications". Proceedings of the Southwest State University 26, n. 1 (28 giugno 2022): 148–71. http://dx.doi.org/10.21869/2223-1560-2022-26-1-148-171.

Testo completo
Abstract (sommario):
Purpose of research. Creation of a methodology for designing a prototype of a metacomputer distributed computing system, taking into account the current stage of the evolution of hardware and cloud-network software to provide users with the means to create applications with inter-program parallelism and the ability of components to work together.Methods. Logical models of artificial intelligence, semantic networks and conceptual graphs, agent-based technology, virtualization of network resources. The method of conducting a full-scale experiment was that when the application was launched for execution in a virtual agent-based metacomputer, a network infrastructure was used with remote access to the Fast Ethernet laboratory network via the Internet, and then time characteristics were measured.Results. A technique for designing cloud-network metacomputer systems and applications is proposed, and prototype middleware software based on multi-agent technology is created. The goal of the study has been achieved, since the developed agent-based environment allows the implementation of universal programming control structures - transition by one or more conditions, cycle, sequence, parallelization, for which executable conceptual specifications have been introduced.Conclusion. An approach to the implementation of a distributed metacomputer application in a computer network environment based on conceptual graphs describing the exchange of messages and data processing by software agents is proposed. The performance of the application under conditions of extraneous load on the network was demonstrated.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Malik, Najeeb ur Rehman, Usman Ullah Sheikh, Syed Abdul Rahman Abu-Bakar e Asma Channa. "Multi-View Human Action Recognition Using Skeleton Based-FineKNN with Extraneous Frame Scrapping Technique". Sensors 23, n. 5 (2 marzo 2023): 2745. http://dx.doi.org/10.3390/s23052745.

Testo completo
Abstract (sommario):
Human action recognition (HAR) is one of the most active research topics in the field of computer vision. Even though this area is well-researched, HAR algorithms such as 3D Convolution Neural Networks (CNN), Two-stream Networks, and CNN-LSTM (Long Short-Term Memory) suffer from highly complex models. These algorithms involve a huge number of weights adjustments during the training phase, and as a consequence, require high-end configuration machines for real-time HAR applications. Therefore, this paper presents an extraneous frame scrapping technique that employs 2D skeleton features with a Fine-KNN classifier-based HAR system to overcome the dimensionality problems.To illustrate the efficacy of our proposed method, two contemporary datasets i.e., Multi-Camera Action Dataset (MCAD) and INRIA Xmas Motion Acquisition Sequences (IXMAS) dataset was used in experiment. We used the OpenPose technique to extract the 2D information, The proposed method was compared with CNN-LSTM, and other State of the art methods. Results obtained confirm the potential of our technique. The proposed OpenPose-FineKNN with Extraneous Frame Scrapping Technique achieved an accuracy of 89.75% on MCAD dataset and 90.97% on IXMAS dataset better than existing technique.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Molla, D., R. Schwitter, F. Rinaldi, J. Dowdall e M. Hess. "ExtrAns: Extracting answers from technical texts". IEEE Intelligent Systems 18, n. 4 (luglio 2003): 12–17. http://dx.doi.org/10.1109/mis.2003.1217623.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Extranets (Computer networks)"

1

Sherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Long, Weili. "On the topology design of hose-model VPN networks /". View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LONG.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Isaacs, Rebecca. "Dynamic provisioning of resource-assured and programmable virtual private networks". Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621158.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Quigley, Kenneth J. "The design and implementation of the Megacomm Media Center's extranet". [Denver, Colo.] : Regis University, 2005. http://165.236.235.140/lib/KQuigley2005.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Rosenbaum, Gustav Filip Computer Science &amp Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks". Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.

Testo completo
Abstract (sommario):
This thesis focuses on efficient provisioning of resilient Virtual Private Network (VPN) services. It first confirms the intuition that network resources can be more efficiently utilized when resilience mechanisms are implemented by a network provider in the physical network than by its VPN customers in their VPNs. Next, a Multiprotocol Label Switching-based programmable VPN architecture is presented that delivers virtual links as resilient quality of service (QoS) connections and virtual sites. Virtual sites allow customers to implement functionality like customized routing and content adaptation ???in the cloud???, as opposed to the current network model where all functionality is implemented at the network edge. To provision a resilient QoS connection, two paths need to be computed from the ingress to the egress nodes, such that both paths meet the given QoS constraints. Two different frameworks have been proposed in the literature to compute resilient QoS connections when the QoS constraints are bandwidth and end-to-end delay. They both use a preprocessing step whereby either all links with less residual capacity than the given bandwidth constraint are pruned, or the given end-to-end delay is converted to an effective bandwidth. The frameworks thus reduce the problem to one with only a single constraint. We argue in this thesis that these frameworks individually lead to poor network utilization and propose a new framework where both constraints are considered simultaneously. Our framework exploits the dependency between endto- end delay, provisioned bandwidth and chosen path through using the provisioned bandwidth as a variable. Here, two link-disjoint paths are computed together with their respective minimum bandwidths such that both the bandwidth and end-to-end delay constraints are satisfied. Given our framework we first propose a new generic algorithm that decomposes the problem into subproblems where known algorithms can be applied. Then we propose two new linear programming (LP) formulations that return the two paths and their respective bandwidths such that they have the minimum combined cost. To make our framework applicable in a production environment, we develop two new algorithms with low run times that achieve even higher network performance than their LP formulation counterpart. These algorithms systematically use an algorithm that computes non-resilient QoS connections. As no algorithm for computing nonresilient QoS connections with sufficiently low run time has been proposed in the current literature we develop two new algorithms and their respective heuristics with a run time comparable to Dijkstra???s shortest-path algorithm. Our simulations show that exploiting the dependency between end-to-end delay, provisioned bandwidth and chosen path can significantly improve the network performance.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Munasinghe, Kumudu S., University of Western Sydney, of Science Technology and Environment College e School of Computing and Information Technology. "VPN over a wireless infrastructure : evaluation and performance analysis". THESIS_CSTE_CIT_Munasinghe_K.xml, 2005. http://handle.uws.edu.au:8081/1959.7/662.

Testo completo
Abstract (sommario):
This thesis presents the analysis and experimental results for an evaluation of the performance and Quality of Service (QoL) levels of a virtual private network( QoL) levels of a Virtual Private Network (VPN) implementation of an IEEE 802.11b wireless infrastructure. The VPN tunnelling protocol considered for the above study is IP security (IPSec). The main focus of the research is to identify the major performance limitations and their underlying causes for such VPN implementations under study. The experimentation and data collection involved in the study spans over a number of platforms to suit a range of practical VPN implementations over a wireless medium. The collected data includes vital QoS and performance measures such as the application throughput, packet loss, jitter, and round-trip delay. Once the baseline measure is established, a series of experiments are conducted to analyse the behaviour of a single IPSec VPN operating over an IEEE 802.11b infrastructure, after which the experimentation is extended by investigating the trends of the performance metrics of a simultaneously multiple VPN setup. The overall results and analysis of the investigation concludes that the CPU processing power, payload data size, packet generation rate and the geographical distance are critical factors affecting the performance of such VPN tunnel implementations. Furthermore, it is believed that these results may give vital clues for enhancing and achieving optimal performance and QoS levels for VPN applications over WLANs
Master of Science (Hons.)
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Valella, William. "Securing open source Virtual Private Networks a study in Linux security /". [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.

Testo completo
Abstract (sommario):
Thesis (M.S.)--University of Florida, 2001.
Title from title page of source document. Document formatted into pages; contains x, 188 p.; also contains graphics. Includes vita. Includes bibliographical references.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Munasinghe, Kumudu S. "VPN over a wireless infrastructure : evaluation and performance analysis". Thesis, View thesis, 2005. http://handle.uws.edu.au:8081/1959.7/662.

Testo completo
Abstract (sommario):
This thesis presents the analysis and experimental results for an evaluation of the performance and Quality of Service (QoL) levels of a virtual private network( QoL) levels of a Virtual Private Network (VPN) implementation of an IEEE 802.11b wireless infrastructure. The VPN tunnelling protocol considered for the above study is IP security (IPSec). The main focus of the research is to identify the major performance limitations and their underlying causes for such VPN implementations under study. The experimentation and data collection involved in the study spans over a number of platforms to suit a range of practical VPN implementations over a wireless medium. The collected data includes vital QoS and performance measures such as the application throughput, packet loss, jitter, and round-trip delay. Once the baseline measure is established, a series of experiments are conducted to analyse the behaviour of a single IPSec VPN operating over an IEEE 802.11b infrastructure, after which the experimentation is extended by investigating the trends of the performance metrics of a simultaneously multiple VPN setup. The overall results and analysis of the investigation concludes that the CPU processing power, payload data size, packet generation rate and the geographical distance are critical factors affecting the performance of such VPN tunnel implementations. Furthermore, it is believed that these results may give vital clues for enhancing and achieving optimal performance and QoS levels for VPN applications over WLANs
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Munasinghe, Kumudu S. "VPN over a wireless infrastructure evaluation and performance analysis /". View thesis, 2005. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050920.141716/index.html.

Testo completo
Abstract (sommario):
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2005.
A thesis submitted in fulfillment of the requirements for the award of the degree Master of Science (Honours) to the University of Western Sydney on March 2005. Includes bibliography.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Salamon, Jakub. "Návrh intranetu pro podporu firemních procesů". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222583.

Testo completo
Abstract (sommario):
The subject of this diploma thesis is the implementation of the intranet to support business processes. At the beginning are defined the basic concepts of the topic. Then I analyzed the situation in the company and the current status of ICT. Based on these analyses, I proposed the intranet implementation process leading to simplify and streamline business operations.
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Extranets (Computer networks)"

1

Loshin, Peter. Extranet design and implementation. San Francisco: SYBEX Network Press, 1997.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Bayles, Deborah L. Extranets: Building the business-to-business Web. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Minei, Ina. MPLS-enabled applications: Emerging developments and new technologies. 3a ed. Chichester, England: Wiley, 2011.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Thomas, Witte, e Claus Thorsten 1965-, a cura di. Virtuelle Netze: Chance für interdisziplinäre Kooperationen in Institutionen. Frankfurt am Main: Peter Lang, 2005.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Covill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Bort, Julie. Building an Extranet: Connect your Intranet with vendors and customers. New York: Wiley Computer Pub., 1997.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Rosli︠a︡kov, A. V. Virtualʹnye chastnye seti: Osnovy postroenii︠a︡ i primenenii︠a︡. Moskva: Ėko-Trendz, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Kosiur, David R. Building and managing virtual private networks. New York: Wiley, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Extranets (Computer networks)"

1

Sadiku, Matthew N. O., e Cajetan M. Akujuobi. "Intranets and Extranets". In Fundamentals of Computer Networks, 71–77. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09417-0_6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Dibble, Catherine. "Beyond Data: Handling Spatial and Analytical Contexts with Genetics-Based Machine Learning". In Spatial Evolutionary Modeling. Oxford University Press, 2001. http://dx.doi.org/10.1093/oso/9780195135688.003.0012.

Testo completo
Abstract (sommario):
Geographic information systems (GISs) are fairly good at handling three types of data: locational, attribute, and topological. Recent work holds promise for adding temporal data to this list as well (e.g., see Langran, 1992). Yet the unprecedentedly vast resources of geographically referenced data continue to outstrip our ability to derive meaningful information from such databases, despite dramatic improvements in computer processing power, algorithm efficiency, and parallel processing. In part this is because such research has emphasized improvements in processing efficiency rather than effectiveness. We humans are slow-minded compared with our silicon inventions; yet our analytical capabilities remain far more powerful, primarily because we have evolved elaborate cognitive infrastructures devoted to ensuring that we leverage our limited processing power by focusing our attention on the events and information most likely to be relevant. In GIS use, so far only human perception provides the requisite integration of spatial context, and human attention directs the determination of relevance and the selection of geographic features and related analyses. Understanding of spatial context and analytical purpose exists only in the minds of humans working with the GIS or viewing the displays and maps created by such operations. We still extract information from our geographic data systems primarily through long series of relatively tedious and complex spatial operations, performed—or at least explicitly preprogrammed—by a human, in order to derive each answer. Human integration of analytical purpose and spatial and attribute contexts is perhaps the most essential and yet the most invisible component of any geographic analysis, yet it is also perhaps the most fundamental missing link in any GIS. Only humans can glance at a map of a toxic waste dumps next to school yards, or oil spills upstream from fisheries, and recognize the potential threat of such proximity; human cartographers understand the importance of emphasizing either road or stream networks depending on the purpose of a map; humans understand that “near” operates at different scales for corner stores versus cities, or tropical jungle habitat versus open savannah. Given a GIS with the capability to deluge any inquiry with myriad layers of extraneous data, this natural human ability to filter data and manipulate only the meaningful elements is essential.
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Extranets (Computer networks)"

1

Martinez-Ruiz, Francisco, Pilar Godina Gonzalez, Ana Lourdes Borrego, Hamurabi Gamboa Rosales e José De la Rosa Vargas. "EXTRANEOUS COGNITIVE OVERLOAD IN THE BLENDED LEARNING PARADIGM. CASE STUDY: USE OF SOCIAL NETWORKS IN COMPUTER SCIENCE COURSES". In International Technology, Education and Development Conference. IATED, 2016. http://dx.doi.org/10.21125/iceri.2016.0793.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Newendorp, Brandon, Christian Noon, Chiu-Shui Chan, Eliot Winer e Jim Oliver. "Development Methods and a Scenegraph Animation API for Cluster Driven Immersive Applications". In ASME-AFM 2009 World Conference on Innovative Virtual Reality. ASMEDC, 2009. http://dx.doi.org/10.1115/winvr2009-736.

Testo completo
Abstract (sommario):
This paper presents a scenegraph animation application programming interface (API), known as the Animation Engine, which was constructed for software developers to easily perform smooth transitions and manipulations to scenegraph nodes. A developer can use one line of code to enter the property, end state and number of frames to describe the animation, then the Animation Engine handles the rest in the background. The goal of the Animation Engine is to provide a simple API that integrates into existing applications with minimal effort. Additionally, techniques to improve virtual reality (VR) application performance on a large computer cluster are presented. These techniques include maintaining high frame rates with 4096 × 4096 pixel textures, eliminating extraneous network traffic and reducing long model loading time. To demonstrate the Animation Engine and the development techniques, an application known as the Virtual Universe was created. The Virtual Universe, designed to run in a six walled CAVE, allows users to freely explore a set of space themed environments. The architecture and development techniques for writing a stable immersive VR application on a large computer cluster, in addition to the creation of the Animation Engine, is presented in this paper.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia