Gotowa bibliografia na temat „Computer network”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Computer network”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Computer network"
Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 9 (30.09.2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Pełny tekst źródłaKobayashi, Shin-ya. "‘Computer’ × n + ‘Network’ ⇒ ‘Computer & Network’ ≠ ‘Computer Netwok’". IEEJ Transactions on Electronics, Information and Systems 121, nr 1 (2001): 52. http://dx.doi.org/10.1541/ieejeiss1987.121.1_52.
Pełny tekst źródłaQin, Peng. "Analysis of a Model for Computer Virus Transmission". Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.
Pełny tekst źródłaRen, Xiaohui, Iftikhar Ahmed i Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs". Journal of Combinatorial Mathematics and Combinatorial Computing 117 (1.08.2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.
Pełny tekst źródłaRefaee, Eshrag A., i Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors". Complexity 2021 (26.04.2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.
Pełny tekst źródłaMing, Xiaobo, Ying Chen i Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy". MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Pełny tekst źródłaAyu tiara sunja, Sunja, i Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya". International Journal Cister 1, nr 02 (1.08.2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Pełny tekst źródłaYeh, Wei-Chang, Edward Lin i Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus". Complexity 2021 (10.07.2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.
Pełny tekst źródłaHasan, Ammar, Tarik A. Rashid, Birzo Ismael i Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET". UKH Journal of Science and Engineering 3, nr 1 (22.05.2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.
Pełny tekst źródłaM, Priyanand. "Computer Network". International Journal for Research in Applied Science and Engineering Technology 9, nr 3 (31.03.2021): 1302–5. http://dx.doi.org/10.22214/ijraset.2021.33227.
Pełny tekst źródłaRozprawy doktorskie na temat "Computer network"
Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices". Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.
Pełny tekst źródłaBrande, Julia K. Jr. "Computer Network Routing with a Fuzzy Neural Network". Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/29685.
Pełny tekst źródłaPh. D.
Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks". Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.
Pełny tekst źródłaBurchett, Ian. "Quantifying Computer Network Security". TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Pełny tekst źródłaSomalingam, Ramesh Ramvel. "Network performance monitoring for multimedia networks". Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23939.
Pełny tekst źródłaKim, Anthony Eli. "On network coding capacity : matroidal networks and network capacity regions". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62657.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (p. 68-70).
One fundamental problem in the field of network coding is to determine the network coding capacity of networks under various network coding schemes. In this thesis, we address the problem with two approaches: matroidal networks and capacity regions. In our matroidal approach, we prove the converse of the theorem which states that, if a network is scalar-linearly solvable then it is a matroidal network associated with a representable matroid over a finite field. As a consequence, we obtain a correspondence between scalar-linearly solvable networks and representable matroids over finite fields in the framework of matroidal networks. We prove a theorem about the scalar-linear solvability of networks and field characteristics. We provide a method for generating scalar-linearly solvable networks that are potentially different from the networks that we already know are scalar-linearly solvable. In our capacity region approach, we define a multi-dimensional object, called the network capacity region, associated with networks that is analogous to the rate regions in information theory. For the network routing capacity region, we show that the region is a computable rational polytope and provide exact algorithms and approximation heuristics for computing the region. For the network linear coding capacity region, we construct a computable rational polytope, with respect to a given finite field, that inner bounds the linear coding capacity region and provide exact algorithms and approximation heuristics for computing the polytope. The exact algorithms and approximation heuristics we present are not polynomial time schemes and may depend on the output size.
by Anthony Eli Kim.
M.Eng.
Geha, Abbas. "Computer enhanced network design". Thesis, University of Sussex, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.344069.
Pełny tekst źródłaVega, Juan Carlos. "Computer network operations methodology". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FVega.pdf.
Pełny tekst źródłaPost, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks". Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Pełny tekst źródłaDahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /". Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.
Pełny tekst źródłaKsiążki na temat "Computer network"
Shinde, S. S. Computer network. New Delhi: New Age International, 2009.
Znajdź pełny tekst źródłaDean, Tamara. Network+ guide to networks. Cambridge, MA: Course Technology, Thomson Learning, 2000.
Znajdź pełny tekst źródłaNetwork+ guide to networks. Cambridge, MA: Course Technology, Thomson Learning, 2000.
Znajdź pełny tekst źródłaW, Thomas Blair, red. The Network Press QuickPath to NetWare 4.11 networks. Wyd. 2. San Francisco: Network Press, 1997.
Znajdź pełny tekst źródłaNetwork+ guide to networks. Wyd. 4. Boston, Mass: Thomson/Course Technology, 2006.
Znajdź pełny tekst źródłaNetwork+ guide to networks. Wyd. 3. Boston, Mass: Thomson/Course Technology, 2004.
Znajdź pełny tekst źródłaIsachyenko, Olyeg. Computer network software. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1033087.
Pełny tekst źródłaKotenko, Igor, i Victor Skormin, red. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.
Pełny tekst źródłaRak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin i Krzysztof Szczypiorski, red. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.
Pełny tekst źródłaGorodetsky, Vladimir, Igor Kotenko i Victor Skormin, red. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.
Pełny tekst źródłaCzęści książek na temat "Computer network"
Kale, Vivek. "Computer Networks". W Agile Network Businesses, 55–80. New York : CRC Press, 2017.: Auerbach Publications, 2017. http://dx.doi.org/10.4324/9781315368559-4.
Pełny tekst źródłaCole, Robert. "Computer Network Technology". W Computer Communications, 84–103. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_7.
Pełny tekst źródłaCole, Robert. "The Computer Network". W Computer Communications, 119–40. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_9.
Pełny tekst źródłaKizza, Joseph Migga. "Computer Network Fundamentals". W Guide to Computer Network Security, 3–40. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_1.
Pełny tekst źródłaKizza, Joseph Migga. "Computer Network Fundamentals". W Texts in Computer Science, 3–40. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_1.
Pełny tekst źródłaKizza, Joseph Migga. "Computer Network Fundamentals". W Guide to Computer Network Security, 3–41. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_1.
Pełny tekst źródłaKizza, Joseph Migga. "Computer Network Vulnerabilities". W Guide to Computer Network Security, 89–105. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_4.
Pełny tekst źródłaKizza, Joseph Migga. "Computer Network Fundamentals". W Guide to Computer Network Security, 3–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_1.
Pełny tekst źródłaLefebvre, E. "Computer Network Security". W Multisensor Fusion, 765–78. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.
Pełny tekst źródłaDieminger, Walter, Gerd K. Hartmann i Reinhart Leitinger. "Computer Network Communications". W The Upper Atmosphere, 942–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/978-3-642-78717-1_29.
Pełny tekst źródłaStreszczenia konferencji na temat "Computer network"
Bates, Richard J. S., i Anujan Varma. "Broadband Computer Network Based on Optical Subcarrier Multiplexing". W Photonic Switching. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/phs.1991.fd4.
Pełny tekst źródłaPham, Nam, Hao Yu i Bogdan M. Wilamowski. "Neural Network Trainer through Computer Networks". W 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE, 2010. http://dx.doi.org/10.1109/aina.2010.169.
Pełny tekst źródłaYoussef, M. W. "Securing computer networks communication by modifying computer network communication protocols". W 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.
Pełny tekst źródłaElenbogen, Bruce S. "Computer network management". W The proceedings of the thirtieth SIGCSE technical symposium. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/299649.299713.
Pełny tekst źródłaPan, Jianping. "Teaching computer networks in a real network". W the 41st ACM technical symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1734263.1734311.
Pełny tekst źródłaNiewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, Mariusz Kamola, Krzysztof Malinowski, Przemyslaw Jaskola i Michal Marks. "Network-wide power management in computer networks". W 2013 22nd ITC Specialist Seminar on Energy Efficient and Green Networking (SSEEGN). IEEE, 2013. http://dx.doi.org/10.1109/sseegn.2013.6705398.
Pełny tekst źródłaNanda, Priyadarsi, i Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)". W IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/3258155.
Pełny tekst źródłaWellman, Barry. "For a social network analysis of computer networks". W the 1996 ACM SIGCPR/SIGMIS conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238857.238860.
Pełny tekst źródłaVakaliuk, Tetiana, Oleksii Chyzhmotria, Olena Chyzhmotria, Dmytro Antoniuk, Valerii Kontsedailo i Viacheslav Kryvohyzha. "Simulator of Computer Networks and Basic Network Protocols". W 5th Workshop for Young Scientists in Computer Science & Software Engineering. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0012009800003561.
Pełny tekst źródłaCotter, David. "Ultrafast Computer Networking". W Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.ofb.1.
Pełny tekst źródłaRaporty organizacyjne na temat "Computer network"
Lydon, Michael, i Jessie Ford. Computer Science Career Network. Fort Belvoir, VA: Defense Technical Information Center, marzec 2013. http://dx.doi.org/10.21236/ada578200.
Pełny tekst źródłaPiergrossi, Todd M. Optimizing Computer Network Defense Training. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2000. http://dx.doi.org/10.21236/ada388382.
Pełny tekst źródłaJohannes, James D., Tim Lewis, Kyle Hoover, Andrew Fanning i Chad Williams. Computer Network Analysis and Implementation. Fort Belvoir, VA: Defense Technical Information Center, październik 1998. http://dx.doi.org/10.21236/ada391962.
Pełny tekst źródłaEnslow, P. H., Hamond Jr., Schlag J. L. i J. H. Microprocessor Local Computer Network Evaluation. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1985. http://dx.doi.org/10.21236/ada159914.
Pełny tekst źródłaReed, D. A Discussion on Computer Network Conferencing. RFC Editor, maj 1992. http://dx.doi.org/10.17487/rfc1324.
Pełny tekst źródłaLenderman, Curtis C. Computer Network Attack: An Operational Tool? Fort Belvoir, VA: Defense Technical Information Center, styczeń 2003. http://dx.doi.org/10.21236/ada415427.
Pełny tekst źródłaKaetzel, Lawrence J. Computer-integrated knowledge system (CIKS) network:. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6401.
Pełny tekst źródłaBusby, Daniel J. Peacetime Use of Computer Network Attack. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2000. http://dx.doi.org/10.21236/ada377624.
Pełny tekst źródłaRobinson, David J. Characterization and Planning for Computer Network Operations. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2010. http://dx.doi.org/10.21236/ada577860.
Pełny tekst źródłaJohannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis i Marsha Robinson. Computer Network Security and Directory Services Architecture. Fort Belvoir, VA: Defense Technical Information Center, marzec 2000. http://dx.doi.org/10.21236/ada392366.
Pełny tekst źródła