Gotowa bibliografia na temat „Computer network”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Computer network”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Computer network"

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, nr 9 (30.09.2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Pełny tekst źródła
Streszczenie:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
Style APA, Harvard, Vancouver, ISO itp.
2

Kobayashi, Shin-ya. "‘Computer’ × n + ‘Network’ ⇒ ‘Computer & Network’ ≠ ‘Computer Netwok’". IEEJ Transactions on Electronics, Information and Systems 121, nr 1 (2001): 52. http://dx.doi.org/10.1541/ieejeiss1987.121.1_52.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Qin, Peng. "Analysis of a Model for Computer Virus Transmission". Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Pełny tekst źródła
Streszczenie:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
Style APA, Harvard, Vancouver, ISO itp.
4

Ren, Xiaohui, Iftikhar Ahmed i Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs". Journal of Combinatorial Mathematics and Combinatorial Computing 117 (1.08.2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Pełny tekst źródła
Streszczenie:
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we aim to compute topological invariants of some computer related graph networks. We computed various irregularities indices for the graphs of OTIS swapped network \(OP_a\) and Biswapped Networks \(Bsw(Pa).\)
Style APA, Harvard, Vancouver, ISO itp.
5

Refaee, Eshrag A., i Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors". Complexity 2021 (26.04.2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.

Pełny tekst źródła
Streszczenie:
There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but not to one another. As such, any failure in the central computer will result in a failure of the entire network and computers in star network will not be able to communicate. The star topology design can be represented by a graph where vertices represent the computer nodes and edges represent the links between the computer nodes. In this paper, we study the vertex-edge-based topological descriptor for a newly designed hexagon star network.
Style APA, Harvard, Vancouver, ISO itp.
6

Ming, Xiaobo, Ying Chen i Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy". MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Pełny tekst źródła
Streszczenie:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
Style APA, Harvard, Vancouver, ISO itp.
7

Ayu tiara sunja, Sunja, i Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya". International Journal Cister 1, nr 02 (1.08.2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Pełny tekst źródła
Streszczenie:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
Style APA, Harvard, Vancouver, ISO itp.
8

Yeh, Wei-Chang, Edward Lin i Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus". Complexity 2021 (10.07.2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.

Pełny tekst źródła
Streszczenie:
With the rapid development of network technology, computer viruses have developed at a fast pace. The threat of computer viruses persists because of the constant demand for computers and networks. When a computer virus infects a facility, the virus seeks to invade other facilities in the network by exploiting the convenience of the network protocol and the high connectivity of the network. Hence, there is an increasing need for accurate calculation of the probability of computer-virus-infected areas for developing corresponding strategies, for example, based on the possible virus-infected areas, to interrupt the relevant connections between the uninfected and infected computers in time. The spread of the computer virus forms a scale-free network whose node degree follows the power rule. A novel algorithm based on the binary-addition tree algorithm (BAT) is proposed to effectively predict the spread of computer viruses. The proposed BAT utilizes the probability derived from PageRank from the scale-free network together with the consideration of state vectors with both the temporal and learning effects. The performance of the proposed algorithm was verified via numerous experiments.
Style APA, Harvard, Vancouver, ISO itp.
9

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael i Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET". UKH Journal of Science and Engineering 3, nr 1 (22.05.2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Pełny tekst źródła
Streszczenie:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
Style APA, Harvard, Vancouver, ISO itp.
10

M, Priyanand. "Computer Network". International Journal for Research in Applied Science and Engineering Technology 9, nr 3 (31.03.2021): 1302–5. http://dx.doi.org/10.22214/ijraset.2021.33227.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Computer network"

1

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices". Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Brande, Julia K. Jr. "Computer Network Routing with a Fuzzy Neural Network". Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/29685.

Pełny tekst źródła
Streszczenie:
The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. As more individuals transmit data through a computer network, the quality of service received by the users begins to degrade. A major aspect of computer networks that is vital to quality of service is data routing. A more effective method for routing data through a computer network can assist with the new problems being encountered with today's growing networks. Effective routing algorithms use various techniques to determine the most appropriate route for transmitting data. Determining the best route through a wide area network (WAN), requires the routing algorithm to obtain information concerning all of the nodes, links, and devices present on the network. The most relevant routing information involves various measures that are often obtained in an imprecise or inaccurate manner, thus suggesting that fuzzy reasoning is a natural method to employ in an improved routing scheme. The neural network is deemed as a suitable accompaniment because it maintains the ability to learn in dynamic situations. Once the neural network is initially designed, any alterations in the computer routing environment can easily be learned by this adaptive artificial intelligence method. The capability to learn and adapt is essential in today's rapidly growing and changing computer networks. These techniques, fuzzy reasoning and neural networks, when combined together provide a very effective routing algorithm for computer networks. Computer simulation is employed to prove the new fuzzy routing algorithm outperforms the Shortest Path First (SPF) algorithm in most computer network situations. The benefits increase as the computer network migrates from a stable network to a more variable one. The advantages of applying this fuzzy routing algorithm are apparent when considering the dynamic nature of modern computer networks.
Ph. D.
Style APA, Harvard, Vancouver, ISO itp.
3

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks". Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Burchett, Ian. "Quantifying Computer Network Security". TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Pełny tekst źródła
Streszczenie:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of computer network port vulnerabilities from NIST’s Network Vulnerability Database (NVD) are conducted, and via utilization of NVD’s Common Vulnerability Scoring System values, composite scores are created for each computer on the network, and then collectively a composite score is computed for the entire network, which accurately represents the health of the entire network. Special concerns about small numbers of highly vulnerable computers or especially critical members of the network are confronted.
Style APA, Harvard, Vancouver, ISO itp.
5

Somalingam, Ramesh Ramvel. "Network performance monitoring for multimedia networks". Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23939.

Pełny tekst źródła
Streszczenie:
Multimedia applications require certain guarantees from the underlying system concerning quality of various parameters, such as the throughput, delay, loss rate etc. We assume that such quality of service (QoS) parameters are normally agreed upon for the duration of a session, and should be maintained throughout that session. If a QoS violation occurs, possibly due to the temporary overload of one of the system components, either the user will notice this and may request a renegotiation of the quality and cost parameters, or the system will automatically do some internal reconfiguration in order to recover from the problem. In the latter case, the system needs to continuously monitor the relevant performance parameters. In this thesis, we develop means for performing such monitoring in the context of a News-on-Demand application. We have designed and implemented a distributed QoS monitoring facility that can be used by distributed multimedia applications for QoS monitoring and QoS violation detection. The system consists of a measurement component and an administrative component. The measurement component is responsible for continuously measuring the end-to-end QoS parameters of connections between the server and client application, while the administrative component is responsible for the overall administration of the monitoring system, which includes raising QoS violation notifications if the quality of service is violated.
Style APA, Harvard, Vancouver, ISO itp.
6

Kim, Anthony Eli. "On network coding capacity : matroidal networks and network capacity regions". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62657.

Pełny tekst źródła
Streszczenie:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 68-70).
One fundamental problem in the field of network coding is to determine the network coding capacity of networks under various network coding schemes. In this thesis, we address the problem with two approaches: matroidal networks and capacity regions. In our matroidal approach, we prove the converse of the theorem which states that, if a network is scalar-linearly solvable then it is a matroidal network associated with a representable matroid over a finite field. As a consequence, we obtain a correspondence between scalar-linearly solvable networks and representable matroids over finite fields in the framework of matroidal networks. We prove a theorem about the scalar-linear solvability of networks and field characteristics. We provide a method for generating scalar-linearly solvable networks that are potentially different from the networks that we already know are scalar-linearly solvable. In our capacity region approach, we define a multi-dimensional object, called the network capacity region, associated with networks that is analogous to the rate regions in information theory. For the network routing capacity region, we show that the region is a computable rational polytope and provide exact algorithms and approximation heuristics for computing the region. For the network linear coding capacity region, we construct a computable rational polytope, with respect to a given finite field, that inner bounds the linear coding capacity region and provide exact algorithms and approximation heuristics for computing the polytope. The exact algorithms and approximation heuristics we present are not polynomial time schemes and may depend on the output size.
by Anthony Eli Kim.
M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
7

Geha, Abbas. "Computer enhanced network design". Thesis, University of Sussex, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.344069.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Vega, Juan Carlos. "Computer network operations methodology". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FVega.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks". Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /". Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Computer network"

1

Shinde, S. S. Computer network. New Delhi: New Age International, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Dean, Tamara. Network+ guide to networks. Cambridge, MA: Course Technology, Thomson Learning, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Network+ guide to networks. Cambridge, MA: Course Technology, Thomson Learning, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

W, Thomas Blair, red. The Network Press QuickPath to NetWare 4.11 networks. Wyd. 2. San Francisco: Network Press, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Network+ guide to networks. Wyd. 4. Boston, Mass: Thomson/Course Technology, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Network+ guide to networks. Wyd. 3. Boston, Mass: Thomson/Course Technology, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Isachyenko, Olyeg. Computer network software. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1033087.

Pełny tekst źródła
Streszczenie:
The tutorial includes information about the main types of computer network software, modern Web technologies, and popular Web application development tools. Meets the requirements of the Federal state educational standards of secondary professional education of the last generation. Designed for students of secondary professional education, enrolled in the enlarged group of specialties 09.02.00 "computer science" and studying discipline "Software, computer networks and Software, computer networks and Web servers." It can also be useful for students of higher educational institutions.
Style APA, Harvard, Vancouver, ISO itp.
8

Kotenko, Igor, i Victor Skormin, red. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Rak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin i Krzysztof Szczypiorski, red. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Gorodetsky, Vladimir, Igor Kotenko i Victor Skormin, red. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Computer network"

1

Kale, Vivek. "Computer Networks". W Agile Network Businesses, 55–80. New York : CRC Press, 2017.: Auerbach Publications, 2017. http://dx.doi.org/10.4324/9781315368559-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cole, Robert. "Computer Network Technology". W Computer Communications, 84–103. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Cole, Robert. "The Computer Network". W Computer Communications, 119–40. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kizza, Joseph Migga. "Computer Network Fundamentals". W Guide to Computer Network Security, 3–40. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kizza, Joseph Migga. "Computer Network Fundamentals". W Texts in Computer Science, 3–40. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kizza, Joseph Migga. "Computer Network Fundamentals". W Guide to Computer Network Security, 3–41. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kizza, Joseph Migga. "Computer Network Vulnerabilities". W Guide to Computer Network Security, 89–105. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kizza, Joseph Migga. "Computer Network Fundamentals". W Guide to Computer Network Security, 3–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Lefebvre, E. "Computer Network Security". W Multisensor Fusion, 765–78. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dieminger, Walter, Gerd K. Hartmann i Reinhart Leitinger. "Computer Network Communications". W The Upper Atmosphere, 942–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/978-3-642-78717-1_29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Computer network"

1

Bates, Richard J. S., i Anujan Varma. "Broadband Computer Network Based on Optical Subcarrier Multiplexing". W Photonic Switching. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/phs.1991.fd4.

Pełny tekst źródła
Streszczenie:
An optical passive-star network consists of a number of stations interconnected in a star topology by means of a central passive optical coupler. These networks offer a reliable and inexpensive means for implementation of local-area and room-area networks, multiprocessor interconnection networks, I/O buses, and workstation clusters. Optical subcarrier multiplexing (SCM) provides a means to divide the aggregate bandwidth of the optical medium in an optical passive-star network into multiple channels, each offering a fraction of the aggregate bandwidth. A network testbed to evaluate the SCM technology and its likely applications to computer-system interconnection are the subject of this paper.
Style APA, Harvard, Vancouver, ISO itp.
2

Pham, Nam, Hao Yu i Bogdan M. Wilamowski. "Neural Network Trainer through Computer Networks". W 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE, 2010. http://dx.doi.org/10.1109/aina.2010.169.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Youssef, M. W. "Securing computer networks communication by modifying computer network communication protocols". W 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Elenbogen, Bruce S. "Computer network management". W The proceedings of the thirtieth SIGCSE technical symposium. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/299649.299713.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Pan, Jianping. "Teaching computer networks in a real network". W the 41st ACM technical symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1734263.1734311.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, Mariusz Kamola, Krzysztof Malinowski, Przemyslaw Jaskola i Michal Marks. "Network-wide power management in computer networks". W 2013 22nd ITC Specialist Seminar on Energy Efficient and Green Networking (SSEEGN). IEEE, 2013. http://dx.doi.org/10.1109/sseegn.2013.6705398.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Nanda, Priyadarsi, i Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)". W IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/3258155.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wellman, Barry. "For a social network analysis of computer networks". W the 1996 ACM SIGCPR/SIGMIS conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238857.238860.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Vakaliuk, Tetiana, Oleksii Chyzhmotria, Olena Chyzhmotria, Dmytro Antoniuk, Valerii Kontsedailo i Viacheslav Kryvohyzha. "Simulator of Computer Networks and Basic Network Protocols". W 5th Workshop for Young Scientists in Computer Science & Software Engineering. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0012009800003561.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cotter, David. "Ultrafast Computer Networking". W Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.ofb.1.

Pełny tekst źródła
Streszczenie:
In recent years research on ‘optics in computing’ has focused increasingly on the use of optical interconnects within future electronic computers, packet switches and routers to enhance their power and performance as stand-alone machines. At the same time, however, the interconnection between computers today has undergone a revolution; the widespread adoption of common network transport protocols has stimulated the rapidly increasing and extensive use of inter-networking, and this is manifest by the explosive growth of the global Internet. Increasingly, intelligence— data, applications, computing power itself—is becoming distributed across networks of machines. The efficiency with which machines are interconnected becomes vitally important for acceptable performance of these advanced distributed applications. The interconnection must certainly provide sufficient bandwidth, but equally important is the need to minimise latency. A simple and common example of the inadequacy of today’s computer networks is the frustratingly poor performance often experienced by users of the Worldwide Web. Increasingly in the future there will be a demand for multi-media applications that can operate with a slick and seamless interface to the network, and that provide long interaction periods with human immersion in computer generated environments, synthesised from wide-ranging distributed intelligence. There will also be an increasing volume of computer-to-computer interaction with little human intervention, using software agents. For these applications, interconnection latency must be minimised and should ideally be dominated by the fundamental delay due to the optical transmission time-of-flight.
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Computer network"

1

Lydon, Michael, i Jessie Ford. Computer Science Career Network. Fort Belvoir, VA: Defense Technical Information Center, marzec 2013. http://dx.doi.org/10.21236/ada578200.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Piergrossi, Todd M. Optimizing Computer Network Defense Training. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2000. http://dx.doi.org/10.21236/ada388382.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Johannes, James D., Tim Lewis, Kyle Hoover, Andrew Fanning i Chad Williams. Computer Network Analysis and Implementation. Fort Belvoir, VA: Defense Technical Information Center, październik 1998. http://dx.doi.org/10.21236/ada391962.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Enslow, P. H., Hamond Jr., Schlag J. L. i J. H. Microprocessor Local Computer Network Evaluation. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1985. http://dx.doi.org/10.21236/ada159914.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Reed, D. A Discussion on Computer Network Conferencing. RFC Editor, maj 1992. http://dx.doi.org/10.17487/rfc1324.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lenderman, Curtis C. Computer Network Attack: An Operational Tool? Fort Belvoir, VA: Defense Technical Information Center, styczeń 2003. http://dx.doi.org/10.21236/ada415427.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kaetzel, Lawrence J. Computer-integrated knowledge system (CIKS) network:. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6401.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Busby, Daniel J. Peacetime Use of Computer Network Attack. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2000. http://dx.doi.org/10.21236/ada377624.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Robinson, David J. Characterization and Planning for Computer Network Operations. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2010. http://dx.doi.org/10.21236/ada577860.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis i Marsha Robinson. Computer Network Security and Directory Services Architecture. Fort Belvoir, VA: Defense Technical Information Center, marzec 2000. http://dx.doi.org/10.21236/ada392366.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii