Gotowa bibliografia na temat „Network analysis”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Network analysis”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Network analysis"
Kilkenny, Maureen, i Nerys Fuller Love. "Network analysis and business networks". International Journal of Entrepreneurship and Small Business 21, nr 3 (2014): 303. http://dx.doi.org/10.1504/ijesb.2014.060894.
Pełny tekst źródłaJadhav, Pranavati, i Dr Burra Vijaya Babu. "Detection of Community within Social Networks with Diverse Features of Network Analysis". Journal of Advanced Research in Dynamical and Control Systems 11, nr 12-SPECIAL ISSUE (31.12.2019): 366–71. http://dx.doi.org/10.5373/jardcs/v11sp12/20193232.
Pełny tekst źródłaCVS, Rajesh, i Nadikoppula Pardhasaradhi. "Analysis of Artificial Neural-Network". International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (31.10.2018): 418–28. http://dx.doi.org/10.31142/ijtsrd18482.
Pełny tekst źródłaKalaiSelvi, Dr B., i Aruna K. "Network Traffic Analysis Using Wireshark". International Journal of Research Publication and Reviews 4, nr 12 (18.12.2023): 1960–65. http://dx.doi.org/10.55248/gengpi.4.1223.123506.
Pełny tekst źródłaBlair, Alan D., i Jordan B. Pollack. "Analysis of Dynamical Recognizers". Neural Computation 9, nr 5 (1.07.1997): 1127–42. http://dx.doi.org/10.1162/neco.1997.9.5.1127.
Pełny tekst źródłaKarimi, Faezeh, David Green, Petr Matous, Manos Varvarigos i Kaveh R. Khalilpour. "Network of networks: A bibliometric analysis". Physica D: Nonlinear Phenomena 421 (lipiec 2021): 132889. http://dx.doi.org/10.1016/j.physd.2021.132889.
Pełny tekst źródłaLobastova, M., A. Matyukhin i A. Muthanna. "Analysis of Network Reliability of Network Synchronization". Telecom IT 8, nr 4 (23.12.2020): 93–99. http://dx.doi.org/10.31854/2307-1303-2020-8-4-93-99.
Pełny tekst źródłaTarapata, Zbigniew. "Modelling and analysis of transportation networks using complex networks: Poland case study". Archives of Transport 36, nr 4 (31.12.2015): 55–65. http://dx.doi.org/10.5604/08669546.1185207.
Pełny tekst źródłaHafner-Burton, Emilie M., Miles Kahler i Alexander H. Montgomery. "Network Analysis for International Relations". International Organization 63, nr 3 (lipiec 2009): 559–92. http://dx.doi.org/10.1017/s0020818309090195.
Pełny tekst źródłaWEN, HAO, ZHENG-FU HAN, GUANG-CAN GUO i PEI-LIN HONG. "QKD NETWORKS WITH PASSIVE OPTICAL ELEMENTS: ANALYSIS AND ASSESSMENT". International Journal of Quantum Information 07, nr 06 (wrzesień 2009): 1217–31. http://dx.doi.org/10.1142/s0219749909005730.
Pełny tekst źródłaRozprawy doktorskie na temat "Network analysis"
Oesterheld, Matthias. "Analysis of biomolecular networks using a generic network analysis suite". kostenfrei, 2008. http://mediatum2.ub.tum.de/doc/646475/646475.pdf.
Pełny tekst źródłaPost, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks". Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Pełny tekst źródłaLim, Kok Seng. "Analysis of network management protocols in optical networks". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FLim%5FK.pdf.
Pełny tekst źródłaSilva, do Monte Lima Jennifer. "Performance analysis of network composition in ambient networks". Universidade Federal de Pernambuco, 2007. https://repositorio.ufpe.br/handle/123456789/2637.
Pełny tekst źródłaConselho Nacional de Desenvolvimento Científico e Tecnológico
Atualmente, o compartilhamento de recursos e oferta de serviços entre redes são permitidos apenas através de intensa configuração manual e acordos prévios entre as redes envolvidas. Devido às diferentes tecnologias de acesso, à heterogeneidade dos dispositivos e dos serviços e a mobilidade dos usuários, o gerenciamento dos recursos se torna uma tarefa ainda mais complexa. As Redes de Ambiente surgem para permitir a cooperação instantânea e dinâmica de redes heterogêneas pertencentes a diferentes domínios administrativos e tecnológicos, através de um novo conceito chamado de Composição de Redes. A Composição permite a disponibilização de serviços e o compartilhamento de recursos entre redes, via Acordo de Composição. O desempenho da composição tem um fator crucial na viabilidade das Redes de Ambiente, devido à alta demanda por composição em uma interação de um usuário típico com a rede. Estas composições de redes mudam todo o cenário e trazem novas complicações para o processo tornando necessária a avaliação da estabilidade e da escalabilidade das mesmas. Diante da impossibilidade de testar tais conceitos de forma prática e real, optouse por fazê-lo através de simulação. Para atingir este objetivo foi especificado e implementado um simulador para Composições de Redes de Ambiente. Este simulador tem como objetivo principal avaliar o desempenho da composição mostrando que a mesma não representa um gargalo para a implantação das Redes de Ambiente
Woodbury, Nathan Scott. "Network Reconstruction and Vulnerability Analysis of Financial Networks". BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6370.
Pełny tekst źródłaJunuthula, Ruthwik Reddy. "Modeling, Evaluation and Analysis of Dynamic Networks for Social Network Analysis". University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1544819215833249.
Pełny tekst źródłaHassan, Aamir, i Fida Mohammad. "Network Security Analysis". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002.
Pełny tekst źródłaSecurity is the second step after that a successful network has been deployed. There are many types of attacks that could potentially harm the network and an administrator should carefully document and plan the weak areas, where the network could be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security. This thesis addresses all the possible tools and techniques that attackers use to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable tools to get the results. It is important to note that most of the attention in network security is given to the router, but far less attention is given to securing a switch. This thesis will also address some more ways of securing a switch, if there is no router in the network.
The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.
Mei, Jonathan B. "Principal Network Analysis". Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1175.
Pełny tekst źródłaZhou, Lin. "Active network management and uncertainty analysis in distribution networks". Thesis, University of Bath, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.675697.
Pełny tekst źródła鄧沛權 i Pui-kuen Tang. "Business network: network marketing : analysis of network marketing using business network theories". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31268316.
Pełny tekst źródłaKsiążki na temat "Network analysis"
Brandes, Ulrik, i Thomas Erlebach, red. Network Analysis. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b106453.
Pełny tekst źródłaCombined Higher Education Software Team., Environmental Systems Research Institute i Manchester Computing Centre, red. Network analysis. Manchester: Manchester Computing Centre, 1993.
Znajdź pełny tekst źródłaLucas, Michael. Network flow analysis. San Francisco: No Starch Press, 2010.
Znajdź pełny tekst źródłaHodgson. Novell Netware protocol and network analysis. Manchester: University of Manchester, Department of Computer Science, 1996.
Znajdź pełny tekst źródłaFreeman, Linton. Social Network Analysis. 1 Oliver's Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications Ltd, 2008. http://dx.doi.org/10.4135/9781446263464.
Pełny tekst źródłaKnoke, David, i Song Yang. Social Network Analysis. 2455 Teller Road, Thousand Oaks California 91320 United States of America: SAGE Publications, Inc., 2008. http://dx.doi.org/10.4135/9781412985864.
Pełny tekst źródłaXu, Kuai. Network Behavior Analysis. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8325-1.
Pełny tekst źródłaHolt, Alan. Network Performance Analysis. London: Springer London, 2008. http://dx.doi.org/10.1007/978-1-84628-823-4.
Pełny tekst źródłaFellin, Tommaso, i Michael Halassa, red. Neuronal Network Analysis. Totowa, NJ: Humana Press, 2012. http://dx.doi.org/10.1007/978-1-61779-633-3.
Pełny tekst źródłaBonald, Thomas, i Mathieu Feuillet. Network Performance Analysis. Hoboken, NJ, USA: John Wiley & Sons, Inc, 2011. http://dx.doi.org/10.1002/9781118602911.
Pełny tekst źródłaCzęści książek na temat "Network analysis"
Cellerino, Alessandro, i Michele Sanguanini. "Network analysis". W Transcriptome Analysis, 99–119. Pisa: Scuola Normale Superiore, 2018. http://dx.doi.org/10.1007/978-88-7642-642-1_7.
Pełny tekst źródłaBrinkmeier, Michael, i Thomas Schank. "Network Statistics". W Network Analysis, 293–317. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31955-9_11.
Pełny tekst źródłaBaur, Michael, i Marc Benkert. "Network Comparison". W Network Analysis, 318–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31955-9_12.
Pełny tekst źródłaBaumann, Nadine, i Sebastian Stiller. "Network Models". W Network Analysis, 341–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31955-9_13.
Pełny tekst źródłaCostantini, Giulio, i Marco Perugini. "Network Analysis". W The Wiley Handbook of Personality Assessment, 74–89. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781119173489.ch6.
Pełny tekst źródłaRennels, Donald C., i Hobart M. Hudson. "Network Analysis". W Pipe Flow, 49–60. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118275276.ch5.
Pełny tekst źródłaCostantini, Giulio, i Marco Perugini. "Network Analysis". W Encyclopedia of Personality and Individual Differences, 3184–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-24612-3_1332.
Pełny tekst źródłaVanhoucke, Mario. "Network Analysis". W Integrated Project Management Sourcebook, 11–27. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27373-0_3.
Pełny tekst źródłaGallupe, Owen. "Network Analysis". W The Handbook of Measurement Issues in Criminology and Criminal Justice, 555–75. Hoboken, NJ: John Wiley & Sons, Inc, 2016. http://dx.doi.org/10.1002/9781118868799.ch25.
Pełny tekst źródłaMorrissey, Sean. "Network Analysis". W iOS Forensic Analysis for iPhone, iPad, and iPod touch, 323–42. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3343-5_10.
Pełny tekst źródłaStreszczenia konferencji na temat "Network analysis"
Melo, Renato Silva, i André Luís Vignatti. "Preprocessing Rules for Target Set Selection in Complex Networks". W Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/brasnam.2020.11167.
Pełny tekst źródłaBursztyn, Victor S., Marcelo Granja Nunes i Daniel R. Figueiredo. "How Congressmen Connect: Analyzing Voting and Donation Networks in the Brazilian Congress". W Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6451.
Pełny tekst źródłaMaruyama, William Takahiro, i Luciano Antonio Digiampietri. "Co-authorship prediction in academic social network". W Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6445.
Pełny tekst źródłaBrandão, Michele A., Matheus A. Diniz i Mirella M. Moro. "Using Topological Properties to Measure the Strength of Co-authorship Ties". W Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6455.
Pełny tekst źródłaSoares, Rafael Henrique Santos, Jorge H. C. Fernandes i Ricardo Sampaio. "Formal Information Flows Among Top Authorities of the Brazilian Federal Government based on Co-word Analysis of Data Published in the Official Gazette". W Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/brasnam.2016.6450.
Pełny tekst źródłaOliveira, Davi Alves, Erica dos Santos Rodrigues i Hernane Borges de Barros Pereira. "Affinity Networks as a Tool for Assessing Writing Processes: A Novel Method Utilizing Pause-Based Visibility Graphs". W Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/brasnam.2023.229991.
Pełny tekst źródłaSilva, Mariana O., Gabriel P. Oliveira i Mirella M. Moro. "Analyzing Character Networks in Portuguese-language Literary Works". W Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/brasnam.2023.230585.
Pełny tekst źródłaPopescu, Daniela, Elena Serban, Carmen-Ema Panaite i Abel Herna´ndez-Guerrero. "Hydraulic Analysis of a District Heating Network". W ASME 2008 9th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2008. http://dx.doi.org/10.1115/esda2008-59352.
Pełny tekst źródłaAshjaee, Mehdi, Reza Afzali, Mohammad Niknami, Mehdi Amiri i Tooraj Yousefi. "Neural Network Analysis of Free Convection Around Isothermal Elliptic Tube". W ASME 8th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2006. http://dx.doi.org/10.1115/esda2006-95238.
Pełny tekst źródłaRen, Fuxin, Zhongbao Zhang, Jiawei Zhang, Sen Su, Li Sun, Guozhen Zhu i Congying Guo. "BANANA: when Behavior ANAlysis meets social Network Alignment". W Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/200.
Pełny tekst źródłaRaporty organizacyjne na temat "Network analysis"
Kalb, Jeffrey L., i David S. Lee. Network topology analysis. Office of Scientific and Technical Information (OSTI), styczeń 2008. http://dx.doi.org/10.2172/1028919.
Pełny tekst źródłaBonnett, Michaela, Chimdi Ezeigwe, Meaghan Kennedy i Teri Garstka. Using Social Network Analysis to Link Community Health and Network Strength. Orange Sparkle Ball, lipiec 2023. http://dx.doi.org/10.61152/scsf6662.
Pełny tekst źródłaR.T. Rosche. IDCS NETWORK ALTERNATIVES ANALYSIS. Office of Scientific and Technical Information (OSTI), luty 1995. http://dx.doi.org/10.2172/883443.
Pełny tekst źródłaMeyer, Robert A., i David A. Perreault. Communication Network Software Analysis. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 1994. http://dx.doi.org/10.21236/ada281019.
Pełny tekst źródłaZinilli, Antonio. From Basic to Advanced Network Analysis in R. Instats Inc., 2024. http://dx.doi.org/10.61700/t68209rotxkow930.
Pełny tekst źródłaLee, Hyun-Jung, HyunJu Shin, Kyu-Hye Lee, Seulah Lee i Ye-Jin In. Semantic Network Analysis of Gorpcore. Ames (Iowa): Iowa State University. Library, styczeń 2019. http://dx.doi.org/10.31274/itaa.8218.
Pełny tekst źródłaChristie, Alan M. Network Survivability Analysis Using Easel. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2002. http://dx.doi.org/10.21236/ada413664.
Pełny tekst źródłaJohannes, James D., Tim Lewis, Kyle Hoover, Andrew Fanning i Chad Williams. Computer Network Analysis and Implementation. Fort Belvoir, VA: Defense Technical Information Center, październik 1998. http://dx.doi.org/10.21236/ada391962.
Pełny tekst źródłaPowell, Bruce C. Artificial Neural Network Analysis System. Fort Belvoir, VA: Defense Technical Information Center, luty 2001. http://dx.doi.org/10.21236/ada392390.
Pełny tekst źródłaBrunner, James, Aaron Robinson i Chain Patrick Sam Guy. Is Transkingdom Network Analysis Possible? Office of Scientific and Technical Information (OSTI), listopad 2023. http://dx.doi.org/10.2172/2377943.
Pełny tekst źródła