Artigos de revistas sobre o tema "Computer network resources"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Computer network resources".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Vishvakarma, Tanmya. "A Review of Modern Computer Networks". International Journal for Research in Applied Science and Engineering Technology 10, n.º 9 (30 de setembro de 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Texto completo da fonteGoffe, William L. "Computer Network Resources for Economists". Journal of Economic Perspectives 8, n.º 3 (1 de agosto de 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.
Texto completo da fonteLu, Jingrong. "Optimization Simulation of Balanced Distribution of Multimedia Network Modular Teaching Resources". Mobile Information Systems 2022 (14 de setembro de 2022): 1–10. http://dx.doi.org/10.1155/2022/5348953.
Texto completo da fonteSavytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev e Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK". Information technology and computer engineering 58, n.º 3 (29 de dezembro de 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.
Texto completo da fonteTulegenova, E. N., A. B. Adranova e K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION". Bulletin of the Korkyt Ata Kyzylorda University 60, n.º 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.
Texto completo da fonteYi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen e Kuan-Hung Lai Yu-Liang Tang. "Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks". 網際網路技術學刊 23, n.º 5 (setembro de 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.
Texto completo da fonteBishop, Michael P., Roger M. Hubbard, James L. Ward, Mark S. Binkley e Thomas K. Moore. "Computer Network Resources for Physical Geography Instruction". Journal of Geography 92, n.º 3 (maio de 1993): 102–9. http://dx.doi.org/10.1080/00221349308979632.
Texto completo da fonte骆, 又麟. "Application of Network Resources in Computer Teaching". Vocational Education 13, n.º 03 (2024): 836–40. http://dx.doi.org/10.12677/ve.2024.133135.
Texto completo da fontePatel, Dhyan. "A Research Paper on Basic of Computer Network". International Journal for Research in Applied Science and Engineering Technology 12, n.º 2 (29 de fevereiro de 2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.
Texto completo da fonteGiladi, Ran, Ephraim Korach e Rony Ohayon. "Placement of network resources in communication networks". Computer Networks 43, n.º 2 (outubro de 2003): 195–209. http://dx.doi.org/10.1016/s1389-1286(03)00259-7.
Texto completo da fonteBoyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS". Journal scientific and applied research 5, n.º 1 (6 de maio de 2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.
Texto completo da fonteLi, Ning. "Study of Computer Network Resource Sharing for Advanced Engineering Applications". Applied Mechanics and Materials 484-485 (janeiro de 2014): 799–802. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.799.
Texto completo da fonteBushur, Jacob, e Chao Chen. "Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing". International Journal of Computer Science and Information Technology 14, n.º 03 (30 de junho de 2022): 41–54. http://dx.doi.org/10.5121/ijcsit.2022.14304.
Texto completo da fonteNiu, Yiming, Wenyong Du e Zhenying Tang. "Computer Network Security Defense Model". Journal of Physics: Conference Series 2146, n.º 1 (1 de janeiro de 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.
Texto completo da fonteBura, Aman, e Yang Dacheng . "GPRS Network Resources Optimization". Information Technology Journal 5, n.º 5 (15 de agosto de 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.
Texto completo da fonteIrwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono e Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB". Infotech: Journal of Technology Information 8, n.º 2 (30 de novembro de 2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.
Texto completo da fonteXu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology". Applied Mechanics and Materials 687-691 (novembro de 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.
Texto completo da fonteLu, Zhaoming, Tao Lei, Xiangming Wen, Luhan Wang e Xin Chen. "SDN Based User-Centric Framework for Heterogeneous Wireless Networks". Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9874969.
Texto completo da fonteAlQahtani, Salman Ali. "Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities". Future Internet 15, n.º 10 (19 de outubro de 2023): 343. http://dx.doi.org/10.3390/fi15100343.
Texto completo da fonteYu, Jie, Yaliu Li, Chenle Pan e Junwei Wang. "A Classification Method for Academic Resources Based on a Graph Attention Network". Future Internet 13, n.º 3 (4 de março de 2021): 64. http://dx.doi.org/10.3390/fi13030064.
Texto completo da fonteXi Liang, Xi Liang, e Jiesen Yin Xi Liang. "Recommendation Algorithm for Equilibrium of Teaching Resources in Physical Education Network Based on Trust Relationship". 網際網路技術學刊 23, n.º 1 (janeiro de 2022): 135–43. http://dx.doi.org/10.53106/160792642022012301014.
Texto completo da fonteShkilniak, S. S., e Yu Yu Yurchenko. "Methods of ensuring the security of computer network". Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.
Texto completo da fonteBoyanov, Petar. "USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS". Journal Scientific and Applied Research 6, n.º 1 (11 de novembro de 2014): 148–54. http://dx.doi.org/10.46687/jsar.v6i1.152.
Texto completo da fontePerepelkin, D. A., e A. M. Pham. "MATHEMATICAL AND COMPUTER MODELING OF HETEROGENEOUS RESOURCES PLANNING AND ALLOCATION IN INDUSTRIAL NETWORKS". Vestnik of Ryazan State Radio Engineering University 77 (2021): 68–80. http://dx.doi.org/10.21667/1995-4565-2021-77-68-80.
Texto completo da fonteOlha, Zinchenko. "SIMULATION OF DDOS ATTACKS ON CLOUD COMPUTER SYSTEMS". Problems of Modeling and Design Automatization, n.º 2 (2020): 75–85. http://dx.doi.org/10.31474/2074-7888-2020-2-75-85.
Texto completo da fonteMathonsi, Topside E., Tshimangadzo Mavin Tshilongamulenzhe e Bongisizwe Erasmus Buthelezi. "Enhanced Resource Allocation Algorithm for Heterogeneous Wireless Networks". Journal of Advanced Computational Intelligence and Intelligent Informatics 24, n.º 6 (20 de novembro de 2020): 763–73. http://dx.doi.org/10.20965/jaciii.2020.p0763.
Texto completo da fonteDevika SV, Et al. "Radio Resource Management Satellite Communication Network MCDM Method". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 10 (2 de novembro de 2023): 1826–32. http://dx.doi.org/10.17762/ijritcc.v11i10.8759.
Texto completo da fonteRehm, Sven-Volker, Lakshmi Goel e Iris Junglas. "Using Information Systems in Innovation Networks: Uncovering Network Resources". Journal of the Association for Information Systems 18, n.º 8 (agosto de 2017): 577–604. http://dx.doi.org/10.17705/1jais.00465.
Texto completo da fonteSharadqeh, Ahmad. "A novel algorithm for software defined networks model to enhance the quality of services and scalability in wireless network". International Journal of Electrical and Computer Engineering (IJECE) 12, n.º 2 (1 de abril de 2022): 1585. http://dx.doi.org/10.11591/ijece.v12i2.pp1585-1592.
Texto completo da fonteSetyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia e Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS". JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, n.º 2 (18 de fevereiro de 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.
Texto completo da fonteMacleod, Roderick A. "Network resources and access tools". New Review of Information Networking 10, n.º 1 (maio de 2004): 85. http://dx.doi.org/10.1080/13614570412331311996.
Texto completo da fonteMacLeod, Roderick A. "Network resources and access tools". New Review of Information Networking 9, n.º 1 (janeiro de 2003): 79–80. http://dx.doi.org/10.1080/1361457042000186921.
Texto completo da fonteShefer, O. V., G. V. Golovko, Ye A. Chaika e M. A. Luchko. "DEVELOPMENT OF A COMPUTER NETWORK OF THE REGIONAL OFFICE OF WATER RESOURCES IN POLTAVA REGION WITH AN INTELLIGENT DATABASE MANAGEMENT SYSTEM". Системи управління, навігації та зв’язку. Збірник наукових праць 3, n.º 61 (11 de setembro de 2020): 44–48. http://dx.doi.org/10.26906/sunz.2020.3.044.
Texto completo da fonteFeng, Xu, Mengyang He, Lei Zhuang, Yanrui Song e Rumeng Peng. "Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space–Air–Ground Integrated Network". Future Internet 16, n.º 1 (16 de janeiro de 2024): 27. http://dx.doi.org/10.3390/fi16010027.
Texto completo da fonteDu, Lian Yan. "Design on Structure and Integrity for Foreign Language Network Learning Resource Library". Applied Mechanics and Materials 543-547 (março de 2014): 4581–84. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4581.
Texto completo da fonteLiu, Li Jun. "Research on Computer Network Data Transfer Methods". Advanced Materials Research 926-930 (maio de 2014): 2807–10. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2807.
Texto completo da fontePourebrahimi, Behnaz, e Koen Bertels. "Self-Adaptive Economic-Based Resource Allocation in Ad-Hoc Grids". International Journal of Embedded and Real-Time Communication Systems 3, n.º 2 (abril de 2012): 111–30. http://dx.doi.org/10.4018/jertcs.2012040106.
Texto completo da fonteGoni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter". International Journal of Computer Science and Mobile Computing 10, n.º 5 (30 de maio de 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.
Texto completo da fonteChaudhary, Sachin, e Anjna Chaudhary. "Biologically inspired networking: A solution over the challenges of ordinary networking". International Journal of Advance Research and Innovation 1, n.º 3 (2013): 40–44. http://dx.doi.org/10.51976/ijari.131305.
Texto completo da fonteVoyne-Thrall, Michael. "Network Resources for Computer Music (Editor's Note in "Computer Music Journal" 18:1)". Computer Music Journal 18, n.º 3 (1994): 8. http://dx.doi.org/10.2307/3681174.
Texto completo da fonteGao, Chenchen, e Kai Zhang. "Research on remote education intelligent recommendation system of computer network Ancient Literature Resources Database". MATEC Web of Conferences 365 (2022): 01055. http://dx.doi.org/10.1051/matecconf/202236501055.
Texto completo da fonteMartini, Barbara, Valerio Martini, Fabio Baroncelli, Karim Torkman e Piero Castoldi. "Application-Driven Control of Network Resources in Multiservice Optical Networks". Journal of Optical Communications and Networking 1, n.º 2 (1 de julho de 2009): A270. http://dx.doi.org/10.1364/jocn.1.00a270.
Texto completo da fonteWang, WenXia. "A Classification Method of Network Ideological and Political Resources Using Improved SVM Algorithm". Security and Communication Networks 2021 (12 de novembro de 2021): 1–10. http://dx.doi.org/10.1155/2021/2133042.
Texto completo da fonteZhao, Guotao, e Jie Ding. "Image Network Teaching Resource Retrieval Algorithm Based on Deep Hash Algorithm". Scientific Programming 2021 (11 de outubro de 2021): 1–7. http://dx.doi.org/10.1155/2021/9683908.
Texto completo da fonteHiswara, Indra, Khusnul Khoiriyah e Dody Febriyanto. "PERANCANGAN JARINGAN LAN SMK AL-KHAIRIYAH 2 DENGAN MENGGUNAKAN METODE OSPF". JEIS : Jurnal Elektro dan Informatika Swadharma 3, n.º 1 (31 de janeiro de 2023): 58–66. http://dx.doi.org/10.56486/jeis.vol3no1.302.
Texto completo da fonteMshvidobadze, Tinatin. "Computer Network and Computer Grid Joins to E-Learning". Journal of Technical Science and Technologies 4, n.º 2 (22 de maio de 2016): 35–37. http://dx.doi.org/10.31578/jtst.v4i2.81.
Texto completo da fonteRong, Liu. "Design of Ideological and Political Multimedia Network Teaching Resources Integration System Based on Wireless Network". Scientific Programming 2021 (10 de junho de 2021): 1–15. http://dx.doi.org/10.1155/2021/4293771.
Texto completo da fonteXue, Nian, e Li Wei Jia. "Construction and Research of Virtual Network User File System Based on Upnp and FUSE on Linux". Applied Mechanics and Materials 299 (fevereiro de 2013): 125–29. http://dx.doi.org/10.4028/www.scientific.net/amm.299.125.
Texto completo da fonteHart, Joseph. "Computer Communications for Advisors". NACADA Journal 13, n.º 2 (1 de setembro de 1993): 27–33. http://dx.doi.org/10.12930/0271-9517-13.2.27.
Texto completo da fonteTan, Tin-Wee, e Derek Beng-Kee Kiong. "Computer network resources and advanced level teaching of biochemical sciences". Biochemical Education 22, n.º 1 (janeiro de 1994): 40–44. http://dx.doi.org/10.1016/0307-4412(94)90170-8.
Texto completo da fonte