Artigos de revistas sobre o tema "Computer networks"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Computer networks".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Texto completo da fonteSireesha, Manchoori, and Gobi N. "Computer Networks." International Journal of Research Publication and Reviews 5, no. 3 (March 2, 2024): 1020–24. http://dx.doi.org/10.55248/gengpi.5.0324.0640.
Texto completo da fonteZizaeva, Ana, Yakha A. Khadueva, and Olga A. Pyrnova. "APPLICATION OF INFORMATION SECURITY IN COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1/10, no. 154 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2025.01.10.006.
Texto completo da fonteHyman, William A. "Medical Devices, Computers, and Computer Networks." Biomedical Safety & Standards 39, no. 1 (January 2009): 1–4. http://dx.doi.org/10.1097/01.bmsas.0000342710.32111.54.
Texto completo da fonteAlviyanto, Fendi, Thomas Budiman, and Anton Zulkarnain Sianipar. "LAN Network Optimization to Support Practicum Activities Using Action Research Method at STMIK Jayakarta." Jurnal Indonesia Sosial Teknologi 5, no. 7 (July 16, 2024): 3050–58. http://dx.doi.org/10.59141/jist.v5i7.1104.
Texto completo da fonteMadaeva, Madina S., Salidat M. Yunaeva, and Irina V. Grigorieva. "THE ROLE OF COMPUTER INFORMATION NETWORKS IN ECONOMIC ACTIVITY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/10, no. 150 (2024): 17–22. https://doi.org/10.36871/ek.up.p.r.2024.09.10.003.
Texto completo da fonteGumen, O., I. Selina, and D. Міz. "NEURAL NETWORKS. COMPUTER VISUAL RECOGNITION." Modern problems of modeling, no. 26 (June 13, 2024): 95–99. https://doi.org/10.33842/2313125x-2024-26-95-99.
Texto completo da fonteRen, Xiaohui, Iftikhar Ahmed, and Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (August 1, 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.
Texto completo da fonteMurdalova, Iman E., Aiset U. Baydarova, and Deni M. Temirsultanov. "THE ROLE OF COMPUTER NETWORKS IN ECONOMIC DEVELOPMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/11, no. 153 (2024): 236–40. https://doi.org/10.36871/ek.up.p.r.2024.12.11.028.
Texto completo da fonteQin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.
Texto completo da fonteMadaeva, Madina S., Salidat M. Yunaeva, and Svetlana G. Nikolaeva. "THE IMPACT OF INFORMATION COMPUTER NETWORKS ON SOCIAL DEVELOPMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/10, no. 150 (2024): 86–92. https://doi.org/10.36871/ek.up.p.r.2024.09.10.012.
Texto completo da fonteHasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.
Texto completo da fonteGOTO, Eiji. "Using Computers and Computer Networks in U.S.A." Journal of Agricultural Meteorology 50, no. 2 (1994): 135–39. http://dx.doi.org/10.2480/agrmet.50.135.
Texto completo da fonteBogucki, Peter. "Computer Networks." Anthropology News 27, no. 6 (September 1986): 2. http://dx.doi.org/10.1111/an.1986.27.6.2.1.
Texto completo da fonteBrinn, L. W. "Computer Networks." ACM SIGCSE Bulletin 17, no. 1 (March 1985): 135–39. http://dx.doi.org/10.1145/323275.323305.
Texto completo da fonteJensen, Pamela S. "Computer Networks." Investigative Radiology 20, no. 6 (September 1985): 648. http://dx.doi.org/10.1097/00004424-198509000-00026.
Texto completo da fonteMulyadi. "PENERAPAN IP VERSI 6 DALAM MEMBANGUN JARINGAN LAN." Jurnal Informatika Komputer, Bisnis dan Manajemen 19, no. 3 (November 20, 2023): 16–26. http://dx.doi.org/10.61805/fahma.v19i3.49.
Texto completo da fonteSanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (January 1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.
Texto completo da fonteBidaybekov, Ye Y., Y. K. Khenner, Sh T. Shekerbekova, and Y. Н. Zhabayev. "ON THE ISSUE OF TRAINING FUTURE COMPUTER SCIENCE TEACHERS IN COMPUTER." BULLETIN Series of Physics & Mathematical Sciences 72, no. 4 (September 29, 2020): 174–79. http://dx.doi.org/10.51889/2020-4.1728-7901.27.
Texto completo da fonteGlăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.
Texto completo da fonteMathew, Jincy C. "Review on Architecture of Computer Networks." International Journal of Psychosocial Rehabilitation 24, no. 4 (April 30, 2020): 6997–7001. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020702.
Texto completo da fonteZufarov, Zair Makhmudovich. "TOPOLOGY OF COMPUTER NETWORKS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 1, no. 1 (April 30, 2021): 886–91. https://doi.org/10.5281/zenodo.4742124.
Texto completo da fonteS.I., Arubere, and Okardi B. "Fundamentals of Communication Technology and Networks." British Journal of Computer, Networking and Information Technology 4, no. 1 (June 2, 2021): 1–12. http://dx.doi.org/10.52589/bjcnit-3vorvhit.
Texto completo da fonteYuri Ariyanto, Atiqah Nurul Asri, Yoppy Yunhasnawa, Faiz Ushbah Mubarok, and Mungki Astiningrum. "INSTALASI JARINGAN KOMPUTER SEBAGAI PENUNJANG LAYANAN ADMINISTRASI MASYARAKAT DESA KARANGDUREN KAB. MALANG." Jurnal Pengabdian Kepada Masyarakat 9, no. 2 (December 30, 2022): 158–61. http://dx.doi.org/10.33795/jabdimas.v9i2.190.
Texto completo da fonteLazarov, Andon D. "Mathematical Modelling of Malware Intrusion in Computer Networks." Cybernetics and Information Technologies 22, no. 3 (September 1, 2022): 29–47. http://dx.doi.org/10.2478/cait-2022-0026.
Texto completo da fonteWellman, B. "Computer Networks As Social Networks." Science 293, no. 5537 (September 14, 2001): 2031–34. http://dx.doi.org/10.1126/science.1065547.
Texto completo da fonteLevin, Ilya, Mark Korenblit, and Vadim Talis. "STUDY OF SOCIAL NETWORKS’ DYNAMICS BY SIMULATION WITHIN THE NODEXL-EXCEL ENVIRONMENT." Problems of Education in the 21st Century 54, no. 1 (June 20, 2013): 125–37. http://dx.doi.org/10.33225/pec/13.54.125.
Texto completo da fonteSeyam, Noha Mohammad, Mohammed Ali Alghamdi, and Adnan Khalil. "Calculating degree-based topological indices and m-polynomials for various interconnection networks." Open Journal of Discrete Applied Mathematics 7, no. 1 (December 31, 2024): 21–38. https://doi.org/10.30538/psrp-odam2024.0096.
Texto completo da fonteTarafdar, Sk Sahil, Divyanshu Dwivedi, Ashish Dhiman, Er Narinder Yadav, and Er Sanjay Singla. "A Comparative Study Enhancing Dynamic Routing in Computer Networks: Strategies for Optimal Performance using EIGRP." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (October 30, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem38318.
Texto completo da fonteBushur, Jacob, and Chao Chen. "Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 41–54. http://dx.doi.org/10.5121/ijcsit.2022.14304.
Texto completo da fonteSathyamurthy, N. "Let There be Computers and Virtual Computer Networks!" Resonance 25, no. 10 (October 2020): 1463–66. http://dx.doi.org/10.1007/s12045-020-1063-2.
Texto completo da fonteKoam, Ali N. A., Ali Ahmad, and Ashfaq Ahmed Qummer. "On the Study of Reverse Degree-Based Topological Properties for the Third Type of p th Chain Hex-Derived Network." Journal of Mathematics 2021 (November 3, 2021): 1–12. http://dx.doi.org/10.1155/2021/4540276.
Texto completo da fonteYanova, Olga Yu, Osman M. Minaev, and Hava S. Khalieva. "THE USE OF VIRTUAL NETWORK TECHNOLOGY IN ENSURING THE SECURITY OF COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 11/12, no. 152 (2024): 194–200. https://doi.org/10.36871/ek.up.p.r.2024.11.12.020.
Texto completo da fonteAfrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (September 9, 2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.
Texto completo da fontePotuzak, Tomas. "Methods for division of road traffic network for distributed simulation performed on heterogeneous clusters." Computer Science and Information Systems 10, no. 1 (2013): 321–48. http://dx.doi.org/10.2298/csis120601006p.
Texto completo da fonteTeguh Tamrin, Nur Muhaidi, Anang Fathul Arifin, and Ariyanto. "IMPLEMENTASI METODE VLSM (VARIABLE LENGTH SUBNET MASK) PADA PEMETAAN IP ADDRESS LAN (LOCAL AREA NETWORK) DI LAB FAKULTAS SAINT DAN TEKNOLOGI (FST) UNISNU JEPARA." Jurnal Publikasi Teknik Informatika 2, no. 1 (January 20, 2023): 6–11. http://dx.doi.org/10.55606/jupti.v1i1.963.
Texto completo da fonteSmith, E. "Review: Computer Networks." Computer Bulletin 46, no. 1 (January 1, 2004): 30. http://dx.doi.org/10.1093/combul/46.1.30.
Texto completo da fonteĐokić, Ratomir Đ., and Milorad S. Markagić. "Computer networks forensics." Vojnotehnicki glasnik 61, no. 1 (2013): 136–45. http://dx.doi.org/10.5937/vojtehg61-1493.
Texto completo da fonteSmythe, C. "Computer Communication Networks." Electronics & Communications Engineering Journal 4, no. 1 (1992): 31. http://dx.doi.org/10.1049/ecej:19920007.
Texto completo da fonteMax, G. "Modelling computer networks." Journal of Physics: Conference Series 268 (January 1, 2011): 012018. http://dx.doi.org/10.1088/1742-6596/268/1/012018.
Texto completo da fonteGorodetskii, V. I., I. V. Kotenko, and R. M. Yusupov. "Computer networks safety." Herald of the Russian Academy of Sciences 76, no. 4 (July 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.
Texto completo da fonteQuarterman, John S., and Josiah C. Hoskins. "Notable computer networks." Communications of the ACM 29, no. 10 (October 1986): 932–71. http://dx.doi.org/10.1145/6617.6618.
Texto completo da fonteFluck, Andrew. "Using Computer Networks." British Journal of Special Education 16, no. 1 (June 8, 2007): 14. http://dx.doi.org/10.1111/j.1467-8578.1989.tb01352.x.
Texto completo da fonteAnwar Rifai, Rojani Amsir, Muhammad. "Implementation of a Local Area Network Using a Mikrotik Router on Sheza Computer." JELTec (Journal of Learning Technology) 2, no. 1 (March 31, 2024): 10–15. https://doi.org/10.56327/jeltec.v2i1.85.
Texto completo da fonteSmushkin, A. B. "Forensic Significance of Certain Types of Computer Networks." Lex Russica 77, no. 9 (September 17, 2024): 72–83. http://dx.doi.org/10.17803/1729-5920.2024.214.9.072-083.
Texto completo da fonteAyu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Texto completo da fonteRefaee, Eshrag A., and Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors." Complexity 2021 (April 26, 2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.
Texto completo da fonteIrwansyah, Irwansyah, Ade Davy Wiranata, Tupan Tri Muryono, and Agus Budiyantara. "SISTEM PAKAR DETEKSI KERUSAKAN JARINGAN LOCAL AREA NETWORK (LAN) MENGGUNAKAN METODE BECKWARD CHAINING BERBASIS WEB." Infotech: Journal of Technology Information 8, no. 2 (November 30, 2022): 135–42. http://dx.doi.org/10.37365/jti.v8i2.150.
Texto completo da fonteShkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.
Texto completo da fonteFan, Chengmei, M. Mobeen Munir, Zafar Hussain, Muhammad Athar, and Jia-Bao Liu. "Polynomials and General Degree-Based Topological Indices of Generalized Sierpinski Networks." Complexity 2021 (February 9, 2021): 1–10. http://dx.doi.org/10.1155/2021/6657298.
Texto completo da fonte