Artigos de revistas sobre o tema "Extranets (Computer networks)"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 47 melhores artigos de revistas para estudos sobre o assunto "Extranets (Computer networks)".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Morgan, David. "Deploying extranets?" Network Security 2004, n.º 12 (dezembro de 2004): 12–14. http://dx.doi.org/10.1016/s1353-4858(04)00170-9.
Texto completo da fonteLiu, Nan, Zhi Zeng e Ruoyu Jin. "A Survey on Users' Perspectives to Functionalities of Web-Based Construction Collaboration Extranets". International Journal of e-Collaboration 15, n.º 4 (outubro de 2019): 1–17. http://dx.doi.org/10.4018/ijec.2019100101.
Texto completo da fontePhaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets". EDPACS 27, n.º 12 (junho de 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.
Texto completo da fonteGuo, Jie, Xihao Fu, Liqiang Lin, Hengjun Ma, Yanwen Guo, Shiqiu Liu e Ling-Qi Yan. "ExtraNet". ACM Transactions on Graphics 40, n.º 6 (dezembro de 2021): 1–16. http://dx.doi.org/10.1145/3478513.3480531.
Texto completo da fonteAhmed Ali, Adel, e Ahmed M. Al-Naamany. "Converged Networking: A Review of Concepts and Technologies". Sultan Qaboos University Journal for Science [SQUJS] 5 (1 de dezembro de 2000): 209. http://dx.doi.org/10.24200/squjs.vol5iss0pp209-225.
Texto completo da fonteHu, Xiujian, Guanglei Sheng, Piao Shi e Yuanyuan Ding. "TbsNet: the importance of thin-branch structures in CNNs". PeerJ Computer Science 9 (16 de junho de 2023): e1429. http://dx.doi.org/10.7717/peerj-cs.1429.
Texto completo da fonteAbabneh, Nedal. "Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks". International Journal of Distributed Sensor Networks 6, n.º 1 (1 de janeiro de 2010): 671385. http://dx.doi.org/10.1155/2010/671385.
Texto completo da fonteKaramysheva, N. S., D. S. Svishchev, K. V. Popov e S. A. Zinkin. "Implementation of Agent-Based Metacomputersystems and Applications". Proceedings of the Southwest State University 26, n.º 1 (28 de junho de 2022): 148–71. http://dx.doi.org/10.21869/2223-1560-2022-26-1-148-171.
Texto completo da fonteMalik, Najeeb ur Rehman, Usman Ullah Sheikh, Syed Abdul Rahman Abu-Bakar e Asma Channa. "Multi-View Human Action Recognition Using Skeleton Based-FineKNN with Extraneous Frame Scrapping Technique". Sensors 23, n.º 5 (2 de março de 2023): 2745. http://dx.doi.org/10.3390/s23052745.
Texto completo da fonteMolla, D., R. Schwitter, F. Rinaldi, J. Dowdall e M. Hess. "ExtrAns: Extracting answers from technical texts". IEEE Intelligent Systems 18, n.º 4 (julho de 2003): 12–17. http://dx.doi.org/10.1109/mis.2003.1217623.
Texto completo da fonteHameed, Marwah. "Modified Fuzzy Neural Network Approach for Academic Performance Prediction of Students in Early Childhood Education". Bonfring International Journal of Networking Technologies and Applications 11, n.º 1 (13 de fevereiro de 2024): 17–20. http://dx.doi.org/10.9756/bijnta/v11i1/bij24007.
Texto completo da fonteILYA V., VOLODIN, PUTYATO MICHAEL M., MAKARYAN ALEXANDER S. e EVGLEVSKY VYACHESLAV YU. "CLASSIFICATION OF ATTACK MECHANISMS AND RESEARCH OF PROTECTION METHODS FOR SYSTEMS USING MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE ALGORITHMS". CASPIAN JOURNAL: Control and High Technologies 54, n.º 2 (2021): 90–98. http://dx.doi.org/10.21672/2074-1707.2021.53.1.090-098.
Texto completo da fonteStyles, K., e M. Goldsworthy. "GI extranet: a case study in applying technology for competitive advantage". International Journal of Networking and Virtual Organisations 1, n.º 1 (2002): 82. http://dx.doi.org/10.1504/ijnvo.2002.001464.
Texto completo da fonteLiu, Zhen, Yi-Liang Han e Xiao-Yuan Yang. "A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks". International Journal of Distributed Sensor Networks 15, n.º 6 (junho de 2019): 155014771985651. http://dx.doi.org/10.1177/1550147719856516.
Texto completo da fonteYong, Chern Han, e Limsoon Wong. "From the static interactome to dynamic protein complexes: Three challenges". Journal of Bioinformatics and Computational Biology 13, n.º 02 (abril de 2015): 1571001. http://dx.doi.org/10.1142/s0219720015710018.
Texto completo da fonteNuli Namassivaya, Sunkari Nithigna, Sindhu Kovilala e MD Sibli Hussain. "Encrypted chat application using RSA Algorithm". international journal of engineering technology and management sciences 7, n.º 2 (2023): 854–59. http://dx.doi.org/10.46647/ijetms.2023.v07i02.095.
Texto completo da fonteSychugov, Anton, Vadim Miheychikov e Maksim Chernyshov. "Application of Neural Networks for Object Recognition in Railway Transportation". Proceedings of Petersburg Transport University 20, n.º 2 (20 de junho de 2023): 478–91. http://dx.doi.org/10.20295/1815-588x-2023-2-478-491.
Texto completo da fonteLaksana, Eugene, Melissa Aczon, Long Ho, Cameron Carlin, David Ledbetter e Randall Wetzel. "The impact of extraneous features on the performance of recurrent neural network models in clinical tasks". Journal of Biomedical Informatics 102 (fevereiro de 2020): 103351. http://dx.doi.org/10.1016/j.jbi.2019.103351.
Texto completo da fonteGALL, HARALD C., RENÉ R. KLÖSCH e ROLAND T. MITTERMEIR. "USING DOMAIN KNOWLEDGE TO IMPROVE REVERSE ENGINEERING". International Journal of Software Engineering and Knowledge Engineering 06, n.º 03 (setembro de 1996): 477–505. http://dx.doi.org/10.1142/s021819409600020x.
Texto completo da fonteM. Sujitha, N. Leela e B. Kanimozhi. "Computer Aided Diagnosis (CAD) and Classification of Microbial and other Wide Range of Dermal Diseases using AI and Medical Image Processing". Journal of Innovative Image Processing 5, n.º 3 (setembro de 2023): 307–22. http://dx.doi.org/10.36548/jiip.2023.3.006.
Texto completo da fonteПальчикова, И. Г., И. А. Будаева e Е. С. Смирнов. "Generation of a digital passport for gunshot residues using the computer vision techniques". Вычислительные технологии 29, n.º 1 (24 de fevereiro de 2024): 93–106. http://dx.doi.org/10.25743/ict.2024.29.1.009.
Texto completo da fonteSun, Jiuyun, Huanhe Dong, Ya Gao, Yong Fang e Yuan Kong. "The Short-Term Load Forecasting Using an Artificial Neural Network Approach with Periodic and Nonperiodic Factors: A Case Study of Tai'an, Shandong Province, China". Computational Intelligence and Neuroscience 2021 (26 de outubro de 2021): 1–8. http://dx.doi.org/10.1155/2021/1502932.
Texto completo da fontePeeters, Hendrik, Sebastian Habig e Sabine Fechner. "Does Augmented Reality Help to Understand Chemical Phenomena during Hands-On Experiments?–Implications for Cognitive Load and Learning". Multimodal Technologies and Interaction 7, n.º 2 (19 de janeiro de 2023): 9. http://dx.doi.org/10.3390/mti7020009.
Texto completo da fonteJones, R. Kenny, Paul Guerrero, Niloy J. Mitra e Daniel Ritchie. "ShapeCoder: Discovering Abstractions for Visual Programs from Unstructured Primitives". ACM Transactions on Graphics 42, n.º 4 (26 de julho de 2023): 1–17. http://dx.doi.org/10.1145/3592416.
Texto completo da fonteChen, Xinyue, Shuo Li, Shipeng Liu, Robin Fowler e Xu Wang. "MeetScript: Designing Transcript-based Interactions to Support Active Participation in Group Video Meetings". Proceedings of the ACM on Human-Computer Interaction 7, CSCW2 (28 de setembro de 2023): 1–32. http://dx.doi.org/10.1145/3610196.
Texto completo da fonteWang, Lei, e Wenqi He. "Analysis of Community Outdoor Public Spaces Based on Computer Vision Behavior Detection Algorithm". Applied Sciences 13, n.º 19 (2 de outubro de 2023): 10922. http://dx.doi.org/10.3390/app131910922.
Texto completo da fonteLin, Hsien-I., e C. S. George Lee. "Neuro-fuzzy-based skill learning for robots". Robotica 30, n.º 6 (8 de dezembro de 2011): 1013–27. http://dx.doi.org/10.1017/s026357471100124x.
Texto completo da fonteNguyen, Viet Hung, Ngoc Nam Pham, Cong Thang Truong, Duy Tien Bui, Huu Thanh Nguyen e Thu Huong Truong. "Retina-based quality assessment of tile-coded 360-degree videos". EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 9, n.º 32 (21 de junho de 2022): e2. http://dx.doi.org/10.4108/eetinis.v9i32.1058.
Texto completo da fonteS.Saravana Kumar, Et al. "Automated Detection of Autism Spectrum Disorder Using Bio-Inspired Swarm Intelligence Based Feature Selection and Classification Techniques". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (5 de novembro de 2023): 2342–50. http://dx.doi.org/10.17762/ijritcc.v11i9.9242.
Texto completo da fonteMirzazade, Ali, Cosmin Popescu, Thomas Blanksvärd e Björn Täljsten. "Workflow for Off-Site Bridge Inspection Using Automatic Damage Detection-Case Study of the Pahtajokk Bridge". Remote Sensing 13, n.º 14 (7 de julho de 2021): 2665. http://dx.doi.org/10.3390/rs13142665.
Texto completo da fontePaudel, Niroj, Bishnu Maya Kharel, Ramesh Prasad Sah e Rajesh Shrestha. "Comparative Study of E-Learning Frameworks: Recommendation for Nepal". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 8 (30 de agosto de 2017): 273. http://dx.doi.org/10.23956/ijarcsse.v7i8.66.
Texto completo da fonteMohammed Saleh Al Ansari, Et al. "Nanoparticle Incorporation to Enhance Titanium Alloy Electric Discharge Machining Capabilities". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (5 de novembro de 2023): 3722–30. http://dx.doi.org/10.17762/ijritcc.v11i9.9596.
Texto completo da fonteHalteh, Khaled, e Hakem Sharari. "Employing Artificial Neural Networks and Multiple Discriminant Analysis to Evaluate the Impact of the COVID-19 Pandemic on the Financial Status of Jordanian Companies". Interdisciplinary Journal of Information, Knowledge, and Management 18 (2023): 251–67. http://dx.doi.org/10.28945/5112.
Texto completo da fonteKornilova, Alla A., Sergey N. Gaydamaka, Marina A. Gladchenko, Dmitry Ya Agasarov, Igor V. Kornilov e Maxim A. Gerasimov. "Thermal Waves and Flow Features of Pulsed Thermally Stimulated Biochemical Reactions in Viral Particles Interaction with Cells". Radioelectronics. Nanosystems. Information Technologies. 14, n.º 1 (12 de abril de 2022): 87–96. http://dx.doi.org/10.17725/rensit.2022.14.087.
Texto completo da fonteShimada, Kunio. "Elucidation of Response and Electrochemical Mechanisms of Bio-Inspired Rubber Sensors with Supercapacitor Paradigm". Electronics 12, n.º 10 (19 de maio de 2023): 2304. http://dx.doi.org/10.3390/electronics12102304.
Texto completo da fonteDo, Quang-Huy, Rémi Antony, Bernard Ratier e Johann Bouclé. "Improving Device-to-Device Reproducibility of Light-Emitting Diodes Based on Layered Halide Perovskites". Electronics 13, n.º 6 (11 de março de 2024): 1039. http://dx.doi.org/10.3390/electronics13061039.
Texto completo da fonteMichel, Janet, David Evans, Marcel Tanner e Thomas C. Sauter. "Identifying Policy Gaps in a COVID-19 Online Tool Using the Five-Factor Framework". Systems 10, n.º 6 (15 de dezembro de 2022): 257. http://dx.doi.org/10.3390/systems10060257.
Texto completo da fonteLande-Marghade, Pallavi. "Anaesthesia TV: Beginning of a New Revolution!" Journal of Anaesthesia and Critical Care Reports 4, n.º 1 (2018): 1–2. http://dx.doi.org/10.13107/jaccr.2018.v04i01.075.
Texto completo da fonte"Equant provides extranet". Network Security 2000, n.º 10 (outubro de 2000): 3–4. http://dx.doi.org/10.1016/s1353-4858(00)10008-x.
Texto completo da fonte"National extranet further secured". Network Security 2000, n.º 3 (março de 2000): 4. http://dx.doi.org/10.1016/s1353-4858(00)03008-7.
Texto completo da fonteShi, Yinghui, Huiyun Yang, Zongkai Yang, Wei Liu, Di Wu e Harrison Hao Yang. "Examining the effects of note-taking styles on college students’ learning achievement and cognitive load". Australasian Journal of Educational Technology, 12 de agosto de 2022, 1–11. http://dx.doi.org/10.14742/ajet.6688.
Texto completo da fonteFaulconer, Emily Kaye, Darryl Chamberlain e Beverly L. Wood. "A Case Study of Community of Inquiry Presences and Cognitive Load in Asynchronous Online STEM Courses". Online Learning 26, n.º 3 (1 de setembro de 2022). http://dx.doi.org/10.24059/olj.v26i3.3386.
Texto completo da fonteBäuerle, Alex, Patrick Albus, Raphael Störk, Tina Seufert e Timo Ropinski. "exploRNN: teaching recurrent neural networks through visual exploration". Visual Computer, 14 de julho de 2022. http://dx.doi.org/10.1007/s00371-022-02593-0.
Texto completo da fonte"A Secure Electronic Messaging System in Client Server Cryptography-RSA Algorithm". International Journal of Engineering and Advanced Technology 8, n.º 6S3 (22 de novembro de 2019): 1804–8. http://dx.doi.org/10.35940/ijeat.f1343.0986s319.
Texto completo da fonteFatima, Mah Noor, Mohammad S. Obaidat, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem e Muhammad Faizan Ayub. "Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks Deployed in Agricultural Field". ACM Transactions on Sensor Networks, 3 de julho de 2023. http://dx.doi.org/10.1145/3607142.
Texto completo da fonteRao, Prahalad, Satish Bukkapatnam, Omer Beyca, Zhenyu (James) Kong e Ranga Komanduri. "Real-Time Identification of Incipient Surface Morphology Variations in Ultraprecision Machining Process". Journal of Manufacturing Science and Engineering 136, n.º 2 (16 de janeiro de 2014). http://dx.doi.org/10.1115/1.4026210.
Texto completo da fonteRuggill, Judd, e Ken McAllister. "The Wicked Problem of Collaboration". M/C Journal 9, n.º 2 (1 de maio de 2006). http://dx.doi.org/10.5204/mcj.2606.
Texto completo da fonte