Добірка наукової літератури з теми "Computer networks Standards Australia"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Computer networks Standards Australia".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Computer networks Standards Australia"

1

Richardson, James K. "Percy Rollo Brett OBE (1923–2022)." Journal of Telecommunications and the Digital Economy 10, no. 3 (September 26, 2022): 165–70. http://dx.doi.org/10.18080/jtde.v10n3.628.

Повний текст джерела
Анотація:
Percy Rollo Brett OBE (11 November 1923 to 8 August 2022) was a highly respected head of the PMG/APO (later Telecom Australia/Telstra) Research Laboratories between 1964 and 1975. He was promoted to Head of Planning for Telecom Australia in July 1975, and then State Manager, Victoria for that organization in 1980–1983. Rollo’s achievements as Director of the Research Laboratories included building links with Australian universities to strengthen the Laboratories’ expertise in longer term research, and masterminding the Laboratories’ move from six different sites in central Melbourne to a single site, in purpose-designed buildings in Clayton, opposite Monash University’s main campus. In the early 1970s, he used the expertise he gained as Chairman of the Telecommunications and Electronics Standards Committee of the Standards Association of Australia to lead the Australian Post Office’s conversion of all its standards to metric. Upon retirement in 1983 he was awarded the OBE.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

McAuley, Elise, Chandana Unnithan, and Sofie Karamzalis. "Implementing Scanned Medical Record Systems in Australia." International Journal of E-Adoption 4, no. 4 (October 2012): 29–54. http://dx.doi.org/10.4018/jea.2012100103.

Повний текст джерела
Анотація:
In recent years, influenced by the pervasive power of technology, standards and mandates, Australian hospitals have begun exploring digital forms of keeping this record. The main rationale is the ease of accessing different data sources at the same time by varied staff members. The initial step in this transition was implementation of scanned medical record systems, which converts the paper based records to digitised form, which required process flow redesign and changes to existing modes of work. For maximising the benefits of scanning implementation and to better prepare for the changes, Austin Hospital in the State of Victoria commissioned this research focused on elective admissions area. This structured case study redesigned existing processes that constituted the flow of external patient forms and recommended a set of best practices at the same time highlighting the significance of user participation in maximising the potential benefits anticipated. In the absence of published academic studies focused on Victorian hospitals, this study has become a conduit for other departments in the hospital as well as other hospitals in the incursion.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Caesar, Matthew, and Bruce Davie. "Great educators in computer networking." ACM SIGCOMM Computer Communication Review 51, no. 2 (April 11, 2021): 31–37. http://dx.doi.org/10.1145/3464994.3465001.

Повний текст джерела
Анотація:
This interview is part of a series on Great Educators in Computer Networking, where we interview some of the most impactful and skilled educators in our field. Here, we interviewed Australian Bruce Davie, the self-described computer scientist/engineer/runner/cyclist, who agreed to talk to us about his thoughts on computer networking education, his role in it, his thoughts about the big ideas in our field, and how the pandemic is changing our work. Bruce has over 30 years of industry experience and is well known for a broad spectrum of educational initiatives such as co-authoring several textbooks, as well as his contributions to many networking standards and technologies, including IP quality of service, network virtualization, software defined networking, and more
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nourmohammadi, Fatemeh, Mohammadhadi Mansourianfar, Sajjad Shafiei, Ziyuan Gu, and Meead Saberi. "An Open GMNS Dataset of a Dynamic Multi-Modal Transportation Network Model of Melbourne, Australia." Data 6, no. 2 (February 19, 2021): 21. http://dx.doi.org/10.3390/data6020021.

Повний текст джерела
Анотація:
Simulation-based dynamic traffic assignment models are increasingly used in urban transportation systems analysis and planning. They replicate traffic dynamics across transportation networks by capturing the complex interactions between travel demand and supply. However, their applications particularly for large-scale networks have been hindered by the challenges associated with the collection, parsing, development, and sharing of data-intensive inputs. In this paper, we develop and share an open dataset for reproduction of a dynamic multi-modal transportation network model of Melbourne, Australia. The dataset is developed consistently with the General Modeling Network Specification (GMNS), enabling software-agnostic human and machine readability. GMNS is a standard readable format for sharing routable transportation network data that is designed to be used in multimodal static and dynamic transportation operations and planning models.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Booth, Sara, Jeff Beckett, and Cassandra Saunders. "Peer review of assessment network: supporting comparability of standards." Quality Assurance in Education 24, no. 2 (April 4, 2016): 194–210. http://dx.doi.org/10.1108/qae-01-2015-0003.

Повний текст джерела
Анотація:
Purpose – This paper aims to test the need in the Australian higher education (HE) sector for a national network for the peer review of assessment in response to the proposed HE standards framework and propose a sector-wide framework for calibrating and assuring achievement standards, both within and across disciplines, through the establishment of a peer review of assessment network (PRAN). Design/methodology/approach – This study used a “proof of concept”approach to test the need for a national network, using consultations (n = 67) which included teleconference meetings [39], face-to-face meetings [2], Skype [1], presentations [19], state-based workshops [6] and a national forum. Quantitative data from evaluation surveys from state-based workshops and national forum were computer-analysed to generate descriptive statistics. Qualitative data arising from open-ended questionnaire responses were analysed through progressive categorisation and data coding designed to identify and refine data themes. Findings – In all, 63 per cent of participants to the state-based workshops were satisfied with the workshop content. A further 29 per cent reported a high level of satisfaction. The interactive group discussions fostered a collaborative approach and facilitated engagement with the workshop content. A total of 58 per cent of participants to the national forum were satisfied with the forum, with a further 40 per cent reporting a high level of satisfaction. Participants indicated that presentation content was informative and covered a diverse range of topics and viewpoints highly relevant to the current clime across the HE sector. Practical implications – Many participants strongly supported the establishment of a national PRAN, with overwhelming support (88 per cent) for the forum to be made an annual event. Originality/value – This study contributes to existing literature and provides further evidence for the value of networks in the peer review of assessment to support academics in professional learning and calibration exercises.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Rawindaran, Nisha, Ambikesh Jayal, and Edmond Prakash. "Machine Learning Cybersecurity Adoption in Small and Medium Enterprises in Developed Countries." Computers 10, no. 11 (November 10, 2021): 150. http://dx.doi.org/10.3390/computers10110150.

Повний текст джерела
Анотація:
In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed countries have created their own cyber regimes around AI and ML. This knowledge is tested daily in how these countries’ SMEs run their businesses and identify threats and attacks, based on the support structure of the individual country. Based on recent changes to the UK General Data Protection Regulation (GDPR), Brexit, and ISO standards requirements, machine learning cybersecurity (MLCS) adoption in the UK SME market has become prevalent and a good example to lean on, amongst other developed nations. Whilst MLCS has been successfully applied in many applications, including network intrusion detection systems (NIDs) worldwide, there is still a gap in the rate of adoption of MLCS techniques for UK SMEs. Other developed countries such as Spain and Australia also fall into this category, and similarities and differences to MLCS adoptions are discussed. Applications of how MLCS is applied within these SME industries are also explored. The paper investigates, using quantitative and qualitative methods, the challenges to adopting MLCS in the SME ecosystem, and how operations are managed to promote business growth. Much like security guards and policing in the real world, the virtual world is now calling on MLCS techniques to be embedded like secret service covert operations to protect data being distributed by the millions into cyberspace. This paper will use existing global research from multiple disciplines to identify gaps and opportunities for UK SME small business cyber security. This paper will also highlight barriers and reasons for low adoption rates of MLCS in SMEs and compare success stories of larger companies implementing MLCS. The methodology uses structured quantitative and qualitative survey questionnaires, distributed across an extensive participation pool directed to the SMEs’ management and technical and non-technical professionals using stratify methods. Based on the analysis and findings, this study reveals that from the primary data obtained, SMEs have the appropriate cybersecurity packages in place but are not fully aware of their potential. Secondary data collection was run in parallel to better understand how these barriers and challenges emerged, and why the rate of adoption of MLCS was very low. The paper draws the conclusion that help through government policies and processes coupled together with collaboration could minimize cyber threats in combatting hackers and malicious actors in trying to stay ahead of the game. These aspirations can be reached by ensuring that those involved have been well trained and understand the importance of communication when applying appropriate safety processes and procedures. This paper also highlights important funding gaps that could help raise cyber security awareness in the form of grants, subsidies, and financial assistance through various public sector policies and training. Lastly, SMEs’ lack of understanding of risks and impacts of cybercrime could lead to conflicting messages between cross-company IT and cybersecurity rules. Trying to find the right balance between this risk and impact, versus productivity impact and costs, could lead to UK SMES getting over these hurdles in this cyberspace in the quest for promoting the usage of MLCS. UK and Wales governments can use the research conducted in this paper to inform and adapt their policies to help UK SMEs become more secure from cyber-attacks and compare them to other developed countries also on the same future path.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Pattinson, Malcolm, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. "Managing information security awareness at an Australian bank: a comparative study." Information & Computer Security 25, no. 2 (June 12, 2017): 181–89. http://dx.doi.org/10.1108/ics-03-2017-0017.

Повний текст джерела
Анотація:
Purpose The aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other Australian industries and second to identify the major factors that contributed to this bank’s high levels of information security awareness (ISA). Design/methodology/approach A Web-based questionnaire (the Human Aspects of Information Security Questionnaire – HAIS-Q) was used in two separate studies to assess the ISA of individuals who used computers at their workplace. The first study assessed 198 employees at an Australian bank and the second study assessed 500 working Australians from various industries. Both studies used a Qualtrics-based questionnaire that was distributed via an email link. Findings The results showed that the average level of ISA among bank employees was consistently 20 per cent higher than that among general workforce participants in all focus areas and overall. There were no significant differences between the ISA scores for those who received more frequent training compared to those who received less frequent training. This result suggests that the frequency of training is not a contributing factor to an employee’s level of ISA. Research limitations/implications This current research did not investigate the information security (InfoSec) culture that prevailed within the bank in question because the objective of the research was to compare a bank’s employees with general workforce employees rather than compare organisations. The Research did not include questions relating to the type of training participants had received at work. Originality/value This study provided the bank’s InfoSec management with evidence that their multi-channelled InfoSec training regime was responsible for a substantially higher-than-average ISA for their employees. Future research of this nature should examine the effectiveness of various ISA programmes in light of individual differences and learning styles. This would form the basis of an adaptive control framework that would complement many of the current international standards, such as ISO’s 27000 series, NIST’s SP800 series and ISACA’s COBIT5.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Chapin, A. Lyman. "Computer communication standards." ACM SIGCOMM Computer Communication Review 18, no. 1-2 (January 3, 1988): 7–21. http://dx.doi.org/10.1145/45152.45153.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chapin, A. Lyman. "Computer communication standards." ACM SIGCOMM Computer Communication Review 21, no. 5 (October 1991): 77–101. http://dx.doi.org/10.1145/122431.122437.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Stretch, R. M., and P. M. Adams. "Standards for intelligent networks." BT Technology Journal 23, no. 1 (January 2005): 154–59. http://dx.doi.org/10.1007/s10550-005-0116-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Computer networks Standards Australia"

1

Aitken, William Theodore Carleton University Dissertation Engineering Electrical. "Network management standards from the fault management perspective." Ottawa, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Staples, John. "Local area network development standards." Master's thesis, This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-03302010-020011/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Okano, Stephen Hiroshi. "Optimizing secure communication standards for disadvantaged networks." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/61316.

Повний текст джерела
Анотація:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 137-140).
We present methods for optimizing standardized cryptographic message protocols for use on disadvantaged network links. We first provide an assessment of current secure communication message packing standards and their relevance to disadvantaged networks. Then we offer methods to reduce message overhead in packing Cryptographic Message Syntax (CMS) structures by using ZLIB compression and using a Lite version of CMS. Finally, we offer a few extensions to the Extensible Messaging and Presence Protocol (XMPP) to wrap secure group messages for chat on disadvantaged networks and to reduce XMPP message overhead in secure group transmissions. We present the design and implementation of these optimizations and the results that these optimizations have on message overhead, extensibility, and usability of both CMS and XMPP. We have developed these methods to extend CMS and XMPP with the ultimate goal of establishing standards for securing communications in disadvantaged networks.
by Stephen Hiroshi Okano.
M.Eng.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Laska, William David. "Development of a standards based open environment for the worldwide military command and control system." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-03302010-020318/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

De, Kock Johannes Marthinus. "Optimal management of MPLS networks." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52977.

Повний текст джерела
Анотація:
Thesis (MSc)--Stellenbosch University, 2002.
ENGLISH ABSTRACT: Multiprotocol Label Switching (MPLS) is a routing technology which can manage Quality of Service (QoS) in scalable connectionless networks using relatively simple packet forwarding mechanisms. This thesis considers the optimisation of the QoS offered by an MPLS network. The QoS measure used is the expected packet delay which is minimised by switching packets along optimal label switched paths (LSPs). Two mathematical models of MPLS networks are presented together with appropriate algorithms for optimally dividing the network traffic into forwarding equivalence classes (FECs), finding optimal LSPs which minimise the expected packet delay and switching these FECs along the optimal LSPs. These algorithms are applied to compute optimal LSPs for several test networks. The mathematics on which these algorithms are based is also reviewed. This thesis provides the MPLS network operator with efficient packet routing algorithms for optimising the network's QoS.
AFRIKAANSE OPSOMMING: Multiprotocol Label Switching (MPLS) is 'n roeteringsmetode om die diensvlak (QoS) van 'n skaleerbare, verbindinglose netwerk te bestuur deur middel van relatief eenvoudige versendingsmeganismes. Hierdie tesis beskou die optimering van die QoS van 'n MPLS-netwerk. Die QoS-maatstaf is die verwagte vert raging van 'n netwerk-pakkie. Dit word geminimeer deur pakkies langs optimale "label switched paths" (LSPs) te stuur. Twee wiskundige modelle van MPLS-netwerke word ondersoek. Toepaslike algoritmes word verskaf vir die optimale verdeling van die netwerkverkeer in "forwarding equivalence classes" (FECs), die soektog na optimale LSPs (wat die verwagte pakkie-vertraging minimeer) en die stuur van die FECs langs die optimale LSPs. Hierdie algoritmes word ingespan om optimale LSPs vir verskeie toetsnetwerke op te stel. Die wiskundige teorie waarop hierdie algoritmes gegrond is, word ook hersien. Hierdie tesis verskaf doeltreffende roeteringsalgoritmes waarmee 'n MPLS-netwerkbestuurderj-es die netwerk se QoS kan optimeer.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ngqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.

Повний текст джерела
Анотація:
Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kheirkhah, Sabetghadam Morteza. "MMPTCP : a novel transport protocol for data centre networks." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/61781/.

Повний текст джерела
Анотація:
Modern data centres provide large aggregate capacity in the backbone of networks so that servers can theoretically communicate with each other at their maximum rates. However, the Transport Control Protocol (TCP) cannot efficiently use this large capacity even if Equal-Cost Multi-Path (ECMP) routing is enabled to exploit the existence of parallel paths. MultiPath TCP (MPTCP) can effectively use the network resources of such topologies by performing fast distributed load balancing. MPTCP is an appealing technique for data centres that are very dynamic in nature. However, it is ill-suited for handling short flows since it increases their flow completion time. To mitigate these problems, we propose Maximum MultiPath TCP (MMPTCP), a novel transport protocol for modern data centres. Unlike MPTCP, it provides high performance for all network flows. It also decreases the bursty nature of data centres, which is essentially rooted in traffic patterns of short flows. MMPTCP achieves these nice features by randomising a flow's packets via all parallel paths to a destination during the initial phase of data transmission until a certain amount of data is delivered. It then switches to MPTCP with several subflows in which data transmission is governed by MPTCP congestion control. In this way, short flows are delivered very fast via the initial phase only, and long flows are delivered by MPTCP with several subflows. We evaluate MMPTCP in a FatTree topology under various network conditions. We found that MMPTCP decreases the loss rate of all the links throughout the network and helps competing flows to achieve a better performance. Unlike MPTCP with a fixed number of subflows, MMPTCP offers high burst tolerance and low-latency for short flows while it maintains high overall network utilisation. MMPTCP is incrementally deployable in existing data centres because it does not require any modification to the network and application layers.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tsietsi, Mosiuoa Jeremia. "Prototyping a peer-to-peer session initiation protocol user agent." Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1006603.

Повний текст джерела
Анотація:
The Session Initiation Protocol (SIP) has in recent years become a popular protocol for the exchange of text, voice and video over IP networks. This thesis proposes the use of a class of structured peer to peer protocols - commonly known as Distributed Hash Tables (DHTs) - to provide a SIP overlay with services such as end-point location management and message relay, in the absence of traditional, centralised resources such as SIP proxies and registrars. A peer-to-peer layer named OverCord, which allows the interaction with any specific DHT protocol via the use of appropriate plug-ins, was designed, implemented and tested. This layer was then incorporated into a SIP user agent distributed by NIST (National Institute of Standards and Technology, USA). The modified user agent is capable of reliably establishing text, audio and video communication with similarly modified agents (peers) as well as conventional, centralized SIP overlays.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kapp, James A. "Implementation of operational framework in the NLP based on MOF and ITIL standards." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/JKappPartI2006.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Li, Xiao-Yu. "Evolving a secure grid-enabled, distributed data warehouse : a standards-based perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/544.

Повний текст джерела
Анотація:
As digital data-collection has increased in scale and number, it becomes an important type of resource serving a wide community of researchers. Cross-institutional data-sharing and collaboration introduce a suitable approach to facilitate those research institutions that are suffering the lack of data and related IT infrastructures. Grid computing has become a widely adopted approach to enable cross-institutional resource-sharing and collaboration. It integrates a distributed and heterogeneous collection of locally managed users and resources. This project proposes a distributed data warehouse system, which uses Grid technology to enable data-access and integration, and collaborative operations across multi-distributed institutions in the context of HV/AIDS research. This study is based on wider research into OGSA-based Grid services architecture, comprising a data-analysis system which utilizes a data warehouse, data marts, and near-line operational database that are hosted by distributed institutions. Within this framework, specific patterns for collaboration, interoperability, resource virtualization and security are included. The heterogeneous and dynamic nature of the Grid environment introduces a number of security challenges. This study also concerns a set of particular security aspects, including PKI-based authentication, single sign-on, dynamic delegation, and attribute-based authorization. These mechanisms, as supported by the Globus Toolkit’s Grid Security Infrastructure, are used to enable interoperability and establish trust relationship between various security mechanisms and policies within different institutions; manage credentials; and ensure secure interactions.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Computer networks Standards Australia"

1

Black, Uyless. Computer networks: Protocols, standards and interfaces. 2nd ed. Englewood Cliffs: Prentice-Hall, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Black, Uyless. Computer networks: Protocols, standards, and interfaces. 2nd ed. Englewood Cliffs N.J: Prentice-Hall International, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Black, Uyless D. Computer networks: Protocols, standards, and interfaces. Englewood Cliffs, N.J: Prentice-Hall, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Computer networks: Protocols, standards, and interfaces. 2nd ed. New Delhi: Prentice-Hall of India Private, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Black, Uyless. Computer networks: Protocols, standards, and interfaces. Englewood Cliffs, N.J: Prentice-Hall, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Computer networks: Protocols, standards, and interfaces. 2nd ed. Englewood Cliffs, N.J: PTR Prentice Hall, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

William, Stallings. Handbook of computer-communications standards. 2nd ed. Carmel, IN, USA: H.W. Sams, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

William, Stallings, and William Stallings. Handbook of computer-communications standards. 2nd ed. Carmel, IN, USA: H.W. Sams, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

William, Stallings. Handbook of computer-communications standards. Indianapolis, Ind: Howard W. Sams, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

William, Stallings, and William Stallings. Handbook of computer-communications standards. New York: Macmillan, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Computer networks Standards Australia"

1

Freer, John R. "Interface standards." In Computer Communications and Networks, 171–90. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1041-9_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Panko, Raymond R. "Internet Security Standards." In Handbook of Computer Networks, 428–46. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Krishnamurthy, Prashant. "Wireless LAN Standards." In Handbook of Computer Networks, 917–34. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch58.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Govindarajan, Anand, and Lakshmanan. "Overview of Cloud Standards." In Computer Communications and Networks, 77–89. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-241-4_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Freer, John R. "Wide area network standards." In Computer Communications and Networks, 243–77. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1041-9_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Grabowski, Mateusz, and Grzegorz Dziwoki. "The IEEE Wireless Standards as an Infrastructure of Smart Home Network." In Computer Networks, 302–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3_35.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Faynberg, Igor, and Steve Goeringer. "NFV Security: Emerging Technologies and Standards." In Computer Communications and Networks, 33–73. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64653-4_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

García-Hernando, Ana-Belén, José-Fernán Martínez-Ortega, Juan-Manuel López-Navarro, Aggeliki Prayati, and Luis Redondo-López. "Standards and Safety Regulations for WSNs." In Computer Communications and Networks, 1–11. London: Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-203-6_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Dickerson, K. R., and J. P. Chester. "Standards for integrated services and networks." In Lecture Notes in Computer Science, 5–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/bfb0013393.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Soppera, A., T. Burbridge, and D. Molnar. "RFID Security and Privacy — Issues, Standards, and Solutions." In Computer Communications and Networks, 179–98. London: Springer London, 2006. http://dx.doi.org/10.1007/978-1-84628-429-8_12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Computer networks Standards Australia"

1

Mirisaee, Seyed Hadi. "A human-centred context-aware approach to develop open-standard agile ridesharing using mobile social networks." In the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1952222.1952332.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cargill, C. F. "Anticipatory standards-the next wave." In Proceedings [1988] 13th Conference on Local Computer Networks. IEEE, 1988. http://dx.doi.org/10.1109/lcn.1988.10222.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Jardim-Goncalves, Ricardo, Carlos Agostinho, Pedro Malo, and Adolfo Steiger-Garcao. "AP236-XML: A Framework for Integration and Harmonization of STEP Application Protocols." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-85581.

Повний текст джерела
Анотація:
Today, organizations have to deal with the integration of applications across company borders, and must support collaboration of business processes between organizations in networked environments that are seamless, flexible and interoperable. This characteristic of horizontality, where one application embraces more than one domain of activity, is frequently found and raises the need for integration and cooperation between multiple standard application protocols and business objects. However, a standard for data representation cannot cove the whole range of activities one application needs to handle. This paper contributes by proposing a framework that supports interoperability in distributed heterogeneous networked environments, assisting in the integration of reference models described following dissimilar methodologies. This framework assists in the automatic mapping between ISO10303 STEP, UML and XML models. The proposed work results from research developed and validated in the scope of the IMS SMART-fm project (www.smart-fm.funstep.org, www.ims.org), involving partners from USA, Europe, Canada and Australia, using emerging approaches for modeling and technology.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Maraj, Dardan, Ruzhdi Sefa, and Arianit Maraj. "QoS Evaluation for different WLAN standards." In 2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2015. http://dx.doi.org/10.1109/softcom.2015.7314115.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Swift, Ben, Henry Gardner, and Alistair Riddell. "Engagement networks in social music-making." In the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1952222.1952244.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kera, Denisa, and Connor Graham. "Collective sensor networks and future communities." In the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1952222.1952312.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Panchenko, Andriy, Benedikt Westermann, Lexi Pimenidis, and Christer Andersson. "SHALON: Lightweight Anonymization Based on Open Standards." In 2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009. IEEE, 2009. http://dx.doi.org/10.1109/icccn.2009.5235258.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Rezaei, Fahimeh, Michael Hempel, and Hamid Sharif. "LTE PHY performance analysis under 3GPP standards parameters." In 2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2011. http://dx.doi.org/10.1109/camad.2011.5941095.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Graell i Amat, Alexandre, Guido Montorsi, and Francesca Vatta. "Comparison of some recent classes of turbo like codes for the upcoming DVB standards." In 2007 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2007. http://dx.doi.org/10.1109/softcom.2007.4446095.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Secombe, Chirstopher, Robert Steele, and Wayne Brookes. "Perceptions of the elderly on the use of wireless sensor networks for health monitoring." In the 20th conference of the computer-human interaction special interest group (CHISIG) of Australia. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1228175.1228188.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Computer networks Standards Australia"

1

McKenna, Patrick, and Mark Evans. Emergency Relief and complex service delivery: Towards better outcomes. Queensland University of Technology, June 2021. http://dx.doi.org/10.5204/rep.eprints.211133.

Повний текст джерела
Анотація:
Emergency Relief (ER) is a Department of Social Services (DSS) funded program, delivered by 197 community organisations (ER Providers) across Australia, to assist people facing a financial crisis with financial/material aid and referrals to other support programs. ER has been playing this important role in Australian communities since 1979. Without ER, more people living in Australia who experience a financial crisis might face further harm such as crippling debt or homelessness. The Emergency Relief National Coordination Group (NCG) was established in April 2020 at the start of the COVID-19 pandemic to advise the Minister for Families and Social Services on the implementation of ER. To inform its advice to the Minister, the NCG partnered with the Institute for Governance at the University of Canberra to conduct research to understand the issues and challenges faced by ER Providers and Service Users in local contexts across Australia. The research involved a desktop review of the existing literature on ER service provision, a large survey which all Commonwealth ER Providers were invited to participate in (and 122 responses were received), interviews with a purposive sample of 18 ER Providers, and the development of a program logic and theory of change for the Commonwealth ER program to assess progress. The surveys and interviews focussed on ER Provider perceptions of the strengths, weaknesses, future challenges, and areas of improvement for current ER provision. The trend of increasing case complexity, the effectiveness of ER service delivery models in achieving outcomes for Service Users, and the significance of volunteering in the sector were investigated. Separately, an evaluation of the performance of the NCG was conducted and a summary of the evaluation is provided as an appendix to this report. Several themes emerged from the review of the existing literature such as service delivery shortcomings in dealing with case complexity, the effectiveness of case management, and repeat requests for service. Interviews with ER workers and Service Users found that an uplift in workforce capability was required to deal with increasing case complexity, leading to recommendations for more training and service standards. Several service evaluations found that ER delivered with case management led to high Service User satisfaction, played an integral role in transforming the lives of people with complex needs, and lowered repeat requests for service. A large longitudinal quantitative study revealed that more time spent with participants substantially decreased the number of repeat requests for service; and, given that repeat requests for service can be an indicator of entrenched poverty, not accessing further services is likely to suggest improvement. The interviews identified the main strengths of ER to be the rapid response and flexible use of funds to stabilise crisis situations and connect people to other supports through strong local networks. Service Users trusted the system because of these strengths, and ER was often an access point to holistic support. There were three main weaknesses identified. First, funding contracts were too short and did not cover the full costs of the program—in particular, case management for complex cases. Second, many Service Users were dependent on ER which was inconsistent with the definition and intent of the program. Third, there was inconsistency in the level of service received by Service Users in different geographic locations. These weaknesses can be improved upon with a joined-up approach featuring co-design and collaborative governance, leading to the successful commissioning of social services. The survey confirmed that volunteers were significant for ER, making up 92% of all workers and 51% of all hours worked in respondent ER programs. Of the 122 respondents, volunteers amounted to 554 full-time equivalents, a contribution valued at $39.4 million. In total there were 8,316 volunteers working in the 122 respondent ER programs. The sector can support and upskill these volunteers (and employees in addition) by developing scalable training solutions such as online training modules, updating ER service standards, and engaging in collaborative learning arrangements where large and small ER Providers share resources. More engagement with peak bodies such as Volunteering Australia might also assist the sector to improve the focus on volunteer engagement. Integrated services achieve better outcomes for complex ER cases—97% of survey respondents either agreed or strongly agreed this was the case. The research identified the dimensions of service integration most relevant to ER Providers to be case management, referrals, the breadth of services offered internally, co-location with interrelated service providers, an established network of support, workforce capability, and Service User engagement. Providers can individually focus on increasing the level of service integration for their ER program to improve their ability to deal with complex cases, which are clearly on the rise. At the system level, a more joined-up approach can also improve service integration across Australia. The key dimensions of this finding are discussed next in more detail. Case management is key for achieving Service User outcomes for complex cases—89% of survey respondents either agreed or strongly agreed this was the case. Interviewees most frequently said they would provide more case management if they could change their service model. Case management allows for more time spent with the Service User, follow up with referral partners, and a higher level of expertise in service delivery to support complex cases. Of course, it is a costly model and not currently funded for all Service Users through ER. Where case management is not available as part of ER, it might be available through a related service that is part of a network of support. Where possible, ER Providers should facilitate access to case management for Service Users who would benefit. At a system level, ER models with a greater component of case management could be implemented as test cases. Referral systems are also key for achieving Service User outcomes, which is reflected in the ER Program Logic presented on page 31. The survey and interview data show that referrals within an integrated service (internal) or in a service hub (co-located) are most effective. Where this is not possible, warm referrals within a trusted network of support are more effective than cold referrals leading to higher take-up and beneficial Service User outcomes. However, cold referrals are most common, pointing to a weakness in ER referral systems. This is because ER Providers do not operate or co-locate with interrelated services in many cases, nor do they have the case management capacity to provide warm referrals in many other cases. For mental illness support, which interviewees identified as one of the most difficult issues to deal with, ER Providers offer an integrated service only 23% of the time, warm referrals 34% of the time, and cold referrals 43% of the time. A focus on referral systems at the individual ER Provider level, and system level through a joined-up approach, might lead to better outcomes for Service Users. The program logic and theory of change for ER have been documented with input from the research findings and included in Section 4.3 on page 31. These show that ER helps people facing a financial crisis to meet their immediate needs, avoid further harm, and access a path to recovery. The research demonstrates that ER is fundamental to supporting vulnerable people in Australia and should therefore continue to be funded by government.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії