Добірка наукової літератури з теми "Configured networks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Configured networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Configured networks"

1

Merrill, John W. L., and Robert F. Port. "Fractally configured neural networks." Neural Networks 4, no. 1 (January 1991): 53–60. http://dx.doi.org/10.1016/0893-6080(91)90031-y.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (August 29, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.

Повний текст джерела
Анотація:
This paper proposes a method to optimize the performance of web application firewalls according to their positions in large scale networks. Since ports for web services are always open and vulnerable in security, the introduction of web application firewalls is essential. Methods to configure web application firewalls in existing networks are largely divided into two types. There is an in-line type where a web application firewall is located between the network and the web server to be protected. This is mostly used in small scale single networks and is vulnerable to the physical obstruction of web application firewalls. The port redirection type configured with the help of peripheral network equipment such as routers or L4 switches can maintain web services even when physical obstruction of the web application firewall occurs and is suitable for large scale networks where several web services are mixed. In this study, port redirection type web application firewalls were configured in large-scale networks and there was a problem in that the performance of routers was degraded due to the IP-based VLAN when a policy was set for the ports on the routers for web security. In order to solve this problem, only those agencies and enterprises that provide web services of networks were separated and in-line type web application firewalls were configured for them. Internet service providers (ISPs) or central line-concentration agencies can apply the foregoing to configure systems for web security for unit small enterprises or small scale agencies at low costs.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Baek, Jinsuk, Munene W. Kanampiu, and Cheonshik Kim. "A Secure Internet of Things Smart Home Network: Design and Configuration." Applied Sciences 11, no. 14 (July 7, 2021): 6280. http://dx.doi.org/10.3390/app11146280.

Повний текст джерела
Анотація:
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Instead, many users still rely on the minimum home network security by setting an easiest-to-guess password to restrict unauthorized access to their home gateway. In this paper, we propose a network design and configuration that enables secure IoT services with MQTT messaging protocol for home networks. With the proposed network design, a home network is interconnected to external networks through a home gateway. To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. The secure communications among network entities are governed by a home gateway operating a well-configured extended access control. The effectiveness of the proposed design and configuration is verified through a simulation by showing that it does not impose any significant performance degradation for reinforced security. We expect the proposed configuration to help facilitate interconnection among heterogeneous network entities.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Miyoshi, Naoto, and Tomoyuki Shirai. "A Cellular Network Model with Ginibre Configured Base Stations." Advances in Applied Probability 46, no. 03 (September 2014): 832–45. http://dx.doi.org/10.1017/s0001867800007394.

Повний текст джерела
Анотація:
Stochastic geometry models for wireless communication networks have recently attracted much attention. This is because the performance of such networks critically depends on the spatial configuration of wireless nodes and the irregularity of the node configuration in a real network can be captured by a spatial point process. However, most analysis of such stochastic geometry models for wireless networks assumes, owing to its tractability, that the wireless nodes are deployed according to homogeneous Poisson point processes. This means that the wireless nodes are located independently of each other and their spatial correlation is ignored. In this work we propose a stochastic geometry model of cellular networks such that the wireless base stations are deployed according to the Ginibre point process. The Ginibre point process is one of the determinantal point processes and accounts for the repulsion between the base stations. For the proposed model, we derive a computable representation for the coverage probability—the probability that the signal-to-interference-plus-noise ratio (SINR) for a mobile user achieves a target threshold. To capture its qualitative property, we further investigate the asymptotics of the coverage probability as the SINR threshold becomes large in a special case. We also present the results of some numerical experiments.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Miyoshi, Naoto, and Tomoyuki Shirai. "A Cellular Network Model with Ginibre Configured Base Stations." Advances in Applied Probability 46, no. 3 (September 2014): 832–45. http://dx.doi.org/10.1239/aap/1409319562.

Повний текст джерела
Анотація:
Stochastic geometry models for wireless communication networks have recently attracted much attention. This is because the performance of such networks critically depends on the spatial configuration of wireless nodes and the irregularity of the node configuration in a real network can be captured by a spatial point process. However, most analysis of such stochastic geometry models for wireless networks assumes, owing to its tractability, that the wireless nodes are deployed according to homogeneous Poisson point processes. This means that the wireless nodes are located independently of each other and their spatial correlation is ignored. In this work we propose a stochastic geometry model of cellular networks such that the wireless base stations are deployed according to the Ginibre point process. The Ginibre point process is one of the determinantal point processes and accounts for the repulsion between the base stations. For the proposed model, we derive a computable representation for the coverage probability—the probability that the signal-to-interference-plus-noise ratio (SINR) for a mobile user achieves a target threshold. To capture its qualitative property, we further investigate the asymptotics of the coverage probability as the SINR threshold becomes large in a special case. We also present the results of some numerical experiments.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Stepanov, M. D., E. Yu Pavlenko, and D. S. Lavrova. "Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm." Automatic Control and Computer Sciences 55, no. 8 (December 2021): 1039–50. http://dx.doi.org/10.3103/s0146411621080307.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

CHIU, CHINCHUAN, and MICHAEL A. SHANBLATT. "HUMAN-LIKE DYNAMIC PROGRAMMING NEURAL NETWORKS FOR DYNAMIC TIME WARPING SPEECH RECOGNITION." International Journal of Neural Systems 06, no. 01 (March 1995): 79–89. http://dx.doi.org/10.1142/s012906579500007x.

Повний текст джерела
Анотація:
This paper presents a human-like dynamic programming neural network method for speech recognition using dynamic time warping. The networks are configured, much like human’s, such that the minimum states of the network’s energy function represent the near-best correlation between test and reference patterns. The dynamics and properties of the neural networks are analytically explained. Simulations for classifying speaker-dependent isolated words, consisting of 0 to 9 and A to Z, show that the method is better than conventional methods. The hardware implementation of this method is also presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Mitra, J., and C. Singh. "Capacity assistance distributions for arbitrarily configured multi-area networks." IEEE Transactions on Power Systems 12, no. 4 (1997): 1530–35. http://dx.doi.org/10.1109/59.627853.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zhao, Yongli, Jie Zhang, Dahai Han, Lei Wang, Wanyi Gu, and Yuefeng Ji. "Routing on pre-configured topology for dynamic optical networks." Photonic Network Communications 17, no. 3 (August 27, 2008): 299–310. http://dx.doi.org/10.1007/s11107-008-0164-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mohamed, Nader, and Jameela Al-Jaroodi. "Self-configured multiple-network-interface socket." Journal of Network and Computer Applications 33, no. 1 (January 2010): 35–42. http://dx.doi.org/10.1016/j.jnca.2009.07.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Configured networks"

1

Pretorius, Wynand. "The development of a dynamically configured wireless ad-hoc multihop network protocol." Thesis, Link to the online version, 2006. http://hdl.handle.net/10019.1/2770.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Alegretti, Francisco José Prates. "ChicuxBot : genetic algorithm configured behavior network multi-agent for Quake II." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2006. http://hdl.handle.net/10183/8497.

Повний текст джерела
Анотація:
Este trabalho descreve a implementação de um sistema multi agente usando Redes de Comportamento configurada por Algoritmos Genéticos. O sistema utiliza o jogo de computador Quake II como o ambiente simulado para os agentes. Redes de Comportamento são utilizadas como o mecanismo de tomada de decisão. Um Algoritmo Genético é utilizado para configurar os parâmetros da Rede de Comportamento. Cada agente é um programa independente que se conecta ao servidor do jogo para realizar tarefas e trocar material genético a fim de evoluir. Os resultados obtidos mostram um ambiente multi agente dinamicamente configurado capaz de evoluir e se adaptar apropriadamente conforme o andamento do jogo.
This work describes the implementation of a multi-agent system using Behavior Networks configured by Genetic Algorithms. The system uses the computer game Quake II as the simulated environment for the agents. Behavior Networks are used as the decision making mechanism. The Genetic Algorithm is used to configure the parameters of the Behavior Network. Each agent of the system is an independent program that connects to the game server to perform tasks and to exchange genetic material in order to evolve. The results obtained indicate a dynamically configured multi-agent system that can evolve and adapt accordingly throughout the course of the game.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mezher, Ahmad Mohamad. "Contributions to provide a QoS-aware self-configured framework for video-streaming services over ad hoc networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/386558.

Повний текст джерела
Анотація:
Ad hoc networks have attracted much attention from the research community over the last years and important technical advances have risen as a consequence. These networks are foreseen as an important kind of next generation access networks, where multimedia services will be demanded by end users from their wireless devices everywhere. In this thesis, we specially focus our research work on mobile ad hoc networks (MANETs) and on vehicular ad hoc networks (VANETs), two kind of ad hoc networks over which interesting multimedia services can be provided. The special haracteristics of MANETs/VANETs, such as mobility, dynamic network topology (specially in VANETs), energy constraints (in case of MANETs), infrastructureless and variable link capacity, make the QoS (Quality of Service) provision over these networks an important challenge for the research community. Due to that, there is a need to develop new routing protocols specially designed for MANETs and VANETs able to provide multimedia services. The main objective of this thesis is to contribute in the development of the communication framework for MANETs and VANETs to improve decisions to select paths or next hops in the moment of forwarding video-reporting messages. In this way, it would be possible to have a quick answer to manage daily problems in the city and help the emergency units (e.g., police, ambulances, health care units) in case of incidents (e.g., traffic accidents). Furthermore, in case of VANETs, a real scenario must be created and thus we have analysed the presence of obstacles in real maps. Also, in case of an obstacle found between the current forwarding node and the candidate next forwarding node, the packet is stored in a buffer, for a maximum time, until a forwarding neighbour node is found; otherwise, the packet is dropped. To improve the communication framework for MANETs, we propose a new routing protocol based on a game-theoretical scheme for N users specially designed to transmit video-reporting messages. Our proposal makes the network more efficient and provides a higher degree of satisfaction of the users by receiving much more packets with a lower average end-to-end delay, lower jitter and higher PSNR (Peak Signal-to-Noise Ratio). In addition, we propose a geographical routing protocol for VANETs that considers multiple metrics named 3MRP (Multimedia Multimetric Map-Aware Routing Protocol) [1]. 3MRP is a geographical protocol based on hop-by-hop forwarding. The metrics considered in 3MRP are the distance, the density of vehicles in transmission range, the available bandwidth, the future trajectory of the neighbouring nodes and the MAC layer losses. Those metrics are weighted to obtain a multimetric score. Thus, a node selects another node among its neighbours as the best forwarding node to increase the percentage of successful packet delivery, minimizing the average packet delay and offering a certain level of quality and service. Furthermore, a new algorithm named DSW (Dynamic Self-configured Weights) computes for each metric its corresponding weight depending on the current network conditions. As a consequence, nodes are classiffied in a better way.
Les xarxes sense fils ad hoc han captat molt l'atenció per part de la comunitat científica en els últims anys, a més dels importants avenços tècnics que han sorgit. Aquestes xarxes es preveuen com un tipus important de xarxes d'accés de nova generació, a on els serveis multimèdia seran requerits pels usuaris a través dels seus dispositius sense fils desde tot arreu. En aquesta tesi, centrem el nostre treball especialment en les xarxes mòbils ad hoc (MANET, Mobile Ad hoc Network) i en les xarxes vehiculars ad hoc (VANET, Vehicular Ad hoc Network). Les característiques especials de les MANETs i les VANETs, com la mobilitat, la topologia dinàmica de la xarxa (especialment en VANETs), les restriccions de bateria (en cas de MANETs), l'absència d'infrastructura i la capacitat variable de l'enllaç sense fil fa que la provisió de la qualitat de servei en aquestes xarxes sigui un repte important per a la comunitat científica. A causa d'això, hi ha la necessitat de desenvolupar nous protocols d'encaminament especialment dissenyats per a MANETs i VANETs capaços de proporcionar els serveis de multimèdia requerits. L'objectiu principal d'aquesta tesi és proveir millores en la comunicació per a les xarxes ad hoc MANET i VANET per millorar les decisions a l'hora de seleccionar els propers camins o nodes, respectivament, en el moment de l'enviament de les trames del video. D'aquesta manera serà possible tenir una resposta ràpida per resoldre els problema diaris a la ciutat i ajudar a les unitats d'emergència (per exemple, policia, ambulàncies, unitats de salut) en cas d'incidents, com ara els accidents de trànsit. Per analitzar adequadament les nostres propostes sobre VANETs hem dissenyat un entorn de simulació realista que incorpora la presència d'edificis en mapes reals i en el cas que hi hagi un obstacle entre el node actual i el candidat per a ser el pròxim salt el paquet s'emmagatzema en un buffer, per un temps màxim, fins a trobar un nou candidat; en cas contrari, es descarta el paquet. Per millorar les comunicacions en les MANETs, proposem un nou protocol d'encaminament basat en teoria de jocs per a N usuaris especialment dissenyat per a enviar missatges de vídeo. Això fa que la xarxa sigui més eficient, i així s'aconsegueix un major grau de satisfacció dels usuaris en rebre molts més paquets amb un menor retard mig extrem a extrem, menor variació del retard (jitter ) i major PSNR (Relació Senyal Soroll de Pic) . A més, es proposa un protocol d'encaminament geogràfic basat en el reenviament hop-by-hop per a VANETs anomenat 3MRP (Multimedia Multimetric Map-Aware Routing Protocol ) [1] que prèn en consideració múltiples mètriques. Les mètriques considerades en 3MRP són la distància a destinació, la densitat de vehicles en el rang de transmissió, l'ample de banda disponible, la trajectòria futura dels nodes veíns i la perdua de paquets a la capa MAC. Aquestes mètriques es ponderen per a obtenir una puntuació multimètrica. Així, un node pot seleccionar el millor node de reenviament entre tots els seus veíns per augmentar la probabilitat d' èxit de lliurament de paquets, minimitzant el retard mitjà dels paquets i oferint un cert nivell de qualitat de servei.
Las redes ad hoc han llamado mucho la atención por parte de la comunidad científica en los últimos años, además de los importantes avances técnicos que han surgido. Estas redes se prevén como un tipo importante de redes de acceso de nueva generación, donde los servicios multimedia sean requeridos por los usuarios a través de sus dispositivos inalámbricos desde todas partes. En esta tesis, centramos nuestro trabajo de investigación especialmente en las redes móviles ad hoc (MANET, Mobile Ad hoc Network) y las redes vehiculares ad hoc (VANET, Vehicular Ad hoc Network). Las características especiales de las MANETs y las VANETs, como la movilidad, la topología dinámica de la red (especialmente en VANETs), las restricciones de batería (en caso de MANETs), la ausencia de infraestructura y la capacidad variable del enlace inalámbrico hace que la provisión de la calidad de servicio en estas redes sea un reto importante para la comunidad científica. Debido a esto, existe la necesidad de desarrollar nuevos protocolos de encaminamiento especialmente diseñados para MANETs y VANETs capaces de proporcionar los servicios de multimedia requeridos. El objetivo principal de esta tesis es proveer mejoras en la comunicación para las redes ad hoc MANET y VANET para mejorar las decisiones a la hora de seleccionar los próximos caminos o nodos, respectivamente, en el momento del envío de las tramas del video y de esta manera sería posible tener una respuesta rápida para resolver los problema diarios en la ciudad y ayudar a las unidades de emergencia (por ejemplo, policía, ambulancias, unidades de salud) en caso de incidentes, como accidentes de tráfico. Para analizar adecuadamente nuestras propuestas sobre VANETs hemos diseñado un entorno de simulación realista que incorpora la presencia de edificios en mapas reales. En el caso de que haya un obstáculo entre el nodo actual y el candidato para ser el próximo salto el paquete se almacena en un buer, durante un tiempo máximo, hasta encontrar un nuevo candidato; en caso contrario, se descarta el paquete. Para mejorar las comunicaciones en las MANETs, proponemos un nuevo protocolo de encaminamiento basado en teoría de juegos para N usuarios especialmente diseñados para enviar mensajes de video. Esto hace que la red sea más eficiente, y así se consigue un mayor grado de satisfacción de los usuarios al recibir muchos más paquetes con un menor promedio de retardo de extremo a extremo, variación de retardo (jitter) y mayor PSNR (Relación Señal a Ruido de Pico). Además, se propone un protocolo de encaminamiento geográfico basado en el reenvío de salto-a-salto para VANETs llamado 3MRP (Multimedia multimetric Map-Aware Routing Protocol) [1] que incluye diversas métricas. Las métricas consideradas en 3MRP son la distancia al destino, la densidad de vehículos en el rango de transmisión, el ancho de banda disponible, la trayectoria futura de los nodos vecinos y la pérdida de paquetes en la capa MAC. Estas métricas se ponderan para obtener una puntuación multimetricanal. Así, un nodo puede seleccionar el mejor nodo de reenvío entre todos sus vecinos para aumentar la probabilidad de éxito de entrega de paquetes, minimizando el retardo medio de los paquetes y ofreciendo un cierto nivel de calidad de servicio. Por otra parte, se ha diseñado un nuevo algoritmo capaz de dar a cada métrica su correspondiente peso en función de las condiciones actuales de la red. De esta forma, los nodos se pueden clasificar de una mejor manera. Por último, se propone un nuevo protocolo de encaminamiento para VANETs llamado G-3MRP (Game Theoretical Multimedia Multimetric Map-aware Routing Protocol) [2] para enviar mensajes de video basado en teoría de juegos para N usuarios en escenarios urbanos. G-3MRP se basa en el protocolo de encaminamiento 3MRP. G-3MRP utiliza hasta tres nodos a través de los cuales los tres tipos de cuadros de video I, P y B serán enviados. Las métricas utilizadas son las mismas que en 3MRP. G-3MRP logra una mayor grado de satisfacción de los usuarios mediante la recepción de muchos más paquetes de video y con un mayor nivel de PSNR, que la anterior propuesta 3MRP+DSW. También hemos analizado el problema de detección de obstáculos en mapas reales para VANETs en escenarios urbanos. Para este propósito, hemos desarrollado nuestra herramienta REVsim [3] de tal forma que puede estar fácilmente integrada en nuestra propuesta de protocolo de encaminamiento para que las simulaciones sean más realistas.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Khan, Tehmina Karamat. "Resilience Routing in AdHoc Networks. A decision based routing tree mechanism that can establish routes in adhoc network, which may than be configured into logical dual ring. Also a system is proposed to embed the QoS mechanisms, resilience and reliability features from RPR." Thesis, University of Bradford, 2008. http://hdl.handle.net/10454/4871.

Повний текст джерела
Анотація:
As the number of people using wireless networks is increasing, the need to reduce the vulnerability of wireless networks from node or link failures that cause loss of data is becoming a priority. Also the present techniques and topologies used for wireless networking are not sufficient to handle the traffic load even if we solve the issues of reliability and resilience. Packet loss or delay is increasingly likely due to the increase in the number of packets as technology is evolving and more video and voice packets along with the data packets are being transmitted. Only the efficient and intelligent use of the shared medium can solve the problem and help in avoiding the collision or delay among the packets using a newly proposed intelligent topology. Wireless technology offers the potential to replace wires from many applications, particularly for the rapid deployment of networks for permanent or temporary use. Fiber_ optic metropolitan area networks (WAN) provide security and resilience. A target of the research was to match this in the wireless environment. This research investigates the suitability if using wireless technology for the establishment of a MAN by adding features to enhance resilience. We proposed a mechanism that may be rapidly deployed and provide automatic configuration. Research work and simulation design has been used to develop a new wireless network topology for an efficient and intelligent packet transmission by identifying reliable routes. This novel idea will help give wireless as well as mobile technology a clear edge over wired technology, not only in the case of mobility but also in the case of security of data and other services. A decision based routing tree mechanism has been developed, that can establish routes in an ad-hoc network which may than be configured into a logical dual ring. At the same time the proposed system proposes to embed the quality of service mechanisms, resilience, and reliability features from RPR. The simulations were created using Microsoft Visual Studio.Net for the Decision based routing algorithm. The results were compared with an existing LAR algorithm. We have obtained 95% confidence intervals on all the performance analysis results to indicate accuracy.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Волосянко, Кирило Сергійович. "Аналіз процедур забезпечення якості у мобільних мережах 5G". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39365.

Повний текст джерела
Анотація:
Мета роботи: підвищення якості надання послуг кінцевим користувачам мобільних мережах 5G за рахунок поєднання доступних засобів керування. В даній роботі розглядається технологія 5G, принцип роботи, вимоги до якості мережі. Також ознаюмлюємось з технологією SDN, її архітектурою та принципами роботи. Проведено аналіз технології SDN та 5G, описані недоліки SDN, також переваги 5G та вимоги до її якості.
Purpose: to improve the quality of services to end users of 5G mobile networks through a combination of available controls. In any case, you can use 5G technology, working, requiring other users to follow. We will also define with SDN technology, its architecture and principles of work. Analytical technologies of SDN and 5G are carried out, shortcomings of SDN, and also 5G are described and necessary for its work.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kang, Byungkyu. "Design of survivable WDM network based on pre-configured protection cycle." Connect to thesis, 2006. http://portal.ecu.edu.au/adt-public/adt-ECU2007.0015.html.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Leite, Melina da Silveira. "Jornalismo de proximidade configurado pelos sentidos das interações no facebook: um estudo dos processos no diário popular." Universidade do Vale do Rio dos Sinos, 2018. http://www.repositorio.jesuita.org.br/handle/UNISINOS/7047.

Повний текст джерела
Анотація:
Submitted by JOSIANE SANTOS DE OLIVEIRA (josianeso) on 2018-05-10T13:01:44Z No. of bitstreams: 1 Melina da Silveira Leite_.pdf: 2155817 bytes, checksum: 2306c73633e1be53a5bf3e035165612a (MD5)
Made available in DSpace on 2018-05-10T13:01:44Z (GMT). No. of bitstreams: 1 Melina da Silveira Leite_.pdf: 2155817 bytes, checksum: 2306c73633e1be53a5bf3e035165612a (MD5) Previous issue date: 2018-04-02
Nenhuma
O presente trabalho tem como proposta estudar como ocorrem os vínculos entre leitores e um jornal, o Diário Popular, localizado no interior do Rio Grande do Sul, na cidade de Pelotas e que abrange uma mesma região, a zona Sul do estado, através da página do veículo no Facebook. Investigamos de que forma esses leitores significam os acontecimentos locais, a partir de interação com o jornal. Para isso, levamos em conta os processos de jornalismo em redes digitais e estudamos questões pertinentes à proximidade e territorialidade, além de acontecimento, redes sociais digitais e interação. Utilizamos como principais metodologias a análise de construção de sentidos em redes digitais e entrevista. Pudemos identificar a partir do nosso recorte, que existem diferentes tipos de interação entre leitores e jornal, as quais categorizamos como afetação – argumento, afetação – passionalidade, prestimosidade e sociabilidade e que, o leitor, a partir de características de proximidade territoriais, identifica-se com os acontecimentos locais e regionais.
The present study aims to verify the links between readers and a newspaper. The newspaper studied was Diário Popular, which is located in the country side of Rio Grande do Sul, in the city of Pelotas. The newspaper cover, the southern part of the state, through the Facebook’s page. We investigated how these readers signify local events, from the interaction with the newspaper. For this, we considerated the processes of journalism in digital networks and we study issues related to proximity and territoriality, as well as events, digital social networks and interaction. The methodology used was the analysis of sense construction in digital networks and interview. From our clipping, we identified that there are different types of interaction between readers and newspapers, categorized as affectation - argument, affectation - passion, helpfulness and sociability. Which the readers, based on characteristics of territorial proximity, find themselves in local and regional events.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Марчук, Олександр Олегович. "Метод управління безпекою інформаційних потоків мережі IoT за допомогою SDN". Master's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/39304.

Повний текст джерела
Анотація:
Актуальність: Підвищення якості функціонування мереж зв'язку за рахунок поліпшення надійності є складною науково-технічною та економічною проблемою. Це обумовлено тим що до мереж з новими технологіями, таким як програмно-конфігуровані мережі (SDN) в даний час висувають високі вимоги по надійності (відмовостійкості) в тому числі до характеристик відновлення мережі після відмови. При розробці заходів, що підвищують надійність доцільна постановка задачі максимально можливого підвищення якості функціонування мережі при мінімальному часу відновлення зв'язку. Високий рівень відмовостійкості мережі забезпечується за рахунок швидкого виявлення пошкоджень і усунення їх наслідків за короткий час. Існуючі методи забезпечення надійності в мережах SDN можна поділити на два самостійних класи: захисне перемикання (резервування) і відновлення (перемаршрутизація). Звідси випливає що для системного підходу до дослідження методів забезпечення надійності SDN доцільно використовувати засоби математичного моделювання. Дослідження механізмів забезпечення надійності SDN розглядається в ряді робіт, як вітчизняних, так і зарубіжних. Однак в даних роботах не проводиться порівняльний аналіз використання механізмів забезпечення відмовостійкості, а також комбінації цих механізмів. Так само в ряді робіт не враховуються економічні показники використання даних механізмів. Мета роботи: підвищити відмовостійкість при DoS-атаці системи Інтернету речей з використанням концепції SDN за рахунок премаршутизації та резервування комунікаційних ресурсів, що дозволить зменшити час до виявлення відмови методами швидкого відновлення, зменшиння відсотка навантаженості. Задачі дослідження: 1. Проаналізувати існуючі підходи щодо управління безпекою інформаційних потоків мережі IoT за допомогою SDN . 2. Запропонувати модель управління безпекою інформаційних потоків мережі IoT при DoS-атаці, яка дозволить зменшити як ймовірність відмови, так і вплив відмови ; 3. Вдосконалити процедуру керування безпекою інформаційних потоків мережі IoT яка враховує можливості організації потоків в програмно-керованих мережах (SDN); 4. Розробити удосконалений метод управління безпекою інформаційних потоків мережі IoT з використанням концепції SDN та резервування контролера, що дозволить отримати надійну мережу, не враховуючи збільшення часу до виявлення відмови при роботі методів швидкого відновлення. 5. Розробка імітаційної моделі в середовищі MiniNet, планування та проведення експерименту з метою перевірки теоритичних положень та доведення їх ефективності. 6. Розробка стартап проекту для системи безпеки IoT. Об’єкт дослідження: пристрої і технології організації програмно-керованого зв'язку в мережі Інтернету речей. Предмет дослідження: моделі та методи управління безпекою інформаційних потоків мережі IoT за допомогою SDN Методи дослідження: Проведені дослідження базуються на теорії ймовірностей, математичній статистиці, теорії телекомунікацій методах моделювання. Моделювання фрагмента мережі ІР проведено на основі пакета MiniNet. Наукова новизна: Запропоновано удосконалений метод управління безпекою інформаційних потоків мережі IoT з використанням концепції SDN, який дозволяє підвищити відмовостійкість при DoS-атаці системи Інтернету речей, зменшити час до виявлення відмови методами швидкого відновлення, зменшити відсотка завантаженості мережі, за рахунок премаршутизації та резервування комунікаційних ресурсів. Практична новизна: Пропонована модель PFI скорочує час на встановлення шляху, знижує час обробки контролера і зменшує трафік каналу управління при DoS-атаці на мережу шляхом використання методів резервування та відновлення зв’язку, також взаємодіє з протоколами безпеки, основним з них є OpenFlow.
Relevance: Improving the quality of communication networks by improving reliability is a complex scientific, technical and economic problem. This is due to the fact that networks with new technologies, such as software-configured networks (SDN) currently have high requirements for reliability (fault tolerance), including the characteristics of network recovery after failure. When developing measures to increase reliability, it is advisable to set the task of maximizing the quality of network operation with a minimum connection recovery time. The high level of fault tolerance of the network is provided due to fast detection of damages and elimination of their consequences in a short time. Existing methods of ensuring reliability in SDN networks can be divided into two separate classes: protective switching (redundancy) and recovery (rerouting). It follows that for a systematic approach to the study of methods to ensure the reliability of SDN, it is advisable to use mathematical modeling. The study of the mechanisms of ensuring the reliability of SDN is considered in a number of works, both domestic and foreign. However, these works do not provide a comparative analysis of the use of mechanisms to ensure fault tolerance, as well as a combination of these mechanisms. Similarly, a number of works do not take into account the economic indicators of the use of these mechanisms. Purpose: to develop a method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will provide a reliable network, without taking into account the increase in time to detect failure of rapid recovery methods. Research objectives: 1. to propose a model of security management of information flows of the IoT network; 2. provide an algorithm for managing the security of information flows of the IoT network using SDN; 3. to reveal the methodology for determining the effectiveness of security management of information flows of the IoT network using SDN; 4. to develop an improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Object of research: devices and technologies of communication organization in the Internet of Things. Subject of research: data transmission models and methods of ensuring the functioning of the Internet of Things in the face of hazards. Research methods: The research is based on probability theory, mathematical statistics, modeling methods and field experiments. The simulation of a fragment of the IP network was performed on the basis of a simulation package. Scientific novelty: An improved method of managing the security of information flows of the IoT network using the concept of SDN and controller redundancy has been proposed, which will allow to obtain a reliable network, without taking into account the increase in time to detect failure of fast recovery methods. Practical novelty: The obtained results can be implemented in a real enterprise in order to improve the quality of security management of information flows of the IoT network using SDN.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rauschecker, Ursula Maria [Verfasser], and Alexander [Akademischer Betreuer] Verl. "Method to configure agile production networks for personalised products based on customisable manufacturing services / Ursula Maria Rauschecker ; Betreuer: Alexander Verl." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2020. http://d-nb.info/1215574118/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Machado, Vinicius Ponte. "Uma arquitetura baseada em agentes para configura??o din?mica de aplica??es inteligentes em ambiente foundation fieldbus." Universidade Federal do Rio Grande do Norte, 2009. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15136.

Повний текст джерела
Анотація:
Made available in DSpace on 2014-12-17T14:54:53Z (GMT). No. of bitstreams: 1 ViniciusPM.pdf: 1794851 bytes, checksum: 2a77c7f1b263be186ffa64cbc38b4cc3 (MD5) Previous issue date: 2009-12-11
Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior
The industrial automation is directly linked to the development of information tecnology. Better hardware solutions, as well as improvements in software development methodologies make possible the rapid growth of the productive process control. In this thesis, we propose an architecture that will allow the joining of two technologies in hardware (industrial network) and software field (multiagent systems). The objective of this proposal is to join those technologies in a multiagent architecture to allow control strategies implementations in to field devices. With this, we intend develop an agents architecture to detect and solve problems which may occur in the industrial network environment. Our work ally machine learning with industrial context, become proposed multiagent architecture adaptable to unfamiliar or unexpected production environment. We used neural networks and presented an allocation strategies of these networks in industrial network field devices. With this we intend to improve decision support at plant level and allow operations human intervention independent
A automa??o industrial est? diretamente ligada ao crescimento da tecnologia da informa??o. Tanto as melhorias em solu??es de hardware quanto o aprimoramento em metodologias de desenvolvimento de software propiciaram o crescimento do controle do processo produtivo ao longo dos anos. Nesta tese, propomos uma arquitetura que permitir? a uni?o de duas tecnologias no ?mbito de hardware (redes industriais) e software (sistemas multiagente). O objetivo de nossa proposta ? unir essas tecnologias em uma arquitetura multiagente para permitir implementa??o de aplica??es inteligentes nos dispositivos de campo. Com isso pretendemos fazer que os agentes possam detectar e apontar solu??es para problemas encontrados no ambiente de rede industrial. Este trabalho ainda alia a aprendizagem de m?quina ao contexto industrial, permitindo dessa forma que a arquitetura de agentes proposta possa se tornar adapt?vel a um contexto de produ??o desconhecido ou inesperado. Para isso, utilizamos redes neurais e mostramos uma estrat?gia para aloca??o destas redes em dispositivos da rede industrial. Pretendemos assim viabilizar uma melhoria no suporte a decis?o em ocorr?ncias no n?vel de planta auxiliando os operadores na detec??o e corre??o de problemas e falhas
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Configured networks"

1

Nathan, Yocom, and ebrary Inc, eds. Learning FreeNAS: Configure and manage a network attached storage solution. Birmingham, U.K: Packt Publishing Ltd., 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Soper, Mark Edward. Construye y configura tu red. Madrid: Anaya Multimedia, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Miletić, Darko. Moodle security: Learn how to install and configure Moodle in the most secure way possible. Birmingham, U.K: Packt Pub., 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Inc, ebrary, ed. pfSense 2 cookbook: A practical, example-driven guide to configure even the most advanced features of pfSense 2. Birmingham, U.K: Packt Open Source, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Inc, ebrary, ed. ADempiere 3.4 ERP solutions: Design configure, and implement a robust enterprise resource planning system in your organization by using ADempiere. Birmingham, U.K: Packt Pub., 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

(Editor), Charles Riley. Cisco PIX Firewalls: Configure, Manage, & Troubleshoot. 2nd ed. Syngress, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kitschelt, Herbert, and Philipp Rehm. 18. Political participation. Oxford University Press, 2017. http://dx.doi.org/10.1093/hepl/9780198737421.003.0020.

Повний текст джерела
Анотація:
This chapter examines four fundamental questions relating to political participation. First, it considers different modes of political participation such as social movements, interest groups, and political parties. Second, it analyses the determinants of political participation, focusing in particular on the paradox of collective action. Third, it explains political participation at the macro-level in order to identify which contextual conditions are conducive to participation and the role of economic affluence in political participation. Finally, the chapter discusses political participation at the micro-level. It shows that both formal associations and informal social networks, configured around family and friendship ties, supplement individual capacities to engage in political participation or compensate for weak capacities, so as to boost an individual's probability to become politically active.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Windows Server 2019 Cookbook: Over 100 Recipes to Effectively Configure Networks, Manage Security, and Administer Workloads, 2nd Edition. Packt Publishing, Limited, 2020.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Configured networks"

1

Gupta, Vidhi, Rachna Asthana, and Yatindra Nath Singh. "Pre-configured (p)-Cycle Protection for Non-hamiltonian Networks." In Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences, 299–309. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-7533-4_23.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gupta, Vidhi, and Rachna Asthana. "Comparative Study of Introducing Wavelength Converters in Pre-configured (P)-Cycle." In Lecture Notes in Networks and Systems, 899–910. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7345-3_76.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sharma, Purnima Kumari, Mondira Deori, Balbindar Kaur, Chandralekha Dey, and Karen Das. "An Innovative ANN Based Assamese Character Recognition System Configured with Radon Transform." In Wireless Networks and Computational Intelligence, 287–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31686-9_34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Rak, Jacek. "Capacity Efficient Shared Protection and Fast Restoration Scheme in Self-Configured Optical Networks." In Self-Managed Networks, Systems, and Services, 142–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767886_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Wessels, Bridgette. "Community, Subculture, Secondary Association as a Resource: Patterns of Association to Counter Exclusion and Configured Networks to Manage Exclusion." In Welfare Policy from Below, 175–86. London: Routledge, 2021. http://dx.doi.org/10.4324/9781315234212-19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Miyoshi, Naoto, and Tomoyuki Shirai. "Cellular Networks with $$\alpha $$ -Ginibre Configurated Base Stations." In The Impact of Applications on Mathematics, 211–26. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-54907-9_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Toland, Tyrone S., Sebastian Kollmannsperger, J. Bernard Brewton, and William B. Craft. "Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield." In Computer and Network Security Essentials, 189–204. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Laskowski, Eryk, Łukasz Maśko, and Marek Tudruj. "Multi–CMP Module System Based on a Look-Ahead Configured Global Network." In Parallel Processing and Applied Mathematics, 586–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14390-8_61.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Sanvito, Davide. "Traffic Management in Networks with Programmable Data Planes." In Special Topics in Information Technology, 13–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_2.

Повний текст джерела
Анотація:
AbstractThis brief includes a summary of the Ph.D. thesis entitled “Traffic management in networks with programmable data planes” and supervised by Prof. Antonio Capone. Software-Defined Networking (SDN) enables the configuration and operation of communications networks through open software programming interfaces providing an unprecedented flexibility in their dynamic reconfiguration and management. The thesis analyses the opportunities for traffic management provided by the SDN paradigm at different levels. Starting from the programmability at the control plane, we have designed a Traffic Engineering framework operating on the global view offered on top of the controller to proactively configure the network according to traffic measurements while limiting the number of reconfigurations. In order to deal with unexpected conditions such as network failures and congestion, the above centralized, global and proactive approach has been complemented by reactive and distributed approaches based on advanced stateful programmable data planes which enable a self-adaptation according to partial local information yielding to a more prompt and scalable reaction. All the solutions presented in the thesis have been evaluated with software prototypes based on research-oriented or production-ready open-source tools. Some of the extensions developed for these tools have been integrated as official open-source contributions.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Montesinos López, Osval Antonio, Abelardo Montesinos López, and Jose Crossa. "Artificial Neural Networks and Deep Learning for Genomic Prediction of Binary, Ordinal, and Mixed Outcomes." In Multivariate Statistical Machine Learning Methods for Genomic Prediction, 477–532. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89010-0_12.

Повний текст джерела
Анотація:
AbstractIn this chapter, we provide the main elements for implementing deep neural networks in Keras for binary, categorical, and mixed outcomes under feedforward networks as well as the main practical issues involved in implementing deep learning models with binary response variables. The same practical issues are provided for implementing deep neural networks with categorical and count traits under a univariate framework. We follow with a detailed assessment of information for implementing multivariate deep learning models for continuous, binary, categorical, count, and mixed outcomes. In all the examples given, the data came from plant breeding experiments including genomic data. The training process for binary, ordinal, count, and multivariate outcomes is similar to fitting DNN models with univariate continuous outcomes, since once we have the data to be trained, we need to (a) define the DNN model in Keras, (b) configure and compile the model, (c) fit the model, and finally, (d) evaluate the prediction performance in the testing set. In the next section, we provide illustrative examples of training DNN for binary outcomes in Keras R (Chollet and Allaire, Deep learning with R. Manning Publications, Manning Early Access Program (MEA), 2017; Allaire and Chollet, Keras: R interface to Keras’, 2019).
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Configured networks"

1

Michelogiannakis, George, Dionisios Pnevmatikatos, and Manolis Katevenis. "Approaching Ideal NoC Latency with Pre-Configured Routes." In 2007 International Symposium on Networks-on-Chip. IEEE, 2007. http://dx.doi.org/10.1109/nocs.2007.10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Arnold, Jon, Olaf Maennel, Ashley Flavel, Jeremy McMahon, and Matthew Roughan. "Quantitative Analysis of Incorrectly-Configured Bogon-Filter Detection." In 2008 Australasian Telecommunication Networks and Applications Conference (ATNAC). IEEE, 2008. http://dx.doi.org/10.1109/atnac.2008.4783287.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Nasuha Daud, Nur, Siti Hafizah Ab Hamid, Chempaka Seri, Muntadher Saadoon, and Nor Badrul Anuar. "Scalable Link Prediction in Twitter using Self-Configured Framework." In 8th International Conference on Natural Language Processing (NATP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120107.

Повний текст джерела
Анотація:
Link prediction analysis becomes vital to acquire a deeper understanding of events underlying social networks interactions and connections especially in current evolving and large-scale social networks. Traditional link prediction approaches underperformed for most large-scale social networks in terms of its scalability and efficiency. Spark is a distributed open-source framework that facilitate scalable link prediction efficiency in large-scale social networks. The framework provides numerous tunable properties for users to manually configure the parameters for the applications. However, manual configurations open to performance issue when the applications start scaling tremendously, which is hard to set up and expose to human errors. This paper introduced a novel Self-Configured Framework (SCF) to provide an autonomous feature in Spark that predicts and sets the best configuration instantly before the application execution using XGBoost classifier. SCF is evaluated on the Twitter social network using three link prediction applications: Graph Clustering (GC), Overlapping Community Detection (OCD), and Redundant Graph Clustering (RGD) to assess the impact of shifting data sizes on different applications in Twitter. The result demonstrates a 40% reduction in prediction time as well as a balanced resource consumption that makes full use of resources, especially for limited number and size of clusters.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Tragos, Elias Z., Raffaele Brunoy, Emilio Ancillottiz, Krzysztof Grochlaz, and Vasilios A. Siris. "Automatically configured, optimised and QoS aware wireless mesh networks." In 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2010). IEEE, 2010. http://dx.doi.org/10.1109/pimrc.2010.5671649.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gomes, Reinaldo, and Ricardo de O. Schmidt. "Evaluating automatic pools distribution techniques for self-configured networks." In 2011 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2011. http://dx.doi.org/10.1109/iscc.2011.5983914.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chou, Nien-Tsu, Shih-Hao Lin, Shin-Ming Cheng, and Shih-Hao Chang. "Performance Evaluation of Self-Configured Two-Tier Heterogeneous Cellular Networks." In 2013 IEEE International Conference on Systems, Man and Cybernetics (SMC 2013). IEEE, 2013. http://dx.doi.org/10.1109/smc.2013.506.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Ravindrababu, Sandeep Gogineni, and Jim Alves-Foss. "Automated Detection of Configured SDN Security Policies for ICS Networks." In ICSS 2020: Sixth Annual Industrial Control System Security Workshop. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3442144.3442148.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Boukerche, Azzedine, Zhenxia Zhang, and Richard W. Pazzi. "A self-configured handoff scheme for IEEE 802.11-based wireless networks." In 2009 IEEE 34th Conference on Local Computer Networks (LCN 2009). IEEE, 2009. http://dx.doi.org/10.1109/lcn.2009.5355195.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Liu, Fang, and Xiuzhen Cheng. "A Self-Configured Key Establishment Scheme for Large-Scale Sensor Networks." In 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems. IEEE, 2006. http://dx.doi.org/10.1109/mobhoc.2006.278585.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Jinho Kim, Jongpil Jeong, and Hyunseung Choo. "An efficient handover scheme with pre-configured tunneling in IEEE 802.16e Systems." In 2007 Australasian Telecommunication Networks and Applications Conference (ATNAC 2007). IEEE, 2007. http://dx.doi.org/10.1109/atnac.2007.4665284.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Configured networks"

1

Voellmy, Andreas, Ashish Agarwal, Paul Hudak, Nick Feamster, Sam Burnett, and John Launchbury. Don't Configure the Network, Program It! Domain-Specific Programming Languages for Network Systems. Fort Belvoir, VA: Defense Technical Information Center, July 2010. http://dx.doi.org/10.21236/ada555142.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії