Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Computer architecture.

Zeitschriftenartikel zum Thema „Computer architecture“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer architecture" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Attya, Salih Mahmoud, Suhad Qasim G. Haddad, Hamid Kareem Radam Al-Zaidi, Wafaa Mustafa Hameed, and Nabaa Latif. "Quantum Computing Impact on Traditional Computer Architecture Models." Radioelectronics. Nanosystems. Information Technologies. 16, no. 5 (2024): 691–704. http://dx.doi.org/10.17725/j.rensit.2024.16.691.

Der volle Inhalt der Quelle
Annotation:
Background: Traditional computer architectures are based on classical computational techniques, challenged by rapid advances in quantum computing. Quantum computers use quantum bits (qubits) to do calculations at speeds unreachable by classical computers, possibly revolutionizing many fields by providing exponential improvements in processing power. Objective: The article aims to investigate the potential consequences of quantum computing on traditional computer architectural models, emphasizing integration issues and transformative powers. Methods: We conducted extensive literature reviews an
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Singh, Amit Kumar, and Geeta Chhabra Gandhi. "Computer Architecture." International Journal of Smart Security Technologies 7, no. 1 (2020): 41–48. http://dx.doi.org/10.4018/ijsst.2020010103.

Der volle Inhalt der Quelle
Annotation:
It is a well-known fact that the expansion of Internet has given rise to many daily activities which are being done online including financial and personal data transactions which has developed the need of security like never before. It has made people realize that the data on the internet must be secured as many types of attacks are increasing day by day with the advancement of technology. So, here the requirement is to ensure that the services are supplied to a legitimate user rather than bots to prevent service abuse. The present article provides such a security from bots with the help of a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Chien, Andrew A. "Computer architecture." Communications of the ACM 61, no. 9 (2018): 5. http://dx.doi.org/10.1145/3243136.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Tabak, Daniel. "Computer Architecture." Microprocessors and Microsystems 14, no. 10 (1990): 676. http://dx.doi.org/10.1016/0141-9331(90)90043-u.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wang, Yan, and Jun Hui Zheng. "A Well Modularized Computer Network Architecture." Applied Mechanics and Materials 631-632 (September 2014): 902–5. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.902.

Der volle Inhalt der Quelle
Annotation:
By analyzing a variety of computer network architectures, we can find that researchers establish different computer network models from their different starting points and get different computer network architectures by different modularization methods. We establish a well modularized non-layered computer network architecture. This paper compares it with the layered architecture and obtains a conclusion that it is superior to the layered architecture. We have developed two framework prototypes of it. In the one of them we develop some application softwares of TCP/IP, including E-mail, FTP, Web
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Odhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (2012): 302–9. http://dx.doi.org/10.48084/etasr.145.

Der volle Inhalt der Quelle
Annotation:
Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Mathew, Jincy C. "Review on Architecture of Computer Networks." International Journal of Psychosocial Rehabilitation 24, no. 4 (2020): 6997–7001. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020702.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Dong, Xia, Shou Quan Wang, Xin Zhang, and Xiao Jia Ji. "Software Radar Hardware Architecture Based on General Computer." Advanced Materials Research 846-847 (November 2013): 207–10. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.207.

Der volle Inhalt der Quelle
Annotation:
For software radar, different functions are realized by software running on standard hardware platform, which brings to great predominance over traditional radar. In this paper, realizable structure of software radar was analyzed, and hardware platform based on computer was studied. Two hardware architectures, one-computer architecture as well as computer cluster architecture were raised based on computer. The one-computer architecture is available to radars that cubage is restricted, while computer cluster architecture is applied in huge radar with complex computation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kaiser, Marcus. "Brain architecture: a design for natural computation." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365, no. 1861 (2007): 3033–45. http://dx.doi.org/10.1098/rsta.2007.0007.

Der volle Inhalt der Quelle
Annotation:
Fifty years ago, John von Neumann compared the architecture of the brain with that of the computers he invented and which are still in use today. In those days, the organization of computers was based on concepts of brain organization. Here, we give an update on current results on the global organization of neural systems. For neural systems, we outline how the spatial and topological architecture of neuronal and cortical networks facilitates robustness against failures, fast processing and balanced network activation. Finally, we discuss mechanisms of self-organization for such architectures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Clements, A. "Computer architecture education." Microprocessors and Microsystems 23, no. 5 (1999): 255–56. http://dx.doi.org/10.1016/s0141-9331(99)00020-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Clements, A. "Computer architecture education." IEEE Micro 20, no. 3 (2000): 10–12. http://dx.doi.org/10.1109/mm.2000.846304.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Bhatt, Dulari, Chirag Patel, Hardik Talsania, et al. "CNN Variants for Computer Vision: History, Architecture, Application, Challenges and Future Scope." Electronics 10, no. 20 (2021): 2470. http://dx.doi.org/10.3390/electronics10202470.

Der volle Inhalt der Quelle
Annotation:
Computer vision is becoming an increasingly trendy word in the area of image processing. With the emergence of computer vision applications, there is a significant demand to recognize objects automatically. Deep CNN (convolution neural network) has benefited the computer vision community by producing excellent results in video processing, object recognition, picture classification and segmentation, natural language processing, speech recognition, and many other fields. Furthermore, the introduction of large amounts of data and readily available hardware has opened new avenues for CNN study. Se
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Zhang, Xinyu, Vincent C. S. Lee, Jia Rong, Feng Liu, and Haoyu Kong. "Multi-channel convolutional neural network architectures for thyroid cancer detection." PLOS ONE 17, no. 1 (2022): e0262128. http://dx.doi.org/10.1371/journal.pone.0262128.

Der volle Inhalt der Quelle
Annotation:
Early detection of malignant thyroid nodules leading to patient-specific treatments can reduce morbidity and mortality rates. Currently, thyroid specialists use medical images to diagnose then follow the treatment protocols, which have limitations due to unreliable human false-positive diagnostic rates. With the emergence of deep learning, advances in computer-aided diagnosis techniques have yielded promising earlier detection and prediction accuracy; however, clinicians’ adoption is far lacking. The present study adopts Xception neural network as the base structure and designs a practical fra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Jamieson, Peter, Huan Le, Nathan Martin, et al. "Computer Engineering Education Experiences with RISC-V Architectures—From Computer Architecture to Microcontrollers." Journal of Low Power Electronics and Applications 12, no. 3 (2022): 45. http://dx.doi.org/10.3390/jlpea12030045.

Der volle Inhalt der Quelle
Annotation:
With the growing popularity of RISC-V and various open-source released RISC-V processors, it is now possible for computer engineers students to explore this simple and relevant architecture, and also, these students can explore and design a microcontroller at a low-level using real tool-flows and implement and test their hardware. In this work, we describe our experiences with undergraduate engineers building RISC-V architectures on an FPGA and then extending their experiences to implement an Arduino-like RISC-V tool-flow and the respective hardware and software to handle input-output ports, i
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Çelik, Tuğçe. "Unknown interiors of ancient Egypt: producing by artificial intelligence in the context of light-space relationship." JOURNAL OF ARCHITECTURE AND URBANISM 49, no. 1 (2025): 1–10. https://doi.org/10.3846/jau.2025.21202.

Der volle Inhalt der Quelle
Annotation:
This study presents a design method aimed at visualizing cultural heritage through the architecture of ancient Egypt using modern technologies. With the deepening of the digital age, the use of digital technology and artificial intelligence in cultural heritage research has become an important tool for renewing and disseminating period architecture. The reason for choosing the interior spaces of ancient Egypt as a sample in this study is that, in addition to leaving a rich heritage in the field of architecture, ancient Egypt offers distinct period architecture in terms of space-light relations
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Schmidt, Anne Marie Due, and Poul Henning Kirkegaard. "From Architectural Acoustics to Acoustical Architecture Using Computer Simulation." Building Acoustics 12, no. 2 (2005): 85–98. http://dx.doi.org/10.1260/1351010054037965.

Der volle Inhalt der Quelle
Annotation:
Architectural acoustics design has in the past been based on simple design rules. However, with a growing complexity in architectural acoustics and the emergence of room acoustic simulation programmes with considerable potential, it is now possible to subjectively analyse and evaluate acoustic properties prior to the actual construction of a building. With the right tools applied, acoustic design can become an integral part of the architectural design process. The aim of this paper is to investigate the field of application that an acoustic simulation programme can have during an architectural
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Ahmad, Othman. "FPGA BASED INDIVIDUAL COMPUTER ARCHITECTURE LABORATORY EXERCISES." Journal of BIMP-EAGA Regional Development 3, no. 1 (2017): 23–31. http://dx.doi.org/10.51200/jbimpeagard.v3i1.1026.

Der volle Inhalt der Quelle
Annotation:
Computer Architecture is the study of digital computers towards designing, building and operating digital computers. Digital computers are vital for the modern living because they are essential in providing the intelligences in devices such as self-driving cars and smartphones. Computer Architecture is a core subject for the Electronic (Computer) Engineering course at the Universiti Malaysia Sabah that is compliant to the requirement of the Washington Accord as accredited by the Engineering Accreditation Council of the Board of Engineers of Malaysia (EAC). An FPGA (Field Programmable Gate Arra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

AKL, SELIM G. "THREE COUNTEREXAMPLES TO DISPEL THE MYTH OF THE UNIVERSAL COMPUTER." Parallel Processing Letters 16, no. 03 (2006): 381–403. http://dx.doi.org/10.1142/s012962640600271x.

Der volle Inhalt der Quelle
Annotation:
It is shown that the concept of a Universal Computer cannot be realized. Specifically, instances of a computable function [Formula: see text] are exhibited that cannot be computed on any machine [Formula: see text] that is capable of only a finite and fixed number of operations per step. This remains true even if the machine [Formula: see text] is endowed with an infinite memory and the ability to communicate with the outside world while it is attempting to compute [Formula: see text]. It also remains true if, in addition, [Formula: see text] is given an indefinite amount of time to compute [F
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Ramancha, Nitesh Kumar. "Evaluation of Computer Architecture and Organization using the SPSS Method." International Journal of Cloud Computing and Supply Chain Management 1, no. 1 (2025): 13–24. https://doi.org/10.55124/ijccsm.v1i1.233.

Der volle Inhalt der Quelle
Annotation:
The process of creating a computer's internal structure and layout, as well as the electronic components' interactions with one another, is referred to as computer architecture design. It entails making choices about the architectural of the entire system as well as the CPU, memory hierarchy, input/output (I/O) systems, and memory hierarchy. (ISA) Instruction Set Architecture The interface that exists between software and computer hardware is described by ISA. It contains the set of instructions the CPU is capable of processing, the addressing modes, and the register structure. The ISA decisio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Medvidovic, Nenad, Eric M. Dashofy, and Richard N. Taylor. "The Role of Middleware in Architecture-Based Software Development." International Journal of Software Engineering and Knowledge Engineering 13, no. 04 (2003): 367–93. http://dx.doi.org/10.1142/s0218194003001330.

Der volle Inhalt der Quelle
Annotation:
Software architectures promote development focused on modular functional building blocks (components), their interconnections (configurations), and their interactions (connectors). Since architecture-level components often contain complex functionality, it is reasonable to expect that their interactions will be complex as well. Middleware technologies such as CORBA, COM, and RMI provide a set of predefined services for enabling component composition and interaction. However, the potential role of such services in the implementations of software architectures is not well understood. In practice
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Ossama MOHAMED al-Rawi, Ossama. "Origins of Computational Design in Architecture." Future Engineering Journal 1, no. 1 (2020): 1–9. http://dx.doi.org/10.54623/fue.fej.1.1.5.

Der volle Inhalt der Quelle
Annotation:
The changes that the computer is bringing to architecture are one part of a revolutionary social upheaval. Tools not only change individual patterns and behaviour, but also cause transformations in institutions. Just as other tools have in the past, the computer is in the process of conditioning our understanding of the world and our perception of our place in it. The application of computers to architecture is more than anew sophisticated tool that can be manipulated like a pencil or pen. It is rather, “the culmination of the objectifying mentality of modernity and it is, therefore, inherentl
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

PAHL, CLAUS, YAOLING ZHU, and VERONICA GACITUA-DECAR. "A TEMPLATE-DRIVEN APPROACH FOR MAINTAINABLE SERVICE-ORIENTED INFORMATION SYSTEMS INTEGRATION." International Journal of Software Engineering and Knowledge Engineering 19, no. 07 (2009): 889–912. http://dx.doi.org/10.1142/s0218194009004465.

Der volle Inhalt der Quelle
Annotation:
Service-oriented architecture (SOA) is currently the predominant software integration framework. Web services provide the predominant platform for SOA. SOA as an integration architecture solution supports a range of application scenarios. We present a solution for the integration of business information systems based on SOA and Web services. We discuss maintainability requirements in relation to information-specific integration and architecture aspects. A template-based approach based on modular and declarative transformation rules and architectural styles and patterns defines our solution to
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Driker, Benjamin. "Disbursed control computer architecture." ACM SIGARCH Computer Architecture News 27, no. 3 (1999): 24–31. http://dx.doi.org/10.1145/333680.333695.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Ma, K. "Review: Computer Systems Architecture." Computer Bulletin 46, no. 5 (2004): 31. http://dx.doi.org/10.1093/combul/46.5.31-a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Wulf, Wm A. "The WM computer architecture." ACM SIGARCH Computer Architecture News 16, no. 1 (1988): 70–84. http://dx.doi.org/10.1145/44571.44577.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Torrellas, Josep. "Extreme-scale computer architecture." National Science Review 3, no. 1 (2016): 19–23. http://dx.doi.org/10.1093/nsr/nwv085.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Dorsey, Julie, and Leonard McMillan. "Computer graphics and architecture." ACM SIGGRAPH Computer Graphics 32, no. 1 (1998): 45–48. http://dx.doi.org/10.1145/279389.279449.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Pancratov, Cosmin, Jacob M. Kurzer, Kelly A. Shaw, and Matthew L. Trawick. "Why Computer Architecture Matters." Computing in Science & Engineering 10, no. 3 (2008): 59–63. http://dx.doi.org/10.1109/mcse.2008.87.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Cragon, Harvey G. "Computer Architecture and Implementation." Measurement Science and Technology 12, no. 10 (2001): 1744–45. http://dx.doi.org/10.1088/0957-0233/12/10/704.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Ibbett, R. N. "Computer architecture visualisation techniques." Microprocessors and Microsystems 23, no. 5 (1999): 291–300. http://dx.doi.org/10.1016/s0141-9331(99)00024-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Karafyllidis, Ioannis G. "Cellular quantum computer architecture." Physics Letters A 320, no. 1 (2003): 35–38. http://dx.doi.org/10.1016/j.physleta.2003.11.001.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Bhuyan, Laxmi N. "High-performance computer architecture." Future Generation Computer Systems 11, no. 6 (1995): 501–2. http://dx.doi.org/10.1016/0167-739x(95)00020-s.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Kammerer-Luka, G. "Architecture — related computer art." Visual Computer 2, no. 3 (1986): 187–88. http://dx.doi.org/10.1007/bf01900337.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Hunt, Ray. "Computer architecture and communications." Computer Communications 11, no. 6 (1988): 331. http://dx.doi.org/10.1016/0140-3664(88)90048-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Markettos, A. T., R. N. M. Watson, S. W. Moore, P. Sewell, and P. G. Neumann. "Through computer architecture, darkly." Communications of the ACM 62, no. 6 (2019): 25–27. http://dx.doi.org/10.1145/3325284.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Stojcev, M. "Computer Organization and Architecture." Microelectronics Journal 31, no. 5 (2000): 375–76. http://dx.doi.org/10.1016/s0026-2692(99)00155-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Clements, Alan. "High-performance computer architecture." Microprocessors and Microsystems 13, no. 1 (1989): 63. http://dx.doi.org/10.1016/0141-9331(89)90038-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Clements, Alan. "Computer architecture and design." Microprocessors and Microsystems 14, no. 1 (1990): 62. http://dx.doi.org/10.1016/0141-9331(90)90017-p.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Sorin, Daniel J. "Fault Tolerant Computer Architecture." Synthesis Lectures on Computer Architecture 4, no. 1 (2009): 1–104. http://dx.doi.org/10.2200/s00192ed1v01y200904cac005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Konyavsky, Valery A., and Gennady V. Ross. "COMPUTER WITH CHANGEABLE ARCHITECTURE." Journal of Mechanical Engineering Research and Developments 42, no. 3 (2019): 19–23. http://dx.doi.org/10.26480/jmerd.03.2019.19.23.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Anderson, Noel W. "Amorphous computer system architecture." ACM SIGARCH Computer Architecture News 18, no. 1 (1990): 51. http://dx.doi.org/10.1145/379126.379133.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Schoeberl, Martin. "Time-Predictable Computer Architecture." EURASIP Journal on Embedded Systems 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/758480.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Ibbett, Roland N., J. C. Diaz y Carballo, and D. A. W. Dolman. "Computer architecture simulation models." ACM SIGCSE Bulletin 38, no. 3 (2006): 353. http://dx.doi.org/10.1145/1140123.1140263.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Mirmotahari, Omid, Christian Holmboe, and Jens Kaasbøll. "Difficulties learning computer architecture." ACM SIGCSE Bulletin 35, no. 3 (2003): 247. http://dx.doi.org/10.1145/961290.961606.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Hill, Mark D. "21st century computer architecture." ACM SIGPLAN Notices 49, no. 8 (2014): 1–2. http://dx.doi.org/10.1145/2692916.2558890.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

G.W.A.D. "Computer architecture and design." Microelectronics Reliability 30, no. 1 (1990): 182–83. http://dx.doi.org/10.1016/0026-2714(90)90027-k.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Tsuchiya, Mas. "Computer hardware/software architecture." Microprocessors and Microsystems 11, no. 4 (1987): 236. http://dx.doi.org/10.1016/0141-9331(87)90383-8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Yang, Chia-Lin. "Understanding Computer Architecture Sustainability." Computer 56, no. 9 (2023): 4–5. http://dx.doi.org/10.1109/mc.2023.3290271.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Verma, Neena. "Insecurity in architecture." Architectural Research Quarterly 18, no. 2 (2014): 106–9. http://dx.doi.org/10.1017/s1359135514000414.

Der volle Inhalt der Quelle
Annotation:
‘I myself do not believe in explaining anything’, wrote Shel Silverstein. It seems that architecture is always looking to explain itself. Definitions of architecture seem almost common knowledge; ask a bartender, biologist, computer scientist, economist, legislator, birdwatcher, quilter or scientist, each of whom analogises their field with respect to architecture. And several within the profession can themselves define architecture's limits quite elegantly. Most recently Steven Holl defined architecture as consisting simply of abstract, use, space and idea. However, seeking a rationale or exp
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Gudhka, Drashti. "Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 78–87. http://dx.doi.org/10.22214/ijraset.2024.57862.

Der volle Inhalt der Quelle
Annotation:
Abstract: This paper presents a comprehensive overview of computer networking, covering fundamental concepts and modern advancements. It explores core networking principles, including models, architectures, and essential layers. Emphasising contemporary trends, it delves into topics like network security (Zero Trust Architecture, AI/ML), Software-Defined Networking (SDN), IoT security challenges, 5G and Mobile Edge Computing (MEC), network performance optimisation, Big Data analytics, and eco-friendly networking strategies. Aimed at students, researchers, and professionals, this overview serve
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!