Zeitschriftenartikel zum Thema „Extranets (Computer networks)“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-47 Zeitschriftenartikel für die Forschung zum Thema "Extranets (Computer networks)" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Morgan, David. "Deploying extranets?" Network Security 2004, no. 12 (December 2004): 12–14. http://dx.doi.org/10.1016/s1353-4858(04)00170-9.
Der volle Inhalt der QuelleLiu, Nan, Zhi Zeng, and Ruoyu Jin. "A Survey on Users' Perspectives to Functionalities of Web-Based Construction Collaboration Extranets." International Journal of e-Collaboration 15, no. 4 (October 2019): 1–17. http://dx.doi.org/10.4018/ijec.2019100101.
Der volle Inhalt der QuellePhaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets." EDPACS 27, no. 12 (June 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.
Der volle Inhalt der QuelleGuo, Jie, Xihao Fu, Liqiang Lin, Hengjun Ma, Yanwen Guo, Shiqiu Liu, and Ling-Qi Yan. "ExtraNet." ACM Transactions on Graphics 40, no. 6 (December 2021): 1–16. http://dx.doi.org/10.1145/3478513.3480531.
Der volle Inhalt der QuelleAhmed Ali, Adel, and Ahmed M. Al-Naamany. "Converged Networking: A Review of Concepts and Technologies." Sultan Qaboos University Journal for Science [SQUJS] 5 (December 1, 2000): 209. http://dx.doi.org/10.24200/squjs.vol5iss0pp209-225.
Der volle Inhalt der QuelleHu, Xiujian, Guanglei Sheng, Piao Shi, and Yuanyuan Ding. "TbsNet: the importance of thin-branch structures in CNNs." PeerJ Computer Science 9 (June 16, 2023): e1429. http://dx.doi.org/10.7717/peerj-cs.1429.
Der volle Inhalt der QuelleAbabneh, Nedal. "Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 671385. http://dx.doi.org/10.1155/2010/671385.
Der volle Inhalt der QuelleKaramysheva, N. S., D. S. Svishchev, K. V. Popov, and S. A. Zinkin. "Implementation of Agent-Based Metacomputersystems and Applications." Proceedings of the Southwest State University 26, no. 1 (June 28, 2022): 148–71. http://dx.doi.org/10.21869/2223-1560-2022-26-1-148-171.
Der volle Inhalt der QuelleMalik, Najeeb ur Rehman, Usman Ullah Sheikh, Syed Abdul Rahman Abu-Bakar, and Asma Channa. "Multi-View Human Action Recognition Using Skeleton Based-FineKNN with Extraneous Frame Scrapping Technique." Sensors 23, no. 5 (March 2, 2023): 2745. http://dx.doi.org/10.3390/s23052745.
Der volle Inhalt der QuelleMolla, D., R. Schwitter, F. Rinaldi, J. Dowdall, and M. Hess. "ExtrAns: Extracting answers from technical texts." IEEE Intelligent Systems 18, no. 4 (July 2003): 12–17. http://dx.doi.org/10.1109/mis.2003.1217623.
Der volle Inhalt der QuelleHameed, Marwah. "Modified Fuzzy Neural Network Approach for Academic Performance Prediction of Students in Early Childhood Education." Bonfring International Journal of Networking Technologies and Applications 11, no. 1 (February 13, 2024): 17–20. http://dx.doi.org/10.9756/bijnta/v11i1/bij24007.
Der volle Inhalt der QuelleILYA V., VOLODIN, PUTYATO MICHAEL M., MAKARYAN ALEXANDER S., and EVGLEVSKY VYACHESLAV YU. "CLASSIFICATION OF ATTACK MECHANISMS AND RESEARCH OF PROTECTION METHODS FOR SYSTEMS USING MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE ALGORITHMS." CASPIAN JOURNAL: Control and High Technologies 54, no. 2 (2021): 90–98. http://dx.doi.org/10.21672/2074-1707.2021.53.1.090-098.
Der volle Inhalt der QuelleStyles, K., and M. Goldsworthy. "GI extranet: a case study in applying technology for competitive advantage." International Journal of Networking and Virtual Organisations 1, no. 1 (2002): 82. http://dx.doi.org/10.1504/ijnvo.2002.001464.
Der volle Inhalt der QuelleLiu, Zhen, Yi-Liang Han, and Xiao-Yuan Yang. "A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks." International Journal of Distributed Sensor Networks 15, no. 6 (June 2019): 155014771985651. http://dx.doi.org/10.1177/1550147719856516.
Der volle Inhalt der QuelleYong, Chern Han, and Limsoon Wong. "From the static interactome to dynamic protein complexes: Three challenges." Journal of Bioinformatics and Computational Biology 13, no. 02 (April 2015): 1571001. http://dx.doi.org/10.1142/s0219720015710018.
Der volle Inhalt der QuelleNuli Namassivaya, Sunkari Nithigna, Sindhu Kovilala, and MD Sibli Hussain. "Encrypted chat application using RSA Algorithm." international journal of engineering technology and management sciences 7, no. 2 (2023): 854–59. http://dx.doi.org/10.46647/ijetms.2023.v07i02.095.
Der volle Inhalt der QuelleSychugov, Anton, Vadim Miheychikov, and Maksim Chernyshov. "Application of Neural Networks for Object Recognition in Railway Transportation." Proceedings of Petersburg Transport University 20, no. 2 (June 20, 2023): 478–91. http://dx.doi.org/10.20295/1815-588x-2023-2-478-491.
Der volle Inhalt der QuelleLaksana, Eugene, Melissa Aczon, Long Ho, Cameron Carlin, David Ledbetter, and Randall Wetzel. "The impact of extraneous features on the performance of recurrent neural network models in clinical tasks." Journal of Biomedical Informatics 102 (February 2020): 103351. http://dx.doi.org/10.1016/j.jbi.2019.103351.
Der volle Inhalt der QuelleGALL, HARALD C., RENÉ R. KLÖSCH, and ROLAND T. MITTERMEIR. "USING DOMAIN KNOWLEDGE TO IMPROVE REVERSE ENGINEERING." International Journal of Software Engineering and Knowledge Engineering 06, no. 03 (September 1996): 477–505. http://dx.doi.org/10.1142/s021819409600020x.
Der volle Inhalt der QuelleM. Sujitha, N. Leela, and B. Kanimozhi. "Computer Aided Diagnosis (CAD) and Classification of Microbial and other Wide Range of Dermal Diseases using AI and Medical Image Processing." Journal of Innovative Image Processing 5, no. 3 (September 2023): 307–22. http://dx.doi.org/10.36548/jiip.2023.3.006.
Der volle Inhalt der QuelleПальчикова, И. Г., И. А. Будаева, and Е. С. Смирнов. "Generation of a digital passport for gunshot residues using the computer vision techniques." Вычислительные технологии 29, no. 1 (February 24, 2024): 93–106. http://dx.doi.org/10.25743/ict.2024.29.1.009.
Der volle Inhalt der QuelleSun, Jiuyun, Huanhe Dong, Ya Gao, Yong Fang, and Yuan Kong. "The Short-Term Load Forecasting Using an Artificial Neural Network Approach with Periodic and Nonperiodic Factors: A Case Study of Tai'an, Shandong Province, China." Computational Intelligence and Neuroscience 2021 (October 26, 2021): 1–8. http://dx.doi.org/10.1155/2021/1502932.
Der volle Inhalt der QuellePeeters, Hendrik, Sebastian Habig, and Sabine Fechner. "Does Augmented Reality Help to Understand Chemical Phenomena during Hands-On Experiments?–Implications for Cognitive Load and Learning." Multimodal Technologies and Interaction 7, no. 2 (January 19, 2023): 9. http://dx.doi.org/10.3390/mti7020009.
Der volle Inhalt der QuelleJones, R. Kenny, Paul Guerrero, Niloy J. Mitra, and Daniel Ritchie. "ShapeCoder: Discovering Abstractions for Visual Programs from Unstructured Primitives." ACM Transactions on Graphics 42, no. 4 (July 26, 2023): 1–17. http://dx.doi.org/10.1145/3592416.
Der volle Inhalt der QuelleChen, Xinyue, Shuo Li, Shipeng Liu, Robin Fowler, and Xu Wang. "MeetScript: Designing Transcript-based Interactions to Support Active Participation in Group Video Meetings." Proceedings of the ACM on Human-Computer Interaction 7, CSCW2 (September 28, 2023): 1–32. http://dx.doi.org/10.1145/3610196.
Der volle Inhalt der QuelleWang, Lei, and Wenqi He. "Analysis of Community Outdoor Public Spaces Based on Computer Vision Behavior Detection Algorithm." Applied Sciences 13, no. 19 (October 2, 2023): 10922. http://dx.doi.org/10.3390/app131910922.
Der volle Inhalt der QuelleLin, Hsien-I., and C. S. George Lee. "Neuro-fuzzy-based skill learning for robots." Robotica 30, no. 6 (December 8, 2011): 1013–27. http://dx.doi.org/10.1017/s026357471100124x.
Der volle Inhalt der QuelleNguyen, Viet Hung, Ngoc Nam Pham, Cong Thang Truong, Duy Tien Bui, Huu Thanh Nguyen, and Thu Huong Truong. "Retina-based quality assessment of tile-coded 360-degree videos." EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 9, no. 32 (June 21, 2022): e2. http://dx.doi.org/10.4108/eetinis.v9i32.1058.
Der volle Inhalt der QuelleS.Saravana Kumar, Et al. "Automated Detection of Autism Spectrum Disorder Using Bio-Inspired Swarm Intelligence Based Feature Selection and Classification Techniques." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2342–50. http://dx.doi.org/10.17762/ijritcc.v11i9.9242.
Der volle Inhalt der QuelleMirzazade, Ali, Cosmin Popescu, Thomas Blanksvärd, and Björn Täljsten. "Workflow for Off-Site Bridge Inspection Using Automatic Damage Detection-Case Study of the Pahtajokk Bridge." Remote Sensing 13, no. 14 (July 7, 2021): 2665. http://dx.doi.org/10.3390/rs13142665.
Der volle Inhalt der QuellePaudel, Niroj, Bishnu Maya Kharel, Ramesh Prasad Sah, and Rajesh Shrestha. "Comparative Study of E-Learning Frameworks: Recommendation for Nepal." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 273. http://dx.doi.org/10.23956/ijarcsse.v7i8.66.
Der volle Inhalt der QuelleMohammed Saleh Al Ansari, Et al. "Nanoparticle Incorporation to Enhance Titanium Alloy Electric Discharge Machining Capabilities." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 3722–30. http://dx.doi.org/10.17762/ijritcc.v11i9.9596.
Der volle Inhalt der QuelleHalteh, Khaled, and Hakem Sharari. "Employing Artificial Neural Networks and Multiple Discriminant Analysis to Evaluate the Impact of the COVID-19 Pandemic on the Financial Status of Jordanian Companies." Interdisciplinary Journal of Information, Knowledge, and Management 18 (2023): 251–67. http://dx.doi.org/10.28945/5112.
Der volle Inhalt der QuelleKornilova, Alla A., Sergey N. Gaydamaka, Marina A. Gladchenko, Dmitry Ya Agasarov, Igor V. Kornilov, and Maxim A. Gerasimov. "Thermal Waves and Flow Features of Pulsed Thermally Stimulated Biochemical Reactions in Viral Particles Interaction with Cells." Radioelectronics. Nanosystems. Information Technologies. 14, no. 1 (April 12, 2022): 87–96. http://dx.doi.org/10.17725/rensit.2022.14.087.
Der volle Inhalt der QuelleShimada, Kunio. "Elucidation of Response and Electrochemical Mechanisms of Bio-Inspired Rubber Sensors with Supercapacitor Paradigm." Electronics 12, no. 10 (May 19, 2023): 2304. http://dx.doi.org/10.3390/electronics12102304.
Der volle Inhalt der QuelleDo, Quang-Huy, Rémi Antony, Bernard Ratier, and Johann Bouclé. "Improving Device-to-Device Reproducibility of Light-Emitting Diodes Based on Layered Halide Perovskites." Electronics 13, no. 6 (March 11, 2024): 1039. http://dx.doi.org/10.3390/electronics13061039.
Der volle Inhalt der QuelleMichel, Janet, David Evans, Marcel Tanner, and Thomas C. Sauter. "Identifying Policy Gaps in a COVID-19 Online Tool Using the Five-Factor Framework." Systems 10, no. 6 (December 15, 2022): 257. http://dx.doi.org/10.3390/systems10060257.
Der volle Inhalt der QuelleLande-Marghade, Pallavi. "Anaesthesia TV: Beginning of a New Revolution!" Journal of Anaesthesia and Critical Care Reports 4, no. 1 (2018): 1–2. http://dx.doi.org/10.13107/jaccr.2018.v04i01.075.
Der volle Inhalt der Quelle"Equant provides extranet." Network Security 2000, no. 10 (October 2000): 3–4. http://dx.doi.org/10.1016/s1353-4858(00)10008-x.
Der volle Inhalt der Quelle"National extranet further secured." Network Security 2000, no. 3 (March 2000): 4. http://dx.doi.org/10.1016/s1353-4858(00)03008-7.
Der volle Inhalt der QuelleShi, Yinghui, Huiyun Yang, Zongkai Yang, Wei Liu, Di Wu, and Harrison Hao Yang. "Examining the effects of note-taking styles on college students’ learning achievement and cognitive load." Australasian Journal of Educational Technology, August 12, 2022, 1–11. http://dx.doi.org/10.14742/ajet.6688.
Der volle Inhalt der QuelleFaulconer, Emily Kaye, Darryl Chamberlain, and Beverly L. Wood. "A Case Study of Community of Inquiry Presences and Cognitive Load in Asynchronous Online STEM Courses." Online Learning 26, no. 3 (September 1, 2022). http://dx.doi.org/10.24059/olj.v26i3.3386.
Der volle Inhalt der QuelleBäuerle, Alex, Patrick Albus, Raphael Störk, Tina Seufert, and Timo Ropinski. "exploRNN: teaching recurrent neural networks through visual exploration." Visual Computer, July 14, 2022. http://dx.doi.org/10.1007/s00371-022-02593-0.
Der volle Inhalt der Quelle"A Secure Electronic Messaging System in Client Server Cryptography-RSA Algorithm." International Journal of Engineering and Advanced Technology 8, no. 6S3 (November 22, 2019): 1804–8. http://dx.doi.org/10.35940/ijeat.f1343.0986s319.
Der volle Inhalt der QuelleFatima, Mah Noor, Mohammad S. Obaidat, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, and Muhammad Faizan Ayub. "Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks Deployed in Agricultural Field." ACM Transactions on Sensor Networks, July 3, 2023. http://dx.doi.org/10.1145/3607142.
Der volle Inhalt der QuelleRao, Prahalad, Satish Bukkapatnam, Omer Beyca, Zhenyu (James) Kong, and Ranga Komanduri. "Real-Time Identification of Incipient Surface Morphology Variations in Ultraprecision Machining Process." Journal of Manufacturing Science and Engineering 136, no. 2 (January 16, 2014). http://dx.doi.org/10.1115/1.4026210.
Der volle Inhalt der QuelleRuggill, Judd, and Ken McAllister. "The Wicked Problem of Collaboration." M/C Journal 9, no. 2 (May 1, 2006). http://dx.doi.org/10.5204/mcj.2606.
Der volle Inhalt der Quelle