Journal articles on the topic 'Computer network architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer network architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Yan, and Jun Hui Zheng. "A Well Modularized Computer Network Architecture." Applied Mechanics and Materials 631-632 (September 2014): 902–5. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.902.
Full textKaiser, Marcus. "Brain architecture: a design for natural computation." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365, no. 1861 (2007): 3033–45. http://dx.doi.org/10.1098/rsta.2007.0007.
Full textKeller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.
Full textHowlett, R. J., and S. D. Walters. "Multi-computer neural network architecture." Electronics Letters 35, no. 16 (1999): 1350. http://dx.doi.org/10.1049/el:19990962.
Full textDuan, Qiang. "Intelligent and Autonomous Management in Cloud-Native Future Networks—A Survey on Related Standards from an Architectural Perspective." Future Internet 13, no. 2 (2021): 42. http://dx.doi.org/10.3390/fi13020042.
Full textCoffield, David. "Network system architecture." Computer Communications 14, no. 1 (1991): 58. http://dx.doi.org/10.1016/0140-3664(91)90085-f.
Full textRaghavan, SV. "Systems network architecture." Computer Communications 18, no. 1 (1995): 56. http://dx.doi.org/10.1016/0140-3664(95)90075-6.
Full textShi, Jian, Shao Ping Wang, and Kang Wang. "The Integrated Performability Analysis Architecture of the Computer Networks." Advanced Materials Research 118-120 (June 2010): 907–11. http://dx.doi.org/10.4028/www.scientific.net/amr.118-120.907.
Full textZemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Routing Communication Inside Ad Hoc Drones Network." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 17 (2021): 192. http://dx.doi.org/10.3991/ijim.v15i17.19179.
Full textXu, Hong Yun. "Analysis and Research of Financial Network Security Architecture." Advanced Materials Research 108-111 (May 2010): 168–71. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.168.
Full textJiang, Weiyu, Bingyang Liu, Chuang Wang, and Xue Yang. "Security-Oriented Network Architecture." Security and Communication Networks 2021 (May 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/6694650.
Full textChen, Chang Wen, and Yu Wang. "Chain-Type Wireless Sensor Network for Monitoring Long Range Infrastructures: Architecture and Protocols." International Journal of Distributed Sensor Networks 4, no. 4 (2008): 287–314. http://dx.doi.org/10.1080/15501320701260261.
Full textZhang, Ke Jun, and Wu Xu. "Virtual Instrument Measurement System Architecture Design Based on Database Management." Applied Mechanics and Materials 198-199 (September 2012): 989–94. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.989.
Full textZkik, Karim, Said EL Hajji, and Ghizlane Orhanou. "A centralized secure plan for detecting and mitigation incidents in hybrid SDN." MATEC Web of Conferences 189 (2018): 10015. http://dx.doi.org/10.1051/matecconf/201818910015.
Full textGibson, Garth A., and Rodney Van Meter. "Network attached storage architecture." Communications of the ACM 43, no. 11 (2000): 37–45. http://dx.doi.org/10.1145/353360.353362.
Full textBudhiraja, N., M. Gopal, M. Gupta, E. A. Hervatic, S. J. Nadas, and P. A. Stirpe. "Multicast network connection architecture." IBM Systems Journal 34, no. 4 (1995): 590–603. http://dx.doi.org/10.1147/sj.344.0590.
Full textKryukov, Ya V., D. A. Pokamestov, E. V. Rogozhnikov, S. A. Novichkov, and D. V. Lakontsev. "Analysis of Computational Complexity and Processing Time Evaluation of the Protocol Stack in 5G New Radio." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 3 (2020): 31–37. http://dx.doi.org/10.21293/1818-0442-2020-23-3-31-37.
Full textSesha Saiteja, Maddula N. V., K. Sai Sumanth Reddy, D. Radha, and Minal Moharir. "Multi-Core Architecture and Network on Chip: Applications and Challenges." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 239–45. http://dx.doi.org/10.1166/jctn.2020.8657.
Full textPelc, Mariusz, and Dawid Galus. "Adaptation Architecture for Self-Healing Computer Systems." International Journal of Software Engineering and Knowledge Engineering 27, no. 05 (2017): 791–815. http://dx.doi.org/10.1142/s0218194017500292.
Full textOdhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (2012): 302–9. http://dx.doi.org/10.48084/etasr.145.
Full textZinkin, S. A., Mustafa Sadeq Jaafar, and N. S. Karamysheva. "CONCEPTUAL REPRESENTATIONS AND MODIFICATIONS OF PETRI NETS FOR APPLICATIONS IN THE AREA OF SYNTHESIS OF A FUNCTIONAL ARCHITECTURE OF DISTRIBUTED COMPUTATIONAL SYSTEMS WITH VARIABLE STRUCTURE." Proceedings of the Southwest State University 22, no. 6 (2019): 143–67. http://dx.doi.org/10.21869/2223-1560-2018-22-6-143-167.
Full textElenbogen, Bruce S. "Computer network management." ACM SIGCSE Bulletin 31, no. 1 (1999): 119–21. http://dx.doi.org/10.1145/384266.299713.
Full textRowshanrad, Shiva, Mohamad Reza Parsaei, and Manijeh Keshtgari. "IMPLEMENTING NDN USING SDN: A REVIEW ON METHODS AND APPLICATIONS." IIUM Engineering Journal 17, no. 2 (2016): 11–20. http://dx.doi.org/10.31436/iiumej.v17i2.590.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textCalvert, Ken. "Reflections on network architecture." ACM SIGCOMM Computer Communication Review 36, no. 2 (2006): 27–30. http://dx.doi.org/10.1145/1129582.1129590.
Full textSummers, Kenneth L., Thomas Preston Caudell, Kathryn Berkbigler, Brian Bush, Kei Davis, and Steve Smith. "Graph Visualization for the Analysis of the Structure and Dynamics of Extreme-Scale Supercomputers." Information Visualization 3, no. 3 (2004): 209–22. http://dx.doi.org/10.1057/palgrave.ivs.9500079.
Full textWaheed, Mohammed Abbas, Azzad Bader Saeed, and Thanaa Hussein Abd. "Signalling load reduction in 5G network based on cloud radio access network architecture." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5127. http://dx.doi.org/10.11591/ijece.v11i6.pp5127-5136.
Full textPaluzo-Hidalgo, Eduardo, Rocio Gonzalez-Diaz, Miguel A. Gutiérrez-Naranjo, and Jónathan Heras. "Optimizing the Simplicial-Map Neural Network Architecture." Journal of Imaging 7, no. 9 (2021): 173. http://dx.doi.org/10.3390/jimaging7090173.
Full textCepl, Miroslav, and Jiří Šťastný. "Progressive optimization methods for applied in computer network." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 57, no. 6 (2009): 45–50. http://dx.doi.org/10.11118/actaun200957060045.
Full textSherazi, Hafiz Husnain Raza, Zuhaib Ashfaq Khan, Razi Iqbal, Shahzad Rizwan, Muhammad Ali Imran, and Khalid Awan. "A Heterogeneous IoV Architecture for Data Forwarding in Vehicle to Infrastructure Communication." Mobile Information Systems 2019 (February 3, 2019): 1–12. http://dx.doi.org/10.1155/2019/3101276.
Full textChi, Kaikai, Xiaohong Jiang, Baoliu Ye, and Yanjun Li. "Flow-oriented network coding architecture for multihop wireless networks." Computer Networks 55, no. 10 (2011): 2425–42. http://dx.doi.org/10.1016/j.comnet.2011.04.006.
Full textLadner, Roy, Elizabeth Warner, Udaykiran Katikaneni, Frank McCreedy, and Frederick E. Petry. "Active network architecture and management." International Journal of Intelligent Systems 22, no. 10 (2007): 1123–38. http://dx.doi.org/10.1002/int.20242.
Full textNAKANO, KOJI. "A BIBLIOGRAPHY OF PUBLISHED PAPERS ON DYNAMICALLY RECONFIGURABLE ARCHITECTURES." Parallel Processing Letters 05, no. 01 (1995): 111–24. http://dx.doi.org/10.1142/s0129626495000102.
Full textXu, Yue. "Research on Computer Network Security Architecture of Universities in China." Advanced Materials Research 765-767 (September 2013): 1486–89. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1486.
Full textAhmad, Muhib, Farrukh Zeeshan Khan, Zeshan Iqbal, et al. "Designing of a Simulation Tool for the Performance Analysis of Hybrid Data Center Networks (DCNs)." Complexity 2021 (April 9, 2021): 1–13. http://dx.doi.org/10.1155/2021/5520324.
Full textBuonacorsi, Brandon, Zhenyu Cai, Eduardo B. Ramirez, et al. "Network architecture for a topological quantum computer in silicon." Quantum Science and Technology 4, no. 2 (2019): 025003. http://dx.doi.org/10.1088/2058-9565/aaf3c4.
Full textCoffield, David. "Systems network architecture: A tutorial." Computer Communications 11, no. 3 (1988): 153. http://dx.doi.org/10.1016/0140-3664(88)90064-3.
Full textFreeman, Donald T. "Computer Applications in Otolaryngology: Computer Recognition of Brain Stem Auditory Evoked Potential Wave V by a Neural Network." Annals of Otology, Rhinology & Laryngology 101, no. 9 (1992): 782–90. http://dx.doi.org/10.1177/000348949210100913.
Full textQian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.
Full textChan, Vincent W. S. "Multi-Layer Network Security Architecture." IEEE Communications Magazine 58, no. 12 (2020): 4. http://dx.doi.org/10.1109/mcom.2020.9311934.
Full textShirey, Robert W. "Defense data network security architecture." ACM SIGCOMM Computer Communication Review 20, no. 2 (1990): 66–72. http://dx.doi.org/10.1145/378570.378710.
Full textTennenhouse, David L., and David J. Wetherall. "Towards an active network architecture." ACM SIGCOMM Computer Communication Review 37, no. 5 (2007): 81–94. http://dx.doi.org/10.1145/1290168.1290180.
Full textTennenhouse, David L., and David J. Wetherall. "Towards an active network architecture." ACM SIGCOMM Computer Communication Review 26, no. 2 (1996): 5–17. http://dx.doi.org/10.1145/231699.231701.
Full textYang, Xiaowei, David Wetherall, and Thomas Anderson. "A DoS-limiting network architecture." ACM SIGCOMM Computer Communication Review 35, no. 4 (2005): 241–52. http://dx.doi.org/10.1145/1090191.1080120.
Full textBauer, Steven, and Xiaowei Yang. "Future directions in network architecture." ACM SIGCOMM Computer Communication Review 33, no. 5 (2003): 89–98. http://dx.doi.org/10.1145/963985.963996.
Full textGuesmi, Tawfik, Anwar Kalghoum, Badr M. Alshammari, Haitham Alsaif, and Ahmed Alzamil. "Leveraging Software-Defined Networking Approach for Future Information-Centric Networking Enhancement." Symmetry 13, no. 3 (2021): 441. http://dx.doi.org/10.3390/sym13030441.
Full textGRAF, THORSTEN, and ALOIS KNOLL. "A MULTI-AGENT SYSTEM ARCHITECTURE FOR DISTRIBUTED COMPUTER VISION." International Journal on Artificial Intelligence Tools 09, no. 02 (2000): 305–19. http://dx.doi.org/10.1142/s0218213000000203.
Full textMichiels, Eddie. "The Dutch interbank computer network." Computer Standards & Interfaces 7, no. 1-2 (1988): 127–37. http://dx.doi.org/10.1016/0920-5489(88)90057-8.
Full textFariz, Ahmad, Syamsul El Yumin, Masbah RT Siregar, and Taswanda Taryo. "Arsitektur Jaringan Komputer Berbasis Framework Togaf-Adm Menggunakan Proses NDLC." JTIM : Jurnal Teknologi Informasi dan Multimedia 1, no. 2 (2019): 133–42. http://dx.doi.org/10.35746/jtim.v1i2.28.
Full textBush, Stephen F. "Toward in vivo nanoscale communication networks: utilizing an active network architecture." Frontiers of Computer Science in China 5, no. 3 (2011): 316–26. http://dx.doi.org/10.1007/s11704-011-0116-9.
Full text