Academic literature on the topic 'Computer networks Computer networks Internet'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Computer networks Internet.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks Computer networks Internet"
Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textRogers, Juan D., and Ivan Tchalakov. "Computer Networks as the Embodiment of Social Networks." International Journal of Actor-Network Theory and Technological Innovation 6, no. 3 (2014): 1–25. http://dx.doi.org/10.4018/ijantti.2014070101.
Full textKeller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.
Full textCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Full textTutanescu, I., E. Sofron, and M. Ali. "Security of internet-connected computer networks." International Journal of Internet Technology and Secured Transactions 2, no. 1/2 (2010): 109. http://dx.doi.org/10.1504/ijitst.2010.031474.
Full textAfrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.
Full textFlerov, E. V., I. N. Sablin, O. G. Broitman, V. A. Tolmachev, and Sh S. Batchaev. "Computer-Assisted Monitoring Systems. Use of Computer Networks and Internet Technologies." Biomedical Engineering 39, no. 4 (2005): 161–66. http://dx.doi.org/10.1007/s10527-005-0072-5.
Full textJohnstone, Bob. "Internet Expo provides boost to Asia's computer networks." Nature 377, no. 6544 (1995): 8. http://dx.doi.org/10.1038/377008b0.
Full textAtmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.
Full textDissertations / Theses on the topic "Computer networks Computer networks Internet"
Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Full textWells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.
Full textPost, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Full textXue, Lei. "Internet connection method for mobile ad hoc wireless networks." Thesis, University of Warwick, 2005. http://wrap.warwick.ac.uk/3644/.
Full textKay, James T. "Development of future course content requirements supporting the Department of Defense's Internet Protocol verison 6 transition and implementation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FKay.pdf.
Full textGummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.
Full text謝啓良 and Kai-leung Tse. "Actual business networks behind the virtual networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31269357.
Full textTse, Kai-leung. "Actual business networks behind the virtual networks /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19878382.
Full textRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Full textEllis, Martin. "Understanding the performance of Internet video over residential networks." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3674/.
Full textBooks on the topic "Computer networks Computer networks Internet"
Howser, Gerry. Computer Networks and the Internet. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34496-2.
Full textComer, Douglas. Computer networks and internets with internet applications. 3rd ed. Prentice-Hall, 2001.
Find full textComer, Douglas. Computer networks and internets: With Internet applications. 4th ed. Pearson/Prentice Hall, 2004.
Find full textComer, Douglas. Computer networks and internets. 5th ed. Pearson/Prentice Hall, 2009.
Find full textBerger, Carolynn M. Computer networks, policies, and applications. Nova Science Publishers, 2011.
Find full textWilliam, Stallings. Computer networking with Internet protocols and technology. Pearson/Prentice Hall, 2004.
Find full textDanny, McPherson, and Cisco Systems Inc, eds. Internet routing architectures. 2nd ed. Cisco, 2000.
Find full textBook chapters on the topic "Computer networks Computer networks Internet"
Bilski, Tomasz. "QoS Predictability of Internet Services." In Computer Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_16.
Full textGruca, Aleksandra, Marek Sikora, Łukasz Chróst, and Andrzej Polański. "RULEGO Bioinformatical Internet Service – System Architecture." In Computer Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3_19.
Full textBilski, Tomasz. "Disaster’s Impact on Internet Performance – Case Study." In Computer Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3_25.
Full textBorzemski, Leszek, and Marcin Wojtkiewicz. "Evaluation of Chaotic Internet Traffic Predictor Using MAPE Accuracy Measure." In Computer Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_19.
Full textNycz, Monika, Tomasz Nycz, and Tadeusz Czachórski. "An Analysis of the Extracted Parts of Opte Internet Topology." In Computer Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6_35.
Full textForemski, Paweł, and Krzysztof Grochla. "LTE or WiFi? Client-Side Internet Link Selection for Smartphones." In Computer Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6_5.
Full textSochor, Tomas, and Matej Zuzcak. "Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection." In Computer Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6_7.
Full textSochor, Tomas, and Matej Zuzcak. "Study of Internet Threats and Attack Methods Using Honeypots and Honeynets." In Computer Networks. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7_12.
Full textOjo, Mike, Stefano Giordano, Davide Adami, and Michele Pagano. "A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks." In Computer Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5_9.
Full textXie, Geoffrey G. "Internet Architecture." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch24.
Full textConference papers on the topic "Computer networks Computer networks Internet"
Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.
Full textGeorgioski, Igor, and Hristina Trenchevska. "Wireless sensor networks simulators – computer simulation tools." In International conference on Applied Internet and Information Technologies. University "St. Kliment Ohridski" Bitola, Macedonia, 2016. http://dx.doi.org/10.20544/aiit2016.24.
Full textIbrohimovna, Malohat, and Sonia Heemstra de Groot. "Reputation-Based Systems within Computer Networks." In Fifth International Conference on Internet and Web Applications and Services (ICIW 2010). IEEE, 2010. http://dx.doi.org/10.1109/iciw.2010.22.
Full textLöf, Andreas, and Richard Nelson. "Comparing Anomaly Detection Methods in Computer Networks." In 2010 Fifth International Conference on Internet Monitoring and Protection. IEEE, 2010. http://dx.doi.org/10.1109/icimp.2010.9.
Full textBulira, Damian, and Krzysztof Walkowiak. "Voice and video streaming in wireless computer networks - evaluation of network delays." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217996.
Full textBaig, Zubair A., Abdulrhman S. Shaheen, and Radwan AbdelAal. "An AODE-based intrusion detection system for computer networks." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749877.
Full textGong, Shuiqing, Jing Chen, Xiaochuan Yin, and Qingchao Zhu. "Energy-efficient virtual network embedding for heterogeneous networks." In 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI). IEEE, 2016. http://dx.doi.org/10.1109/cci.2016.7778883.
Full text"Internet Services." In Proceedings of 15th International Conference on Computer Communications and Networks. IEEE, 2006. http://dx.doi.org/10.1109/icccn.2006.286247.
Full text"Session 3: Internet Routing." In Proceedings. 13th International Conference on Computer Communications and Networks. IEEE, 2004. http://dx.doi.org/10.1109/icccn.2004.1401583.
Full textAhmad, Mohammad Zubair, and Ratan Guha. "Impact of Internet exchange points on Internet topology evolution." In 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/lcn.2010.5735736.
Full textReports on the topic "Computer networks Computer networks Internet"
Barkley, John. Personal computer networks. National Bureau of Standards, 1986. http://dx.doi.org/10.6028/nbs.sp.500-140.
Full textVasilenko, L. A., and A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.
Full textAllende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Full textPabrai, Uday, Cary Dowat, and Janet Carlson. Understanding and using computer networks. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/1128743.
Full textCorley, Michael J. Anomaly Detection in Disparate Computer Networks. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada443328.
Full textRaychev, Nikolay. Neuromorphic computer networks with synaptic connections. Web of Open Science, 2020. http://dx.doi.org/10.37686/nrl.v1i1.56.
Full textTolmie, D. E., W. St. John, and D. H. DuBois. Super-speed computer interfaces and networks. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/534509.
Full textCradduck, Trevor D., Martin S. Weinhous, and Neal Tobochnik. E-Mail and Academic Computer Networks. AAPM, 1990. http://dx.doi.org/10.37206/29.
Full textBerry, Nina M., and Teresa H. Ko. On computer vision in wireless sensor networks. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/919195.
Full textVan Randwyk, Jamie A. Position paper on active countermeasures for computer networks. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/918333.
Full text