Academic literature on the topic 'Computer networks Computer networks Internet'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Computer networks Internet.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks Computer networks Internet"

1

Sanders, Mark. "Technology Tips: Teaching Statistics with Computer Networks." Mathematics Teacher 89, no. 1 (1996): 70–72. http://dx.doi.org/10.5951/mt.89.1.0070.

Full text
Abstract:
Because computers are so often used for statistical analysis in real-world situations, they should be highly integrated into statistics classrooms. Computers can be used not only to analyze data but, with the availability of computer networks, to collect data as well. Networks can also assist students in communicating with people who are far away, thus helping to interest students in the statistics. This article chronicles an example of using the Internet, the world's largest network, to teach high school statistics.
APA, Harvard, Vancouver, ISO, and other styles
2

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this c
APA, Harvard, Vancouver, ISO, and other styles
3

Rogers, Juan D., and Ivan Tchalakov. "Computer Networks as the Embodiment of Social Networks." International Journal of Actor-Network Theory and Technological Innovation 6, no. 3 (2014): 1–25. http://dx.doi.org/10.4018/ijantti.2014070101.

Full text
Abstract:
The Internet, both as a technological system and a set of social phenomena, has global reach. Its development is comparatively recent but the Internet has already become established as an ordinary feature of the everyday activities of people around the world. However, the very familiarity of this information infrastructure tends to obscure important dynamics of the process by which the current state of affairs was reached. This paper is the result of the confluence of two research efforts into the nature of this process in the United States and Bulgaria that began independently. The commonalit
APA, Harvard, Vancouver, ISO, and other styles
4

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirement
APA, Harvard, Vancouver, ISO, and other styles
5

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Full text
Abstract:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Tutanescu, I., E. Sofron, and M. Ali. "Security of internet-connected computer networks." International Journal of Internet Technology and Secured Transactions 2, no. 1/2 (2010): 109. http://dx.doi.org/10.1504/ijitst.2010.031474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Afrizal, Afrizal, and Fitriani Fitriani. "Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (2019): 13. http://dx.doi.org/10.35870/jtik.v3i1.78.

Full text
Abstract:
The computer networks is growing rapidly along with the increasing of computer's users. The large number of computers or hosts connected in a network will make it difficult to manage, so it needs a unique identity on each host connected to a computer network. The IP address technology is a solution to overcome the complexity of local and global computer networks. The IPv4 is the IP addressing technology for every host connected in a network, but the growth of computer users hence the availability of IPv4 address becomes very limited, so the IPv6 technology is developed. To avoid IP address con
APA, Harvard, Vancouver, ISO, and other styles
8

Flerov, E. V., I. N. Sablin, O. G. Broitman, V. A. Tolmachev, and Sh S. Batchaev. "Computer-Assisted Monitoring Systems. Use of Computer Networks and Internet Technologies." Biomedical Engineering 39, no. 4 (2005): 161–66. http://dx.doi.org/10.1007/s10527-005-0072-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johnstone, Bob. "Internet Expo provides boost to Asia's computer networks." Nature 377, no. 6544 (1995): 8. http://dx.doi.org/10.1038/377008b0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Atmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.

Full text
Abstract:
Telecommunication technology is developing along with information technology and several innovations in several audio and data transmission and reception techniques. Innovation and communication technology are hoped to be able to create efficiencies in regards to time, equipment, and cost. The Public Switched Telephone Network (PSTN) telephone technology has experienced integration towards communication using Internet Protocol (IP) networks, better known as Voice over Internet Protocol (VoIP). VoIP Technology transmits conversations digitally through IP-based networks, such as internet network
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks Computer networks Internet"

1

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
2

Wells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Full text
Abstract:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access P
APA, Harvard, Vancouver, ISO, and other styles
3

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xue, Lei. "Internet connection method for mobile ad hoc wireless networks." Thesis, University of Warwick, 2005. http://wrap.warwick.ac.uk/3644/.

Full text
Abstract:
In recent years, wireless networks with Internet services have become more and more popular. Technologies which integrate Internet and wireless networks have extended traditional Internet applications into a more flexible and dynamic environment. This research work investigates the technology that supports the connection between a Mobile Ad Hoc Wireless Network (MANET) and the Internet, which enables the current wireless Internet technologies to provide a ubiquitous wireless life style. With detailed analysis of the existing wireless Internet technologies and MANETs regarding their features an
APA, Harvard, Vancouver, ISO, and other styles
5

Kay, James T. "Development of future course content requirements supporting the Department of Defense's Internet Protocol verison 6 transition and implementation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FKay.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2006.<br>Thesis Advisor(s): Geoffrey Xie, John Gibson. "June 2006." Includes bibliographical references (p. 47-48). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Gummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

謝啓良 and Kai-leung Tse. "Actual business networks behind the virtual networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31269357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tse, Kai-leung. "Actual business networks behind the virtual networks /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19878382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Full text
Abstract:
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater
APA, Harvard, Vancouver, ISO, and other styles
10

Ellis, Martin. "Understanding the performance of Internet video over residential networks." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3674/.

Full text
Abstract:
Video streaming applications are now commonplace among home Internet users, who typically access the Internet using DSL or Cable technologies. However, the effect of these technologies on video performance, in terms of degradations in video quality, is not well understood. To enable continued deployment of applications with improved quality of experience for home users, it is essential to understand the nature of network impairments and develop means to overcome them. In this dissertation, I demonstrate the type of network conditions experienced by Internet video traffic, by presenting a new d
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks Computer networks Internet"

1

Howser, Gerry. Computer Networks and the Internet. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34496-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Comer, Douglas. Computer networks and internets with internet applications. 3rd ed. Prentice-Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Comer, Douglas. Computer networks and internets: With Internet applications. 4th ed. Pearson/Prentice Hall, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Comer, Douglas. Computer networks and internets. 2nd ed. Prentice Hall, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Comer, Douglas. Computer networks and internets. Prentice Hall, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Comer, Douglas. Computer networks and internets. Prentice Hall, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Comer, Douglas. Computer networks and internets. 5th ed. Pearson/Prentice Hall, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Berger, Carolynn M. Computer networks, policies, and applications. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

William, Stallings. Computer networking with Internet protocols and technology. Pearson/Prentice Hall, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Danny, McPherson, and Cisco Systems Inc, eds. Internet routing architectures. 2nd ed. Cisco, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks Computer networks Internet"

1

Bilski, Tomasz. "QoS Predictability of Internet Services." In Computer Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gruca, Aleksandra, Marek Sikora, Łukasz Chróst, and Andrzej Polański. "RULEGO Bioinformatical Internet Service – System Architecture." In Computer Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bilski, Tomasz. "Disaster’s Impact on Internet Performance – Case Study." In Computer Networks. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borzemski, Leszek, and Marcin Wojtkiewicz. "Evaluation of Chaotic Internet Traffic Predictor Using MAPE Accuracy Measure." In Computer Networks. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nycz, Monika, Tomasz Nycz, and Tadeusz Czachórski. "An Analysis of the Extracted Parts of Opte Internet Topology." In Computer Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Foremski, Paweł, and Krzysztof Grochla. "LTE or WiFi? Client-Side Internet Link Selection for Smartphones." In Computer Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sochor, Tomas, and Matej Zuzcak. "Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection." In Computer Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sochor, Tomas, and Matej Zuzcak. "Study of Internet Threats and Attack Methods Using Honeypots and Honeynets." In Computer Networks. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ojo, Mike, Stefano Giordano, Davide Adami, and Michele Pagano. "A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks." In Computer Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xie, Geoffrey G. "Internet Architecture." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks Computer networks Internet"

1

Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Georgioski, Igor, and Hristina Trenchevska. "Wireless sensor networks simulators – computer simulation tools." In International conference on Applied Internet and Information Technologies. University "St. Kliment Ohridski" Bitola, Macedonia, 2016. http://dx.doi.org/10.20544/aiit2016.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ibrohimovna, Malohat, and Sonia Heemstra de Groot. "Reputation-Based Systems within Computer Networks." In Fifth International Conference on Internet and Web Applications and Services (ICIW 2010). IEEE, 2010. http://dx.doi.org/10.1109/iciw.2010.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Löf, Andreas, and Richard Nelson. "Comparing Anomaly Detection Methods in Computer Networks." In 2010 Fifth International Conference on Internet Monitoring and Protection. IEEE, 2010. http://dx.doi.org/10.1109/icimp.2010.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bulira, Damian, and Krzysztof Walkowiak. "Voice and video streaming in wireless computer networks - evaluation of network delays." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baig, Zubair A., Abdulrhman S. Shaheen, and Radwan AbdelAal. "An AODE-based intrusion detection system for computer networks." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gong, Shuiqing, Jing Chen, Xiaochuan Yin, and Qingchao Zhu. "Energy-efficient virtual network embedding for heterogeneous networks." In 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI). IEEE, 2016. http://dx.doi.org/10.1109/cci.2016.7778883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Internet Services." In Proceedings of 15th International Conference on Computer Communications and Networks. IEEE, 2006. http://dx.doi.org/10.1109/icccn.2006.286247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Session 3: Internet Routing." In Proceedings. 13th International Conference on Computer Communications and Networks. IEEE, 2004. http://dx.doi.org/10.1109/icccn.2004.1401583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmad, Mohammad Zubair, and Ratan Guha. "Impact of Internet exchange points on Internet topology evolution." In 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/lcn.2010.5735736.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer networks Computer networks Internet"

1

Barkley, John. Personal computer networks. National Bureau of Standards, 1986. http://dx.doi.org/10.6028/nbs.sp.500-140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vasilenko, L. A., and A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
4

Pabrai, Uday, Cary Dowat, and Janet Carlson. Understanding and using computer networks. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/1128743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Corley, Michael J. Anomaly Detection in Disparate Computer Networks. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada443328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Raychev, Nikolay. Neuromorphic computer networks with synaptic connections. Web of Open Science, 2020. http://dx.doi.org/10.37686/nrl.v1i1.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tolmie, D. E., W. St. John, and D. H. DuBois. Super-speed computer interfaces and networks. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/534509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cradduck, Trevor D., Martin S. Weinhous, and Neal Tobochnik. E-Mail and Academic Computer Networks. AAPM, 1990. http://dx.doi.org/10.37206/29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Berry, Nina M., and Teresa H. Ko. On computer vision in wireless sensor networks. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/919195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Van Randwyk, Jamie A. Position paper on active countermeasures for computer networks. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/918333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!