Journal articles on the topic 'Computer systems and networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer systems and networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Full textPatel, Dhyan. "A Research Paper on Basic of Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 965–69. http://dx.doi.org/10.22214/ijraset.2024.58481.
Full textWaitzman, C. "Computer Networks: A Systems Approach." Computer Communications 24, no. 11 (2001): 1116–17. http://dx.doi.org/10.1016/s0140-3664(00)00345-5.
Full textWittie, L. D. "Computer networks and distributed systems." Computer 24, no. 9 (1991): 67–76. http://dx.doi.org/10.1109/2.84901.
Full textSherif, Yosef S., and Brian J. Matt. "Computer networks and distributed systems." Microelectronics Reliability 28, no. 3 (1988): 419–67. http://dx.doi.org/10.1016/0026-2714(88)90398-8.
Full textParker, Bret H. "Computer networks: A systems approach." Journal of the American Society for Information Science 48, no. 9 (1997): 861–62. http://dx.doi.org/10.1002/(sici)1097-4571(199709)48:9<861::aid-asi11>3.0.co;2-u.
Full textBoyanov, Petar. "PERFORMANCE AND CONNECTION ANALYSIS OF THE COMPUTER SYSTEMS AND NETWORKS." Journal Scientific and Applied Research 6, no. 1 (2014): 141–47. http://dx.doi.org/10.46687/jsar.v6i1.151.
Full textChu, Dominique, Mikhail Prokopenko, and J. Christian J. Ray. "Computation by natural systems." Interface Focus 8, no. 6 (2018): 20180058. http://dx.doi.org/10.1098/rsfs.2018.0058.
Full textAnno, Junpei, Leonard Barolli, Arjan Durresi, Fatos Xhafa, and Akio Koyama. "Performance Evaluation of Two Fuzzy-Based Cluster Head Selection Systems for Wireless Sensor Networks." Mobile Information Systems 4, no. 4 (2008): 297–312. http://dx.doi.org/10.1155/2008/876212.
Full textTrobec, Roman, Radivoje Vasiljević, Milo Tomašević, Veljko Milutinović, Ramon Beivide, and Mateo Valero. "Interconnection Networks in Petascale Computer Systems." ACM Computing Surveys 49, no. 3 (2016): 1–24. http://dx.doi.org/10.1145/2983387.
Full textSpragins, J. "Computer Networks: A systems approach [Books]." IEEE Network 10, no. 4 (1996): 4. http://dx.doi.org/10.1109/mnet.1996.527013.
Full textVon Solms, Basic. "Managing secure computer systems and networks." International Journal of Bio-Medical Computing 43, no. 1-2 (1996): 47–52. http://dx.doi.org/10.1016/s0020-7101(96)01226-3.
Full textObaidat, Mohammad S. "Modeling and Simulation of Computer Systems and Networks: Part II: Computer Systems." SIMULATION 68, no. 4 (1997): 205–7. http://dx.doi.org/10.1177/003754979706800401.
Full textBurgin, Mark. "Triadic Automata and Machines as Information Transformers." Information 11, no. 2 (2020): 102. http://dx.doi.org/10.3390/info11020102.
Full textAfrica, Aaron Don M. "Application of Computer Systems in VPN Networks." International Journal of Emerging Trends in Engineering Research 8, no. 4 (2020): 1199–207. http://dx.doi.org/10.30534/ijeter/2020/41842020.
Full textPrabhu, Mukesh M., and S. V. Raghavan. "Security in computer networks and distributed systems." Computer Communications 19, no. 5 (1996): 379–88. http://dx.doi.org/10.1016/0140-3664(95)01031-9.
Full textLiashchynskyi, Pavlo B., and O. M. Berezsky. "COMPUTER DIAGNOSTIC SYSTEMS: METHODS AND TOOLS." Ukrainian Journal of Information Technology 6, no. 2 (2024): 57–63. https://doi.org/10.23939/ujit2024.02.057.
Full textJaber, Tanya Abdulsattar. "Artificial intelligence in computer networks." Periodicals of Engineering and Natural Sciences (PEN) 10, no. 1 (2022): 309–22. https://doi.org/10.21533/pen.v10.i1.539.
Full textHopkins, Michael, Garibaldi Pineda-García, Petruţ A. Bogdan, and Steve B. Furber. "Spiking neural networks for computer vision." Interface Focus 8, no. 4 (2018): 20180007. http://dx.doi.org/10.1098/rsfs.2018.0007.
Full textMikhav, Volodymyr, Yelyzaveta Meleshko, and Mykola Yakymenko. "Development of a Database Management System of Recommendation Systems for Computer Networks and Computer-integrated Systems." Central Ukrainian Scientific Bulletin. Technical Sciences 2, no. 5(36) (2022): 130–36. http://dx.doi.org/10.32515/2664-262x.2022.5(36).2.130-136.
Full textWalden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Full textFarr, Tom. "Trusted networks." ITNOW 30, no. 2 (1988): 25–29. https://doi.org/10.1093/combul/30.2.25.
Full textMultaheb, Samim Ahmad, Bernd Zimmering, and Oliver Niggemann. "Expressing uncertainty in neural networks for production systems." at - Automatisierungstechnik 69, no. 3 (2021): 221–30. http://dx.doi.org/10.1515/auto-2020-0122.
Full textPashynskykh, Vladyslav, Yelyzaveta Meleshko, Mykola Yakymenko, Dmytro Bashchenko, and Roman Tkachuk. "RESEARCH OF THE POSSIBILITIES OF THE C# PROGRAMMING LANGUAGE FOR CREATING CYBERSECURITY ANALYSIS SOFTWARE IN COMPUTER NETWORKS AND COMPUTER-INTEGRATED SYSTEMS." Advanced Information Systems 6, no. 2 (2022): 48–56. http://dx.doi.org/10.20998/2522-9052.2022.2.09.
Full textBaranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.
Full textMijwel, Maad M., Adam Esen, and Aysar Shamil. "Overview of Neural Networks." Babylonian Journal of Machine Learning 2023 (August 11, 2023): 42–45. http://dx.doi.org/10.58496/bjml/2023/008.
Full textFlerov, E. V., I. N. Sablin, O. G. Broitman, V. A. Tolmachev, and Sh S. Batchaev. "Computer-Assisted Monitoring Systems. Use of Computer Networks and Internet Technologies." Biomedical Engineering 39, no. 4 (2005): 161–66. http://dx.doi.org/10.1007/s10527-005-0072-5.
Full textFilho, Edmundo Alves, Francisco Welington Lima, Tayroni Francisco Alencar Alves, Gladstone de Alencar Alves, and Joao Antonio Plascak. "Opinion Dynamics Systems via Biswas–Chatterjee–Sen Model on Solomon Networks." Physics 5, no. 3 (2023): 873–82. http://dx.doi.org/10.3390/physics5030056.
Full textAbdullayeva, O., and M. Engalichev. "Artificial intelligence systems." Значение цифровых технологий в изучении истории Узбекистана 1, no. 01 (2022): 382–85. http://dx.doi.org/10.47689/.v1i01.13612.
Full textZolkin, A. L., A. N. Losev, D. V. Gridina, and T. G. Aygumov. "Research of problems of computer networks expert systems." IOP Conference Series: Materials Science and Engineering 1047, no. 1 (2021): 012106. http://dx.doi.org/10.1088/1757-899x/1047/1/012106.
Full textGerfelder, Norbert. "Video Application in Multimedia Systems and Computer Networks." SMPTE Journal 105, no. 11 (1996): 689–97. http://dx.doi.org/10.5594/j06441.
Full textCamarero, Cristobal, Carmen Martinez, Enrique Vallejo, and Ramon Beivide. "Projective Networks: Topologies for Large Parallel Computer Systems." IEEE Transactions on Parallel and Distributed Systems 28, no. 7 (2017): 2003–16. http://dx.doi.org/10.1109/tpds.2016.2635640.
Full textDouligeris, C. "Computer networks design using hybrid fuzzy expert systems." Soft Computing 5, no. 4 (2001): 272–86. http://dx.doi.org/10.1007/s005000100101.
Full textAnisimov, V. G., E. G. Anisimov, T. N. Saurenko, and V. P. Los’. "Performance Evaluation of Antivirus Systems for Computer Networks." Automatic Control and Computer Sciences 56, no. 8 (2022): 883–87. http://dx.doi.org/10.3103/s0146411622080016.
Full textLi, Xiao Guang. "Research on the Development and Applications of Artificial Neural Networks." Applied Mechanics and Materials 556-562 (May 2014): 6011–14. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6011.
Full textGumelar, Gugum, and Weni Gurita Aedi. "Security Challenges in Computer Networks and Modern Operating Systems." Dinasti International Journal of Education Management And Social Science 6, no. 5 (2025): 3541–47. https://doi.org/10.38035/dijemss.v6i5.4516.
Full textFarsad, Behshld. "Networking Your Computer Lab: Benefits And Pitfalls." Hospitality Education and Research Journal 12, no. 2 (1988): 482. http://dx.doi.org/10.1177/109634808801200259.
Full textG, Aruna Kranthi. "Prevention of production network system from Attackers using Honeypot based Systems." International Journal of Research and Applications 6, no. 22 (2019): 1201–4. https://doi.org/10.5281/zenodo.13347466.
Full textFan, Chengmei, M. Mobeen Munir, Zafar Hussain, Muhammad Athar, and Jia-Bao Liu. "Polynomials and General Degree-Based Topological Indices of Generalized Sierpinski Networks." Complexity 2021 (February 9, 2021): 1–10. http://dx.doi.org/10.1155/2021/6657298.
Full textDr., Khaldoun Bsoul. "COMPUTER NETWORKS AS AN ELEMENT OF LOGISTICS INFORMATION SYSTEMS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 8, no. 3 (2019): 161–64. https://doi.org/10.5281/zenodo.2607938.
Full textBottoni, Paolo, Anna Labella, and Grzegorz Rozenberg. "Networks of Reaction Systems." International Journal of Foundations of Computer Science 31, no. 01 (2020): 53–71. http://dx.doi.org/10.1142/s0129054120400043.
Full textJarah, Baker Akram Falah, Mufleh Amin AL Jarrah, Salam Nawaf Almomani, Emran AlJarrah, and Maen Al-Rashdan. "The effect of reliable data transfer and efficient computer network features in Jordanian banks accounting information systems performance based on hardware and software, database and number of hosts." International Journal of Data and Network Science 7, no. 1 (2023): 357–62. http://dx.doi.org/10.5267/j.ijdns.2022.9.012.
Full textIsabelle Pope. "Social Network Dynamic Modeling via Mathematical Applicative Formulae." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 05–08. http://dx.doi.org/10.17762/msea.v70i1.7.
Full textChance, Jim. "Simulating computer systems." Microprocessors and Microsystems 12, no. 4 (1988): 238. http://dx.doi.org/10.1016/0141-9331(88)90176-7.
Full textJesshope, Chris. "Distributed computer systems." Microprocessors and Microsystems 14, no. 7 (1990): 483–84. http://dx.doi.org/10.1016/0141-9331(90)90029-u.
Full textDymova, H. "Study of Cryptographic Security of Computer Networks." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 57 (February 13, 2025): 15–19. https://doi.org/10.36910/6775-2524-0560-2024-57-02.
Full textIglesias Perez, Sergio, and Regino Criado. "Increasing the Effectiveness of Network Intrusion Detection Systems (NIDSs) by Using Multiplex Networks and Visibility Graphs." Mathematics 11, no. 1 (2022): 107. http://dx.doi.org/10.3390/math11010107.
Full textALTMAN, EITAN, HISAO KAMEDA, and YOSHIHISA HOSOKAWA. "NASH EQUILIBRIA IN LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS." International Game Theory Review 04, no. 02 (2002): 91–100. http://dx.doi.org/10.1142/s0219198902000574.
Full textМ.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.
Full textTeplytskyi, B. "Current Issues an Examination Computer Hardware and Software Products during the Investigation of Crimes in the Use of Computers (Computer) Systems, Computer Networks and Telecommunication Networks." Naukovij vìsnik Nacìonalʹnoï akademìï vnutrìšnìh sprav 120, no. 3 (2021): 28–34. http://dx.doi.org/10.33270/01211203.28.
Full text