Academic literature on the topic 'SNA (Computer network architecture)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SNA (Computer network architecture).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SNA (Computer network architecture)"

1

Allen, M. O., and S. L. Benedict. "SNA Management Services architecture for APPN networks." IBM Systems Journal 31, no. 2 (1992): 336–52. http://dx.doi.org/10.1147/sj.312.0336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ziemke, Tom. "Radar Image Segmentation Using Self-Adapting Recurrent Networks." International Journal of Neural Systems 08, no. 01 (February 1997): 47–54. http://dx.doi.org/10.1142/s0129065797000070.

Full text
Abstract:
This paper presents a novel approach to the segmentation and integration of (radar) images using a second-order recurrent artificial neural network architecture consisting of two sub-networks: a function network that classifies radar measurements into four different categories of objects in sea environments (water, oil spills, land and boats), and a context network that dynamically computes the function network's input weights. It is shown that in experiments (using simulated radar images) this mechanism outperforms conventional artificial neural networks since it allows the network to learn to solve the task through a dynamic adaptation of its classification function based on its internal state closely reflecting the current context.
APA, Harvard, Vancouver, ISO, and other styles
3

Hsu, Ming-Fu, Te-Min Chang, and Sin-Jin Lin. "NEWS-BASED SOFT INFORMATION AS A CORPORATE COMPETITIVE ADVANTAGE." Technological and Economic Development of Economy 26, no. 1 (November 21, 2019): 48–70. http://dx.doi.org/10.3846/tede.2019.11328.

Full text
Abstract:
This study establishes a decision-making conceptual architecture that evaluates decision making units (DMUs) from numerous aspects. The architecture combines financial indicators together with a variety of data envelopment analysis (DEA) specifications to encapsulate more information to give a complete picture of a corporate’s operation. To make outcomes more accessible to non-specialists, multidimensional scaling (MDS) was performed to visualize the data. Most previous studies on forecasting model construction have relied heavily on hard information, with quite a few works taking into consideration soft information, which contains much denser and more diverse messages than hard information. To overcome this challenge, we consider two different types of soft information: supply chain influential indicator (SCI) and sentimental indicator (STI). SCI is computed by joint utilization of text mining (TM) and social network analysis (SNA), with TM identifying the corporate’s SC relationships from news articles and SNA to determining their impact on the network. STI is extracted from an accounting narrative so as to comprehensively illustrate the relationships between pervious and future performances. The analyzed outcomes are then fed into an artificial intelligence (AI)-based technique to construct the forecasting model. The introduced model, examined by real cases, is a promising alternative for performance forecasting.
APA, Harvard, Vancouver, ISO, and other styles
4

Speranza, Nicholas A., Christopher J. Rave, and Yong Pei. "Energy-Efficient On-Platform Target Classification for Electric Air Transportation Systems." Electricity 2, no. 2 (April 6, 2021): 110–23. http://dx.doi.org/10.3390/electricity2020007.

Full text
Abstract:
Due to the predicted rise of Unmanned Aircraft Systems (UAS) in commercial, civil, and military operations, there is a desire to make UASs more energy efficient so they can proliferate with ease of deployment and maximal life per charge. To address current limitations, a three-tiered approach is investigated to mitigate Unmanned Aerial Vehicle (UAV) hover time, reduce network datalink transmission to a ground station, and provide a real-time framework for Sense-and-Avoidance (SAA) target classification. An energy-efficient UAS architecture framework is presented, and a corresponding SAA prototype is developed using commercial hardware to validate the proposed architecture using an experimental methodology. The proposed architecture utilizes classical computer vision methods within the Detection Subsystem coupled with deeply learned Convolutional Neural Networks (CNN) within the Classification Subsystem. Real-time operations of three frames per second are realized enabling UAV hover time and associated energy consumption during SAA processing to be effectively eliminated. Additional energy improvements are not addressed in the scope of this work. Inference accuracy is improved by 19% over baseline COTS models and current non-adaptive, single-stage SAA architectures. Overall, by pushing SAA processing to the edge of the sensors, network offload transmissions and reductions in processing time and energy consumption are feasible and realistic in future battery-powered electric air transportation systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Køien, Geir M. "On Threats to the 5G Service Based Architecture." Wireless Personal Communications 119, no. 1 (February 19, 2021): 97–116. http://dx.doi.org/10.1007/s11277-021-08200-0.

Full text
Abstract:
AbstractThe 3GPP-based 5G System marks a clear departure form the previous generations. There is a new radio system and a complete overhaul of the core network design. The core network is redesigned both on the control plane parts and the transport plane. The control plane signalling within the core network is now largely based on the service based architecture (SBA) design, featuring Web-based technologies and the associated security solutions. In this paper we conduct a preliminary generic survey of threats to the SBA.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaliva, Eleni, Dimitrios Katsioulas, Efthimios Tambouris, and Konstantinos Tarabanis. "Understanding Researchers Collaboration in eParticipation using Social Network Analysis." International Journal of Electronic Government Research 11, no. 4 (October 2015): 38–68. http://dx.doi.org/10.4018/ijegr.2015100103.

Full text
Abstract:
Over the past years electronic participation (eParticipation) became a political priority worldwide. Consequently, research on the field has dramatically grown. However, eParticipation is still an unconsolidated research area that lacks generally agreed upon definitions, research disciplines, methods and boundaries. The aim of this paper is to contribute to the establishment of the eParticipation identity by investigating the scientific collaborations in the domain. The study of the nature of academic collaboration reveals the structure and the intellectual roots of the research community and the most influential authors. The approach followed in this paper includes the construction of the co-authorship network and the calculation of the social network analysis (SNA) metrics that describe the nature of the collaboration. The results revealed that eParticipation is a rather active academic field in the last decade including a high degree of collaboration and a core network of very influential researchers.
APA, Harvard, Vancouver, ISO, and other styles
7

Allen, Michael O., Sandra L. Benedict, and Marcia L. Peters. "Meeting the challenge of a peer-to-peer network: An SNA management services infrastructure for APPN." Journal of Network and Systems Management 1, no. 2 (June 1993): 189–212. http://dx.doi.org/10.1007/bf01035887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sood, Sandeep K. "SNA based QoS and reliability in fog and cloud framework." World Wide Web 21, no. 6 (January 27, 2018): 1601–16. http://dx.doi.org/10.1007/s11280-018-0525-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Ashish. "Optimized Parallel Counting Sort Algorithm for Distinct Numeric Values on Biswapped Hyper Hexa-Cell Optoelectronic Network." International Journal of Computer Network and Information Security 14, no. 1 (February 8, 2021): 69–80. http://dx.doi.org/10.5815/ijcnis.2022.01.06.

Full text
Abstract:
The optoelectronic Biswapped-Hyper Hexa-Cell is a recently reported recursive and a symmetrical architecture of Biswapped Family. This symmetrical network has claimed and proved to be advantageous in terms of network diameter, bisection width, minimum node-degree and network cost compared to its counterpart architecture of OTIS family named ‘OTIS Hyper Hexa-Cell’ and traditional grid-based architecture of Biswapped family named ‘Biswapped-Mesh’. In this paper, we present a novel and efficient parallel algorithm for counting sort for sorting distinct numeric values on dh-dimensional Biswapped-Hyper Hexa-Cell optoelectronic network. The parallel algorithm demands 10d_h+12+ log_2⁡〖S_A 〗 electronic and 10 optical moves, where SA is the size of count array: Acip[SA], and SA equals to maximal minus minimal numeric value plus one. On the basis of analysis, it is concluded that proposed algorithm delivers better performance since speedup and efficiency improved for worst case scenario (difference between maximal and minimal data values becomes larger) with the increase of only few communication moves required for sorting.
APA, Harvard, Vancouver, ISO, and other styles
10

Mei, Jing, Huahu Xu, Yang Li, Minjie Bian, and Yuzhe Huang. "MFCNet: Mining Features Context Network for RGB–IR Person Re-Identification." Future Internet 13, no. 11 (November 18, 2021): 290. http://dx.doi.org/10.3390/fi13110290.

Full text
Abstract:
RGB–IR cross modality person re-identification (RGB–IR Re-ID) is an important task for video surveillance in poorly illuminated or dark environments. In addition to the common challenge of Re-ID, the large cross-modality variations between RGB and IR images must be considered. The existing RGB–IR Re-ID methods use different network structures to learn the global shared features associated with multi-modalities. However, most global shared feature learning methods are sensitive to background clutter, and contextual feature relationships are not considered among the mined features. To solve these problems, this paper proposes a dual-path attention network architecture MFCNet. SGA (Spatial-Global Attention) module embedded in MFCNet includes spatial attention and global attention branches to mine discriminative features. First, the SGA module proposed in this paper focuses on the key parts of the input image to obtain robust features. Next, the module mines the contextual relationships among features to obtain discriminative features and improve network performance. Finally, extensive experiments demonstrate that the performance of the network architecture proposed in this paper is better than that of state-of-the-art methods under various settings. In the all-search mode of the SYSU and RegDB data sets, the rank-1 accuracy reaches 51.64% and 69.76%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SNA (Computer network architecture)"

1

Geha, Abbas. "Computer enhanced network design." Thesis, University of Sussex, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.344069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Katti, Sachin Rajsekhar. "Network coded wireless architecture." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45885.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.
Includes bibliographical references (p. 183-197).
Wireless mesh networks promise cheap Internet access, easy deployment, and extended range. In their current form, however, these networks suffer from both limited throughput and low reliability; hence they cannot meet the demands of applications such as file sharing, high definition video, and gaming. Motivated by these problems, we explore an alternative design that addresses these challenges. This dissertation presents a network coded architecture that significantly improves throughput and reliability. It makes a simple yet fundamental switch in network design: instead of routers just storing and forwarding received packets, they mix (or code) packets' content before forwarding. We show through practical systems how routers can exploit this new functionality to harness the intrinsic characteristics of the wireless medium to improve performance. We develop three systems; each reveals a different benefit of our network coded design. COPE observes that wireless broadcast naturally creates an overlap in packets received across routers, and develops a new network coding algorithm to exploit this overlap to deliver the same data in fewer transmissions, thereby improving throughput. ANC pushes network coding to the signal level, showing how to exploit strategic interference to correctly deliver data from concurrent senders, further increasing throughput. Finally, MIXIT presents a symbol-level network code that exploits wireless spatial diversity, forwarding correct symbols even if they are contained in corrupted packets to provide high throughput reliable transfers. The contributions of this dissertation are multifold. First, it builds a strong connection between the theory of network coding and wireless system design. Specifically, the systems presented in this dissertation were the first to show that network coding can be cleanly integrated into the wireless network stack to deliver practical and measurable gains. The work also presents novel algorithms that enrich the theory of network coding, extending it to operate over multiple unicast flows, analog signals, and soft-information.
(cont.) Second, we present prototype implementations and testbed evaluations of our systems. Our results show that network coding delivers large performance gains ranging from a few percent to several-fold depending on the traffic mix and the topology. Finally, this work makes a clear departure from conventional network design. Research in wireless networks has largely proceeded in isolation, with the electrical engineers focusing on the physical and lower layers, while the computer scientists worked up from the network layer, with the packet being the only interface. This dissertation pokes a hole in this contract, disposing of artificial abstractions such as indivisible packets and point-to-point links in favor of a more natural abstraction that allows the network and the lower layers to collaborate on the common objectives of improving throughput and reliability using network coding as the building block. At the same time, the design maintains desirable properties such as being distributed, low-complexity, implementable, and integrable with the rest of the network stack.
by Sachin Rajsekhar Katti.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
3

Beverly, Robert E. 1975. "Statistical learning in network architecture." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44210.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 167-[177]).
The Internet has become a ubiquitous substrate for communication in all parts of society. However, many original assumptions underlying its design are changing. Amid problems of scale, complexity, trust and security, the modern Internet accommodates increasingly critical services. Operators face a security arms race while balancing policy constraints, network demands and commercial relationships. This thesis espouses learning to embrace the Internet's inherent complexity, address diverse problems and provide a component of the network's continued evolution. Malicious nodes, cooperative competition and lack of instrumentation on the Internet imply an environment with partial information. Learning is thus an attractive and principled means to ensure generality and reconcile noisy, missing or conflicting data. We use learning to capitalize on under-utilized information and infer behavior more reliably, and on faster time-scales, than humans with only local perspective. Yet the intrinsic dynamic and distributed nature of networks presents interesting challenges to learning. In pursuit of viable solutions to several real-world Internet performance and security problems, we apply statistical learning methods as well as develop new, network-specific algorithms as a step toward overcoming these challenges. Throughout, we reconcile including intelligence at different points in the network with the end-to-end arguments. We first consider learning as an end-node optimization for efficient peer-to-peer overlay neighbor selection and agent-centric latency prediction. We then turn to security and use learning to exploit fundamental weaknesses in malicious traffic streams. Our method is both adaptable and not easily subvertible. Next, we show that certain security and optimization problems require collaboration, global scope and broad views.
(cont.) We employ ensembles of weak classifiers within the network core to mitigate IP source address forgery attacks, thereby removing incentive and coordination issues surrounding existing practice. Finally, we argue for learning within the routing plane as a means to directly optimize and balance provider and user objectives. This thesis thus serves first to validate the potential for using learning methods to address several distinct problems on the Internet and second to illuminate design principles in building such intelligent systems in network architecture.
by Robert Edward Beverly, IV.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
4

Motiwala, Murtaza. "An architecture for network path selection." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43576.

Full text
Abstract:
Traditional routing protocols select paths based on static link weights and converge to new paths only when there is an outright reachability failure (such as a link or router failure). This design allows routing scale to hundreds of thousands of nodes, but it comes at the cost of functionality: routing provides only simple, single path connectivity. Networked applications in the wide-area, enterprise, and data center can all benefit from network protocols that allow traffic to be sent over multiple routes en route to a destination. This ability, also called multipath routing, has other significant benefits over single-path routing, such as more efficiently using network resources and recovering more quickly from network disruptions. This dissertation explores the design of an architecture for path selection in the network and proposes a "narrow waist" interface for networks to expose choice in routing traffic to end systems. Because most networks are also business entities, and are sensitive to the cost of routing traffic in their network, this dissertation also develops a framework for exposing paths based on their cost. For this purpose, this dissertation develops a cost model for routing traffic in a network. In particular, this dissertation presents the following contributions: * Design of path bits, a "narrow waist" for multipath routing. Our work ties a large number of multipath routing proposals by creating an interface (path bits) for decoupling the multipath routing protocols implemented by the network and end systems (or other network elements) making a choice for path selection. Path bits permit simple, scalable, and efficient implementations of multipath routing protocols in the network that still provide enough expressiveness for end systems to select alternate paths. We demonstrate that our interface is flexible and leads to efficient network implementations by building prototype implementations on different hardware and software platforms. * Design of path splicing, a multipath routing scheme. We develop, path splicing, a multipath routing technique, which uses random perturbations from the shortest path to create exponentially large number of paths with only a linear increase in state in a network. We also develop a simple interface to enable end systems to make path selection decisions. We present various deployment paths for implementing path splicing in both intradomain and interdomain routing on the Internet. * Design of low cost path-selection framework for a network. Network operators and end systems can have conflicting goals, where the network operators are concerned with saving cost and reducing traffic uncertainty; and end systems favor better performing paths. Exposing choice of routing in the network can thus, create a tension between the network operators and the end systems. We propose a path-selection framework where end systems make path selection decisions based on path performance and networks expose paths to end systems based on their cost to the network. This thesis presents a cost model for routing traffic in a network to enable network operators to reason about "what-if " scenarios and routing traffic on their network.
APA, Harvard, Vancouver, ISO, and other styles
5

Artz, Michael Lyle 1979. "NetSPA : a Network Security Planning Architecture." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29899.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (leaves 93-96).
Attack scenario graphs provide a concise way of displaying all possible sequences of attacks a malicious user can execute to obtain a desired goal, such as remotely achieving root undetected on a critical host machine. NETSPA, the Network Security Planning Architecture, is a C++ system that quickly generates worst-case attack graphs using a forward-chaining depth-first search of the possible attack space using actions modeled with REM, a simple attack description language. NETSPA accepts network configuration information from a database that includes host and network software types and versions, intrusion detection system placement and types, network connectivity, and firewall rulesets. It is controlled by command line inputs that determine a critical goal state, trust relationships between hosts, and maximum recursive depth. NETSPA was shown to efficiently provide easily understood attack graphs that revealed non-obvious security problems against a realistic sample network of 17 representative hosts using 23 REM defined actions. The largest useful graph was generated within 1.5 minutes of execution. NETSPA-executes faster and handles larger networks than any existing graph generation system. This allows NETSPA to be practically used in combination with other security components to develop and analyze secure networks.
by Michael Lyle Artz.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
6

Lefelhocz, Christopher James. "Investigation of a preemptive network architecture." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/36457.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1994.
Includes bibliographical references (p. 81-82).
by Christopher Jame Lefelhcz.
M.S.
APA, Harvard, Vancouver, ISO, and other styles
7

Umeh, Njideka Adaku. "Security architecture methodology for large net-centric systems." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
APA, Harvard, Vancouver, ISO, and other styles
8

Iqneibi, Sami M. Carleton University Dissertation Engineering Electrical. "A blackboard architecture to support network fault diagnosis." Ottawa, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zheng, Xijia Ph D. Massachusetts Institute of Technology. "Cognitive optical network architecture in dynamic environments." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/126997.

Full text
Abstract:
Thesis: Ph. D. in Computer Science and Engineering, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020
Cataloged from the official PDF of thesis.
Includes bibliographical references (pages 149-154).
Emerging network traffic requires a more agile network management and control system to deal with the dynamic network environments than today's networks use. The bursty and large data transactions introduced by new technological applications can cause both high costs and extreme congestion in networks. The prohibitive cost of massive over-provisioning will manifest as huge congestions during peak demand periods. The network management and control system must be able to sense the traffic changes and reconfigure in a timely manner (in tens of milliseconds instead of minutes or hours) to use network resources efficiently. We propose the use of cognitive techniques for fast and adaptive network management and control of future optical networks. The goal of this work is to provide timely network reconfigurations in response to dynamic traffic environments and prevent congestion from building up.
We make a simplified model of the expected traffic arrival rate changes as a multistate Markov process based on the characteristics of the dynamic, bursty, and high granularity traffic. The traffic is categorized into different network traffic environments by the length of the network coherence time, which is the time that the traffic is unvarying. The tunneled network architecture is adopted due to its supremacy in reducing the control complexity when the traffic volume is at least one wavelength. In the long coherence time regime where traffic changes very slowly, the traffic detection performances of two Bayesian estimators and a stopping-trial (sequential) estimator are examined, based on the transient behaviors of networks. The stopping trial estimator has the fastest response time to the changes of traffic arrival statistics. We propose a wavelength reconfiguration algorithm with continuous assessment where the system reconfigures whenever it deems necessary.
The reconfiguration can involve addition or subtraction of multiple wavelengths. Using the fastest detection and reconfiguration algorithm can reduce queueing delays during traffic surges without over-provisioning and thus can reduce network capital expenditure and prevent wasting resources on erroneous decisions when surges occur. For traffic with moderate coherence time (where traffic changes at a moderate rate) and the short coherence time (where traffic changes quickly), the stopping-trial estimator still responds to the traffic changes with a short detection time. As long as the inter-arrival times of traffic transactions are independent, the algorithm is still optimum. The algorithm provides no prejudice on the exact network traffic distribution, avoiding having to sense and estimate detailed arrival traffic statistics.
To deal with fast-changing traffic, we model the transient convergent behaviors of network traffic drift as a result of traffic transition rate changes and validate the feasibility and utility of the traffic prediction. In a simple example when the network traffic rate changes monotonically in a linear model, the sequential maximum likelihood estimator will capture the traffic trend with a small number of arrivals. The traffic trend prediction can help to provide fast reconfiguration, which is very important for maintaining quality of service during large traffic shifts. We further investigate the design of an efficient rerouting algorithm to maintain users' quality of service when the incremental traffic cannot be accommodated on the primary path. The algorithm includes the fast reconfiguration of wavelengths in the existing lit and spatially routed fibers, and the setting up and lighting of new fibers.
Rerouting is necessary to maintain users' quality of service when the queueing delay on the primary path (determined by shortest path routing) exceeds the requirement. Our algorithm triggers reconfiguration when a queueing delay threshold is crossed on the primary path. The triggering by a threshold on the queueing delay is used due to its simplicity, and it is directly measurable by the exact traffic transaction sizes and the queue size, which reflect both the current network traffic environment and the network configurations. A dynamic rerouting algorithm implemented with a shortest path algorithm is proposed to find the secondary paths for rerouting. We make the conjecture that it is desirable that the alternate paths for rerouting have small numbers of hops and are disjoint with other busy paths when the hops on the path are independent. In addition, the conjecture suggests that a good candidate network topology should have high edge-connectivity.
Wavelength reservation for rerouted traffic does not maximize wavelength utilization. We make the conjecture that traffic with different sizes should be broken up into multi-classes with dedicated partitioned resources and the queueing delay should be normalized by the transmission time for rerouting triggering to realize better network utilization.
by Xijia Zheng.
Ph. D. in Computer Science and Engineering
Ph.D.inComputerScienceandEngineering Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
10

Wiedenhoeft, Paul Eric. "Analysis of the Naval Postgraduate School computer network architecture." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA289749.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1994.
Thesis advisor(s): A. Schoenstadt, James C. Emery. "September 1994." Bibliography: p. 153-161. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SNA (Computer network architecture)"

1

Coover, Edwin R. Systems network architecture (SNA) networks. Los Alamitos, Calif: IEEE Computer Society Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1947-, Czubek Donald H., ed. SNA: IBM's systems network architecture. New York: Van Nostrand Reinhold, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

James, Martin. SNA: IBM's networking solution. Englewood Cliffs, N.J: Prentice-Hall, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schäfer, Werner, and Werner Schäfer. Systems network architecture. Workingham, England: Addison-Wesley, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Illustrated SNA. New York: Wiley, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kapoor, Atul. SNA: Architecture, protocols, and implementation. New York: McGraw-Hill, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Demystifying SNA. Plano, Tex: Wordware Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goralski, Walter. APPN/HPR: The future of SNA. New York: McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oxborrow, Mike. A practical reference to SNA. London: McGraw-Hill, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meijer, Anton. Systems network architecture: A tutorial. London: Pitman, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "SNA (Computer network architecture)"

1

Chang, Jiho, Jongsu Yi, and JunSeong Kim. "A Switch Wrapper Design for SNA On-Chip-Network." In Advances in Computer Systems Architecture, 405–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572961_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "network architecture." In Computer Science and Communications Dictionary, 1084. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cole, Robert. "Network Systems Architecture." In Computer Communications, 104–18. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "system network architecture." In Computer Science and Communications Dictionary, 1721. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weik, Martin H. "open network architecture." In Computer Science and Communications Dictionary, 1144. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barksdale, William J. "Network Protocol and Architecture." In Practical Computer Data Communications, 319–84. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-5164-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhushan, Abhay K., and Dennis G. Frahmann. "Xerox Network Systems Architecture." In Computer Network Architectures and Protocols, 417–47. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pozefsky, Diane P., Daniel A. Pitt, and James P. Gray. "IBM’s Systems Network Architecture." In Computer Network Architectures and Protocols, 449–509. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Yuanyuan, and Cong Wang. "Network Architecture and Principles." In SpringerBriefs in Electrical and Computer Engineering, 9–15. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17656-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Shuangbao Paul. "I/O and Network Interface." In Computer Architecture and Organization, 99–128. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-5662-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SNA (Computer network architecture)"

1

Jiang, Hongxun, and Zongbin Li. "Architecture Model of Enterprise Computing Networks Based on SNA Methodology." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ben Ahmed, Achraf, and Abderazek Ben Abdallah. "PHENIC: silicon photonic 3D-network-on-chip architecture for high-performance Heterogeneous many-core system-on-chip." In 14th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA2013). IEEE, 2013. http://dx.doi.org/10.1109/sta.2013.6914696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joung, Junegak, and Harrison M. Kim. "Importance-Performance Analysis of Product Attributes Using Explainable Deep Neural Network From Online Reviews." In ASME 2020 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/detc2020-22382.

Full text
Abstract:
Abstract Importance-performance analysis (IPA) is a technique used to understand customer satisfaction and improve the quality of product attributes. This study proposes an explainable deep-neural-network-based method to carry out IPA of product attributes from online reviews for product design. Previous works used shallow neural network (SNN)-based methods to estimate importance values, but it was unclear whether the SNN is an optimal neural network architecture. The estimated importance has high variability by a single neural network from a training set that is randomly selected. However, the proposed method provides importance values with a lower variance by improving the importance estimation of each product attribute in the IPA. The proposed method first identifies the product attributes and estimates their performance. Then, it infers the importance values by combining explanations of the input features from multiple optimal neural networks. A case study on smartphones is used herein to demonstrate the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
4

Mao, Min, and Xi Cheng. "Evolution Analysis of Foreign Trade Network Structructure Based on Complex Network SNA." In EBIMCS '19: 2019 2nd International Conference on E-Business, Information Management and Computer Science. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3377817.3377839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Ping. "A Space-time Analysis of Global Trade Network Based on SNA." In EBIMCS 2020: 2020 3rd International Conference on E-Business, Information Management and Computer Science. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3453187.3453306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kallappa, Pattada, and Haftay Hailu. "Automated Contingency and Life Management for Integrated Power and Propulsion Systems." In ASME Turbo Expo 2005: Power for Land, Sea, and Air. ASMEDC, 2005. http://dx.doi.org/10.1115/gt2005-68587.

Full text
Abstract:
Impact Technologies, LLC has developed a prototype Automated Contingency and Life Management (ACLM) System for aircraft propulsion systems. Using a combination of on-board diagnostic and control modules, the ACLM system implements real-time and near real-time strategies to detect critical and life limiting engine faults and take appropriate control actions to ensure optimal performance. The modular hierarchical ACLM architecture is populated with Prognostics and Health Monitoring (PHM), and Adaptive Intelligent Control (AIC) algorithms. The PHM algorithms include Statistical Fault Pattern Recognition, Probabilistic Neural Network and Model-Based modules. These algorithms work in parallel and their outcomes are fused to provide a comprehensive fault diagnosis with an associated level of confidence. The AIC consists of a hierarchical framework for the implementation of the control strategy. The strategy incorporates varying control modes, such as life extending, performance and safe/abort/contingency management. This ACLM system has been demonstrated on an Air Force Research Laboratory generic two-spool turbofan engine computer simulation model.
APA, Harvard, Vancouver, ISO, and other styles
7

"Network Architecture." In Proceedings of 15th International Conference on Computer Communications and Networks. IEEE, 2006. http://dx.doi.org/10.1109/icccn.2006.286240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qadeer, Mohammed A., Afaq H. Khan, Juned A. Ansari, and Sariya Waheed. "IMS Network Architecture." In 2009 International Conference on Future Computer and Communication (ICFCC). IEEE, 2009. http://dx.doi.org/10.1109/icfcc.2009.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Barla, Isil Burcu, Dominic Axel Schupke, and Georg Carle. "Virtual Network Simulator Architecture." In 2012 UKSim 14th International Conference on Computer Modelling and Simulation (UKSim). IEEE, 2012. http://dx.doi.org/10.1109/uksim.2012.96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Computer architecture/network security [session events]." In 2012 Fourth International Conference on Advanced Computing (ICoAC). IEEE, 2012. http://dx.doi.org/10.1109/icoac.2012.6416878.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SNA (Computer network architecture)"

1

Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis, and Marsha Robinson. Computer Network Security and Directory Services Architecture. Fort Belvoir, VA: Defense Technical Information Center, March 2000. http://dx.doi.org/10.21236/ada392366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Belzer, M. R., and Y. M. Cho. Micro-Computer Network Architecture for Range Instrumentation Applications. Fort Belvoir, VA: Defense Technical Information Center, March 1988. http://dx.doi.org/10.21236/ada196971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Markova, Oksana, Serhiy Semerikov, and Maiia Popel. СoCalc as a Learning Tool for Neural Network Simulation in the Special Course “Foundations of Mathematic Informatics”. Sun SITE Central Europe, May 2018. http://dx.doi.org/10.31812/0564/2250.

Full text
Abstract:
The role of neural network modeling in the learning сontent of special course “Foundations of Mathematic Informatics” was discussed. The course was developed for the students of technical universities – future IT-specialists and directed to breaking the gap between theoretic computer science and it’s applied applications: software, system and computing engineering. CoCalc was justified as a learning tool of mathematical informatics in general and neural network modeling in particular. The elements of technique of using CoCalc at studying topic “Neural network and pattern recognition” of the special course “Foundations of Mathematic Informatics” are shown. The program code was presented in a CofeeScript language, which implements the basic components of artificial neural network: neurons, synaptic connections, functions of activations (tangential, sigmoid, stepped) and their derivatives, methods of calculating the network`s weights, etc. The features of the Kolmogorov–Arnold representation theorem application were discussed for determination the architecture of multilayer neural networks. The implementation of the disjunctive logical element and approximation of an arbitrary function using a three-layer neural network were given as an examples. According to the simulation results, a conclusion was made as for the limits of the use of constructed networks, in which they retain their adequacy. The framework topics of individual research of the artificial neural networks is proposed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography