Gotowa bibliografia na temat „Extranets (Computer networks)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Extranets (Computer networks)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Extranets (Computer networks)"

1

Morgan, David. "Deploying extranets?" Network Security 2004, no. 12 (December 2004): 12–14. http://dx.doi.org/10.1016/s1353-4858(04)00170-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Liu, Nan, Zhi Zeng, and Ruoyu Jin. "A Survey on Users' Perspectives to Functionalities of Web-Based Construction Collaboration Extranets." International Journal of e-Collaboration 15, no. 4 (October 2019): 1–17. http://dx.doi.org/10.4018/ijec.2019100101.

Pełny tekst źródła
Streszczenie:
Construction collaboration extranets (CCEs) provide various functionalities depending on the vendors' origins, history, experiences, and financial status. Previous research has listed and described the functionalities that extranet systems can be capable of providing. However, no publication was found so far to systematically analyze users' perspectives to the provided functionalities. This article is to bridge this gap through a questionnaire survey to the users. It aims at examining user's attitude to functionalities of CCEs. The result may be useful to information system vendors, end-users
Style APA, Harvard, Vancouver, ISO itp.
3

Phaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets." EDPACS 27, no. 12 (June 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Guo, Jie, Xihao Fu, Liqiang Lin, Hengjun Ma, Yanwen Guo, Shiqiu Liu, and Ling-Qi Yan. "ExtraNet." ACM Transactions on Graphics 40, no. 6 (December 2021): 1–16. http://dx.doi.org/10.1145/3478513.3480531.

Pełny tekst źródła
Streszczenie:
Both the frame rate and the latency are crucial to the performance of realtime rendering applications such as video games. Spatial supersampling methods, such as the Deep Learning SuperSampling (DLSS), have been proven successful at decreasing the rendering time of each frame by rendering at a lower resolution. But temporal supersampling methods that directly aim at producing more frames on the fly are still not practically available. This is mainly due to both its own computational cost and the latency introduced by interpolating frames from the future. In this paper, we present ExtraNet, an
Style APA, Harvard, Vancouver, ISO itp.
5

Ahmed Ali, Adel, and Ahmed M. Al-Naamany. "Converged Networking: A Review of Concepts and Technologies." Sultan Qaboos University Journal for Science [SQUJS] 5 (December 1, 2000): 209. http://dx.doi.org/10.24200/squjs.vol5iss0pp209-225.

Pełny tekst źródła
Streszczenie:
Converged networking is an emerging technology thrust that integrates voice, video, and data traffic on a single network. Converged networking encompasses several aspects, all of which are related to the aggregation of networking activity. Such aspects include, Payload convergence, Protocol convergence, Physical convergence, Device convergence, Application convergence, Technology convergence, etc. In recent years the Internet has developed into a global data network that is highly accepted as a multimedia information platform, which has the potential to develop into an alternative carrier netw
Style APA, Harvard, Vancouver, ISO itp.
6

Hu, Xiujian, Guanglei Sheng, Piao Shi, and Yuanyuan Ding. "TbsNet: the importance of thin-branch structures in CNNs." PeerJ Computer Science 9 (June 16, 2023): e1429. http://dx.doi.org/10.7717/peerj-cs.1429.

Pełny tekst źródła
Streszczenie:
The performance of a convolutional neural network (CNN) model is influenced by several factors, such as depth, width, network structure, size of the receptive field, and feature map scaling. The optimization of the best combination of these factors poses as the main difficulty in designing a viable architecture. This article presents an analysis of key factors influencing network performance, offers several strategies for constructing an efficient convolutional network, and introduces a novel architecture named TbsNet (thin-branch structure network). In order to minimize computation costs and
Style APA, Harvard, Vancouver, ISO itp.
7

Ababneh, Nedal. "Performance Evaluation of a Topology Control Algorithm for Wireless Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 671385. http://dx.doi.org/10.1155/2010/671385.

Pełny tekst źródła
Streszczenie:
A main design challenge in the area of sensor networks is energy efficiency to prolong the network operable lifetime. Since most of the energy is spent for radio communication, an effective approach for energy conservation is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. Assuming that node position information is unavailable, we present a topology control algorithm, termed OTC, for sensor networks. It uses two-hop neighborhood information to select a subset of nodes to be active among all nodes in the neighborhood. Each no
Style APA, Harvard, Vancouver, ISO itp.
8

Karamysheva, N. S., D. S. Svishchev, K. V. Popov, and S. A. Zinkin. "Implementation of Agent-Based Metacomputersystems and Applications." Proceedings of the Southwest State University 26, no. 1 (June 28, 2022): 148–71. http://dx.doi.org/10.21869/2223-1560-2022-26-1-148-171.

Pełny tekst źródła
Streszczenie:
Purpose of research. Creation of a methodology for designing a prototype of a metacomputer distributed computing system, taking into account the current stage of the evolution of hardware and cloud-network software to provide users with the means to create applications with inter-program parallelism and the ability of components to work together.Methods. Logical models of artificial intelligence, semantic networks and conceptual graphs, agent-based technology, virtualization of network resources. The method of conducting a full-scale experiment was that when the application was launched for ex
Style APA, Harvard, Vancouver, ISO itp.
9

Malik, Najeeb ur Rehman, Usman Ullah Sheikh, Syed Abdul Rahman Abu-Bakar, and Asma Channa. "Multi-View Human Action Recognition Using Skeleton Based-FineKNN with Extraneous Frame Scrapping Technique." Sensors 23, no. 5 (March 2, 2023): 2745. http://dx.doi.org/10.3390/s23052745.

Pełny tekst źródła
Streszczenie:
Human action recognition (HAR) is one of the most active research topics in the field of computer vision. Even though this area is well-researched, HAR algorithms such as 3D Convolution Neural Networks (CNN), Two-stream Networks, and CNN-LSTM (Long Short-Term Memory) suffer from highly complex models. These algorithms involve a huge number of weights adjustments during the training phase, and as a consequence, require high-end configuration machines for real-time HAR applications. Therefore, this paper presents an extraneous frame scrapping technique that employs 2D skeleton features with a Fi
Style APA, Harvard, Vancouver, ISO itp.
10

Molla, D., R. Schwitter, F. Rinaldi, J. Dowdall, and M. Hess. "ExtrAns: Extracting answers from technical texts." IEEE Intelligent Systems 18, no. 4 (July 2003): 12–17. http://dx.doi.org/10.1109/mis.2003.1217623.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Extranets (Computer networks)"

1

Sherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Long, Weili. "On the topology design of hose-model VPN networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LONG.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Isaacs, Rebecca. "Dynamic provisioning of resource-assured and programmable virtual private networks." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621158.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Quigley, Kenneth J. "The design and implementation of the Megacomm Media Center's extranet." [Denver, Colo.] : Regis University, 2005. http://165.236.235.140/lib/KQuigley2005.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Rosenbaum, Gustav Filip Computer Science &amp Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.

Pełny tekst źródła
Streszczenie:
This thesis focuses on efficient provisioning of resilient Virtual Private Network (VPN) services. It first confirms the intuition that network resources can be more efficiently utilized when resilience mechanisms are implemented by a network provider in the physical network than by its VPN customers in their VPNs. Next, a Multiprotocol Label Switching-based programmable VPN architecture is presented that delivers virtual links as resilient quality of service (QoS) connections and virtual sites. Virtual sites allow customers to implement functionality like customized routing and content adapta
Style APA, Harvard, Vancouver, ISO itp.
6

Munasinghe, Kumudu S., University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "VPN over a wireless infrastructure : evaluation and performance analysis." THESIS_CSTE_CIT_Munasinghe_K.xml, 2005. http://handle.uws.edu.au:8081/1959.7/662.

Pełny tekst źródła
Streszczenie:
This thesis presents the analysis and experimental results for an evaluation of the performance and Quality of Service (QoL) levels of a virtual private network( QoL) levels of a Virtual Private Network (VPN) implementation of an IEEE 802.11b wireless infrastructure. The VPN tunnelling protocol considered for the above study is IP security (IPSec). The main focus of the research is to identify the major performance limitations and their underlying causes for such VPN implementations under study. The experimentation and data collection involved in the study spans over a number of platforms to s
Style APA, Harvard, Vancouver, ISO itp.
7

Valella, William. "Securing open source Virtual Private Networks a study in Linux security /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Florida, 2001.<br>Title from title page of source document. Document formatted into pages; contains x, 188 p.; also contains graphics. Includes vita. Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
8

Munasinghe, Kumudu S. "VPN over a wireless infrastructure : evaluation and performance analysis." Thesis, View thesis, 2005. http://handle.uws.edu.au:8081/1959.7/662.

Pełny tekst źródła
Streszczenie:
This thesis presents the analysis and experimental results for an evaluation of the performance and Quality of Service (QoL) levels of a virtual private network( QoL) levels of a Virtual Private Network (VPN) implementation of an IEEE 802.11b wireless infrastructure. The VPN tunnelling protocol considered for the above study is IP security (IPSec). The main focus of the research is to identify the major performance limitations and their underlying causes for such VPN implementations under study. The experimentation and data collection involved in the study spans over a number of platforms to s
Style APA, Harvard, Vancouver, ISO itp.
9

Munasinghe, Kumudu S. "VPN over a wireless infrastructure evaluation and performance analysis /." View thesis, 2005. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050920.141716/index.html.

Pełny tekst źródła
Streszczenie:
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2005.<br>A thesis submitted in fulfillment of the requirements for the award of the degree Master of Science (Honours) to the University of Western Sydney on March 2005. Includes bibliography.
Style APA, Harvard, Vancouver, ISO itp.
10

Salamon, Jakub. "Návrh intranetu pro podporu firemních procesů." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222583.

Pełny tekst źródła
Streszczenie:
The subject of this diploma thesis is the implementation of the intranet to support business processes. At the beginning are defined the basic concepts of the topic. Then I analyzed the situation in the company and the current status of ICT. Based on these analyses, I proposed the intranet implementation process leading to simplify and streamline business operations.
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Extranets (Computer networks)"

1

Loshin, Peter. Extranet design and implementation. San Francisco: SYBEX Network Press, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bayles, Deborah L. Extranets: Building the business-to-business Web. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Minei, Ina. MPLS-enabled applications: Emerging developments and new technologies. 3rd ed. Chichester, England: Wiley, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Thomas, Witte, and Claus Thorsten 1965-, eds. Virtuelle Netze: Chance für interdisziplinäre Kooperationen in Institutionen. Frankfurt am Main: Peter Lang, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Covill, Randall J. Implementing extranets: The Internet as a virtual private network. Boston: Digital Press, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Bort, Julie. Building an Extranet: Connect your Intranet with vendors and customers. New York: Wiley Computer Pub., 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Carmouche, James Henry. IPsec virtual private network fundamentals. Indianapolis, Ind: Cisco Press, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Rosli︠a︡kov, A. V. Virtualʹnye chastnye seti: Osnovy postroenii︠a︡ i primenenii︠a︡. Moskva: Ėko-Trendz, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kosiur, David R. Building and managing virtual private networks. New York: Wiley, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Extranets (Computer networks)"

1

Sadiku, Matthew N. O., and Cajetan M. Akujuobi. "Intranets and Extranets." In Fundamentals of Computer Networks, 71–77. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09417-0_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Dibble, Catherine. "Beyond Data: Handling Spatial and Analytical Contexts with Genetics-Based Machine Learning." In Spatial Evolutionary Modeling. Oxford University Press, 2001. http://dx.doi.org/10.1093/oso/9780195135688.003.0012.

Pełny tekst źródła
Streszczenie:
Geographic information systems (GISs) are fairly good at handling three types of data: locational, attribute, and topological. Recent work holds promise for adding temporal data to this list as well (e.g., see Langran, 1992). Yet the unprecedentedly vast resources of geographically referenced data continue to outstrip our ability to derive meaningful information from such databases, despite dramatic improvements in computer processing power, algorithm efficiency, and parallel processing. In part this is because such research has emphasized improvements in processing efficiency rather than effectiveness. We humans are slow-minded compared with our silicon inventions; yet our analytical capabilities remain far more powerful, primarily because we have evolved elaborate cognitive infrastructures devoted to ensuring that we leverage our limited processing power by focusing our attention on the events and information most likely to be relevant. In GIS use, so far only human perception provides the requisite integration of spatial context, and human attention directs the determination of relevance and the selection of geographic features and related analyses. Understanding of spatial context and analytical purpose exists only in the minds of humans working with the GIS or viewing the displays and maps created by such operations. We still extract information from our geographic data systems primarily through long series of relatively tedious and complex spatial operations, performed—or at least explicitly preprogrammed—by a human, in order to derive each answer. Human integration of analytical purpose and spatial and attribute contexts is perhaps the most essential and yet the most invisible component of any geographic analysis, yet it is also perhaps the most fundamental missing link in any GIS. Only humans can glance at a map of a toxic waste dumps next to school yards, or oil spills upstream from fisheries, and recognize the potential threat of such proximity; human cartographers understand the importance of emphasizing either road or stream networks depending on the purpose of a map; humans understand that “near” operates at different scales for corner stores versus cities, or tropical jungle habitat versus open savannah. Given a GIS with the capability to deluge any inquiry with myriad layers of extraneous data, this natural human ability to filter data and manipulate only the meaningful elements is essential.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Extranets (Computer networks)"

1

Martinez-Ruiz, Francisco, Pilar Godina Gonzalez, Ana Lourdes Borrego, Hamurabi Gamboa Rosales, and José De la Rosa Vargas. "EXTRANEOUS COGNITIVE OVERLOAD IN THE BLENDED LEARNING PARADIGM. CASE STUDY: USE OF SOCIAL NETWORKS IN COMPUTER SCIENCE COURSES." In International Technology, Education and Development Conference. IATED, 2016. http://dx.doi.org/10.21125/iceri.2016.0793.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Newendorp, Brandon, Christian Noon, Chiu-Shui Chan, Eliot Winer, and Jim Oliver. "Development Methods and a Scenegraph Animation API for Cluster Driven Immersive Applications." In ASME-AFM 2009 World Conference on Innovative Virtual Reality. ASMEDC, 2009. http://dx.doi.org/10.1115/winvr2009-736.

Pełny tekst źródła
Streszczenie:
This paper presents a scenegraph animation application programming interface (API), known as the Animation Engine, which was constructed for software developers to easily perform smooth transitions and manipulations to scenegraph nodes. A developer can use one line of code to enter the property, end state and number of frames to describe the animation, then the Animation Engine handles the rest in the background. The goal of the Animation Engine is to provide a simple API that integrates into existing applications with minimal effort. Additionally, techniques to improve virtual reality (VR) ap
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!