Literatura científica selecionada sobre o tema "Computer networks"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Computer networks".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Computer networks"

1

Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.

Texto completo da fonte
Resumo:
Abstract: A computer network's principal role is to facilitate the transfer of digital information between computers. An interconnected network of computer equipment is all that constitutes a computer network. Distributing tasks among different machines is frequent in a computer network. Most networks confront substantial threats from attacks on their resources. This research focuses on computer networks. It is only through the establishment of a computer network that this is made possible at all. Nodes include things like computers, cell phones, servers, and other networking gear. Computer networks enable the Internet, as well as the shared use of application and storage servers, printers, and fax machines. Through the use of computer networks, many jobs can be completed. Systems can be classified as open or closed. If you want to connect to the network, the open system is ready to go. Closed systems, on the other hand, require further authentication to connect to other networks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Sireesha, Manchoori, and Gobi N. "Computer Networks." International Journal of Research Publication and Reviews 5, no. 3 (March 2, 2024): 1020–24. http://dx.doi.org/10.55248/gengpi.5.0324.0640.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Zizaeva, Ana, Yakha A. Khadueva, and Olga A. Pyrnova. "APPLICATION OF INFORMATION SECURITY IN COMPUTER NETWORKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1/10, no. 154 (2024): 50–55. https://doi.org/10.36871/ek.up.p.r.2025.01.10.006.

Texto completo da fonte
Resumo:
The information age has arrived, and the Internet has become an important part of life. Computers have become an important tool in daily work, study, entertainment, etc., changing our lives. However, in the process of widespread use of computers and networks, security issues have also become an important obstacle to their development. Problems such as computer viruses, confidential information leaks, and hacker intrusions have caused economic and property damage to computer users. This article mainly explains the basic contents of computer network security and virtual network technology, as well as conducts research on the specific application of virtual network technology in information security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Hyman, William A. "Medical Devices, Computers, and Computer Networks." Biomedical Safety & Standards 39, no. 1 (January 2009): 1–4. http://dx.doi.org/10.1097/01.bmsas.0000342710.32111.54.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Alviyanto, Fendi, Thomas Budiman, and Anton Zulkarnain Sianipar. "LAN Network Optimization to Support Practicum Activities Using Action Research Method at STMIK Jayakarta." Jurnal Indonesia Sosial Teknologi 5, no. 7 (July 16, 2024): 3050–58. http://dx.doi.org/10.59141/jist.v5i7.1104.

Texto completo da fonte
Resumo:
The importance of using computer networks in campus laboratories to improve the quality of education and research is also increasing. However, there are problems found in the use of computer networks in campus laboratories, namely low data transmission speeds, network insecurity and inaccessible resources. Therefore, this research was conducted to determine the factors that influence the performance of computer networks in campus laboratories, including data transmission speed. Computer networks evolved from point-to-point communication to computers connecting to each other and exchanging information. The research methodology involves experimental data being tested, for example the effect of communication speed on computer network performance in campus laboratories.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Madaeva, Madina S., Salidat M. Yunaeva, and Irina V. Grigorieva. "THE ROLE OF COMPUTER INFORMATION NETWORKS IN ECONOMIC ACTIVITY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/10, no. 150 (2024): 17–22. https://doi.org/10.36871/ek.up.p.r.2024.09.10.003.

Texto completo da fonte
Resumo:
The development of computer and network technologies has led human society to enter the information age. In the society of the future, computers will make a number of changes to the structure of the economy, the direction of employment, international economic forms and trade. Based on the relationship between computer networks and the economy, this article analyzes the impact of computer networks on the economy and how computer networks can be used to promote greater economic development.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Gumen, O., I. Selina, and D. Міz. "NEURAL NETWORKS. COMPUTER VISUAL RECOGNITION." Modern problems of modeling, no. 26 (June 13, 2024): 95–99. https://doi.org/10.33842/2313125x-2024-26-95-99.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Ren, Xiaohui, Iftikhar Ahmed, and Rui Liu. "Study of Topological Behavior of Some Computer Related Graphs." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (August 1, 2023): 3–14. http://dx.doi.org/10.61091/jcmcc117-01.

Texto completo da fonte
Resumo:
Network theory is the study of graphs such as representing equilibrium relationships or unequal relationships between different objects. A network can be defined as a graph where nodes and / or margins have attributes (e.g. words). Topological index of a graph is a number that helps to understand its topology and a topological index is known as irregularity index if it is greater than zero and topological index of graph is equal to zero if and only if graph is regular. The irregularity indices are used for computational analysis of nonregular graph topological composition. In this paper, we aim to compute topological invariants of some computer related graph networks. We computed various irregularities indices for the graphs of OTIS swapped network \(OP_a\) and Biswapped Networks \(Bsw(Pa).\)
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Murdalova, Iman E., Aiset U. Baydarova, and Deni M. Temirsultanov. "THE ROLE OF COMPUTER NETWORKS IN ECONOMIC DEVELOPMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/11, no. 153 (2024): 236–40. https://doi.org/10.36871/ek.up.p.r.2024.12.11.028.

Texto completo da fonte
Resumo:
The development of computer and network technologies has brought human society into the information age. In the society of the future, computers will cause a number of changes in the economic structure, the direction of employment, the international economic form and the form of trade. This article begins with the relationship between computer networks and the economy, analyzes the impact of computer networks on the economy and ways to use com-puter networks to promote economic development.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Texto completo da fonte
Resumo:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Teses / dissertações sobre o assunto "Computer networks"

1

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Watson, Jason. "Monitoring computer-based training over computer networks." Thesis, University of Huddersfield, 1999. http://eprints.hud.ac.uk/id/eprint/6910/.

Texto completo da fonte
Resumo:
As time is becoming an ever more precious commodity in today's workplace, effective training is also taking on an increasingly important role, but finding the time to train today's workforce is becoming increasingly difficult. With employees in diverse locations across the country and across the world and some working from home, on the road or "hot-desking" we have to take a new approach to training. Fortunately computer-based training can solve many of the traditional problems such as the need to bring all trainees together in the same location at the same time. With today's sophisticated computer-based training applications motivated employees can train where they want, at home or at work, and when they want, at lunchtime or after work. However, there is also a basic legal and pedagogical requirement to record who has been trained and in what. This is very easy in a traditional training scenario, but much more difficult in today's training environments. This problem is currently the major obstacle to the widespread adoption of computer-based training, and looking for a solution to these problems was the aim of this research. This research began by investigating the processes used by multimedia developers when creating Computer Based Training (CBT) applications, identifying the current methodologies, techniques and tools that they use. Very quickly it was easy to see that developers use a whole range of development tools and that their expertise is primarily in the design of training applications, not in programming. Similarly the students want credit for the training that they undergo but do not want to be distracted by an intrusive monitoring system. The role of the Training Manager is equally important. He or she needs to be able to quickly assess the situation of an individual or a group of students and take remedial action where necessary. Balancing all of these needs in a single generic solution to the monitored training problem was the single biggest challenge. This research has addressed these important problems and has developed a solution that permits the monitoring of student training progress in any location and at any time in a way that is totally transparent to the user. The author integrates this additional functionality into a new or existing training through a drag-and-drop interface which is very easy to use, creating a monitoring experience which is totally transparent to the trainee and the Training Manager receives a summary database of student progress. Specifically the system uses a library of C++ functions that interface to Authorware, Director, Toolbook or a C++ application. The functions permit an author to open a monitoring database at the start of a training session and close it at the end. Whilst the database is open we can record any data that we require regarding student progress and performance. On closing the session the resulting database is sent to a central collation point using FTP. Students are identified automatically through their IP address, from their network login or ask them to logon to the training session manually. The system can write any database format that is required and if the network is unavailable when the session ends the database will be saved locally until the next training session. At the central collation point a specially written application takes the many databases created by individual training sessions and collates them into one large database that can be queried by the training manager. Small trials were initially performed with a prototype system at the collaborating company, CBL Technology Ltd, which in turn led to larger trials at both Cable and Wireless Communication PLC and the University of Huddersfield. In these trials authors of CBT applications found the system extremely easy to integrate into their applications and the training managers and course leaders responsible for training outcomes, found the feedback on student performance, that the system provided, invaluable. This research had demonstrated that it is possible to create a generic monitored training solution that balances the needs of the trainee, the author and the Training Manager. Trainees can train at any time, anywhere in the world, over the Internet or from CDROM and a training manager can monitor their progress provided that at some time they connect to a computer network.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Somalingam, Ramesh Ramvel. "Network performance monitoring for multimedia networks." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23939.

Texto completo da fonte
Resumo:
Multimedia applications require certain guarantees from the underlying system concerning quality of various parameters, such as the throughput, delay, loss rate etc. We assume that such quality of service (QoS) parameters are normally agreed upon for the duration of a session, and should be maintained throughout that session. If a QoS violation occurs, possibly due to the temporary overload of one of the system components, either the user will notice this and may request a renegotiation of the quality and cost parameters, or the system will automatically do some internal reconfiguration in order to recover from the problem. In the latter case, the system needs to continuously monitor the relevant performance parameters. In this thesis, we develop means for performing such monitoring in the context of a News-on-Demand application. We have designed and implemented a distributed QoS monitoring facility that can be used by distributed multimedia applications for QoS monitoring and QoS violation detection. The system consists of a measurement component and an administrative component. The measurement component is responsible for continuously measuring the end-to-end QoS parameters of connections between the server and client application, while the administrative component is responsible for the overall administration of the monitoring system, which includes raising QoS violation notifications if the quality of service is violated.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Denda, Robert. "Fairness in computer networks /." Aachen : Shaker, 2004. http://www.loc.gov/catdir/toc/fy0715/2007464042.html.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.

Texto completo da fonte
Resumo:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2007.<br>Thesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Otten, Fred. "Network simulation for professional audio networks." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017935.

Texto completo da fonte
Resumo:
Audio Engineers are required to design and deploy large multi-channel sound systems which meet a set of requirements and use networking technologies such as Firewire and Ethernet AVB. Bandwidth utilisation and parameter groupings are among the factors which need to be considered in these designs. An implementation of an extensible, generic simulation framework would allow audio engineers to easily compare protocols and networking technologies and get near real time responses with regards to bandwidth utilisation. Our hypothesis is that an application-level capability can be developed which uses a network simulation framework to enable this process and enhances the audio engineer’s experience of designing and configuring a network. This thesis presents a new, extensible simulation framework which can be utilised to simulate professional audio networks. This framework is utilised to develop an application - AudioNetSim - based on the requirements of an audio engineer. The thesis describes the AudioNetSim models and implementations for Ethernet AVB, Firewire and the AES- 64 control protocol. AudioNetSim enables bandwidth usage determination for any network configuration and connection scenario and is used to compare Firewire and Ethernet AVB bandwidth utilisation. It also applies graph theory to the circular join problem and provides a solution to detect circular joins.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Brande, Julia K. Jr. "Computer Network Routing with a Fuzzy Neural Network." Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/29685.

Texto completo da fonte
Resumo:
The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. As more individuals transmit data through a computer network, the quality of service received by the users begins to degrade. A major aspect of computer networks that is vital to quality of service is data routing. A more effective method for routing data through a computer network can assist with the new problems being encountered with today's growing networks. Effective routing algorithms use various techniques to determine the most appropriate route for transmitting data. Determining the best route through a wide area network (WAN), requires the routing algorithm to obtain information concerning all of the nodes, links, and devices present on the network. The most relevant routing information involves various measures that are often obtained in an imprecise or inaccurate manner, thus suggesting that fuzzy reasoning is a natural method to employ in an improved routing scheme. The neural network is deemed as a suitable accompaniment because it maintains the ability to learn in dynamic situations. Once the neural network is initially designed, any alterations in the computer routing environment can easily be learned by this adaptive artificial intelligence method. The capability to learn and adapt is essential in today's rapidly growing and changing computer networks. These techniques, fuzzy reasoning and neural networks, when combined together provide a very effective routing algorithm for computer networks. Computer simulation is employed to prove the new fuzzy routing algorithm outperforms the Shortest Path First (SPF) algorithm in most computer network situations. The benefits increase as the computer network migrates from a stable network to a more variable one. The advantages of applying this fuzzy routing algorithm are apparent when considering the dynamic nature of modern computer networks.<br>Ph. D.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kusetoğulları, Hüseyin. "Network routing optimisation and effective multimedia transmission to enhance QoS in communication networks." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/46802/.

Texto completo da fonte
Resumo:
With the increased usage of communication services in networks, finding routes for reliable transmission and providing effective multimedia communication have become very challenging problems. This has been a strong motivation to examine and develop methods and techniques to find routing paths efficiently and to provide effective multimedia communication. This thesis is mainly concerned with designing, implementing and adapting intelligent algorithms to solve the computational complexity of network routing problems and testing the performance of intelligent algorithms’ applications. It also introduces hybrid algorithms which are developed by using the similarities of genetic algorithm (GA) and particle swarm optimization (PSO) intelligent systems algorithms. Furthermore, it examines the design of a new encoding/decoding method to offer a solution for the problem of unachievable multimedia information in multimedia multicast networks. The techniques presented and developed within the thesis aim to provide maximum utilization of network resources for handling communication problems. This thesis first proposes GA and PSO implementations which are adapted to solve the single and multi-objective functions in network routing problems. To offer solutions for network routing problems, binary variable-length and priority based encoding methods are used in intelligent algorithms to construct valid paths or potential solutions. The performance of generation operators in GA and PSO is examined and analyzed by solving the various shortest path routing problems and it is shown that the performance of algorithms varies based on the operators selected. Moreover, a hybrid algorithm is developed based on the lack of search capability of intelligent algorithms and implemented to solve the single objective function. The proposed method uses a strategy of sharing information between GA and PSO to achieve significant performance enhancement to solve routing optimization problems. The simulation results demonstrate the efficiency of the hybrid algorithm by optimizing the shortest path routing problem. Furthermore, intelligent algorithms are implemented to solve a multi-objective function which involves more constraints of resources in communication networks. The algorithms are adapted to find the multi-optimal paths to provide effective multimedia communication in lossy networks. The simulation results verify that the implemented algorithms are shown as efficient and accurate methods to solve the multi-objective function and find multi-optimal paths to deliver multimedia packets in lossy networks. Furthermore, the thesis proposes a new encoding/decoding method to maximize throughput in multimedia multicast networks. The proposed method is combined with two most used Multiple Description Coding (MDC) methods. The utilization of the proposed method is discussed by comparing two the MDC methods. Through analyzing the simulation results using these intelligent systems algorithms, it has been shown that feasible solutions can be obtained by optimizing complex network problems. Moreover, the methods proposed and developed, which are hybrid algorithms and the encoding/decoding method also demonstrate their efficiency and effectiveness as compared with other techniques.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Zhao, Wenrui. "Routing and Network Design in Delay Tolerant Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14085.

Texto completo da fonte
Resumo:
Delay tolerant networks (DTNs) are a class of emerging networks that exhibit significantly different characteristics from today's Internet, such as intermittent connectivity, large delay, and high loss rates. DTNs have important applications in disaster relief, military, rural Internet access, environmental sensing and surveillance, interplanetary communication, underwater sensing, and vehicular communication. While not the common case for networking, DTNs represent some of the most critical cases, where the ability to communicate can make a huge difference for human lives. Supporting effective communication in DTNs, however, is challenging. First, with intermittent connectivity, DTNs are often extremely limited in capacity. Second, given resource limitations and uncertainty in DTNs, it is critical to deliver data efficiently and robustly. The situation is especially acute for multicast which sends data to multiple destinations. This thesis seeks to address these two issues. To enhance network capacity in DTNs, we propose a message ferrying scheme that exploits the use of special mobile nodes (called message ferries) and controlled device mobility to deliver data. Message ferries are utilized to transport data via mobility between sources and destinations. We develop a foundation for the control of the mobility of message ferries, and nodes if possible, to cooperatively deliver data under a variety of conditions. We also study another approach which deploys new nodes called throwboxes to enhance capacity. Throwboxes are small and inexpensive wireless devices. By relaying data between mobile nodes, throwboxes are able to create data transfer opportunities that otherwise would not exist. We systematically investigate the issues of deployment and routing, and develop algorithms for various deployment and routing approaches. Based on extensive evaluation, we obtain several findings to guide the design and operation of throwbox-augmented DTNs. To address the issue of efficient and robust data delivery, we focus on DTN multicasting. Given the unique characteristics of DTNs, traditional solutions such as IP multicast can not be simply ported to DTNs. We identify the limitations of IP multicast semantics in DTNs and define new semantic models for DTN multicast. Based on these semantic models, we develop and evaluate several multicast routing algorithms with different routing strategies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Livros sobre o assunto "Computer networks"

1

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Gaj, Piotr, Michał Sawicki, and Andrzej Kwiecień, eds. Computer Networks. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21952-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Gaj, Piotr, Andrzej Kwiecień, and Piotr Stera, eds. Computer Networks. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19419-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07941-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02671-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kwiecień, Andrzej, Piotr Gaj, and Piotr Stera, eds. Computer Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Gaj, Piotr, Wojciech Gumiński, and Andrzej Kwiecień, eds. Computer Networks. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50719-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Gaj, Piotr, Michał Sawicki, Grażyna Suchacka, and Andrzej Kwiecień, eds. Computer Networks. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Gaj, Piotr, Andrzej Kwiecień, and Michał Sawicki, eds. Computer Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59767-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Capítulos de livros sobre o assunto "Computer networks"

1

Ashley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security, 45–59. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Rathore, Heena. "Computer Networks." In Mapping Biological Systems to Network Systems, 11–25. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29782-8_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Taylor, Graham. "Computer Networks." In Making Sense of Information Technology, 128–50. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-10649-3_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Lewin, Douglas, and David Noaks. "Computer networks." In Theory and Design of Digital Computer Systems, 349–74. Dordrecht: Springer Netherlands, 1992. http://dx.doi.org/10.1007/978-94-011-1576-6_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Zane Gray, R. "Computer Networks." In Informatics for the Clinical Laboratory, 125–43. New York, NY: Springer New York, 2005. http://dx.doi.org/10.1007/978-0-387-22629-3_7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Fox, Richard. "Computer Networks." In Information Technology, 193–238. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kale, Vivek. "Computer Networks." In Agile Network Businesses, 55–80. New York : CRC Press, 2017.: Auerbach Publications, 2017. http://dx.doi.org/10.4324/9781315368559-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

de Alencar, Marcelo Sampaio. "Computer Networks." In Cryptography and Network Security, 91–121. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Gold, Alex K. "Computer Networks." In DevOps for Data Science, 157–68. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003213345-12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Poshtkohi, Alireza, and M. B. Ghaznavi-Ghoushchi. "Computer Networks." In Implementing Parallel and Distributed Systems, 179–236. Boca Raton: Auerbach Publications, 2023. http://dx.doi.org/10.1201/9781003379041-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Computer networks"

1

Gavrylenko, Svitlana, and Vadym Poltoratskyi. "Detection Computer Network Intrusion Using Deep Neural Networks." In 2024 IEEE 5th KhPI Week on Advanced Technology (KhPIWeek), 1–5. IEEE, 2024. https://doi.org/10.1109/khpiweek61434.2024.10878100.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Antonielli, Nicolas. "Portable Device for Diagnosing Computer Networks." In 2024 IEEE Biennial Congress of Argentina (ARGENCON), 1–7. IEEE, 2024. http://dx.doi.org/10.1109/argencon62399.2024.10735810.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

IURCU, Ina, and Inga GURMEZA. "Connect the world: discover computer networks." In International Congress "Research – Innovation – Innovative Entrepreneurship", 332–44. Ion Creangă Pedagogical State University, 2024. https://doi.org/10.46727/c.17-18-05-2024.p332-344.

Texto completo da fonte
Resumo:
The project for studying the computer network through STEM/STEAM has developed the students' concepts of the 21st century. Involving academical subjects as Physics, Maths, Carft and Arts, the students created topology model of computer networks and types of the network dependent on the area and divided into 4 groups. Therefore, due to this project the students managed to learn the advantages and disadvantages of all types topology networks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Brinn, L. W. "Computer Networks." In the sixteenth SIGCSE technical symposium. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/323287.323305.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Pham, Nam, Hao Yu, and Bogdan M. Wilamowski. "Neural Network Trainer through Computer Networks." In 2010 24th IEEE International Conference on Advanced Information Networking and Applications. IEEE, 2010. http://dx.doi.org/10.1109/aina.2010.169.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Youssef, M. W. "Securing computer networks communication by modifying computer network communication protocols." In 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Pan, Jianping. "Teaching computer networks in a real network." In the 41st ACM technical symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1734263.1734311.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Niewiadomska-Szynkiewicz, Ewa, Andrzej Sikora, Piotr Arabas, Mariusz Kamola, Krzysztof Malinowski, Przemyslaw Jaskola, and Michal Marks. "Network-wide power management in computer networks." In 2013 22nd ITC Specialist Seminar on Energy Efficient and Green Networking (SSEEGN). IEEE, 2013. http://dx.doi.org/10.1109/sseegn.2013.6705398.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Zhong, G., K. Takahashi, S. Amamiya, D. Matsuno, T. Mine, and M. Amamiya. "From computer networks to agent networks." In 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the. IEEE, 2003. http://dx.doi.org/10.1109/hicss.2003.1174210.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Computer networks"

1

Barkley, John. Personal computer networks. Gaithersburg, MD: National Bureau of Standards, 1986. http://dx.doi.org/10.6028/nbs.sp.500-140.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Pabrai, Uday, Cary Dowat, and Janet Carlson. Understanding and using computer networks. Office of Scientific and Technical Information (OSTI), January 1990. http://dx.doi.org/10.2172/1128743.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Corley, Michael J. Anomaly Detection in Disparate Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, December 2005. http://dx.doi.org/10.21236/ada443328.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Raychev, Nikolay. Neuromorphic computer networks with synaptic connections. Web of Open Science, July 2020. http://dx.doi.org/10.37686/nrl.v1i1.56.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Tolmie, D. E., W. St. John, and D. H. DuBois. Super-speed computer interfaces and networks. Office of Scientific and Technical Information (OSTI), October 1997. http://dx.doi.org/10.2172/534509.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Cradduck, Trevor D., Martin S. Weinhous, and Neal Tobochnik. E-Mail and Academic Computer Networks. AAPM, 1990. http://dx.doi.org/10.37206/29.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Berry, Nina M., and Teresa H. Ko. On computer vision in wireless sensor networks. Office of Scientific and Technical Information (OSTI), September 2004. http://dx.doi.org/10.2172/919195.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Franklin, Derek L. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404740.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Van Randwyk, Jamie A. Position paper on active countermeasures for computer networks. Office of Scientific and Technical Information (OSTI), July 2003. http://dx.doi.org/10.2172/918333.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Grimmell, W. C. Computing Path Tables for Quickest Multipaths In Computer Networks. Office of Scientific and Technical Information (OSTI), December 2004. http://dx.doi.org/10.2172/885861.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!