Siga este link para ver outros tipos de publicações sobre o tema: Computer networks.

Teses / dissertações sobre o tema "Computer networks"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Computer networks".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Watson, Jason. "Monitoring computer-based training over computer networks." Thesis, University of Huddersfield, 1999. http://eprints.hud.ac.uk/id/eprint/6910/.

Texto completo da fonte
Resumo:
As time is becoming an ever more precious commodity in today's workplace, effective training is also taking on an increasingly important role, but finding the time to train today's workforce is becoming increasingly difficult. With employees in diverse locations across the country and across the world and some working from home, on the road or "hot-desking" we have to take a new approach to training. Fortunately computer-based training can solve many of the traditional problems such as the need to bring all trainees together in the same location at the same time. With today's sophisticated com
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Somalingam, Ramesh Ramvel. "Network performance monitoring for multimedia networks." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23939.

Texto completo da fonte
Resumo:
Multimedia applications require certain guarantees from the underlying system concerning quality of various parameters, such as the throughput, delay, loss rate etc. We assume that such quality of service (QoS) parameters are normally agreed upon for the duration of a session, and should be maintained throughout that session. If a QoS violation occurs, possibly due to the temporary overload of one of the system components, either the user will notice this and may request a renegotiation of the quality and cost parameters, or the system will automatically do some internal reconfiguration in ord
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Denda, Robert. "Fairness in computer networks /." Aachen : Shaker, 2004. http://www.loc.gov/catdir/toc/fy0715/2007464042.html.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.

Texto completo da fonte
Resumo:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2007.<br>Thesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Otten, Fred. "Network simulation for professional audio networks." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017935.

Texto completo da fonte
Resumo:
Audio Engineers are required to design and deploy large multi-channel sound systems which meet a set of requirements and use networking technologies such as Firewire and Ethernet AVB. Bandwidth utilisation and parameter groupings are among the factors which need to be considered in these designs. An implementation of an extensible, generic simulation framework would allow audio engineers to easily compare protocols and networking technologies and get near real time responses with regards to bandwidth utilisation. Our hypothesis is that an application-level capability can be developed which use
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Brande, Julia K. Jr. "Computer Network Routing with a Fuzzy Neural Network." Diss., Virginia Tech, 1997. http://hdl.handle.net/10919/29685.

Texto completo da fonte
Resumo:
The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. As more individuals transmit data through a computer network, the quality of service received by the users begins to degrade. A major aspect of computer networks that is vital to quality of service is data routing. A more effective method for routing data through a computer network can assist with the new problems being encountered with today's growing networks. Effective routing algorithms use various techniques to determine the most
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kusetoğulları, Hüseyin. "Network routing optimisation and effective multimedia transmission to enhance QoS in communication networks." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/46802/.

Texto completo da fonte
Resumo:
With the increased usage of communication services in networks, finding routes for reliable transmission and providing effective multimedia communication have become very challenging problems. This has been a strong motivation to examine and develop methods and techniques to find routing paths efficiently and to provide effective multimedia communication. This thesis is mainly concerned with designing, implementing and adapting intelligent algorithms to solve the computational complexity of network routing problems and testing the performance of intelligent algorithms’ applications. It also in
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Zhao, Wenrui. "Routing and Network Design in Delay Tolerant Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14085.

Texto completo da fonte
Resumo:
Delay tolerant networks (DTNs) are a class of emerging networks that exhibit significantly different characteristics from today's Internet, such as intermittent connectivity, large delay, and high loss rates. DTNs have important applications in disaster relief, military, rural Internet access, environmental sensing and surveillance, interplanetary communication, underwater sensing, and vehicular communication. While not the common case for networking, DTNs represent some of the most critical cases, where the ability to communicate can make a huge difference for human lives. Supporting effecti
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Ekici, Eylem. "Routing and multicasting in satellite IP networks." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15605.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

McKenzie, Neil R. "The Cranium network interface architecture : support for message passing on adaptive packet routing networks /." Thesis, Connect to this title online; UW restricted, 1997. http://hdl.handle.net/1773/6874.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Xie, Jing. "A Temporal Network Calculus for Performance Analysis of Computer Networks." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14619.

Texto completo da fonte
Resumo:
One inevitable trend of network development is to deliver information with various traffic characteristics and diverse Quality of Service (QoS) requirements. In response to the continually growing demand for more bandwidth, network performance analysis is needed to optimize the performance of existing technologies and evaluate the efficiency of new ones. Performance analysis investigates how traffic management mechanisms deployed in the network affect the resource allocation among users and the performance which the users experience. This topic can be investigated by constructing models of tra
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Hall, Kristopher Joseph. "Thwarting Network Stealth Worms in Computer Networks through Biological Epidemiology." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/27726.

Texto completo da fonte
Resumo:
This research developed a system, Rx, to provide early identification and effective control of network stealth worms in digital networks through techniques based on biological epidemiology. Network stealth worms comprise a class of surreptitious, self-propagating code that spread over network connections by exploiting security vulnerabilities in hosts. Past outbreaks due to traditional worms subverted hundreds of thousands of machines. Network stealth worms exacerbate that threat by using clandestine methods to maintain a persistent presence in the network.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Kumar, Rajesh. "An access layer protocol for parallel networks." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07102009-040559/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Texto completo da fonte
Resumo:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagra
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Jannotti, John 1974. "Network layer support for overlay networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29274.

Texto completo da fonte
Resumo:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (p. 98-103).<br>Overlay networks are virtual networks formed by cooperating nodes that share an underlying physical network. They represent a flexible and deployable approach for applications to obtain new network semantics without modification of the underlying network, but they suffer from efficiency concerns. This thesis presents two new primitives for implementation in the network layer (i.e., the routers of the physical network). These
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Kim, MinJi Ph D. Massachusetts Institute of Technology. "Network coding for robust wireless networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71276.

Texto completo da fonte
Resumo:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student submitted PDF version of thesis.<br>Includes bibliographical references (p. 157-167).<br>Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwid
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Baronikian, Haig. "Modelling and analysis of a computer conferencing system." Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=63756.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Weehuizen, Hermanis Frans. "Simulation of distributed computer networks." Doctoral thesis, University of Cape Town, 1987. http://hdl.handle.net/11427/21869.

Texto completo da fonte
Resumo:
Bibliography: pages 77-80.<br>This is a study of the simulated performance of two local area networks, Ethernet and the MAP network, respectively based on the IEEE standards 802.3 and 802.4. The simulation language chosen is of the discrete event type rather than the more usual analytical model. This is done in order to observe the interaction between the various entities of a network in order to gain a better understanding of the method of operation of such a system. The performance demanded of a node entity by the networks is determined. The performance of some commercially available hardwar
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Barenco, Martino. "Packet traffic in computer networks." Thesis, Queen Mary, University of London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.399750.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Johnson, Nicholas Alexander. "Delay estimation in computer networks." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4595.

Texto completo da fonte
Resumo:
Computer networks are becoming increasingly large and complex; more so with the recent penetration of the internet into all walks of life. It is essential to be able to monitor and to analyse networks in a timely and efficient manner; to extract important metrics and measurements and to do so in a way which does not unduly disturb or affect the performance of the network under test. Network tomography is one possible method to accomplish these aims. Drawing upon the principles of statistical inference, it is often possible to determine the statistical properties of either the links or the path
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Shu, Jesse C. "Protocol conversion for computer networks /." The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487686243820478.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Ioannidou, Polyxeni. "Anomaly Detection in Computer Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295762.

Texto completo da fonte
Resumo:
In this degree project, we study the anomaly detection problem in log files of computer networks. In particular, we try to find an efficient way to detect anomalies in our data, which consist of different logging messages from different systems in CERN’s network for the LHC-b experiment. The contributions of the thesis are double: 1) The thesis serves as a survey on how we can detect threats, and errors in systems that are logging a huge amount of messages in the databases of a computer network. 2) Scientists in the LHC-b experiment make use of the Elasticsearch, which is an open source search
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Soewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Texto completo da fonte
Resumo:
Thesis (Ph. D.)--Southern Illinois University Carbondale, 2009.<br>"Department of Electrical and Computer Engineering." Keywords: Adaptive security, Computer networks, Intrusion detection. Includes bibliographical references (p. 78-84). Also available online.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Dahal, Subharoj. "Implementing a redundant solution to improve network system reliability at XYZ Hospital." Online version, 2009. http://www.uwstout.edu/lib/thesis/2009/2009dahals.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Webb, Tristan J. "Biologically plausible attractor networks." Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/57476/.

Texto completo da fonte
Resumo:
Attractor networks have shownmuch promise as a neural network architecture that can describe many aspects of brain function. Much of the field of study around these networks has coalesced around pioneering work done by John Hoprield, and therefore many approaches have been strongly linked to the field of statistical physics. In this thesis I use existing theoretical and statistical notions of attractor networks, and introduce several biologically inspired extensions to an attractor network for which a mean-field solution has been previously derived. This attractor network is a computational ne
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Fang, Jun-Wai 1960. "Design and performance evaluation of a proposed backbone network for PC-Networks interconnection." Thesis, The University of Arizona, 1989. http://hdl.handle.net/10150/276941.

Texto completo da fonte
Resumo:
This thesis is concerned with the design of a high-speed backbone network which provides a high bandwidth interconnection for various Personal Computer Networks (PC-Networks) with an integrated service of voice and data. With the advanced technology of optical fiber as the transmission medium, several different existing topologies and protocols are discussed for the backbone network design. The token ring protocol is simulated and evaluated to find out a suitable buffer size and the length of voice and data packet for backbone network. The Network II.5 simulation tool is applied to simulate th
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Tam, Wing-yan. "Quality of service routing with path information aggregation." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36782956.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Montgomery, Michael Charles. "Managing complexity in large-scale networks via flow and network aggregation /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Zhao, Xiaogeng. "An adaptive approach for optimized opportunistic routing over Delay Tolerant Mobile Ad hoc Networks." Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1004822.

Texto completo da fonte
Resumo:
This thesis presents a framework for investigating opportunistic routing in Delay Tolerant Mobile Ad hoc Networks (DTMANETs), and introduces the concept of an Opportunistic Confidence Index (OCI). The OCI enables multiple opportunistic routing protocols to be applied as an adaptive group to improve DTMANET routing reliability, performance, and efficiency. The DTMANET is a recently acknowledged networkarchitecture, which is designed to address the challenging and marginal environments created by adaptive, mobile, and unreliable network node presence. Because of its ad hoc and autonomic nature,
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Morley, George David. "Analysis and design of ring-based transport networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60329.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Kuhr, Mark Gregory Hamilton John A. "An adaptive jam-resistant cross-layer protocol for mobile ad-hoc networks In noisy environments." Auburn, Ala., 2009. http://hdl.handle.net/10415/1611.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Smeda, Adel Abdullah. "Application of the Hopfield neural network in routing for computer networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ39701.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Texto completo da fonte
Resumo:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Lee, Anna H. "Simplified random network codes for multicast networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33306.

Texto completo da fonte
Resumo:
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.<br>Includes bibliographical references (p. 43).<br>Network coding is a method of data transmission across a network which involves coding at intermediate nodes. Network coding is particularly attractive for multicast. Building on the work done on random linear network codes, we develop a constrained, simplified code construction suitable for multicast in wireless networks. We analyze bounds on sufficient code size and code success probability via an algebraic framework
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Shi, Xiaomeng Ph D. Massachusetts Institute of Technology. "Energy aware network coding in wireless networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78533.

Texto completo da fonte
Resumo:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 97-104).<br>Energy is one of the most important considerations in designing reliable low-power wireless communication networks. We focus on the problem of energy aware network coding. In particular, we investigate practical energy efficient network code design for wireless body area networks (WBAN). We first consider converge-cast in a star-shaped topology, in which a central base station (BS), or
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Texto completo da fonte
Resumo:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Gong, Shujia. "Solutions to constrained path computation in multi-layer networks." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2932.

Texto completo da fonte
Resumo:
Thesis (Ph. D.)--George Mason University, 2007.<br>Title from PDF t.p. (viewed Jan. 18, 2008). Thesis director: Bijan Jabbari Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Vita: p. 113. Includes bibliographical references (p. 109-112). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

You, Bo. "Hub-Network for Distance Computation in Large Social Networks." Kent State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=kent1412601464.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Wells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Texto completo da fonte
Resumo:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access P
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Kim, Anthony Eli. "On network coding capacity : matroidal networks and network capacity regions." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62657.

Texto completo da fonte
Resumo:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 68-70).<br>One fundamental problem in the field of network coding is to determine the network coding capacity of networks under various network coding schemes. In this thesis, we address the problem with two approaches: matroidal networks and capacity regions. In our matroidal approach, we prove the converse of the theorem which states that, if a network is scalar-linearly solvable then it is a m
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Chaltseva, Anna. "Network state estimation in wireless multi-hop networks." Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-26357.

Texto completo da fonte
Resumo:
Multi-hop wireless networks in general and those built upon IEEE 802.11 standard in particular are known for their highly dynamic and unstable performance. The commonly accepted way for improving the situation is to jointly optimize the performance of protocols across different communications layers. Being able to characterize a state of the network is essential to enable the cross-layer optimization. This licentiate thesis investigates methods for passive characterization of network state at medium access control and transport layers based on information accessible from the corresponding lay
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Medina, Andres. "Statistical approach to neighborhood congestion control in ad hoc wireless networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 54 p, 2008. http://proquest.umi.com/pqdweb?did=1456291921&sid=7&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Glazer, D. W. (David W. ). "On routing and congestion control in computer communications networks." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66146.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Somers, Harriet. "A neural computer." Thesis, University of York, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362021.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Texto completo da fonte
Resumo:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Vestin, Jonathan. "SDN-Enabled Resiliency in Computer Networks." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-66992.

Texto completo da fonte
Resumo:
In computer networking, failures, such as breaking equipment, cable cuts, power failures and human errors continuously cause communication interruptions. Such failures may result in dissatisfied customers, loss of product reputation, violation of SLAs and even critical failures in industrial systems. SDN, which logically centralizes the control plane, is an emerging technology in computer networking. The global view provided by the SDN controller can be used to reconfigure the network in case of a link failure. However, this reconfiguration may take too long for high availability networks. Wit
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Brooks, Piete. "Distribution of functions in computer networks." Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335601.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!