Search

Showing total 7,937 results

Search Constraints

Start Over You searched for: Topic computer networks Remove constraint Topic: computer networks Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources Database Academic Search Index Remove constraint Database: Academic Search Index
7,937 results

Search Results

1. IAC-21-E-9 (Paper ID: 67116) Information sharing for the mitigation of outer space–related cybersecurity threats.

2. Cloud-Supported Preservation of Digital Papers: A Solution for Special Collections?

3. Research and implementation of network communication based on embedded monitoring system.

4. A solution process for simulation-based multiobjective design optimization with an application in the paper industry.

5. A comprehensive analysis of various cyber attack datasets used for intrusion detection system.

6. JUNO distributed computing system.

7. Implementation model architecture software defined network using raspberry Pi: a review paper.

8. A collaborative approach for research paper recommender system.

9. Social and content aware One-Class recommendation of papers in scientific social networks.

10. Ethical Considerations in Network Measurement Papers.

11. Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0.

12. Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach.

13. Structural and Spectral Properties of Chordal Ring, Multi-Ring, and Mixed Graphs.

14. An optimization scheme for vehicular edge computing based on Lyapunov function and deep reinforcement learning.

15. Network Time Protocol based Black Box Timing Accuracy Analysis for Internet of Things Devices.

16. A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm.

17. Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer.

18. Attributing digital covert action: the curious case of WikiSaudiLeaks.

19. APPROXIMATE AND EXACT RESULTS FOR THE HARMONIOUS CHROMATIC NUMBER.

20. Real-Time Remote Monitoring and Overheating Early Warning of Thermodynamic State of Complex Equipment Systems Based on Computer Network Technology.

21. Exploring the role of firewall technology in securing computer networks in the 5G environment.

22. Job CPU Performance comparison based on MINIAOD reading options: Local versus remote.

23. A Named Data Networking Based Fast Open Storage System Plugin for XRootD.

24. Implementation of ACME-based automated centralized certificate management system.

25. Cyclic edge and cyclic vertex connectivity of [formula omitted]-fullerene graphs.

26. Securing IoT networks in cloud computing environments: a real-time IDS.

27. A universal parallel simulation framework for energy pipeline networks on high-performance computers.

28. Anomaly Detection Integration-Framework for Network Services in Computer Education Systems.

29. A Low-Computational Burden Closed-Form Approximated Expression for MSE Applicable for PTP with gfGn Environment.

30. Messy Broadcasting in Grid.

31. Advancements in intrusion detection: A lightweight hybrid RNN-RF model.

32. INVESTIGATING VIRUS SPREAD ANALYSIS IN COMPUTER NETWORKS WITH ATANGANA–BALEANU FRACTIONAL DERIVATIVE MODELS.

33. CFAuditChain: Audit BlockChain Based On Cuckoo Filter.

34. Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks.

35. Link Residual Closeness of Graphs with Fixed Parameters.

36. Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification.

37. Hybrid ITÖ Algorithm for Maximum Scatter Colored Traveling Salesman Problem.

38. Strongly Menger Connectedness of a Class of Recursive Networks.

39. The Relationship between Technology of Higher Education in the Case of European Countries, a Panel Approach.

40. Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions.

41. Analysis of packet switching in VoIP telephony at the command post of tactical level units.

42. Intrusion detection system based on machine learning models: An empirical analysis.

43. A modified technique of workload distribution in the fog-computing environment.

44. A review on routing algorithms in software-defined network (SDN).

45. Effective organization of personal data protection.

46. Measurements of the non-ionizing radiation of 5G base station of mobile operator Makedonski telekom AD skopje and electricity supply with photovoltaic plant.

47. Social networking federation: A position paper

48. Same system, different outcomes: Comparing the transitions from two paper-based systems to the same computerized physician order entry system

49. A gradient-based binary feedback scheme for congestion control in computer networks<FNR></FNR><FN>The views expressed in this paper do not necessarily represent those of Nortel Networks. </FN>.

50. Modelling of wireless TCP for short-lived flows<FNR></FNR><FN>A preliminary version of this paper has appeared in the Proceedings of the IEEE Vehicular Technology Conference (VTC) 2003-Spring, Jeju, Korea, April 2003. </FN>.