Search

Your search keyword '"Networking hardware"' showing total 5,936 results

Search Constraints

Start Over You searched for: Descriptor "Networking hardware" Remove constraint Descriptor: "Networking hardware"
5,936 results on '"Networking hardware"'

Search Results

201. A Grey Wolf optimization algorithm with its application on the controller placement problem

202. Information transmission system based on visual recognition between internal and external networks under physical isolation

203. SOAR: Minimizing Network Utilization with Bounded In-network Computing

204. Birds of a Feather Flock Together

205. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools

206. NMAP: Power Management Based on Network Packet Processing Mode Transition for Latency-Critical Workloads

207. Deploying Fake Network Devices to Obtain Sensitive User Data

208. Implementing Data Security in Delay Tolerant Network in Post-disaster Management

209. AI-assisted intent-based traffic grooming in a dynamically shared 5g optical fronthaul network

210. EveryWAn- An Open Source SD-WAN solution

211. Ultrafast machine vision with artificial neural network devices based on a GaN-based micro-LED array

212. Intrusion Detection Using Deep Learning

213. SDN Augmented Network Management For Future Avionics Communications Network

214. A High-Level Ontology Network for ICT Infrastructures

215. An Ml-Based Memory Leak Detection Scheme for Network Devices

216. An Intelligent Fault Location Approach Using Fuzzy Logic for Improving Autonomous Network

217. Energy-Aware Resource Scheduling in FoG Environment for IoT-Based Applications

218. Multiple-Layer-Topology Discovery Method Using Traffic Information

219. Planter: seeding trees within switches

220. Mobile Network Traffic Prediction Using High Order Markov Chains Trained At Multiple Granularity

221. QUIC Protocol Based Monitoring Probes for Network Devices Monitor and Alerts

222. Supporting Real-Time ${T}$-Queries on Network Traffic with a Cloud-Based Offloading Model

223. Daps: A Dynamic Asynchronous Progress Stealing Model for MPI Communication

224. On the Quantum Performance Evaluation of Two Distributed Quantum Architectures

225. A Comparative Analysis of Deep Learning Approaches in Intrusion Detection System

226. A Pseudonym-based Anonymous Routing Mechanism under Multi-controller SDN Architecture

227. A Novel Objective Function for Frequency Switching Cost Aware RPL Algorithm

228. Are WANs Ready for Optical Topology Programming?

229. Secure Keyed Hashing on Programmable Switches

230. Cost-effective capacity provisioning in wide area networks with Shoofly

231. Remote Production System Concept Utilizing Optical Networks and Proof-of-concept for 8K Production

232. Root Cause Analysis in 5G/6G Networks

233. Optimization of open flow controller placement in software defined networks

234. Undergraduate students’ device preferences in the transition to online learning

235. Critical Analysis of Virtual LAN and Its Advantages for the Campus Networks

236. Implementation of Layer 2 MPLS VPN on the SDN Hybrid Network using Ansible and ONOS Controllers

237. A practical approach for applying machine learning in the detection and classification of network devices used in building management

238. Development and Implementation of Counselor Work Management Information System based on MySQL and Data Center

239. A crosstalk-aware and energy-saving survivable RSCA for online prioritized traffic in SDM-EONs

240. Towards Extracting Semantics of Network Config Blocks

241. Diseño e implementación de un sistema de monitoreo de red para infraestructura de campus usando agentes de software

242. Demo: Disaggregated Dataplanes

243. A Quantitative Causal Analysis for Network Log Data

244. Super-Cloudlet: Rethinking Edge Computing in the Era of Open Optical Networks

245. Haechi: A Token-based QoS Mechanism for One-sided I/Os in RDMA based Storage System

246. Logistic Regression Analysis of Online Course Click Rate

247. LiONv2: An Experimental Network Construction Tool Considering Disaggregation of Network Configuration and Device Configuration

248. Leveraging In-Network Computing and Programmable Switches for Streaming Analysis of Scientific Data

249. Mind the Semantic Gap: Policy Intent Inference from Network Metadata

250. Towards Understanding the Performance of Traffic Policing in Programmable Hardware Switches

Catalog

Books, media, physical & digital resources