Results 231 to 240 of about 1,126,443 (291)
Quantum-resilient cross-trust evaluation for zero trust 5G security. [PDF]
Jeysuriya K, Renjith PN, Sudhakaran G.
europepmc +1 more source
Spectral efficient and high data rate ring topology based UWOC system with carrier-free optical add-drop nodes. [PDF]
Armghan A +6 more
europepmc +1 more source
AI-driven routing and layered architectures for intelligent ICT in nanosensor networked systems. [PDF]
Yousif Dafhalla AK +6 more
europepmc +1 more source
Autonomous vehicles with augmented reality internet of things and edge intelligence system for industry 5.0 based on 6G. [PDF]
Ahmed AA +9 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Communication Control in Computer Networks
IFAC Proceedings Volumes, 1979Abstract The problem of controlling data exchange in computer networks with respect to real, in particular stochastic, interferences, and user's requirements, expressed by performance criteria, is discussed. First, the control problem is studied in the 2-station model by means of the concept of communication functions and protocols the latter being a
J.F. Puˆman, R. Poˆízek
openaire +1 more source
Computer communications networks
Proceedings of the May 19-22, 1975, national computer conference and exposition on - AFIPS '75, 1975Advances in computer and communication technologies are profoundly affecting the nature, structure, and operation of computer-communications networks. The joint exploitation of these technologies while promising seemingly unlimited operational possibilities, generates an almost endless parade of issues for the designer, supplier, user, and regulator of
openaire +1 more source
Computer Network Communications
1996There are several wide-area computer networks around the world that are used extensively by the space and Earth science community. These networks can be grouped by the computer communications protocol that they implement such as TCP/IP, NJE, X.25 and DECnet. The Internet (or TCP/IP Internet) uses TCP/IP, BITNET uses NJE, the international public packet
Walter Dieminger +2 more
openaire +1 more source
Securing computer networks communication by modifying computer network communication protocols
2011 11th International Conference on ITS Telecommunications, 2011This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data.
openaire +1 more source

