Results 11 to 20 of about 1,267,704 (337)

Computation in Complex Networks [PDF]

open access: yesEntropy, 2021
The Special Issue on “Computation in Complex Networks” focused on gathering highly original papers in the field of current complex network research [...]
Pizzuti C, Socievole A
openaire   +6 more sources

The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]

open access: yesMATEC Web of Conferences, 2022
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj   +1 more source

Congestion Avoidance and Control in Internet Router Based on Fuzzy AQM [PDF]

open access: yesEngineering and Technology Journal, 2021
The internet has made the world a little community, linking millions of people, organizations, and equipment for different purposes. The great impact of these networks in our lives makes their efficiency a vital matter to take care of, and this needs ...
Hanan M. Kadhim, Ahmed A. Oglah
doaj   +1 more source

Computing in Social Networks [PDF]

open access: yesInformation and Computation, 2010
This paper defines the problem of Scalable Secure Computing in a Social network: we call it the S3 problem. In short, nodes, directly reflecting on associated users, need to compute a function f: V->U of their inputs in a set of constant size, in a scalable and secure way.
Giurgiu, Andrei   +3 more
openaire   +13 more sources

Is the network capable of computation? [PDF]

open access: yes2013 21st IEEE International Conference on Network Protocols (ICNP), 2013
Ensuring correct network behavior is hard. Previous state of the art has demonstrated that analyzing a network containing middleboxes is hard. In this paper, we show that even using only statically configured switches, and asking the simplest possible question – “Will this concrete packet reach the destination?” – can make the problem intractable ...
Peresini, Peter, Kostic, Dejan
openaire   +5 more sources

Price Method and Network Congestion Control

open access: yesJournal of Telecommunications and Information Technology, 2023
Price instruments are useful in achieving market balance conditions in various markets. Those instruments can be also used for control of other composite systems.
Krzysztof Malinowski   +2 more
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

Optimization technique based on cluster head selection algorithm for 5G-enabled IoMT smart healthcare framework for industry

open access: yesPaladyn, 2022
Internet of medical things (IoMT) communication has become an increasingly important component of 5G wireless communication networks in healthcare as a result of the rapid proliferation of IoMT devices.
Jaaz Zahraa A.   +3 more
doaj   +1 more source

A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2020
Subject of research: the process of monitoring the quality indicators of a computer network of a forensic information system using methods for increasing the frequency resolution of acousto-optic spectrum analyzers.
Mykhailo Mozhaiev, Pavlo Buslov
doaj   +1 more source

Computer & Network Equipment Management System (CNEMAS) Application Measurement

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2020
ABC is one of the state-owned enterprises in Indonesia. PT. ABC has policy to give some equipment for employees to rent. Application use to control all equipment that rent by employee named as CNEMAS (Computer & Network Equipment Management System ...
Imelda Pangaribuan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy