Results 271 to 280 of about 11,841,471 (334)
Some of the next articles are maybe not open access.
1970
Abstract : This is the final report for the ARPA Contract number DAHC 15-73-C- 0368 at UCLA covering the period from Jun3 15, 1973 to November 30, 1975. During this contract period we have been engaged in the following tasks: providing a sophisticated network measurement facility adequate for a variety of uses such as performance measurement, model ...
openaire +1 more source
Abstract : This is the final report for the ARPA Contract number DAHC 15-73-C- 0368 at UCLA covering the period from Jun3 15, 1973 to November 30, 1975. During this contract period we have been engaged in the following tasks: providing a sophisticated network measurement facility adequate for a variety of uses such as performance measurement, model ...
openaire +1 more source
When Should The Network Be The Computer?
USENIX Workshop on Hot Topics in Operating Systems, 2019Researchers have repurposed programmable network devices to place small amounts of application computation in the network, sometimes yielding orders-of-magnitude performance gains. At the same time, effectively using these devices requires careful use of
Dan R. K. Ports, J. Nelson
semanticscholar +1 more source
International Scientific Journal of Engineering and Management, 2023
Computer networks are essential components of modern computing systems. They allow computers to communicate with each other and access shared resources, such as databases and file servers. This paper examines the different types of computer networks, their components, and how they interact. It also discusses the various protocols used for communication
openaire +1 more source
Computer networks are essential components of modern computing systems. They allow computers to communicate with each other and access shared resources, such as databases and file servers. This paper examines the different types of computer networks, their components, and how they interact. It also discusses the various protocols used for communication
openaire +1 more source
Computer network intrusion detection using sequential LSTM Neural Networks autoencoders
Signal Processing and Communications Applications Conference, 2018A. Mirza, Selin Cosan
semanticscholar +1 more source
A Review of Computer Vision Methods in Network Security
IEEE Communications Surveys and Tutorials, 2021Rahat Masood, Suranga Seneviratne
exaly
4K-DMDNet: diffraction model-driven network for 4K computer-generated holography
Opto-Electronic Advances, 2023Zehao He
exaly
Guide to Computer Network Security, 4th Edition
Computer Communications and Networks, 2017J. M. Kizza
semanticscholar +1 more source
Computer network intrusion detection using various classifiers and ensemble learning
Signal Processing and Communications Applications Conference, 2018A. Mirza
semanticscholar +1 more source

