Results 21 to 30 of about 2,741,581 (316)

Computer & Network Equipment Management System (CNEMAS) Application Measurement

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2020
ABC is one of the state-owned enterprises in Indonesia. PT. ABC has policy to give some equipment for employees to rent. Application use to control all equipment that rent by employee named as CNEMAS (Computer & Network Equipment Management System ...
Imelda Pangaribuan   +2 more
doaj   +1 more source

Compute First Networking

open access: yesProceedings of the 6th ACM Conference on Information-Centric Networking, 2019
Modern distributed computing frameworks and domain-specific languages provide a convenient and robust way to structure large distributed applications and deploy them on either data center or edge computing environments. The current systems suffer however from the need for a complex underlay of services to allow them to run effectively on existing ...
Krol, Michal   +4 more
openaire   +2 more sources

Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation

open access: yesVojnotehnički Glasnik, 2010
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj   +1 more source

Network traffic anomalies detecting using maximum entropy method / Kompiuterių tinklo srauto anomalijų atpažinimas maksimalios entropijos metodu

open access: yesMokslas: Lietuvos Ateitis, 2014
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj   +1 more source

Secret information security system in computer network based on Bayesian classification and nonlinear algorithm

open access: yesNonlinear Engineering, 2022
To solve the problem that most computer network security assessment systems cannot comprehensively analyze data, this article proposes a research method for computer network confidentiality information security system based on the Bayesian classification
Wu Hao
doaj   +1 more source

Discriminative Cooperative Networks for Detecting Phase Transitions [PDF]

open access: yes, 2018
The classification of states of matter and their corresponding phase transitions is a special kind of machine-learning task, where physical data allow for the analysis of new algorithms, which have not been considered in the general computer-science ...
Liu, Ye-Hua   +1 more
core   +2 more sources

The one-way quantum computer - a non-network model of quantum computation

open access: yes, 2001
A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation.
Briegel, Hans J.   +2 more
core   +1 more source

Using Data Communication to Give Ease in Hotel Room Services

open access: yesComTech, 2011
Gaining extra comfort in a trip is an important factor. Staying in a hotel needs food, laundry, and other activities that can make guests comfortable. The guesses’ requests are usually ordered to the Room Service.
Rudi Tjiptadi
doaj   +1 more source

A Metadata Registry for Metadata Interoperability

open access: yesData Science Journal, 2007
In order to use distributed and heterogeneous scientific databases effectively, semantic heterogeneities have to be detected and resolved. To solve this problem, we propose architecture for managing metadata and metadata schema using a metadata registry.
Jian-hui Li   +4 more
doaj   +1 more source

A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in ...
Rana F. Ghani, Ahmed T. Sadik
doaj   +1 more source

Home - About - Disclaimer - Privacy