Results 41 to 50 of about 1,267,704 (337)
Guaranteed Quantization Error Computation for Neural Network Model Compression [PDF]
Neural network model compression techniques can address the computation issue of deep neural networks on embedded devices in industrial systems. The guaranteed output error computation problem for neural network compression with quantization is addressed in this paper. A merged neural network is built from a feedforward neural network and its quantized
arxiv
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj +1 more source
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović+2 more
doaj +1 more source
Computation Diversity in Emerging Networking Paradigms [PDF]
Nowadays, computation is playing an increasingly more important role in the future generation of computer and communication networks, as exemplified by the recent progress in software defined networking (SDN) for wired networks as well as cloud radio access networks (C-RAN) and mobile cloud computing (MCC) for wireless networks.
arxiv +1 more source
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj +1 more source
Suppose you want to build a computer network, one that has the potential to grow to global proportions and to support applications as diverse as teleconferencing, video on demand, electronic commerce, distributed computing, and digital libraries. What available technologies would serve as the underlying building blocks, and what kind of software ...
Peterson, Larry L., Davie, Bruce S.
openaire +1 more source
Pentesting using Ethical Hacking techniques in IPv6 networks
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio+2 more
doaj +1 more source
The Computer Networks laboratory works and methodical guidelines are designed to help students to acquire knowledge about computer network technologies, network equipment, network design principles, configuration and troubleshooting tasks. Twelve laboratory works are presented in the book.
Paulauskas, Nerijus, Garšva, Eimantas
openaire +2 more sources
Computer networks in education [PDF]
In order to deepen practical knowledge of students within the subject “Computer Networks”, a monitoring network system has been developed which is able to read, collect and distribute data describing real technological process. The monitoring system design is based on a client/server architecture.
Adámek, Milan+2 more
openaire +4 more sources
Computer Network Vulnerabilities [PDF]
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
Kizza J.
europepmc +3 more sources