Results 41 to 50 of about 1,267,704 (337)

Guaranteed Quantization Error Computation for Neural Network Model Compression [PDF]

open access: yesarXiv, 2023
Neural network model compression techniques can address the computation issue of deep neural networks on embedded devices in industrial systems. The guaranteed output error computation problem for neural network compression with quantization is addressed in this paper. A merged neural network is built from a feedforward neural network and its quantized
arxiv  

Algoritmi selektivnog šifrovanja - pregled sa ocenom performansi / Selective encryption algorithms: Overview with performance evaluation

open access: yesVojnotehnički Glasnik, 2010
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj   +1 more source

Realizacija računarske mreže vojnomedicinske akademije / Medical military academy information system management

open access: yesVojnotehnički Glasnik, 2005
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović   +2 more
doaj   +1 more source

Computation Diversity in Emerging Networking Paradigms [PDF]

open access: yes, 2017
Nowadays, computation is playing an increasingly more important role in the future generation of computer and communication networks, as exemplified by the recent progress in software defined networking (SDN) for wired networks as well as cloud radio access networks (C-RAN) and mobile cloud computing (MCC) for wireless networks.
arxiv   +1 more source

Network traffic anomalies detecting using maximum entropy method / Kompiuterių tinklo srauto anomalijų atpažinimas maksimalios entropijos metodu

open access: yesMokslas: Lietuvos Ateitis, 2014
The problem of traffic anomalies in computer networks is analyzed. NetFlow packets are used as network traffic data and maximum entropy methods is used for anomalies detection.
Dalius Mažeika, Saulius Jasonis
doaj   +1 more source

computer network

open access: yes, 2021
Suppose you want to build a computer network, one that has the potential to grow to global proportions and to support applications as diverse as teleconferencing, video on demand, electronic commerce, distributed computing, and digital libraries. What available technologies would serve as the underlying building blocks, and what kind of software ...
Peterson, Larry L., Davie, Bruce S.
openaire   +1 more source

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

Computer Networks [PDF]

open access: yes, 2012
The Computer Networks laboratory works and methodical guidelines are designed to help students to acquire knowledge about computer network technologies, network equipment, network design principles, configuration and troubleshooting tasks. Twelve laboratory works are presented in the book.
Paulauskas, Nerijus, Garšva, Eimantas
openaire   +2 more sources

Computer networks in education [PDF]

open access: yesMATEC Web of Conferences, 2017
In order to deepen practical knowledge of students within the subject “Computer Networks”, a monitoring network system has been developed which is able to read, collect and distribute data describing real technological process. The monitoring system design is based on a client/server architecture.
Adámek, Milan   +2 more
openaire   +4 more sources

Computer Network Vulnerabilities [PDF]

open access: yesA Guide to Computer Network Security, 2009
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
Kizza J.
europepmc   +3 more sources

Home - About - Disclaimer - Privacy