Results 21 to 30 of about 486,360 (195)
Mathematical Model of VPN in a Special Purpose Telecommunication Network
The purpose of the article is to develop a mathematical model of VPN in communication networks of special purpose, which allows to determine the margin of throughput, for scheduled VPN-tunnels.
S. S. Vrublevsky +2 more
doaj +1 more source
Harnessing HPC resources for CMS jobs using a Virtual Private Network [PDF]
The processing needs for the High Luminosity (HL) upgrade for the LHC require the CMS collaboration to harness the computational power available on non-CMS resources, such as High-Performance Computing centers (HPCs). These sites often limit the external
Tovar Benjamin +4 more
doaj +1 more source
Virtual Network Construction Technique, Treating All VPNs Simultaneously
In the paper, a new construction technique for virtual network (e.g., Virtual Private Network (VPN)) based on flow permutation algorithm is proposed. In existing methods for creating virtual networks, whereby virtual networks are constructed one by one ...
Srecko Krile, Martin Medvecky
doaj +1 more source
Implementasi Jaringan Virtual Privat Network (Vpn) dan Teknologi Jaringan Vlan pada Kantor Kecamatan Pasar Rebo [PDF]
Systematics distributing information quickly and effectively to improve the performance of the network is the ability to divide a large broadcast domain into several smaller broadcast domains using VLANs (Virtual Local Area Network).
Hamid, A. (Abdul) +1 more
core +2 more sources
Hearing loss classification via stationary wavelet entropy and Biogeography-based optimization [PDF]
Introduction: Sensorineural hearing loss is associated with many complications and needs timely detection and diagnosis. Objectives: Optimize the sensorineural hearing loss detection system to improve the accuracies of image detection.
Chong Yao, Chaosheng Tan, Junding Sun
doaj +1 more source
PROVISIONING RESTORABLE VIRTUAL PRIVATE NETWORKS USING BARABASI AND WAXMAN TOPOLOGY GENERATION MODEL [PDF]
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks.
R. Ravi
doaj
The COVID-19 pandemic abruptly forced changes in how to conduct multicenter clinical research. Gone were the days of face-to-face meetings and working together in person. Virtual teams became the norm rather than exception.
Stephanie Lowenhaupt, Angela Molloy
doaj +1 more source
Virtual Private Ad Hoc Networking [PDF]
The fact that a lot of applications require secure communication to take place only between a dynamic subset of distributed devices sharing a common context, is, from a network point of view, very challenging and demanding. Existing technologies such as VPN, P2P overlays or VLANs can only partially respond to these requirements. This observation is the
Hoebeke, Jeroen +4 more
openaire +2 more sources
Towards a virtualized Internet for computer networking assignments [PDF]
By combining virtualization technologies, virtual private network techniques and parameterization of network scenarios it is possible to enhance a networking laboratory, typically carried out in university laboratory premises using equipment located ...
Bellido Triana, Luis +2 more
core +1 more source
Quantum Cryptography in Practice [PDF]
BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks.
Elliott, Chip +2 more
core +2 more sources

