Showing 1 - 20 results of 380 for search '"Computer network"', query time: 0.09s Refine Results
  1. 1

    Computer Networks : principles, technologies, and protocols for network design / by Olifer, Natalia

    Published 2006
    Subjects: “…Computer networks Textbooks. 3870…”
    Table of contents only
    Publisher description
    View in OPAC
    Book
  2. 2

    Computer Networks / by Tanenbaum, Andrew S.

    Published 2014
    Subjects: “…Computer networks 10303…”
    View in OPAC
    Book
  3. 3

    Future vehicular fog computing networks by Ning HUI, Jie WU, Yiqing ZHOU, Ling LIU, Zhengang PAN

    Published 2020-06-01
    “…Facing the requirements of secure and reliable vehicle driving,internet of vehicles requires high real-time information transmission and processing,high data storage and security using capacity,and high flexibility and inclusiveness of network architecture.The future vehicular fog computing network can reduce the data transmission and processing delay based on the characteristics of fog computing deployed at the edge of the network,can ensure data security based on the characteristics of fog computing black box operation,and can make heterogeneous facilities connect with other devices and make sure resource sharing between vehicle nodes based on the fog computing distributed architecture.The future vehicular fog computing networks were reviewed,the architecture,challenges,and key technologies of vehicle fog computing were introduced,the communication and computing resource sharing and task collaboration in the mobile state,vehicle fog computing security,and vehicle fog computing heterogeneity of facilities were focused on .Finally,a three-level management and control architecture for vehicular fog computing networks were proposed to promote the development of internet of vehicles to on-networking collaborative decision-making and control.…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Research on the development of intelligent computing network for large models by GUO Liang, WANG Shaopeng, QUAN Wei, LI Jie

    Published 2024-06-01
    “…The requirements and related key technologies of intelligent computing networks for large model training were studied, and the standard specifications, academic research, and case practices of intelligent computing networks were analyzed, in order to promote the development of intelligent computing networks.…”
    Get full text
    Article
  7. 7

    Peculiarities of rendering of material in virtual computers' network course by Liudvikas Kaklauskas

    Published 2004-12-01
    “… Problems of singling out the most important themes of distance computers' network course are analyzed in the present article. …”
    Get full text
    Article
  8. 8

    Network Restoration for Next-Generation Communication and Computing Networks by B. S. Awoyemi, A. S. Alfa, B. T. Maharaj

    Published 2018-01-01
    “…Journal of Computer Networks and Communications…”
    Get full text
    Article
  9. 9

    PERFORMANCE REQUIRED FOR COMMON-USE COMPONENTS OF COMPUTER NETWORKS by BOLUN, Ion

    Published 2024-09-01
    “…Sometimes, in practice, simple solutions of quick preliminary estimation of basic characteristics of a computer network are needed.In this aim, the backbone subnet and server set of wide area computer networks are examined. …”
    Get full text
    Article
  10. 10
  11. 11

    Survey on rail transit mobile edge computing network security by Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG

    Published 2023-04-01
    “…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
    Get full text
    Article
  12. 12

    Optimal Management of Computer Network Security in the Era of Big Data by Minfeng Chen

    Published 2022-01-01
    “…Journal of Computer Networks and Communications…”
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article
  16. 16

    Juveniles as victims of criminal acts committed under the misuse of computer network by Spasojević Đorđe, Miladinović-Bogavac Živanka

    Published 2018-01-01
    “…A special segment of technological development where such misuses are increasingly present are computer networks. Such fear is further expressed when it comes to juveniles, who, due to the characteristics of this development period, represent easy targets, which often leads to serious and long-term consequences. …”
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    A Classical LTE Cellular System Simulator for Computer Network Education by Julius Yaw Ludu, Justice Kwame Appati, Ebenezer Owusu, Prince Boakye-Sekyerehene

    Published 2021-01-01
    “…In this study, a classical LTE cellular system simulator is proposed as a testbed to aid the education of computer networks at college. The proposed simulator is an extension of the functionality of LTE-Sim frameworks. …”
    Get full text
    Article