Search alternatives:
networks » network (Expand Search)
Showing 441 - 460 results of 740 for search '"Computer Networks"', query time: 0.11s Refine Results
  1. 441

    The Process of Creating a Digital Communication Model for the Vatican by Józef Kloch

    Published 2021-03-01
    “…This model was first based on the capabilities of computer networks and then on the Internet. It was first tested by the Holy See in Latin America. …”
    Get full text
    Article
  2. 442
  3. 443

    A fluid flow model for the software defined wide area networks analysis by Karol Marszałek, Adam Domański

    Published 2025-01-01
    “…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
    Get full text
    Article
  4. 444

    Mentality and symbolic nature of culture by Oleg Alexeevich Burunin

    Published 2023-03-01
    “…An attempt has been made to study the mentality in the transition to the coming information civilization with a network structure for organizing communications based on global computer networks. Trends in the field of cultural research associated with the emergence of such phenomena as information and intellectual culture, mosaic mass culture, elite culture, culture of virtual reality and identifying their relationship, interpenetration and interaction with folk spiritual culture have been denoted. …”
    Get full text
    Article
  5. 445
  6. 446

    Distance Measurements Related to Cartesian Product of Cycles by Xiaoli Qiang, Saima Nazeer, Yu-Ming Chu, Muhammad Awais Umar, Imrana Kousar, Ammara Sehar

    Published 2020-01-01
    “…Making the graph of computer networks and analyzing it with aid of graph theory are extensively studied and researched in the literature. …”
    Get full text
    Article
  7. 447

    Comparison of Personal Data Protection Laws Using Narrative Policy Framework Between Indonesia, Malaysia, and Japan by Yusran Panca Putra

    Published 2022-12-01
    “…The era of information and communication technology continues to grow and shows a significant increase. is a type of offensive maneuver used by a state, individual, group, or organization that targets computer information systems, infrastructure, computer networks, and or personal computer devices using malicious acts which usually originate from anonymous sources who steal, modify or destroy the specified target by hacking a vulnerable system. …”
    Get full text
    Article
  8. 448

    The Problem of Shaping the Capacity of Sovereign Powers of a State in the Digital Age by S. V. Korostelev

    Published 2020-08-01
    “…The global architecture of computer networks poses a security dilemma: while modern information and communication technologies allow adversaries to challenge the exclusive power of states over “his own” cyberspace, following traditional notions of sovereignty, respectively, may limit the ability of states to actively counter challenges and threats in global networks. …”
    Get full text
    Article
  9. 449

    Performance Evaluation of Neighbors-Based Learning Methods for Network Intrusion Detection System by Ngoc Thien Nguyen

    Published 2025-05-01
    “… The rapid advancement of computer networks offers substantial benefits but also introduces growing cybersecurity risks. …”
    Get full text
    Article
  10. 450

    Whole Slide Images and Digital Media in Pathology Education, Testing, and Practice: The Oklahoma Experience by Kar-Ming Fung, Lewis A. Hassell, Michael L. Talbert, Allan F. Wiechmann, Brad E. Chaser, Joel Ramey

    Published 2012-01-01
    “…Until the introduction of digitized whole slide images that could be accessed through computer networks, the sharing of pathology slides was a major logistic issue in pathology education and practice. …”
    Get full text
    Article
  11. 451

    Visual Web-Oriented Environment of Dynamic Control of Data Flow in Campus of Software Defined Networks by Vyacheslav P. Koryachko, Dmitry A. Perepelkin, Maria A. Ivanchikova, Vladimir S. Byshov

    Published 2019-03-01
    “…Nowadays new innovative approaches based on the technology of software defined networks (SDN) are gaining popularity in the field of computer networks (CN). SDN provide a flexible approach to the processing and control of data flows in CN by separating the control plane and data plane, as well as centralizing the representation of the entire network. …”
    Get full text
    Article
  12. 452
  13. 453

    A method of forming a self-similar flow with a given Hurst parameter for network traffic modeling by P.E. Pustovoitov, V.O. Kompaniets

    Published 2024-12-01
    “…The procedure can be used to describe traffic when constructing a simulation model of computer network functioning.…”
    Get full text
    Article
  14. 454

    Ensuring Legal Safeguards for Digitalized Social Services within the Framework of Government Decentralization by Ihor Panov, Kristina Petrosyan, Liudmyla Dobroboh, Valentyna Chernobuk, Yuliia Rashed

    Published 2023-12-01
    “…The author reveals the essence of "Portal Diia", which is introduced within the framework of the Unified Social Information System of a single electronic document in the social matters, and highlighted the disadvantage of this application: ensuring the protection of personal data, and access to information about the citizen sphere of interests accumulated in computer networks.…”
    Get full text
    Article
  15. 455

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
    Get full text
    Article
  16. 456

    Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture by Mohammad Hossein Modirrousta, Parisa Forghani Arani, Reza Kazemi, Mahdi Aliyari‐Shoorehdeli

    Published 2024-12-01
    “…The increasing importance of computer networks in daily life is a result of our growing dependence on them. …”
    Get full text
    Article
  17. 457
  18. 458
  19. 459

    Design Principles for Reinforcement Learning in Congestion Control Environments by Lincoln Kamau Kiarie, Mahsa Derakhshani, Konstantinos G. Kyriakopoulos

    Published 2025-01-01
    “…Recent years have seen growth in interest in applying RL to managing Congestion Control (CC) in computer networks, with the goal of handling diverse kinds of traffic that may be challenging for human-designed algorithms. …”
    Get full text
    Article
  20. 460

    Parallel Communicating Finite Automata: Productiveness and Succinctness by Jingnan Xie, Ching-Sheng Lin, Harry B. Hunt

    Published 2025-04-01
    “…This model is relevant for studying complex systems such as computer networks and multi-agent environments. In this paper, we explore two key aspects of PCFA: their undecidability and their descriptional complexity. …”
    Get full text
    Article