Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
41
Toward a Practical Technique to Halt Multiple Virus Outbreaks on Computer Networks
Published 2012-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
42
An optimization model of computer network security based on GABP neural network algorithm
Published 2025-04-01Subjects: Get full text
Article -
43
Research on Migration or Deployment of Telecom Network Management System on Cloud Computing Network
Published 2015-06-01“…Some key problems of system migration or deployment process on cloud computing network were analyzed. The specific method of system resources distribution and calculation,expansion reference coefficients,Oracle database cloud concern points,double disaster recovery system,same city or remote cities disaster recovery systems in cloud solutions were explored. …”
Get full text
Article -
44
SIMULATION OF COMPUTER NETWORK LOAD PARAMETERS OVER A GIVEN PERIOD OF TIME
Published 2019-09-01Subjects: “…computer network…”
Get full text
Article -
45
Predicting traffic flow with federated learning and graph neural with asynchronous computations network
Published 2025-07-01Get full text
Article -
46
Efficient Schemes for Optimizing Load Balancing and Communication Cost in Edge Computing Networks
Published 2024-10-01Get full text
Article -
47
Modeling and Performance Analysis of Task Offloading of Heterogeneous Mobile Edge Computing Networks
Published 2025-04-01“…In this paper, we propose a new heterogeneous edge computing network architecture composed of multi-core servers with varying transmission power, computing capabilities and waiting queue length. …”
Get full text
Article -
48
Integration of computing network energy for green computing: architecture, key issues and challenges
Published 2025-01-01“…Focusing on the collaborative innovation of computing power, network, and energy, the concept of computing network energy integration was first proposed, and its definition, connotation, and significance were clarified. …”
Get full text
Article -
49
Task collaborative offloading scheme in vehicle multi-access edge computing network
Published 2019-03-01“…In order to solve the problem that traditional mobile edge computing network can’t be straightforwardly applied to the Internet of vehicles (IoV) due to high speed mobility and dynamic network topology,a vehicular edge multi-access computing network (VE-MACN) was introduced to realize collaborative computing offloading between roadside units and smart vehicles.In this context,the collaborative computation offloading was formulated as a joint multi-access model selection and task assignment problem to realize the good balance between long-term system utility,diverse needs of IoV applications and energy consumption.Considering the complex joint optimization problem,a deep reinforcement learning-based collaborative computing offloading scheme was designed to overcome the curse of dimensionality for Q-learning algorithm.The simulation results demonstrate that the feasibility and effectiveness of proposed offloading scheme.…”
Get full text
Article -
50
POTMEC: A Novel Power Optimization Technique for Mobile Edge Computing Networks
Published 2025-07-01Get full text
Article -
51
-
52
The application and performance optimization of multi-controller-based load balancing algorithm in computer networks
Published 2025-06-01Subjects: Get full text
Article -
53
The relevance of e-learning resources in computer networks courses: an evaluation based on student perceptions
Published 2024-12-01“…This study evaluates the effectiveness of e-learning strategies implemented within the „Computer Networks” course, focusing on student perceptions and outcomes. …”
Get full text
Article -
54
Hopf Bifurcation in a Delayed SEIQRS Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…A delayed SEIQRS model for the transmission of malicious objects in computer network is considered in this paper. Local stability of the positive equilibrium of the model and existence of local Hopf bifurcation are investigated by regarding the time delay due to the temporary immunity period after which a recovered computer may be infected again. …”
Get full text
Article -
55
New strategies to solve multi criteria optimization problems applying a computer network
Published 2003-12-01“…The experiments with a computer network suggest a more effective strategy to solve a problem applying a single computer. …”
Get full text
Article -
56
Preserving Local Wisdom through Subak Analogy Videos for Teaching Computer Network Concepts
Published 2025-03-01Subjects: Get full text
Article -
57
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks
Published 2024-12-01Get full text
Article -
58
Joint Demand Response and Task Offloading Strategy for 5G Edge Computing Network
Published 2022-10-01“…In response to the high electricity bill of 5G edge computing network, this paper proposes a joint task offloading and demand response strategy for 5G edge computing network. …”
Get full text
Article -
59
Service function chain embedding algorithm with wireless multicast in mobile edge computing network
Published 2020-10-01Get full text
Article -
60
An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set
Published 2025-01-01Get full text
Article