research papers in computer networks 11
Packet switching in a multi-access broadcast channel with application to satellite communication in a computer network
free download
COMPUTER SYSTEMS MODELING AND ANALYSIS GROUP REPORT SERIES Richard R. Muntz, Editor Turn, R., Assignment of Inventory of a Variable Structure Computer, January 1 963, ENGRG Rept No. 63-5. Martin, DF, The Automatic Assignment and Sequencing of
EFFECTIVE PARTICIPATION AND DISCOURSE THROUGH A COMPUTER NETWORK: INVESTIGATING ELEMENTARY STUDENTS COMPUTER SUPPORTED
free download
In this study we analyzed and described how students and teacher of one Finnish elementary class participated in and communicated through CSILE (Computer Supported Intentional Learning Environment) during the years 1997-1998. To this end, we examined
Adding voice to an office computer network
free download
A bst ract: This paper describes the architecture and initial implementation of an experimental telephone system developed by the Computer Science Laboratory at the Xerox Palo Alto Research Center (PARC CSL). A specially designed processor (
How to keep authenticity alive in a computer network
free download
In this paper we present a cryptographic scheme that allows to ensure the ongoing authenticity and security of connections in a computer network. This is achieved by combining a zero-knowledge authentication and a public key exchange protocol. It is
An application of principal component analysis to the detection and visualization of computer network attacks
free download
ABSTRACT Network traffic data collected for intrusion analysis is typically high-dimensional making it difficult to both analyze and visualize. Principal Component Analysis is used to reduce the dimensionality of the feature vectors extracted from the data to enable simpler
Visual data analysis for detecting flaws and intruders in computer network systems
free download
Abstract To ensure the normal operation of a large computer network system, the common practice is to constantly collect system logs and analyze the network activities for detecting anomalies. Most of the analysis methods in use today are highly automated due to the
Some useful 16-valued logics: how a computer network should think
free download
In Belnap s useful 4-valued logic, the set 2={T, F} of classical truth values is generalized to the set 4= P (2)={Ø,{T},{F},{T, F}}. In the present paper, we argue in favor of extending this process to the set 16= P (4)(and beyond). It turns out that this generalization is well-
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
free download
This paper presents experience in application of multi-agent technology to design and implementation of multi-agent systems (MASs) intended to cooperatively solve the currently critical tasks in the area of computer network security assurance. These MASs are Agent-
On the understanding of computer network protocols
free download
ABSTRACT How students learn about network protocols is studied in a project-centred, internationally distributed, university course in computer systems taught jointly by two universities. Insights into students understanding of basic concepts within computer
Analyzing vulnerabilities and measuring security level at design and exploitation stages ofcomputer network life cycle
free download
Vulnerability detection and security level estimation are actual tasks of protecting computer networks. The paper considers the models and architectures of intelligent components intended for active analyzing computer network vulnerabilities and estimating its security
Design and implementation of virtual computer network lab based on ns2 in the internet
free download
This paper proposed the design model and implementing method of virtual Computer Networks lab which is based on NS2. In this lab, the client part is implemented with Java Applet, NS2 is used as computing platform, Nam is used as the tool for displaying in the
Distributed metastasis: a computer network penetration methodology
free download
ABSTRACT Metastasis refers to the process by which an attacker propagates a computer penetration throughout a computer network. The traditional methodology for Internet computer penetration is sufficiently well understood to define behavior which may be
Related
- research papers on distributed systems
- MANET for Disaster Area
- wimax research papers
- free research papers-computer science
- ad hoc networks based on distributed
smart grid series compensation research papers 13
research papers in computer networks 12 CSE PROJECTS