computer network research paper 31
A novel dynamic immunization strategy for computer network epidemics
free download
Z Han ,Information Security Practice and , 2006 ,Springer
Current immunization strategies for computer network epidemics are based on the
assumption that the vaccines are ready before the epidemics, and it is obviously unrealistic
in computer network. Our study of the targeted immunization on Susceptible-Infected-
Computer Network Use Expands Teaching and Learning opportunities
free download
NL McCaslin ,NACTA journal, 1992 ,nactateachers.org
Abstract Colleges and universities are continuously challenged lo stay aOreast with an
ongoing technological revolution. Many of the new types of technology available come and
go with tinle.[lowever, microcomputers have and will continue to make great strides in
Cyber Crime based Curve Fitting Analysis in Internet Traffic Sharing in Computer Network
free download
D Shukla, K Verma, J Dubey ,International Journal of , 2012 ,research.ijcaonline.org
ABSTRACT Many well-developed countries are having broadband services for there
network connection but under developed countries are still having the dial-up-setup
connection network. The cyber crime users are growing fast in the entire world and
Elasticity Variation under Rest State Environment In Case of Internet Traffic Sharing inComputer Network
free download
D Shukla, S Gangele, K Verma ,International Journal of , 2011
Abstract The traffic sharing problem was introduced by Naldi (2002) in the form of a
probability model using Markov Chains. This model was extended by Shukla and Thakur
(2010) by introducing a rest state. The importance of new state was that user does not
Impacts of computer-mediated communication on travel and communication patterns: the Davis Community Network study
free download
PN Balepur ,1998
Page 28. 16 Davis Community Network is a community-based computer network, established
to provide a level of telecommunications capability to Davis residents and businesses well
beyond what was previously available to the average home or office.
FMS: A computer network fault management system based on the OSI standards
free download
N Jailani ,Malaysian journal of computer Science, 1998 ,myjurnal.um.edu.my
ABSTRACT Deals with the management of network faults using management applications
based on the OSI standards. Presents the problem domain and a prototype system that
provides several fault management applications. Keywords: Network Management, Fault
Using the World-Wide Computer Network, Internet
free download
O Edvardsen ,Chemical Sciences. Acta Chemica , 1995 ,actachemscand.org
Modern computer and information technology has opened up many possibilities for
communicating various types of information e?iciently throughout the world. A non-technical
introduction to some of the available resources on the computer network, Internet, is given
Evaluation of network reliability for a computer network subject to a budget constraint
free download
Journal of Innovative Computing, Information and , 2010 ,ijicic.org
Abstract. This paper constructs a multistate flow network composed of multistate edges to
model a computer network. Each edge has lead time, capacity, and cost parameters.
Therefore, the minimum transmission time through a single path is not a fixed number.
PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability
free download
J Mulvenon ,Beyond the Strait: PLA Missions Other Than Taiwan ,kms1.isn.ethz.ch
Theorists in the Chinese military have long been at the forefront of doctrinal thinking about
cyber conflict, arguing that computer network attack offers Beijing some important
asymmetric advantages against adversaries with superior technology. Yet the actual
Maintenance reliability of a computer network with nodes failure in the cloud computing environment
free download
Abstract. With the development of information technology, the cloud computing service has
become a new paradigm for the business and industry. In a cloud computing environment,
the computer network (CN) can be constructed as a multistate network with several
Suboptimal feedback control of TCP flows in computer network using random early discard (RED) mechanism
free download
NU Ahmed ,Mathematical Problems in Engineering, 2005 ,downloads.hindawi.com
We consider a dynamic model that simulates the interaction of TCP sources with active
queue management system (AQM). We propose a modified version of an earlier dynamic
model called RED. This is governed by a system of stochastic differential equations driven
Assessing the Computer Network Operations Threat of Foreign Countries
free download
DE Denning ,Information strategy and warfare: A guide to theory , 2007 ,faculty.nps.edu
As the introduction to this book so aptly stated, advances in information technologies
simultaneously empower and imperil those who use them. They empower by facilitating
communications and the flow of information; they emperil by introducing new
Computer Network Visualisation
free download
R Zschech, P Coddington ,2000 ,emberlogic.com
Abstract Computer networks and especially the Internet are by their very nature
tremendously complicated. This is because networks include many hosts and connections
between them. Computer visualisation techniques offer the opportunity to display
Security Analysis of a Computer Network
free download
J Vykopal ,Masaryk University Brno, master thesis, 2008 ,is.muni.cz
Abstract In this thesis, methods for security analysis at the IP layer are presented and
evaluated. The evaluation is mainly focused on deployment in real high speed networks.
Next, a solution comprising selected method is proposed. The goal of this solution is to
Computer Network Attack and the Laws of Armed Conflict: Searching for Moral Beacons in Twenty-First-Century Cyberwarfare
free download
ME Haber ,2002
A thesis presented to the Faculty of the US Army Command and General Staff College in partial
fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE
General Studies MATTHEW E. HABER, MAJ, USAF BA, University of Pittsburgh,
Time and Time Interval Measurement with Application to Computer and Network Performance Evaluation
free download
DL Mills ,Electrical Engineering Technical Memorandum, , 1996 ,cis.udel.edu
most experiments in which time is involved, it is necessary to develop estimates of time, frequency
and measurement errors from a series of time measurements between the clocks of a number
of computers and ancillary devices interconnected by some kind of computer network
Hotel network security: A study of computer networks in US hotels
free download
J Ogle, E Wagner, MP Talbert ,2008 ,hotelschool.cornell.edu
Over three decades later and only slightly modified, this is still the standard computer network
used in almost every LAN in the world. Hub: An inexpensive, unsophisticated device which simply
forwards all information it gets on any of its ports to every computer on its network.
Computer Simulation Model for a CSMA/CD Local Area Network Utilizing a Multirate Voice Coding Technique for Load Control
free download
Sciences Laboratory Technical Report TR-TISL, 1985 ,rsl.ku.edu
Page 1. COMPUTER SIMULATION MODEL FOR A CSMA/CD LOCAL AREA
NETWORK UTILIZING A MULTIRATE VOICE CODING TECHNIQUE FOR LOAD
CONTROL Victor S. Frost Edward M. Friedman Telecommunications
SECURITY EVALUATION METHODS OF COMPUTER NETWORKS BASED ON BP NEURAL NETWORK
free download
L LI ,American Journal of Engineering and Technology , 2011
ABSTRACT An index system of security evaluation of computer network system is constructed
based on the tree-shaped security evaluation model of computer network system in terms
of the problem of security evaluation of computer network system.
Introduction the Cisco Networking Academy Program into Educational Process of PreparationComputer Network Specialists at Kryvyi Rih Technical University
free download
V CHUBAROV ,csfnau.kiev.ua
Abstract Basic principles and necessity of introduction the Cisco Networking Academy
Program at Kryvyi Rih Technical University are outlined in the article. Advantages of using
this program in the educational process are given.
CSE PROJECTS