research papers in computer networks 11

research papers in computer networks 11


ONLINE TRAINING EDUREKA

Packet switching in a multi-access broadcast channel with application to satellite communication in a computer network
free download

COMPUTER SYSTEMS MODELING AND ANALYSIS GROUP REPORT SERIES Richard R. Muntz, Editor Turn, R., Assignment of Inventory of a Variable Structure Computer, January 1 963, ENGRG Rept No. 63-5. Martin, DF, The Automatic Assignment and Sequencing of

EFFECTIVE PARTICIPATION AND DISCOURSE THROUGH A COMPUTER NETWORK: INVESTIGATING ELEMENTARY STUDENTS COMPUTER SUPPORTED
free download

In this study we analyzed and described how students and teacher of one Finnish elementary class participated in and communicated through CSILE (Computer Supported Intentional Learning Environment) during the years 1997-1998. To this end, we examined

Adding voice to an office computer network
free download

A bst ract: This paper describes the architecture and initial implementation of an experimental telephone system developed by the Computer Science Laboratory at the Xerox Palo Alto Research Center (PARC CSL). A specially designed processor (

How to keep authenticity alive in a computer network
free download

In this paper we present a cryptographic scheme that allows to ensure the ongoing authenticity and security of connections in a computer network. This is achieved by combining a zero-knowledge authentication and a public key exchange protocol. It is

An application of principal component analysis to the detection and visualization of computer network attacks
free download

ABSTRACT Network traffic data collected for intrusion analysis is typically high-dimensional making it difficult to both analyze and visualize. Principal Component Analysis is used to reduce the dimensionality of the feature vectors extracted from the data to enable simpler

Visual data analysis for detecting flaws and intruders in computer network systems
free download

Abstract To ensure the normal operation of a large computer network system, the common practice is to constantly collect system logs and analyze the network activities for detecting anomalies. Most of the analysis methods in use today are highly automated due to the

Some useful 16-valued logics: how a computer network should think
free download

In Belnap s useful 4-valued logic, the set 2={T, F} of classical truth values is generalized to the set 4= P (2)={Ø,{T},{F},{T, F}}. In the present paper, we argue in favor of extending this process to the set 16= P (4)(and beyond). It turns out that this generalization is well-

Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
free download

This paper presents experience in application of multi-agent technology to design and implementation of multi-agent systems (MASs) intended to cooperatively solve the currently critical tasks in the area of computer network security assurance. These MASs are Agent-

On the understanding of computer network protocols
free download

ABSTRACT How students learn about network protocols is studied in a project-centred, internationally distributed, university course in computer systems taught jointly by two universities. Insights into students understanding of basic concepts within computer

Analyzing vulnerabilities and measuring security level at design and exploitation stages ofcomputer network life cycle
free download

Vulnerability detection and security level estimation are actual tasks of protecting computer networks. The paper considers the models and architectures of intelligent components intended for active analyzing computer network vulnerabilities and estimating its security

Design and implementation of virtual computer network lab based on ns2 in the internet
free download

This paper proposed the design model and implementing method of virtual Computer Networks lab which is based on NS2. In this lab, the client part is implemented with Java Applet, NS2 is used as computing platform, Nam is used as the tool for displaying in the

Distributed metastasis: a computer network penetration methodology
free download

ABSTRACT Metastasis refers to the process by which an attacker propagates a computer penetration throughout a computer network. The traditional methodology for Internet computer penetration is sufficiently well understood to define behavior which may be

Related

smart grid series compensation research papers 13

research papers in computer networks 12 CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER

IEEE PAPER UNITED STATES