نتایج جستجو برای: computer network resources

تعداد نتایج: 1384574  

2004
Kevin P. Anchor Paul D. Williams Gregg H. Gunsch Gary B. Lamont

Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying existing attacks. With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect...

Journal: :journal of minimally invasive surgical sciences 0
levent avtan i̇stanbul university continuing medical education and research center, i̇stanbul medical faculty, i̇stanbul, turkey guy bernardcadière department of gastrointestinal surgery, saint-pierre university hospital, brussels, belgium cavit avcı i̇stanbul university continuing medical education and research center, i̇stanbul, turkey; i̇stanbul university continuing medical education and research center, i̇stanbul, turkey.tel: 0090 532 213 19 88, fax: 0090 212 534 16 05

discussions low-bandwidth, internet-based telemedicine is effective and inexpensive. surgeons living in remote areas, distant countries and especially those with limited resources , can follow the videoscopic courses, meetings, and live surgeries organized by experienced centers, on their computer screen, in real-time and interactively. results surgeon applicants who have a computer and basic i...

Journal: :Information Technology Journal 2006

Journal: :Publications of the Astronomical Society of the Pacific 1994

1999
Marcial Porto Fernandez Gardel Moreira Delfino Aloysio Pedroza

A computer network management system presents one manager and several agents. The management of large networks demands much computer resources and management system capacity, impossible to achieve with just one manager. The TMN standard, that intends to standardize management systems for telecommunication networks offering those resources, already foresees the use of several managers organized ...

2012
Dost Muhammad Khan Nawaz Mohamudally

The agent can be categorized into two types; one is known as an intelligent agent and the second is malicious agent, called computer viruses. These types of agents have some common characteristics; both are intelligent by nature and both have the properties reproduction and transfer from one host to another host in the network, called transferability. The fundamental difference between these ag...

2008
O. A. RAHMEH P. JOHNSON A. TALEB-BENDIAB

The growth in computer and networking technologies over the past decades produced new type of collaborative computing environment called Grid Network. Grid is a parallel and distributed computing network system that possesses the ability to achieve a higher throughput computing by taking advantage of many computing resources available in the network. Therefore, to achieve a scalable and reliabl...

2002
Dimitri DeFigueiredo Antonio Garcia Bill Kramer

Peer-to-peer (P2P) networks have emerged over the past several years as new and effective ways for distributed resources to communicate and cooperate. "Peer-to-peer computing is the sharing of computer resources and services by direct exchange between systems. These resources and services include the exchange of information, processing cycles, cache storage, and disk storage for files." P2P net...

Journal: :IEEE Journal on Selected Areas in Communications 1995

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید