نتایج جستجو برای: computer communication networks
تعداد نتایج: 1217632 فیلتر نتایج به سال:
Generating synthetic loads which are sufficiently close to reality represents an important and challenging task in performance and quality-of-service (QoS) evaluations of computer networks and distributed systems. Here, the load to be generated represents sequences of requests at a well-defined service interface within a network node. The paper presents a tool (UniLoG.HTTP) which can be used in...
standards and compatibility in the field of data communication and processing requires urgent attention. The author discusses the compatibility issues that arise from the introduction of packetswitching networks, which typify the growing interdependence of computer and communication technologies. Focusing on Canada as a case example, he examines issues relating to the compatibility between the ...
this study aimed to gain an insight into whether computer-mediated communication (cmc) in the form of a digital forum can reflect gendered discursive practices. a great deal of research has now established that computer-mediated interactions embody gendered differences in the use of emoticons, but few studies have examined the potential effect of the gender of the emoticon-receiver on the frequ...
Communication complexity roughly asks how much two information two parties need to exchange between one another in order to compute a function on their inputs. This has applications in areas like circuit design, where we can model a board as being partitioned in two halves and we wish to find how how information has to pass from one partition to another. Of course, there are also many applicati...
this study looks at the communication between users concerning health risks, with the aim of exploring their use of fora and assessing whether participants establish a niche with like-minded users during these exchanges. by integrating a corpus linguistic approach with content analysis and multiple studies on computer mediated health discourse, this study analyses the intense attention paid to ...
0
if we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.in this paper we discuss...
The design of an interface unit is described, in which RS232 serial data is converted to latched parallel data on 22 independent lines. The data direction of each line is programmable through the serial port. Two picocontrollers are employed in a parallel processing mode to give the required number of I/O pins, and data on the shared serial line is coded to separate data streams to the individu...
Abstract Background & Aims: The use of information and communication technology as a modern technology is rapidly expanding in current world and has been known. The aim of this study was to investigate the relationship between nursing students’ attitudes and the exploitation of information and communication technologies. Materials & Methods: This was a correlational study conducted usin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید