نتایج جستجو برای: computer network management
تعداد نتایج: 1924860 فیلتر نتایج به سال:
چکیده ندارد.
The RFC Editor does not have a copy of RFC 500. If you have a copy of the original, please send it to us at [email protected].
Power management has become an important issue in the design of information systems. Computer industry struggles to cope with the energy and cooling costs for servers. The wireless ad hoc network community has to invent clever schemes to conserve the limited power available to individual small radio devices. The algorithmic challenges in studying these problems involve both proper mathematical ...
Computer network management, due to the complexity and scale of networks nowadays, has necessarily come to be a pro-active and automated activity. In this type of management there are several points of decision-making or reasoning where computational intelligence can be utilized. This paper discusses one of the most important points of decision-making in management: how to implement data collec...
The centralized system approach for computer and telecommunication network management has been presenting scalability problems along with the growth in the number and diversity of equipments being managed. Moreover, the increase in complexity of the services being offered through the networks also contributes for adding extra workload to the management station. The amount of data that must be h...
Structure of the network becomes more and more complicated. Optimal management of a structure of a complex network becomes a di cult, work-consuming and costly task. A concept of a system being a module of a distributed operating system was presented in the paper. The module working as a decentralized multiagent system carries out current monitoring of pro tability of all network connections. I...
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
The rapid development and wide application of computer network effectively promoted the development of China’s economy and information technology, but network and information security problems also came. In our view, we should focus on management on one hand and grasp network security technique on the other hand. Both are equally important. Without the support of management, even the best techn...
Accurate and reliable time is necessary for financial and legal transactions, transportation, distribution systems, and many other applications. Time synchronization protocols such as NTP (the Network Time Protocol) have kept clocks of such applications synchronized to each other for many years. Nowadays there are many commercial GPS based NTP time server products at the market but they almost ...
social network analysis used to study the relationship between stakeholders and actors in natural resource management has become a scientific approach. the purpose of this study was analysis of information exchange network among organizations engage in the sustainable management of natural resources. results of social network analysis revealed that there is weak relationship among organizations...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید