Works matching DE "ENTERPRISE networks (Telecommunications)"
Results: 47
Cloud Computing is like having an Infinite Credit Line!
- Published in:
- IETE Technical Review, 2012, v. 29, n. 6, p. 438, doi. 10.4103/0256-4602.104998
- By:
- Publication type:
- Article
Carbon-aware Enterprise Network through Redesign.
- Published in:
- Computer Journal, 2015, v. 58, n. 2, p. 234, doi. 10.1093/comjnl/bxu001
- By:
- Publication type:
- Article
Dynamic control plane management for software-defined networks.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 2, p. 111, doi. 10.1002/nem.1924
- By:
- Publication type:
- Article
In preparation towards future cellular networks: the detailed analysis of macro and micro site densification and sector densification.
- Published in:
- Telecommunication Systems, 2017, v. 65, n. 4, p. 621, doi. 10.1007/s11235-016-0255-2
- By:
- Publication type:
- Article
An optimization-based robust routing algorithm to energy-efficient networks for cloud computing.
- Published in:
- Telecommunication Systems, 2016, v. 63, n. 1, p. 89, doi. 10.1007/s11235-015-9975-y
- By:
- Publication type:
- Article
JAVA MANAGEMENT EXTENSIONS FOR BUSINESS APPLICATIONS.
- Published in:
- Internal Auditing & Risk Management, 2015, v. 10, n. 4, p. 31
- By:
- Publication type:
- Article
Multi-agent Learning by Trial and Error for Resource Leveling during Multi-Project (Re)scheduling.
- Published in:
- Journal of Computer Science & Technology (JCS&T), 2018, v. 18, n. 2, p. 125, doi. 10.24215/16666038.18.e14
- By:
- Publication type:
- Article
SOA Performance Enhancement Through XML Fragment Caching.
- Published in:
- Information Systems Research, 2012, v. 23, n. 2, p. 505, doi. 10.1287/isre.1110.0368
- By:
- Publication type:
- Article
Digital inclusion in Australia.
- Published in:
- Interaction (Melbourne), 2020, v. 48, n. 3, p. 11
- By:
- Publication type:
- Article
Would David be More Likely to Speak to Angela under National Roaming?
- Published in:
- Review of Network Economics, 2016, v. 15, n. 2, p. 63, doi. 10.1515/rne-2016-0016
- By:
- Publication type:
- Article
Risk balance defense approach against intrusions for network server.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 3, p. 255, doi. 10.1007/s10207-013-0214-9
- By:
- Publication type:
- Article
A bio‐inspired tool for managing resilience in enterprise networks with embedded intelligent formulation.
- Published in:
- Expert Systems, 2018, v. 35, n. 1, p. 1, doi. 10.1111/exsy.12208
- By:
- Publication type:
- Article
DIMENSÕES DO CAPITAL SOCIAL EM REDES DE COOPERAÇÃO: ESTUDO DE CASO EM REDE GAÚCHA.
- Published in:
- 2013
- By:
- Publication type:
- Case Study
Attack Graph Generation and Analysis Techniques.
- Published in:
- Defence Science Journal, 2016, v. 66, n. 6, p. 559, doi. 10.14429/dsj.66.10795
- By:
- Publication type:
- Article
Building and Analyzing of Enterprise Network: A Case Study on China Automobile Supply Network.
- Published in:
- International Journal of Web Services Research, 2016, v. 13, n. 3, p. 64, doi. 10.4018/IJWSR.2016070104
- By:
- Publication type:
- Article
Global Innovation in Foreign Subsidiaries: The Impact of Entrepreneurial Orientation and Corporate Networks.
- Published in:
- Brazilian Business Review (Portuguese Edition), 2017, v. 14, n. 4, p. 417, doi. 10.15728/bbr.2017.14.4.4
- By:
- Publication type:
- Article
Service-based negotiation for advanced collaboration in enterprise networks.
- Published in:
- Journal of Intelligent Manufacturing, 2016, v. 27, n. 1, p. 201, doi. 10.1007/s10845-013-0857-4
- By:
- Publication type:
- Article
An Intrusion Detection Method for Enterprise Network Based on Backpropagation Neural Network.
- Published in:
- Ingénierie des Systèmes d'Information, 2020, v. 25, n. 3, p. 377, doi. 10.18280/isi.250313
- By:
- Publication type:
- Article
Detection DDOS Attacks Using Machine Learning Methods.
- Published in:
- Electrica, 2020, v. 20, n. 2, p. 159, doi. 10.5152/electrica.2020.20049
- By:
- Publication type:
- Article
Logs and enterprise networks for overcoming obstacles in business processes.
- Published in:
- Computing, 2019, v. 101, n. 3, p. 263, doi. 10.1007/s00607-018-00696-y
- By:
- Publication type:
- Article
KEY PERFORMANCE INDICATORS IN SMALL AND MEDIUM SIZED ENTERPRISES.
- Published in:
- TEHNOMUS, 2016, p. 46
- By:
- Publication type:
- Article
On the Design of A URL Capturing Tool for Monitoring Enterprise Networks.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 01
- By:
- Publication type:
- Article
Snort, BRO, NetSTAT, Emerald and SAX2 : A Comparison.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 2, p. 317
- By:
- Publication type:
- Article
Management and Monitoring of IoT Devices Using Blockchain †.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 4, p. 856, doi. 10.3390/s19040856
- By:
- Publication type:
- Article
Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 1, p. 89, doi. 10.1002/sec.535
- By:
- Publication type:
- Article
To Design a Network That Delivers Reliable Performance 24 Hours a Day 7 Days a Week for Higher Education in Uganda.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2020, v. 6, n. 22, p. 1, doi. 10.4108/eai.5-6-2020.165914
- By:
- Publication type:
- Article
TELECOMMUNICATIONS: COMPETITION, CAPACITY, AND COSTS IN THE FIXED SATELLITE SERVICES INDUSTRY.
- Published in:
- Journal of Current Issues in Media & Telecommunications, 2012, v. 4, n. 1, p. 1
- Publication type:
- Article
Threat-centric approach to network security.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 46
- By:
- Publication type:
- Article
Wilson Parking Dials In Reliability, Efficiency With SmarTone.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 23
- Publication type:
- Article
The EU's Regulation of Speech: A Critical View.
- Published in:
- University of the Pacific Law Review, 2024, v. 55, n. 2, p. 175
- By:
- Publication type:
- Article
Robust power control for femtocell networks with imperfect channel state information.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 8, p. 882, doi. 10.1049/iet-com.2015.0501
- By:
- Publication type:
- Article
移动社交网络中的无线资源分配算法研究.
- Published in:
- Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition), 2018, v. 30, n. 1, p. 141, doi. 10.3979/j.issn.1673-825X.2018.01.018
- By:
- Publication type:
- Article
Dynamic SOA Framework to Support Ad Hoc Enterprise Alliance Formation.
- Published in:
- New Generation Computing, 2012, v. 30, n. 2/3, p. 123, doi. 10.1007/s00354-012-0202-z
- By:
- Publication type:
- Article
Mobile Network Sharing.
- Published in:
- DigiWorld Economic Journal, 2017, n. 106, p. 75
- By:
- Publication type:
- Article
Developing A Security Model for Enterprise Networks (SMEN).
- Published in:
- Journal of Engineering Research & Technology, 2017, v. 4, n. 1, p. 16
- By:
- Publication type:
- Article
A ruin theoretic design approach for wireless cellular network sharing with facilities.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 7, p. n/a, doi. 10.1002/ett.3141
- By:
- Publication type:
- Article
Local mobility and service access for enterprise femtocell networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2015, v. 26, n. 4, p. 650, doi. 10.1002/ett.2694
- By:
- Publication type:
- Article
Ubiquitous Integrity via Network Integration and Parallelism-Sustaining Pedestrian/Bike Urbanism.
- Published in:
- Algorithms, 2013, v. 6, n. 3, p. 459, doi. 10.3390/a6030459
- By:
- Publication type:
- Article
Identification and predication of network attack patterns in software-defined networking.
- Published in:
- Peer-to-Peer Networking & Applications, 2019, v. 12, n. 2, p. 337, doi. 10.1007/s12083-017-0629-6
- By:
- Publication type:
- Article
Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 122, doi. 10.1007/s12083-015-0412-5
- By:
- Publication type:
- Article
Novel power control and collision resolution schemes for device-to-device discovery.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 5, p. 913, doi. 10.1007/s12083-015-0375-6
- By:
- Publication type:
- Article
RESTsec: a low-code platform for generating secure by design enterprise services.
- Published in:
- Enterprise Information Systems, 2018, v. 12, n. 8/9, p. 1007, doi. 10.1080/17517575.2018.1462403
- By:
- Publication type:
- Article
e-DMDAV: A new privacy preserving algorithm for wearable enterprise information systems.
- Published in:
- Enterprise Information Systems, 2018, v. 12, n. 4, p. 492, doi. 10.1080/17517575.2017.1308559
- By:
- Publication type:
- Article
Correlation between use time of machine and decline curve for emerging enterprise information systems.
- Published in:
- Enterprise Information Systems, 2018, v. 12, n. 4, p. 452, doi. 10.1080/17517575.2017.1301558
- By:
- Publication type:
- Article
Fog computing and internet of everything for emerging enterprise information systems.
- Published in:
- 2018
- By:
- Publication type:
- Editorial
Supporting capacity sharing in the cloud manufacturing environment based on game theory and fuzzy logic.
- Published in:
- Enterprise Information Systems, 2016, v. 10, n. 2, p. 193, doi. 10.1080/17517575.2014.928950
- By:
- Publication type:
- Article
Data configurations in railway signalling engineering - an application of enterprise systems techniques.
- Published in:
- Enterprise Information Systems, 2013, v. 7, n. 3, p. 354, doi. 10.1080/17517575.2012.705021
- By:
- Publication type:
- Article