![](images/graphics/blank.gif)
Network resources
-
to defend company resources: not only passively by using firewalls, virtual private networks (VPNs), encryption techniques, and whatever other tricks, but also by deploying proactive tools and devices throughout the network = IDS.
34p
vvnghi
05-05-2011
155
23
Download
-
Carrier Sense Multiple Access (CSMA) is a probabilisticMedia Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium CAN uses a nondestructive bitwise arbitration, which means that messages remain intact after arbitration is completed even if collisions are detected. All the arbitration takes place without corruption or delay of the message that wins the arbitration.
36p
xblue06
13-05-2013
84
11
Download
-
Sơ đồ mạng (Network Diagram) cho phép người sử dụng quan sát dự án 1 cách trực quan, rõ ràng và chi tiết Sơ đồ mạng thể hiện thông qua số liệu đã nhập ở biểu đồ ngang
28p
sony_12
25-06-2013
73
8
Download
-
Data networks developed as a result of business applications that were written for microcomputers. Businesses needed a solution that would successfully address the following three problems: How to avoid duplication of equipment and resources; how to communicate efficiently; how to set up and manage a network.
78p
xaydungk23
19-04-2016
63
8
Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p
nhanmotchut_3
20-10-2016
64
4
Download
-
In this thesis, the limitations of using existing LTE congestion mitigation mechanisms such as Discard Timer and RED have been explored. A different mechanism to analyse the effects of using control theory for congestion mitigation has been developed. Finally, congestion mitigation in LTE networks has been addresses using radio resource allocation techniques with non-cooperative game theory being an underlying mathematical framework.
118p
runthenight04
02-02-2023
7
2
Download
-
This research develops a rich theoretical and empirical understanding of embeddedness by way of three dimensions (structural, relational and cultural), and investigates its implications for actors’ value co-creation behaviours and value-in-context outcomes. In addition, the research refines co-creation perspectives by examining a central boundary condition of co-creation processes. The data was collected in an online service environment and was analysed using structural equation modelling techniques.
183p
runthenight04
02-02-2023
13
2
Download
-
This study focuses on exploring the effects of networks on the process of commercialisation in the biotechnology industry. The biotechnology industry itself has a specific position in the industrial markets because of its capability of successfully employing network knowledge to innovate products and services. However, the industry struggles to implement the resource networks to take innovations to market.
248p
runthenight04
02-02-2023
13
3
Download
-
The thesis focuses on researching and developing solutions to shared resources allocation for users in distributed system and optimally communication resources allocation for distributed system in virtualization system based on network coding.
27p
gaocaolon6
30-07-2020
34
2
Download
-
In this thesis, we investigate the problem of IoT services deployment in Cloud-Fog system to provide IoT services with minimal resource usage cost. We for-mulate the problem using a Mixed-Integer Linear Programming model taking into account the characteristics of computing and transmission resources in Cloud-Fog system as well as the IoT services specific requirements.
55p
tamynhan0
04-07-2020
16
3
Download
-
Scenario studies simulate the whole fuel cycle over a period of time, from extraction of natural resources to geological storage. Through the comparison of different reactor fleet evolutions and fuel management options, they constitute a decision-making support.
15p
christabelhuynh
30-05-2020
26
2
Download
-
Nowadays, the concept of globalization seems reduced to the size of the market and, export is only one aspect of the phenomenon of globalization. In global industries, it is now the most competitive positions and bases of competitiveness which should be established worldwide. Therefore, globalization raises strategies to become more global rather than local. Those strategies consist in expanding and coordinating all activities of the company worldwide.
91p
nguyenyenyn117
18-06-2019
53
8
Download
-
Manipulating URLs URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet. Sample structure of a URL. The resource name part may contain: host name, file
15p
huanltgc00061
05-05-2013
53
4
Download
-
The classical metabolic control theory [Kacser, H. & Burns, J.A. (1973)Symp.Soc.Exp.Biol. 27, 65–104; Heinrich, R. & Rapoport, T. (1974)Eur. J. Biochem.42, 89–95.] does not take into account experimental evidence for correlations between enzyme concentrations in the cell. We investigated the implications of two causes of linear correlations: competition between enzymes, which is a mere physical adaptation of the cell to the limitation of resources and space, and regulatory correlations, which result from the existence of regulatory networks....
17p
awards
05-04-2013
51
3
Download
-
Cellular functions are ultimately linked to metabolic fluxes brought about by thousands of chemical reactions and transport processes. The synthesisof theunderlying enzymes and membrane transporters causes the cell a certaineffort of energyandexternal resources.Considering that those cells should have had a selection advantage during natural evo-lution that enabled them to fulfil vital functions (such as growth, defence against toxic compounds, repair of DNA alterations, etc.)
18p
dell39
03-04-2013
34
5
Download
-
Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password before they are allowed access to certain URLs HTTP/1.1 requires that when a user makes a request for a protected resource the server responds with a authentication request header WWW-Authenticate contains enough pertinent information to carry out a “challenge-response” session between the user and the server
13p
muathu_102
28-01-2013
51
3
Download
-
Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.
14p
muathu_102
28-01-2013
41
3
Download
-
When installing a manually configured adapter, what information must you know to avoid resource conflicts? A. IRQ B. Number of bits C. Base I/O port address D. Base Memory address E. Operating System 2) Which IRQ is usually assigned for the primary IDE hard disk controller? A. 5 B. 7 C. 9 D. 14 E. 15 3) Which IRQ is assigned to the first serial port?
5p
nguyenbeo86
24-11-2012
49
3
Download
-
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Cross-Layer Resource Allocation for Variable Bit Rate Multiclass Services in a Multirate Multicarrier DS-CDMA Network
10p
dauphong20
11-03-2012
42
4
Download
-
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Optimisation of Downlink Resource Allocation Algorithms for UMTS Networks
6p
sting11
10-03-2012
46
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)