Full-text articles, eBooks and much more from EBSCO Discovery Service

Not found what you are looking for? Check in Onleihe or make a Purchase Request

Showing 141 - 160 of 5,492,857

141

Reducing Communication Overhead in Federated Learning using Deep Reinforcement Learning
Tong, Van ; Tran, Lam ; Pham, Hung ; et al.
Proceedings of the 3rd ACM Workshop on Secure and Trustworthy Deep Learning Systems. :21-30

Conference
Save to List
143

Products and Services for Computer Networks
Negroponte, Nicholas P.
Scientific American, 1991 Sep 01. 265(3), 106-115.

Academic journal
Save to List
144

Statistical profiling and visualization for detection of malicious insider attacks on computer networks
Colombe, Jeffrey B. ; Stephens, Gregory
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. :138-142

Conference
Save to List
146

Teaching Statistics with Computer Networks
Sanders, Mark
The Mathematics Teacher, 1996 Jan 01. 89(1), 70-72.

Academic journal
Save to List
147

Developing proactive defenses for computer networks with coevolutionary genetic algorithms
Lugo, Anthony Erb ; Garcia, Dennis ; Hemberg, Erik ; et al.
Proceedings of the Genetic and Evolutionary Computation Conference Companion. :273-274

Conference
Save to List
148

Computer and network security in higher education
Petersen, Rodney J. ; Luker, Mark A., 1947 ; EDUCAUSE (Association) ; et al.

Book
Save to List
149

This result is not available to guest users.

150

Application of Electronic Fence in Intelligent Security and Computer Algorithm Support
Li, Yong ; Zhi, Qingyu ; Zhang, Kan ; et al.
Proceedings of the 3rd International Conference on Signal Processing, Computer Networks and Communications. :473-478

Conference
Save to List
151

Training students to administer and defend computer networks and systems
Tjaden, Brian ; Tjaden, Brett
Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education. :245-249

Conference
Save to List
152

Computer Networks, Proportionality, and Military Operations
Doyle, James H. Jr.
Doyle, James H. Jr. / 76 Int'l L. Stud. Ser. US Naval War Col. 147 (2002) / International Law Studies Series. US Naval War College, Vol. 76, pp. 147-162

Save to List
154
155

Computer Network Security Defense System Design Based on Artificial Intelligence Technology.
Li, Siying
Procedia Computer Science. 2025, Vol. 261, p847-855. 9p.

Artificial intelligence Systems design Computer engineering Security systems Big data
Academic journal
Save to List
156

Data transmission rate control in computer networks using neural predictive networks
He, Yanxiang ; Xiong, Naixue ; Yang, Yan
Proceedings of the Second international conference on Parallel and Distributed Processing and Applications. :875-887

Conference
Save to List
157

Computer communication networks : analysis and design
Gebali, Fayez. ; Northstar Digital Design, Inc. ; Gebali, Fayez. ; et al.

Book
Save to List
158

Interpretable Success Prediction in a Computer Networks Curricular Unit Using Machine Learning
de Oliveira, Catarina Félix ; Sobral, Sónia Rolland ; Ferreira, Maria João ; et al.
In Procedia Computer Science 2024 239:598-605

Academic journal
Save to List
159

Computer network management : theory and practice
Elenbogen, Bruce S.
The proceedings of the thirtieth SIGCSE technical symposium on Computer science education. :119-121

Conference
Save to List
160

Computer networks and information warfare : implications for military operations
Gruber, David J. ; Air University (U.S.). Center for Strategy and Technology. ; Gruber, David J. ; et al.

Book
Save to List

Filter