NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)4
Source
ProQuest LLC4
Publication Type
Dissertations/Theses -…4
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 4 results Save | Export
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Liu, Yaoqing – ProQuest LLC, 2013
The fast growth of global routing table size has been causing concerns that the Forwarding Information Base (FIB) will not be able to fit in existing routers' expensive line-card memory, and upgrades will lead to a higher cost for network operators and customers. FIB Aggregation, a technique that merges multiple FIB entries into one, is probably…
Descriptors: Computers, Computer Networks, Mathematics
Liao, Yuan – ProQuest LLC, 2011
The virtualization of computing resources, as represented by the sustained growth of cloud computing, continues to thrive. Information Technology departments are building their private clouds due to the perception of significant cost savings by managing all physical computing resources from a single point and assigning them to applications or…
Descriptors: Telecommunications, Computers, Statistical Analysis, Computer Networks
Rangan, Prahalad – ProQuest LLC, 2010
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
Descriptors: Computer Security, Topology, Computer Networks, Computers