NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Ray, Loye Lynn – ProQuest LLC, 2014
The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…
Descriptors: Computer Networks, Computer Security, Safety, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Huhtanen, Karri; Vatiainen, Heikki; Keski-Kasari, Sami; Harju, Jarmo – Campus-Wide Information Systems, 2008
Purpose: eduroam[TM] has already been proved to be a scalable, secure and feasible way for universities and research institutions to connect their wireless networks into a WLAN roaming community, but the advantages of eduroam[TM] have not yet been fully discovered in the wireless community networks aimed at regular consumers. This aim of this…
Descriptors: Architecture, Telecommunications, Internet, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Esteve, M.; Molina, B.; Palau, C.; Fortino, G. – Interactive Technology and Smart Education, 2006
To date e-Learning material has usually been accessed and delivered through a central web server. As the number of users, the amount of information, the frequency of accesses and the volume of data increase, together with the introduction of multimedia streaming applications, a decentralized content distribution architecture is necessary. In this…
Descriptors: Electronic Learning, Architecture, Internet, Information Management