Browse All Reviews
Computer Systems Organization (C)
Computer-Communication Networks (C.2)
Network Architecture And Design (C.2.1)
> Network Communications (C.2.1...)
All Media Types
1-10 of 248 Reviews about "
Network Communications (C.2.1...)
Introduction to hybrid intelligent networks: modeling, communication, and control
Guan Z., Hu B., Shen X., Springer International Publishing, New York, NY, 2019. 292 pp. Type: Book (978-3-030021-60-3)
Human brains are the most advanced intelligent systems to ever exist, yet also the most mysterious systems to be explored. A hybrid intelligent network is a term coined for the brain-inspired artificial intelligence (AI) that emulates particular a...
Feb 14 2020
EmerGence: a delay tolerant web application for disaster relief
Paul U., Nekrasov M., Belding E. HotMobile 2019 (Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, Feb 27-28, 2019) 167-167, 2019. Type: Proceedings
Providing communication services in disaster-affected areas is important. The authors introduce an app for such situations that runs on the back of networks powered by unmanned aircraft systems (drones). Such a system is designed to tolerate long ...
Jun 19 2019
6LB: scalable and application-aware load balancing with segment routing
Townsley M., Clausen T., Tollet J., Pfister P., Desmouceaux Y. IEEE/ACM Transactions on Networking 26(2): 819-834, 2018. Type: Article
Most network load balancers do not take the application state into account when making a load balancing decision. They often need a centralized orchestrator to help monitor the overall system. In other environments, load balancer functions are int...
Aug 21 2018
Enterprise IoT: a definitive handbook
Balani N., CreateSpace Independent Publishing Platform, Charleston, SC, 2015. 146 pp. Type: Book (978-1-518790-86-7)
The Internet of Things (IoT), the idea of connecting everything using Internet protocols, is one of the most innovative visions across industries as well as daily life. A wide range of subjects, from tiny sensors to big data analysis, are related ...
Sep 20 2016
Counting the security cost of cheap calls
German P. Network Security 2015(11): 9-11, 2015. Type: Article
Session initiation protocol (SIP) trunking effectively allows enterprises and small businesses to continue leveraging their voice-over-IP (VoIP) infrastructure and related IP-based productivity suites (desktop sharing, web conferencing) while conn...
Jun 20 2016
Betweenness centrality in delay tolerant networks
Magaia N., Francisco A., Pereira P., Correia M. Ad Hoc Networks 33(C): 284-305, 2015. Type: Article
The need for larger, mobile, and dynamic networks--such as modern mobile ad hoc networks (MANETs)--is growing. Maintaining MANETs’ end-to-end routes at all times is not always guaranteed, due to node mobility, different capabilitie...
Jun 13 2016
Linux XIA: an interoperable meta network architecture to crowdsource the future Internet
Machado M., Doucette C., Byers J. ANCS 2015 (Proceedings of the 11th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, Oakland, CA, May 7-8, 2015) 147-158, 2015. Type: Proceedings
The Internet becomes increasingly available each day. Access to it in a variety of forms posts challenges to the traditional design of the Internet protocol (IP). This inspiring paper introduces the Linux kernel-based XIA. What is XIA exactly? To ...
May 18 2016
Opportunistic mobile social networks
Wu J., Wang Y., CRC Press, Inc., Boca Raton, FL, 2014. 541 pp. Type: Book (978-1-466594-94-4)
The abundance of mobile devices with wireless communications capability gave birth to mobile networks with opportunistic connectivity among devices. These networks, coupled with modern online social networks or roaming patterns of users, fuel a ne...
Apr 21 2015
The road to SDN: an intellectual history of programmable networks
Feamster N., Rexford J., Zegura E. ACM SIGCOMM Computer Communication Review 44(2): 87-98, 2014. Type: Article
Software-defined networking (SDN) is arguably the single most important development in the networking field in the past few years. SDN decouples how packets are forwarded between routers/switches (data plane) from how packets must be handled (cont...
Aug 22 2014
Mining social networks and security informatics
Özyer T., Erdem Z., Rokne J., Khoury S., Springer Publishing Company, Incorporated, New York, NY, 2013. 275 pp. Type: Book (978-9-400763-58-6)
As one would expect, social networks and information security are hot topics to which some researchers want to contribute, sometimes hastily, largely ignoring prior work that has been done in communications network traffic analysis, monitoring, an...
Apr 7 2014
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.