Optimizing the strategy of input load limitations in an information computer network node

被引:0
|
作者
Klimenok, V.I.
机构
来源
关键词
Free buffer allocation - Input load restrictions;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:49 / 56
相关论文
共 50 条
  • [1] OPTIMIZATION OF A STRATEGY FOR INPUT LOAD RESTRICTIONS IN A COMPUTER NETWORK NODE
    KLIMENOK, V
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1993, (06): : 49 - 56
  • [2] OPTIMIZING THE DYNAMIC CONTROL OF INPUT TRAFFIC IN A NODE OF COMPUTER NETWORK
    DUDIN, AN
    KLIMENOK, VI
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1991, (02): : 25 - 31
  • [3] Optimizing wireless sensor network topology with node load consideration
    Ruizhi CHEN
    虚拟现实与智能硬件(中英文), 2025, 7 (01) : 47 - 61
  • [4] The Strategy of Computer Network Information Security and Protection
    Long, Teng
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 31 - 35
  • [5] Optimizing Proximity Strategy for Federated Learning Node Selection in the Space-Air-Ground Information Network for Smart Cities
    Wang, Weidong
    Li, Ping
    Li, Siqi
    Zhang, Jihao
    Zhou, Zijiao
    Wu, Dapeng Oliver
    Kim, Duk Kyung
    Zhang, Guangwei
    Gong, Peng
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6418 - 6430
  • [6] Analysis of Computer Network Information Security and Protection Strategy
    Ming, Xiaobo
    Chen, Ying
    Guo, Jinhua
    2018 2ND AASRI INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISC 2018), 2019, 267
  • [7] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [8] The Security and Protection Strategy Study of Computer Network Information
    Shi, Junyan
    Li, Juanjuan
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 34 - 37
  • [9] Analysis of computer network information security and protection strategy
    Yu, Wenye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242
  • [10] Study on Security and Protection Strategy of Computer Network Information
    Zhang, Chenxiang
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 74 - 77