UCLA Campus Computing Network Liaison Staff for ARPA Network

نویسنده

  • Barbara B. Noble
چکیده

Please make initial contact with CCN through these representatives: A.Bob Bell, Head-User Relations (213) 825-7548 Bob or Doug Cummings handles administrative matters, such as: charge number applications and funding, and will discuss your application and the facilities and services available at CCN. of Programming (213) 825-7518 Bob handles problems with Network protocol and Network hardware.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bedload transport predictions based on field measurement data by combination of artificial neural network and genetic programming

Bedload transport is an essential component of river dynamics and estimation of its rate is important to many aspects of river management. In this study, measured bedload by Helley- Smith sampler was used to estimate the bedload transport of Kurau River in Malaysia. An artificial neural network, genetic programming and a combination of genetic programming and a neural network were used to estim...

متن کامل

Bedload transport predictions based on field measurement data by combination of artificial neural network and genetic programming

Bedload transport is an essential component of river dynamics and estimation of its rate is important to many aspects of river management. In this study, measured bedload by Helley- Smith sampler was used to estimate the bedload transport of Kurau River in Malaysia. An artificial neural network, genetic programming and a combination of genetic programming and a neural network were used to estim...

متن کامل

Evolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol

The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Real-time data transmission on the ARPANET

In order to get a feel for the ability of the network to support a real-time process an experiment was conducted with real-time data being sent from the UCSB SEL810-B computer, by way of the UCSB IBM 360 host, onto the ARPA Network and into a host discard socket in the UCLA IBM 360 computer. This particular data path very nearly duplicates the path which might be taken if real-time devices were...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 389  شماره 

صفحات  -

تاریخ انتشار 1972