Login / Signup
Updating routing tables after resource failure in a distributed computer network.
Marjory J. Johnson
Published in:
Networks (1984)
Keyphrases
</>
computer networks
network security
intrusion detection system
network traffic
computer systems
data transmission
network management
communication networks
network nodes
network layer
data processing
intrusion detection
mobile phone
routing algorithm
resource management