[PDF][PDF] Modelling layer 2 and layer 3 device bandwidths using B-node theory

S Cikara, SP Maj, DT Shaw - … of the 29th …, 2006 - crpit.scem.westernsydney.edu.au
Modern computer networks contain an amalgamation of devices and technologies, with the
performance exhibited by each central to digital communications. Varieties of methods exist …

A new method for controlling information technology hardware complexity

S Maj, A Boyanich, D Veal - 2001 - aisel.aisnet.org
Abstract Knowledge of information technology hardware is an essential foundation for
curriculum in Information Systems. However computer and network technology is not only a …

[PDF][PDF] Evaluating Layer 3 Device Tunneling and Access Control List Security Bandwidths Using B-Node Theory

SP Maj, D Veal - IJCSNS, 2010 - Citeseer
Computer networks of today consist of a multitude of devices, technologies and protocols
that each in themselves may impact the performance as experienced by the end user. A …

[PDF][PDF] B-NODES: A NEW METHOD FOR MODELLING DIGITAL LIBRARIES

SP Maj, D Veal, R White - damdid.org
In order for digital libraries to provide a prompt and possibly worldwide service they must be
based on a complex infrastructure of hardware and software. Whilst it is recognized that …

B-nodes: a new scalable high level abstraction model

SP Maj, C Caulfield - … on Systems, Man and Cybernetics. e …, 2001 - ieeexplore.ieee.org
This paper proposes a new modeling technique called B-Nodes. B-Nodes represent a new,
high-level abstraction that allows technical detail to be controlled using top-down recursive …

[PDF][PDF] Measurement and observation inside a PC

GI Swan, D Veal, SP Maj - Measurement, 2002 - wiete.com.au
At Edith Cowan University, a Computer Installation and Maintenance (CIM) unit was
developed in response to employers' expectations of computer science graduates and the …