• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 850
  • 122
  • 69
  • 56
  • 35
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 1375
  • 1375
  • 492
  • 462
  • 376
  • 308
  • 292
  • 289
  • 241
  • 213
  • 192
  • 191
  • 176
  • 171
  • 154
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
281

Network tomography based on flow level measurements

Arifler, Dogu 28 August 2008 (has links)
Not available / text
282

Identifying, selecting, and organizing the attributes of Web resources

Pasch, Grete 28 August 2008 (has links)
Not available / text
283

Design and analysis of self-stabilizing sensor network protocols

Choi, Young-ri 28 August 2008 (has links)
A sensor is a battery-operated small computer with an antenna and a sensing board that can sense magnetism, sound, heat, etc. Sensors in a network communicate and cooperate with other sensors to perform given tasks. A sensor network is exposed to various dynamic factors and faults, such as topology changes, energy saving features, unreliable communication, and hardware/software failures. Thus, protocols in this sensor network should be able to adapt to dynamic factors and recover from faults. In this dissertation, we focus on designing and analyzing a class of sensor network protocols, called self-stabilizing protocols. A self-stabilizing protocol is guaranteed to return to a state where it performs its intended function correctly, when some dynamic factors or faults corrupt the state of the protocol arbitrarily. Therefore, in order to make a sensor network resilient to dynamic factors and faults, each protocol in the sensor network should be self-stabilizing. We first develop a state-based model that can be used to formally specify sensor network protocols. This model accommodates several unique characteristics of sensor networks, such as unavoidable local broadcast, probabilistic message transmission, asymmetric communication, message collision, and timeout actions and randomization steps. Second, we present analysis methods for verifying and analyzing the correctness and self-stabilization properties of sensor network protocols specified in this model. Third, using the state-based model and analysis methods, we design three self-stabilizing sensor network protocols, prove their self-stabilization properties, and estimate their performance. These three self-stabilizing protocols are a sentry-sleeper protocol that elects a sentry from a group of sensors at the beginning of each time period, a logical grid routing protocol that builds a routing tree whose root is the base station, and a family of flood sequencing protocols that distinguish between fresh and redundant flood messages using sequence numbers. / text
284

A transparent settlement model and network architecture for mobile voice over Internet protocol (VOIP) service provider.

Mfupe, Luzango. January 2011 (has links)
M. Tech. Electrical Engineering. / A virtual Mobile Voice over IP (MVoIP) service can be implemented by a Mobile VoIP Operator (MVoIPO) in conjunction with a Mobile Network Operator (MNO). MVoIPOs do not operate their own mobile network infrastructure. Instead, they use the MNO's packet-based cellular network. However, the coexistence between the MVoIPO and the MNO raises two related problems: first, how to handle interconnection settlements, and second, how to (inter)connect the two operators to make such settlements. This dissertation uses a game-theoretic modelling approach to show that it is mutually beneficial economically if the MNO allows the MVoIPO to operate on its network. Further, a Service Level Agreement (SLA)-based Transparent Settlement Agreement (TSA) model is proposed to solve the first problem. The TSA model algorithm calculates the MVoIPO's throughput distribution at the edge of a UMTS Core Network (CN). This facilitates the determination of levels of conformance to the pre-set throughput thresholds and, subsequently, the issuing of compensation to the MVoIPO by the MNO after generating an economically acceptable volume of traffic. Further, possible network architecture to solve the second problem is suggested, by combining the TSA model algorithm, the UMTS CN, the IP Multimedia Subsystem (IMS), and the Online Charging System (OCS)
285

Automatic validation of secure authentication protocols

Kim, Kyoil, 1964- 11 July 2011 (has links)
Not available / text
286

Incorporating online projects into K-12 classrooms : the odyssey from beginners' perspectives

Williams, Laurie Cameron, 1955- 27 July 2011 (has links)
Not available / text
287

TCP adaptation schemes in heterogeneous and ad hoc wireless networks

Li, Zhi, 李志 January 2005 (has links)
published_or_final_version / abstract / Electrical and Electronic Engineering / Doctoral / Doctor of Philosophy
288

Location-aware routing with reduced location maintenance routing for Ad hoc networks

Lu, Zhenxin., 蘆振鑫. January 2004 (has links)
published_or_final_version / abstract / toc / Electrical and Electronic Engineering / Doctoral / Doctor of Philosophy
289

A pervasive information framework based on semantic routing and cooperative caching

Chen, Weisong, 陳偉松 January 2004 (has links)
published_or_final_version / abstract / toc / Computer Science and Information Systems / Master / Master of Philosophy
290

Implementation and performance evaluation of doubly-linked list protocols on a cluster of workstations

Leung, K. H. W, 梁海宏. January 1999 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy

Page generated in 0.0512 seconds