Spelling suggestions: "subject:"[een] NETWORKS COMPUTER"" "subject:"[enn] NETWORKS COMPUTER""
31 |
Network exploration and vulnerability assessment using a combined "blackbox" and "whitebox" analysis approachChoong, Patrick Wee Meng. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Xie, Geoffrey ; Gibson, John. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Network exploration, black-box analysis, white-box analysis, vulnerability assessment. Includes bibliographical references (p. 57-58). Also available in print.
|
32 |
Dualtrust a trust management model for swarm-based autonomic computing systems /Maiden, Wendy Marie. January 2010 (has links) (PDF)
Thesis (M.A. in electrical engineering and computer science)--Washington State University, May 2010. / Title from PDF title page (viewed on May 3, 2010). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 110-117).
|
33 |
Neural networks and shape identification an honors project /Hansen, Andrew D. January 1900 (has links) (PDF)
Honors project (B.S.) -- Carson-Newman College, 2010. / Project advisor: Dr. Henry Suters. Includes bibliographical references (p. 40).
|
34 |
On the applications, deployment and security of service overlay networks /Kurian, Jinu, January 2009 (has links)
Thesis. / Includes vita. Includes bibliographical references (leaves [152]-162)
|
35 |
Practical implementation and performance analysis on security of sensor networks /Verma, Nidhi. January 2006 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2006. / Typescript. Includes bibliographical references (leaves 82-88).
|
36 |
Setting up information technology structures for trade unionsHecht, Harvey B. January 2006 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2006. / Title from PDF title page (viewed on Dec. 13, 2006). Includes bibliographical references.
|
37 |
Scalable and efficient distributed algorithms for defending against malicious Internet activitySung, Minho. January 2006 (has links)
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007. / Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
|
38 |
Developing neural network applications using LabVIEWPogula Sridhar, Sriram. January 2005 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2005. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (July 14, 2006). Includes bibliographical references.
|
39 |
Long-term bandwidth estimationMasney, Brian E. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2006. / Title from document title page. Document formatted into pages; contains xvii, 83 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 79-83).
|
40 |
Practical and scalable deployment of DoS defense measures in the internet /Gong, Chao, January 2007 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2007. / Includes vita. Includes bibliographical references (leaves 123-128)
|
Page generated in 0.0431 seconds