1321 |
Software bottleneck identification and visualization using layered queuing networks /Shanmugarajah, Vino. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 109-112). Also available in electronic format on the Internet.
|
1322 |
Optimal user authentication schemes in mobile ad hoc networks /Liu, Jie. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 97-100). Also available in electronic format on the Internet.
|
1323 |
Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /Young, Randall Frederick. Windsor, John C., January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, August, 2008. / Title from title page display. Includes bibliographical references.
|
1324 |
Global memory management for workstation networks /Feeley, Michael Joseph, January 1996 (has links)
Thesis (Ph. D.)--University of Washington, 1996. / Vita. Includes bibliographical references (p. [149]-157).
|
1325 |
An investigation into the design and implementation of an internet-scale network simulator /Richter, John Peter Frank January 2008 (has links)
Thesis (M.Sc. (Computer Science)) - Rhodes University, 2009.
|
1326 |
Automated fault injection and analysis for wired/wireless networksSingh, Shailendra. January 2009 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Computer Science, 2009. / Includes bibliographical references.
|
1327 |
TelosRFID : an ad-hoc wireless networking capable multi-protocol RFID reader system /Lewis, Michael P. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 70-75).
|
1328 |
Scalable framework for heterogeneous clustering of commodity FPGAs /Espenshade, Jeremy K. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 70-74).
|
1329 |
An optimization approach for the cascade vulnerability problemServín Meneses, Christian, January 2009 (has links)
Thesis (M.S.)--University of Texas at El Paso, 2009. / Title from title screen. Vita. CD-ROM. Includes bibliographical references. Also available online.
|
1330 |
Polynomial time exact solutions for forwarding set problems in wireless ad hoc networks /Baysan, Mehmet. January 2008 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 55-57)
|
Page generated in 0.3395 seconds