• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1963
  • 183
  • 182
  • 147
  • 36
  • 25
  • 25
  • 25
  • 25
  • 25
  • 24
  • 16
  • 11
  • 9
  • 7
  • Tagged with
  • 2877
  • 2877
  • 750
  • 637
  • 506
  • 499
  • 393
  • 336
  • 314
  • 300
  • 299
  • 289
  • 288
  • 277
  • 276
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

Securing the corporate network

Siroin, A. J. January 2005 (has links) (PDF)
Thesis, PlanB (M.S.)--University of Wisconsin--Stout, 2005. / Includes bibliographical references.
242

Network processor design benchmarks and architectural alternatives /

Lee, Byeong Kil, John, Lizy Kurian, January 2005 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2005. / Supervisor: Lizy John. Vita. Includes bibliographical references.
243

Long-term bandwidth estimation

Masney, Brian E. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2006. / Title from document title page. Document formatted into pages; contains xvii, 83 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 79-83).
244

Models and algorithms for effective traffic engineering of tunnel-based backbone networks

Srivastava, Shekhar, Medhi, Deepankar. January 2004 (has links)
Thesis (Ph. D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2004. / "A dissertation in computer networking and telecommunication networking." Advisor: Deep Medhi. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Feb. 28, 2006. Includes bibliographical references (leaves 198-210 ). Online version of the print edition.
245

Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost /

Clayton, Bradley. January 2007 (has links)
Thesis (M.Sc. (Computer Science)) - Rhodes University, 2007.
246

Practical and scalable deployment of DoS defense measures in the internet /

Gong, Chao, January 2007 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2007. / Includes vita. Includes bibliographical references (leaves 123-128)
247

A novel alert correlation and confidence fusion framework in intrusion detection systems /

Yu, Dong, January 1900 (has links)
Thesis (Ph. D.)--University of Idaho, 2006. / Abstract. "May 2006." Includes bibliographical references (leaves 86-92). Also available online in PDF format.
248

Swarm intelligence methods for mobile ad hoc networks

Rajagopalan, Sundaram. January 2007 (has links)
Thesis (Ph.D.)--University of Delaware, 2006. / Principal faculty advisor: Chien-Chung Shen, Dept. of Computer & Information Sciences. Includes bibliographical references.
249

Deploying a secure Windows operating system and applications

Miles, Russell Slater, January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
250

Selfish node isolation in mobile ad-hoc networks

Probus, Michael Wayne. January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. "Spring 2007." Includes bibliographical references (p. 41-42).

Page generated in 0.7339 seconds