Spelling suggestions: "subject:"computer betworks"" "subject:"computer conetworks""
41 |
Simulation-based analysis and evaluation of tactical multi-hop radio networksSmith, Howard D. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2009. / Thesis Advisor(s): Gibson, John H. ; Singh, Gurminder. "March 2009." Description based on title screen as viewed on April 24, 2009. Author(s) subject terms: Radio Networks, Multi-hop Networks, Computer Networks, Tactical Radio Networks, Software-Based Network Simulation, Network Analysis, SINCGARS, EPLRS, Cooperative Diversity, JCSS. Includes bibliographical references (p. 105-106). Also available in print.
|
42 |
Using network application behavior to predict performanceMa, Chunling. January 2008 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: network performance, prediction, measurements, network metrics. Includes bibliographical references (leaves 116-117).
|
43 |
Network access control disruptive technology? /Fisher, Craig. January 2008 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2008. / Title from PDF title page (viewed on June 10, 2008). Includes bibliographical references.
|
44 |
Application of overlay techniques to network monitoringZhan, Xiaoying. January 2008 (has links)
Thesis (Ph.D.) - University of Glasgow, 2008. / Ph.D. thesis submitted to the Faculty of Information and Mathematical Sciences, Department of Computing Science, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
|
45 |
On the privacy of emerging distributed network applications /Sampigethaya, Radhakrishna. January 2007 (has links)
Thesis (Ph. D.)--University of Washington, 2007. / Vita. Includes bibliographical references (p. 179-195).
|
46 |
Multicomputer routing techniques /Fulgham, Melanie L., January 1997 (has links)
Thesis (Ph. D.)--University of Washington, 1997. / Vita. Includes bibliographical references (p. [108]-118).
|
47 |
Improving misuse detection with neural networks/Demiray, Sadettin. Tuğlular, Tuğkan January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005 / Keywords: Neural network, back propagation networks, multilayer perceptions, computer networks security, Intrusion detection system. Includes bibliographical references (leaves 68-69)
|
48 |
Statistical methods used for intrusion detection/Özardıç, Onur. Püskülcü, Halis January 2006 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2006 / Keywords: Computer networks, computer networks security, intrusion detection system, statistical methods Includes bibliographical references (leaves. 58-64).
|
49 |
An assessment of vulnerabilities for ship-based control systemsBensing, Richard G. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Burke, Karen ; Dinolt, George. "September 2009." Description based on title screen as viewed on November 04, 2009. Author(s) subject terms: Vulnerability Assessment, Supervisory Control and Data Acquisition, SCADA, Critical Infrastructure, Information Assurance, control system Includes bibliographical references (p. 161-170). Also available in print.
|
50 |
On achievable rate regions for source coding over networksGu, WeiHsin. Effros, Michelle. Effros, Michelle, January 1900 (has links)
Thesis (Ph. D.) -- California Institute of Technology, 2009. / Title from home page (viewed 04/12/2010). Advisor and committee chair names found in the thesis' metadata record in the digital repository. Includes bibliographical references.
|
Page generated in 0.0643 seconds