Spelling suggestions: "subject:"computer networks"" "subject:"coomputer networks""
241 |
Securing the corporate networkSiroin, A. J. January 2005 (has links) (PDF)
Thesis, PlanB (M.S.)--University of Wisconsin--Stout, 2005. / Includes bibliographical references.
|
242 |
Network processor design benchmarks and architectural alternatives /Lee, Byeong Kil, John, Lizy Kurian, January 2005 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2005. / Supervisor: Lizy John. Vita. Includes bibliographical references.
|
243 |
Long-term bandwidth estimationMasney, Brian E. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2006. / Title from document title page. Document formatted into pages; contains xvii, 83 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 79-83).
|
244 |
Models and algorithms for effective traffic engineering of tunnel-based backbone networksSrivastava, Shekhar, Medhi, Deepankar. January 2004 (has links)
Thesis (Ph. D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2004. / "A dissertation in computer networking and telecommunication networking." Advisor: Deep Medhi. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Feb. 28, 2006. Includes bibliographical references (leaves 198-210 ). Online version of the print edition.
|
245 |
Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost /Clayton, Bradley. January 2007 (has links)
Thesis (M.Sc. (Computer Science)) - Rhodes University, 2007.
|
246 |
Practical and scalable deployment of DoS defense measures in the internet /Gong, Chao, January 2007 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2007. / Includes vita. Includes bibliographical references (leaves 123-128)
|
247 |
A novel alert correlation and confidence fusion framework in intrusion detection systems /Yu, Dong, January 1900 (has links)
Thesis (Ph. D.)--University of Idaho, 2006. / Abstract. "May 2006." Includes bibliographical references (leaves 86-92). Also available online in PDF format.
|
248 |
Swarm intelligence methods for mobile ad hoc networksRajagopalan, Sundaram. January 2007 (has links)
Thesis (Ph.D.)--University of Delaware, 2006. / Principal faculty advisor: Chien-Chung Shen, Dept. of Computer & Information Sciences. Includes bibliographical references.
|
249 |
Deploying a secure Windows operating system and applicationsMiles, Russell Slater, January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
|
250 |
Selfish node isolation in mobile ad-hoc networksProbus, Michael Wayne. January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. "Spring 2007." Includes bibliographical references (p. 41-42).
|
Page generated in 0.0741 seconds