Spelling suggestions: "subject:"computer networks computer networks"" "subject:"computer networks coomputer networks""
41 |
Frame-based packet scheduling algorithms for input queued switchesLou, Jianyu, Shen, Xiaojun. January 2006 (has links)
Thesis (Ph. D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2006. / "A dissertation in computer networking and telecommunications networking." Advisor: Xiaojun Shen. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 1, 2007. Includes bibliographical references (leaves 121-127). Online version of the print edition.
|
42 |
Presenting the self in cyberspace : identity play in moos /Chester, Andrea. January 2004 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Psychology, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 363-386).
|
43 |
Contributions to group key distribution schemesKurnio, Hartono. January 2005 (has links)
Thesis (Ph.D.)--University of Wollongong, 2005. / Typescript. Includes bibliographical references: leaf 149-157.
|
44 |
WSACT - a model for Web Services Access Control incorporating TrustCoetzee, Marijke. January 2006 (has links)
Thesis (D.Phil.(Computer Science))--University of Pretoria, 2006. / Includes bibliographical references.
|
45 |
Cultures and campaigns of resistance to commercialization in cyberspace /Garcin, Peter January 1900 (has links)
Thesis (M.A.) - Carleton University, 2002. / Includes bibliographical references (p. 143-145). Also available in electronic format on the Internet.
|
46 |
A taxonomy of reputation systems on decentralized peer-to-peer networks /Zeng, Wei, January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2005. / Includes bibliographical references (p. 153-158). Also available in electronic format on the Internet.
|
47 |
More connections, less connection an examination of the effects of computer-mediated communication on relationships /McGlynn, Joseph. Byers, Lori A. January 2006 (has links)
Thesis (M.A.)--University of North Texas, Dec., 2006. / Title from title page display. Includes bibliographical references.
|
48 |
A formal approach to specifying access control security features of Java modulesRubio Medrano, Carlos Ernesto, January 2008 (has links)
Thesis (M.S.)--University of Texas at El Paso, 2008. / Title from title screen. Vita. CD-ROM. Includes bibliographical references. Also available online.
|
49 |
eChirp measuring available bandwidth for the Internet using multiple chirp packet trains /Kumar, Surender. January 1900 (has links)
Thesis (M.S.)--The University of North Carolina at Greensboro, 2008. / Directed by Shan Suthaharan; submitted to the Dept. of Computer Science. Title from PDF t.p. (viewed Aug. 25, 2009). Includes bibliographical references (p. 65-67).
|
50 |
Anomaly-based intrusion detection using using lightweight stateless payload inspectionNwanze, Nnamdi Chike. January 2009 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Electrical and Computer Engineering, 2009. / Includes bibliographical references.
|
Page generated in 0.1608 seconds