• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 5
  • 1
  • Tagged with
  • 19
  • 19
  • 10
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Design and development of a targeting system using MATLAB

Murphree, Stephen Kyle, Overfelt, Ruel A., January 2008 (has links) (PDF)
Thesis (M.S.)--Auburn University, 2008. / Abstract. Vita. Includes program code. Includes bibliographical references (p. 94-96).
2

Least Privilege Separation Kernel storage hierarchy prototype for the trusted computing exemplar project

Guillen, Jonathan Michael. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Irvine, Cynthia E. ; Clark, Paul C. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: Trustworthy systems, separation kernels, secondary storage, storage hierarchy Includes bibliographical references (p. 143-144). Also available in print.
3

Statistical modeling for low level vision algorithms /

Gao, Xiang, January 2002 (has links)
Thesis (Ph. D.)--Lehigh University, 2003. / Includes vita. Includes bibliographical references (leaves 167-176).
4

A study of the market and the buying behavior of electronic autosecurity systems for private cars in Hong Kong.

January 1993 (has links)
by Cheng Lai-fan, Candice, Li Po-yi, Mabel. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1993. / Includes bibliographical references (leaf 120). / ACKNOWLEDGMENT --- p.i / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iv / LIST OF TABLES --- p.vii / LIST OF FIGURES --- p.viii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Objectives of the Research --- p.2 / Chapter II. --- LITERATURE REVIEW --- p.4 / Number of Private Cars in Hong Kong --- p.4 / Problem of Vehicle Theft in Hong Kong --- p.5 / Definition of Electronic Autosecurity Systems --- p.8 / Market of Electronic Autosecurity Systems for Private Cars in Hong Kong --- p.9 / Chapter III. --- METHODOLOGY --- p.10 / Target Population --- p.10 / Method of Data Collection --- p.10 / Pretest --- p.11 / Questionnaire --- p.11 / Sampling --- p.12 / Chapter IV. --- SURVEY FINDINGS --- p.14 / Use of Autosecurity Systems --- p.14 / Demographic Data About the Respondents --- p.15 / Age --- p.15 / Sex --- p.15 / Education --- p.16 / Driving Experience --- p.16 / Data About the Car --- p.17 / Data About Mechanical Autosecurity Devices Installed --- p.18 / Degree of Satisfaction --- p.18 / Data About Electronic Autosecurity Systems Installed --- p.19 / Brand Awareness --- p.19 / Country of Origin --- p.19 / Time Spent on Information Search --- p.19 / Cost --- p.20 / Degree of Satisfaction --- p.20 / Satisfactory and Dissatisfactory Aspects --- p.22 / Information Sources --- p.24 / Evaluative Criteria in the Purchase of Electronic Autosecurity Systems --- p.25 / Decision Process --- p.26 / Product Switching Behavior of Users of Mechanical Autosecurity Devices --- p.28 / Chapter V. --- LIMITATIONS --- p.30 / Chapter VI. --- CONCLUSION AND RECOMMENDATIONS --- p.34 / Conclusion --- p.34 / Information Sources --- p.35 / Evaluative Criteria --- p.36 / Decision Process --- p.37 / Product Switching Behavior --- p.39 / Recommendations --- p.41 / Forecast of Market Potential of Electronic Autosecurity Systems for Private Cars in Hong Kong --- p.41 / Market Share --- p.41 / Market Potential --- p.42 / Other Considerations --- p.43 / Marketing Strategies --- p.43 / Product Strategies --- p.43 / Pricing Strategies --- p.45 / Promotional Strategies --- p.46 / Channel Strategies --- p.51 / APPENDIX / Chapter A. --- PRETESTED QUESTIONNAIRE (ENGLISH & CHINESE) --- p.52 / Chapter B. --- SUMMARY OF SURVEY FINDINGS --- p.63 / EXHIBIT / Chapter I. --- NEWSPAPER ARTICLES ON CAR THEFTS IN HONG KONG --- p.104 / Chapter II. --- PRODUCT CATALOGUES OF ELECTRONIC AUTOSECURITY SYSTEMS --- p.111 / BIBLIOGRAPHY --- p.120
5

A simulation of a microcomputer-based intrusion detection system

Bartholomew, John Warren January 2011 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
6

The social impact of using automatic identification technologies and location-based services in national security

Tootell, Holly. January 2007 (has links)
Thesis (Ph.D.)--University of Wollongong, 2007. / Typescript. Includes bibliographical references: p. 172-198.
7

Capacities of erasure networks

Smith, Brian Matthew, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2008. / Vita. Includes bibliographical references.
8

Object recognition using rapid classification trees

Haynes, Keith L. Liu, Xiuwen. January 2006 (has links)
Thesis (Ph. D.)--Florida State University, 2006. / Advisor: Xiuwen Liu, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Sept. 20, 2006). Document formatted into pages; contains xi, 109 pages. Includes bibliographical references.
9

Privacy : Plug the Internet Peep Hole

Denebo, Petra, Linder, Anna-Katrine January 2001 (has links)
The Internet is a relatively new technology that has developed explosively during the last 10 years. The Internet-technology has been accepted rapidly by users, but the legal and ethical aspects have not been updated at the same rapid rate. Trust in electronic services or products is founded on knowledge and an understanding of what happens during a session and of the effects that might occur. Within electronically based services there are obvious risks for invisible and undesired results such as intrusions on privacy. In the traditional relationship of a service provider and a user, the question of privacy is clear, whereas in the new, Internet-related relationship between a service provider and a user, it is not. We have performed an informed survey concerning privacy, carried out through interviews. From the answers in the interviews it is clear that the threat against privacy is perceived as a problem, but that it is overshadowed by other issues such as safe conducts of payment, functioning distribution systems and reclamation etc. This could be due to the difficulty of addressing an intangible problem such as privacy when there are other issues that are as important and easier to address since they concern an actual purchase. To increase the trust of the users in the Internet and e-commerce branch, we believe that the Internet peephole needs to be plugged from within the branch. A user should neither have to worry about where his or her personal information goes or who has access to it nor for which purpose it will be used. The users must be made aware of what threats their information faces and which certificates that can protect it. If the providers of products and services on the Internet do not gain the trust of the users, in the end, cyberspace will be a desolate place.
10

Capacities of erasure networks

Smith, Brian Matthew, 1975- 11 September 2012 (has links)
We have investigated, in various multiple senses, the “capacity” of several models of erasure networks. The defining characteristic of a memoryless erasure network is that each channel between any two nodes is an independent erasure channel. The models that we explore differ in the absence or presence of interference at either the transmitters, the receivers, or both; and in the availability of feedback at the transmitters. The crux of this work involves the investigation and analysis of several different performance measures for these networks: traditional information capacity (including multicast capacity and feeback capacity), secrecy capacity, and transport capacity. / text

Page generated in 0.071 seconds