• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 198
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 226
  • 226
  • 81
  • 81
  • 59
  • 54
  • 41
  • 39
  • 32
  • 27
  • 27
  • 26
  • 24
  • 23
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Sender-driven bandwidth differentiation for transmitting multimedia flows over TCP.

January 2006 (has links)
Lau Kwok Hung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 66-67). / Abstracts in English and Chinese. / Acknowledgement --- p.1 / Abstract --- p.2 / 摘要 --- p.3 / Chapter Chapter 1 --- Introduction --- p.6 / Chapter Chapter 2 --- Background and Related Work --- p.9 / Chapter 2.1 --- Application-Layer Bandwidth Differentiation --- p.9 / Chapter 2.2 --- Related Work --- p.14 / Chapter 2.2.1 --- Bandwidth Differentation --- p.14 / Chapter 2.2.2 --- Shared Congestion Management --- p.15 / Chapter 2.2.3 --- Flow Partition --- p.16 / Chapter Chapter 3 --- VPS Protocol Architecture --- p.17 / Chapter 3.1 --- Virtual and Actual Flows --- p.18 / Chapter 3.2 --- VPS Controller --- p.21 / Chapter Chapter 4 --- ACK Translation --- p.25 / Chapter 4.1 --- Fast Retransmit and Fast Recovery --- p.27 / Chapter 4.2 --- Timeout --- p.30 / Chapter 4.3 --- Packet and ACK Reordering --- p.33 / Chapter 4.4 --- False Duplicate ACK Suppression --- p.35 / Chapter 4.5 --- Maxburst --- p.37 / Chapter 4.6 --- Memory Overhead and Computation Complexity --- p.38 / Chapter Chapter 5 --- Bandwidth Differentiation --- p.41 / Chapter 5.1 --- Distribution of Virtual Packets --- p.41 / Chapter 5.2 --- Temporary Suspension of Actual Flows --- p.43 / Chapter 5.3 --- Receive Window Limit --- p.44 / Chapter 5.4 --- Limited Data Transmission --- p.44 / Chapter Chapter 6 --- Performance Evaluatoin --- p.45 / Chapter 6.1 --- Performance Metric --- p.45 / Chapter 6.2 --- Simulation Setup --- p.46 / Chapter 6.3 --- Performance over Different Time Scales --- p.47 / Chapter 6.4 --- Performance over Different Bottleneck Bandwidth --- p.53 / Chapter 6.5 --- Performance over Different Application-specified Ratios --- p.54 / Chapter 6.6 --- Performance over Different Number of Flows --- p.57 / Chapter 6.7 --- Heterogeneous Receivers --- p.60 / Chapter Chapter 7 --- Conclusions and Future Work --- p.65 / Bibliography --- p.66
72

Gender Praxis| Rural Fiji Radio and Mobile Devices

Rahmani-Shirazi, Ashiyan Ian 12 March 2019 (has links)
<p> This communications study looks at gender-based self-reflexive theoretically guided practice, &ldquo;praxis,&rdquo; to explore the way in which a women's community media organization, femLINKpacific, pursues its goals of enhancing women's participation in governance structures and resiliency to extreme weather conditions. This study contributes to the nascent literature on mobile device and radio interaction by exploring the way in which women in rural Fiji utilize mobile devices to interact with femTALK, the community radio station of femLINKpacific. The study is based on the theoretical frameworks of inclusive innovation, post-development theory, and participatory communications theory in the context of gender-based ICT4D. Two main platforms, Mobile Suitcase Radio (MSR), a portable radio platform, and Women&rsquo;s Weather Watch (WWW), a mobile-phone based weather reporting network, and an additional non-mediated communication venue of monthly women&rsquo;s gatherings were explored through a 3-phase study, utilizing interviews and focus groups, with radio station staff and women leader&rsquo;s networks. </p><p> Main findings included the role of WWW to transmit information for preparedness for Tropical Cyclone Winston, and indigenous food practices shared through the various platforms, as well as the role of MSR, when used in conjunction with the issues shared at the monthly consultations, to bring greater awareness to the women&rsquo;s &ldquo;voice.&rdquo; This study extends to understanding the role of mutually supportive, systematic processes to enhance women's participation in governance structures, including the role and effectiveness of inter-ethnic groups in addressing community issues, and capacity building through incremental acclimatizing activities.</p><p>
73

Performance metrics, configuration strategies and traffic identification for group network application.

January 2008 (has links)
Fu, Zhengjia. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (p. 64-70 ). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Design for group network communication --- p.6 / Chapter 2.1 --- Performance metrics of network Voice Conference: GMOS --- p.7 / Chapter 2.2 --- Conference Leader Selection strategies --- p.11 / Chapter 2.3 --- Experiment Description --- p.14 / Chapter 2.4 --- Data analysis and results --- p.16 / Chapter 2.5 --- Applications of Proposals to Voice Conference --- p.25 / Chapter 3 --- P2P Application Identification --- p.27 / Chapter 3.1 --- Periodic Group Communication Patterns --- p.28 / Chapter 3.1.1 --- Terminology for Behavioral Patterns --- p.29 / Chapter 3.1.2 --- Pattern 1: Gossip of Buffer Maps --- p.30 / Chapter 3.1.3 --- Pattern 2: Content flow control --- p.31 / Chapter 3.1.4 --- Pattern 3: Synchronized Link Activation and Deactivation --- p.32 / Chapter 3.2 --- Identification Based on behavioral signatures --- p.33 / Chapter 3.2.1 --- Algorithm Overview --- p.34 / Chapter 3.2.2 --- Sequence Generation (SG1): Time Series for the Gossip Pattern --- p.36 / Chapter 3.2.3 --- Transform Time-domain Sequence to Frequency-domain Sequence --- p.36 / Chapter 3.2.4 --- Sequence Generation (SG2): Time Series for Content Flow Control Pattern --- p.40 / Chapter 3.2.5 --- Sequence Generation (SG3): Time Series for Synchronized Start and Finish of Flows --- p.41 / Chapter 3.2.6 --- Analyzer step --- p.47 / Chapter 3.3 --- Behavioral signatures of popular P2P applications --- p.47 / Chapter 3.4 --- Experiment Results --- p.49 / Chapter 3.5 --- Discussion --- p.52 / Chapter 4 --- Related Work --- p.58 / Chapter 5 --- Conclusion --- p.62 / Bibliography --- p.64
74

Digital Identity Dissonance A Grounded Theory Study of Identity Guarding.

Szumski, Meredith Kay. Unknown Date (has links)
This grounded theory study responds to the 21st Century dilemma medical schools encounter as online social networking sites like Facebook reveal more and more about their students---do professionally incongruous online behaviors indicate a lack of essential traits required to be a physician? By contextually situating the inquiry at one medical school over a period of three years, findings revealed the main concerns students had regarding professionalism as it relates to Facebook and detailed strategies employed to resolve those concerns as a substantive theory of digital identity dissonance. Participants revealed an awareness of desired behaviors espoused by professionalism expectations, but discovery of a looped pattern of telling demonstrated a reactive reasoning process seemingly incompatible with institutional norms but indicative of identity acquisition tension. Theoretical conceptualization of the data expanded Bourdieu's notion of habitus to a novel concept of Facebook Native Habitus (FBNH). Identity guarding emerged in analysis as a basic social process characterized by a reactive reasoning process through which enculturated members of a group negotiate thoughts and feelings perceived to be incongruent with in-group expectations. Identity guarding is a subconscious strategy used in managing presentation of self and is the formal theory developed in this study.
75

The Relationship between Playing Games and Metacognitive Awareness.

Moncarz, Howard T. Unknown Date (has links)
This study investigated how playing different types of video games was associated with different values of metacognitive awareness. The target population was first and second-year college students. The study used a survey methodology that employed two self-reporting instruments: the first to estimate a metacognitive-awareness index (MAI), and the second (developed in this study) to: (a) assess a respondent's video- and non-electronic-game experience (including both video and non-electronic games), (b) estimate the time spent playing video games (time played) over the prior two years, and (c) characterize the different types of video games that were played (to determine gamer type). / Out of 759 surveys distributed in 29 classes (for first and second-year courses), there were 175 respondents. For the main analysis, 80 respondents were eligible because they were video gamers, aged 18 to 21 years, and undergraduates. Juniors and seniors were included to mitigate the risk of too few respondents. The analysis was based on a 2 (time played) x 3 (gamer type) ANOVA for MAI. Gamer type was based on the predominant type of video games played among action games, strategy games, and coherent world games (CWGs). A CWG was defined as a role-playing game (RPG) in which a player explored a consistent and complex world to solve challenges or an entity-development game (EDG) in which the player developed, managed, and operated a complex entity in a consistent world or context. The three gamer types were action, strategy, and CWG. / The initial analysis revealed that action gamers and strategy gamers could not be objectively distinguished. Thus, three new gamer types that were consistent with the study's objectives were specified. The first type played predominantly EDGs; the second, RPGs; and the third, neither EDGs nor RPGs as often. The third type was assumed to play predominantly non-coherent world games (NCWGs). Thus, the three gamer types were EDG, RPG, and NCWG. / The results showed that EDG gamers were associated with a significantly higher MAI than NCWG gamers. F(2, 77) = 4.55; p &lt; .05; partial eta2 = .11; and power = .76. There was not a significant association for time played or the interaction of time played and gamer type. In a secondary analysis, comprising 64 gamers, aged 18 to 21 years, and first and second-year students only, the results showed that CWG and EDG gamers were associated with a significantly higher MAI than NCWG gamers. F(3, 60) = 4.29; p &lt; .01; partial eta2 = .18; and power = .84. / Two possible hypotheses for the results were that playing CWGs foster metacognitive awareness or that those with a higher metacognitive awareness preferred CWGs. Because the methodology used a one-time survey, neither hypothesis could be confirmed or denied. Due to coverage and nonresponse errors, the sample results were not generalizable. Nevertheless, the results provided evidence of an association between CWG gamers and a higher metacognitive awareness than for NCWG gamers. The implication was that the study could inform methodology design for future research to develop an empirically-based taxonomy on game characteristics, organized according to their association with metacognitive awareness.
76

Twitter and the journalistic field| How the growth of a new(s) medium is transforming journalism

Barnard, Stephen R. 11 January 2013
Twitter and the journalistic field| How the growth of a new(s) medium is transforming journalism
77

End-to-end streaming protocols with QoS control for secure IP multimedia communications /

Chan, Siu Ping. January 2004 (has links)
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 167-175). Also available in electronic version. Access restricted to campus users.
78

Scalable visual contents delivery over heterogeneous networks /

Cai, Hua. January 2003 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 130-136). Also available in electronic version. Access restricted to campus users.
79

Through no fault of their own? A critical discourse analysis of the Dream Act and undocumented youth in evening television news

Lopez, Ruth Maria 06 October 2015 (has links)
<p> This study focuses on the rise of one of the most publicized policies related to U.S. immigration: The Development, Relief, and Education for Alien Minors (DREAM) Act, which would create a path to legal residency for young undocumented immigrants living in the United States. Following the 1982 <i> Plyler v. Doe</i> Supreme Court decision, undocumented children gained the right to a free public K-12 education in the United States (Olivas, 2012), but their immigration status and access to institutions of higher education were left largely unaddressed (L&oacute;pez, 2004; Yates, 2004). In response to the uncertainty faced by thousands of undocumented students upon high school graduation in this country each year, the DREAM Act was first introduced to Congress in 2001 (Olivas, 2004). In this multi-method study, I examined the DREAM Act versions presented to Congress during President Barack Obama&rsquo;s first term in office&mdash;a time when the DREAM Act was expected to pass for the first time since its inception in 2001. First, through a content analysis of DREAM Act policy documents, I explored how this policy was framed and how DREAMers were legally constructed (Johnson, 1996). Following this, I conducted a multimodal (Kress, 2011) critical discourse analysis (CDA; Luke, 1996; van Dijk, 2002, 2003) of national television news coverage of the DREAM Act of 2010, the version that came closest to passing, and highlighted the role news media played in communicating this policy issue. Considering Haas&rsquo;s (2004) argument that news media play a large part in how education policy issues come to be understood by the public, I explored how framing (Hand, Penuel, &amp; Guti&eacute;rrez, 2012) was used to portray the DREAM Act and DREAMers. My theoretical framework centers on understanding immigration in the United States as a racial issue (P&eacute;rez Huber, 2009) by using Omi and Winant&rsquo;s (1994) theories of racial formation as well as Bonilla-Silva&rsquo;s (2014) frames of color-blind racism.</p>
80

Sexting uncensored| An exploratory study on the behaviors, experiences, and perceptions of sexting among college students

Abraham, Anju Elizabeth 18 November 2015 (has links)
<p>This study examined the practice of sexting (the exchange of nude or semi-nude photos through text messaging) among 401 undergraduate students ages 18 to 25 at California State University, Fresno. A computer survey with separate tracks for sexters and non-sexters differentiated data between the two groups. The researcher found that one in three students sexted. Pearson&rsquo;s &chi;<sup> 2</sup> test indicated a statistical significance between female non-Hispanic White casual daters and sexting. Among key findings, a majority of sexters infrequently exchanged a small number of photos with their boyfriends or girlfriends. Face cropping and smartphone applications were used most often for protection against harmful effects. Less than a fifth of respondents had their sext forwarded without their consent or were bullied with the photo. Over half of the students that sexted perceived their sexting activity led to having sex with that person. Those who did not engage in sexting perceived sexters to be unaware of the risks attached to the practice and perceived sexting as inappropriate. The findings demonstrated a range of risky and protective behaviors, experiences, and perceptions exist among Fresno State students that have adopted or rejected the practice of sexting. Recommendations for future studies include further exploration on the sexting behaviors between relationship partners as well as the types of applications used to sext. </p>

Page generated in 0.1155 seconds