• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8743
  • 2930
  • 1104
  • 1047
  • 1016
  • 682
  • 315
  • 302
  • 277
  • 266
  • 135
  • 128
  • 79
  • 78
  • 75
  • Tagged with
  • 20085
  • 3907
  • 2819
  • 2574
  • 2434
  • 2344
  • 1930
  • 1830
  • 1554
  • 1524
  • 1513
  • 1510
  • 1499
  • 1444
  • 1395
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
651

Study of network-service disruptions using heterogeneous data and statistical learning

Erjongmanee, Supaporn 21 January 2011 (has links)
The study of network-service disruptions caused by large-scale disturbances has mainly focused on assessing network damage; however, network-disruption responses, i.e., how the disruptions occur depending on social organizations, weather, and power resources, have been studied little. The goal of this research is to study the responses of network-service disruptions caused by large-scale disturbances with respect to (1) temporal and logical network, and (2) external factors such as weather and power resources, using real and publicly available heterogeneous data that are composed of network measurements, user inputs, organizations, geographic locations, weather, and power outage reports. Network-service disruptions at the subnet level caused by Hurricanes Katrina in 2005 and Ike in 2008 are used as the case studies. The analysis of network-disruption responses with respect to temporal and logical network shows that subnets became unreachable dependently within organization, cross organization, and cross autonomous system. Thus, temporal dependence also illustrates the characteristics of logical dependence. In addition, subnet unreachability is analyzed with respect to the external factors. It is found that subnet unreachability and the storm are weakly correlated. The weak correlation motivates us to search for root causes and discover that the majority of subnet unreachability reportedly occurred because of power outages or lack of power generators. Using the power outage data, it is found that subnet unreachability and power outages are strongly correlated.
652

A framework to model the relationship between information and network performance

Geng, Yanhui. January 2009 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2010. / Includes bibliographical references (leaves 97-102). Also available in print.
653

Hop integrity a defense against denial-of-service attacks /

Huang, Chin-Tser, Gouda, Mohamed G., January 2003 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Supervisor: Mohamed G. Gouda. Vita. Includes bibliographical references. Available also from UMI Company.
654

Network efficiency/performance measurement with vulnerability and robustness analysis with application to critical infrastructure

Qiang, Qiang, January 2009 (has links)
Thesis (Ph. D.)--University of Massachusetts Amherst, 2009. / Includes bibliographical references (p. 200-223). Print copy also available.
655

Scalable network architecures [sic] for providing per-flow service guarantees

Sahni, Jasleen Kaur. January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2002. / Vita. Includes bibliographical references. Available also from UMI Company.
656

Efficient protocol for live Web-based teaching

Singh, Ravinder Pal, January 2002 (has links)
Thesis (M.S.)--University of Florida, 2002. / Title from title page of source document. Document formatted into pages; contains xi, 74 p.; also contains graphics. Includes vita. Includes bibliographical references.
657

A network equilibrium approach for modeling urban taxi services /

Wong, Ka-io. January 2002 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2002. / Includes bibliographical references (leaves 141-145).
658

A design comparison between IPv4 and IPv6 in the context of MYSEA, and implementation of an IPv6 MYSEA prototype /

O'Neal, Matthew R. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 49-50). Also available online.
659

Social couponing : Groupon's influence on brands / Groupon's influence on brands

Chiu, Jessica Chi-Hang 20 February 2012 (has links)
Groupon was founded in 2008 and became the first official social couponing site, attracting widespread attention from many individuals. By putting a new spin on an old marketing strategy, Groupon was able to alter the manner in which consumers viewed coupons. Their social business model took network marketing to a whole new level by capitalizing on the rising trend of social media and online communities. In addition, the company’s rapidly growing subscriber base has prompted many retailers to engage with Groupon in an attempt to generate higher brand awareness. This professional report will explore the influence that Groupon has on retail brands by providing an analysis of two case studies that yielded positive and negative experiences with Groupon. / text
660

Power reduction of wireless sensors networks Power reduction of wireless sensors networks

Morales, Isaac James 27 February 2012 (has links)
This Master’s report presents the research leading to the development of a low power Wireless Sensor Network (WSN) and a discussion of an implementation of the WSN. This report assesses the power reduction techniques further by reviewing their influences upon functionality, throughput, latency, and data reliability. The software techniques were implemented on evaluation boards and actual performance gains were observed. Furthermore, the report provides insight into the selection of the processor, wireless protocol, and WSN architecture by comparing other options in regards to the power reduction, functionality, and data reliability. The architecture of the WSN consists of four sensor nodes, and a backbone router connected to a PC. The sensor nodes contain an application processor and a radio processor. The application processor is a Texas Instruments MSP430F5438 which is located on an MSP-EXP430F5438 evaluation board. The radio processor is a NIVIS Versa Node 210 that is located on a VS210 development board. The wireless protocol investigated is the ISA100.11a. / text

Page generated in 0.0419 seconds