Spelling suggestions: "subject:"betworks"" "subject:"conetworks""
1 |
Secure remote network administration and power management /Sullivan, Mark P. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Dale Courtney. Includes bibliographical references (p. 53). Also available online.
|
2 |
Layered decision model for cost-effective network safeguarding /Wei, Huaqiang. January 1900 (has links)
Thesis (Ph. D., Computer Science)--University of Idaho, December 6, 2006. / Major professor: Jim Alves-Foss. Includes bibliographical references (leaves 102-109). Also available online (PDF file) by subscription or by purchasing the individual file.
|
3 |
Building reliable applications in overlay networksLiu, Xiaomei. January 2008 (has links)
Thesis (Ph. D.)--Michigan State University. Computer Science and Engineering Dept., 2008. / Title from PDF t.p. (viewed on Apr. 8, 2009) Includes bibliographical references (p. 176-184). Also issued in print.
|
4 |
Survivability of interconnected ring networks /Kulkarni, Anoop P., January 1993 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1993. / Vita. Abstract. Includes bibliographical references (leaf 142). Also available via the Internet.
|
5 |
Algorithms for multiconstrained quality-of-service paths and restorationSong, Meongchul. January 2005 (has links)
Thesis (Ph. D.)--University of Florida, 2005. / Title from title page of source document. Document formatted into pages; contains 88 pages. Includes vita. Includes bibliographical references.
|
6 |
Network management standards from the fault management perspective.Aitken, William Theodore, Carleton University. Dissertation. Engineering, Electrical. January 1992 (has links)
Thesis (M. Eng.)--Carleton University, 1992. / Also available in electronic format on the Internet.
|
7 |
On the applications, deployment and security of service overlay networks /Kurian, Jinu, January 2009 (has links)
Thesis. / Includes vita. Includes bibliographical references (leaves [152]-162)
|
8 |
Practical implementation and performance analysis on security of sensor networks /Verma, Nidhi. January 2006 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2006. / Typescript. Includes bibliographical references (leaves 82-88).
|
9 |
Setting up information technology structures for trade unionsHecht, Harvey B. January 2006 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2006. / Title from PDF title page (viewed on Dec. 13, 2006). Includes bibliographical references.
|
10 |
Scalable and efficient distributed algorithms for defending against malicious Internet activitySung, Minho. January 2006 (has links)
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007. / Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
|
Page generated in 0.6397 seconds