• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10792
  • 4319
  • 1109
  • 933
  • 646
  • 270
  • 247
  • 230
  • 189
  • 147
  • 134
  • 114
  • 81
  • 81
  • 70
  • Tagged with
  • 23042
  • 6381
  • 5749
  • 4313
  • 4013
  • 2948
  • 2586
  • 2452
  • 2344
  • 2100
  • 1947
  • 1871
  • 1806
  • 1733
  • 1679
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

A study of linear transformation methods of three-phase systems

Alford, Glynn Herman 05 1900 (has links)
No description available.
72

Active network synthesis using the generalized positive impedance converter

Cobb, Douglas Romain 05 1900 (has links)
No description available.
73

Analysis of wideband phase-shift networks

Fielder, Daniel Curtis 08 1900 (has links)
No description available.
74

A new technique for performance studies of CSMA/CD local networks

O'Reilly, Peter John Paul 05 1900 (has links)
No description available.
75

Synthesis of three-terminal ±R,C networks

Phillips, Charles Lamar 12 1900 (has links)
No description available.
76

Synthesis of lossless networks with controlled sources

Scarborough, Sidney Mize 12 1900 (has links)
No description available.
77

Computer generation of equivalent networks.

Soukup, Zdenek. January 1967 (has links)
No description available.
78

Use of multiple unified power flow controllers (UPFCs) to enhance power system operations and control

Ma, Tsao-Tsung January 2000 (has links)
No description available.
79

End-to-end security in active networks

Brown, Ian January 2001 (has links)
Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea.
80

The optimal design and control of water distribution systems using genetic algorithms

Ali, Mohammed Elgorani A. January 2001 (has links)
No description available.

Page generated in 0.0483 seconds