Spelling suggestions: "subject:"anda computer betworks."" "subject:"anda computer conetworks.""
81 |
Building scalable next generation Internet routers /Wang, Feng. January 2008 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2008. / Includes bibliographical references (p. 104-110). Also available in electronic version.
|
82 |
Design of the Network Multimedia File System protocol : a protocol for remote access of networked multimedia files /Patel, Sameer H., January 1994 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1994. / Vita. Abstract. Includes bibliographical references (leaves 68-70). Also available via the Internet.
|
83 |
Survivability of interconnected ring networks /Kulkarni, Anoop P., January 1993 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1993. / Vita. Abstract. Includes bibliographical references (leaf 142). Also available via the Internet.
|
84 |
Increasing server reliability and performance using smart gatewaysDemir, Onur. January 2007 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Dept. of Computer Science, 2007. / Includes bibliographical references.
|
85 |
Development of a standards based open environment for the worldwide military command and control system /Laska, William David. January 1993 (has links)
Report (M.S.)--Virginia Polytechnic Institute and State University. M.S. 1993. / Abstract. Includes bibliographical references. Also available via the Internet.
|
86 |
Three dimensional networks-on-chip a performance evaluation /Feero, Brett Stanley, January 2008 (has links) (PDF)
Thesis (M.S. in computer engineering)--Washington State University, May 2008. / Includes bibliographical references (p. 57-60).
|
87 |
Networking security : risk assessment of information systems /Lurain, Sher. January 1990 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 1990. / Spine title: Network security and risk assessment. Includes bibliographical references (leaves 105-108).
|
88 |
Civil society computer networks the perilous road of cyber-politics /Fortier, François. January 1997 (has links)
Thesis (Ph. D.)--York University, 1996. / Title from web page. Includes bibliographical references.
|
89 |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises /Sherman, Michael A. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis Advisor(s): Cynthia E. Irvine, J.D. Fulp. Includes bibliographical references (p. 155-159). Also available online.
|
90 |
Cooperative resource discovery and sharing in group communicationsLee, Jangwon, January 2003 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.
|
Page generated in 0.0617 seconds