381 |
Parametric mixing for centralized VoIP conferencing using ITU-T recommendation G.722.2 /Agnello, Giuseppe, January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2006. / Includes bibliographical references (p. 114-119). Also available in electronic format on the Internet.
|
382 |
Application of simulated anealing algorithm to wireless sensor networks /Liao, Jiye. January 1900 (has links)
Thesis (M.Eng.) - Carleton University, 2006. / Includes bibliographical references (p. 89-93). Also available in electronic format on the Internet.
|
383 |
SIP-RTI: a high level architecture, runtime infrastructure build on a SIP-enabled conferencing mechanism /Van Ham, Claude O. H., January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2006. / Includes bibliographical references (p. 81-89). Also available in electronic format on the Internet.
|
384 |
Source authentication in group communicationAl-Ibrahim, Mohamed Hussain. January 2005 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Dept. of Computing, 2004. / Title from screen page; viewed 10 Oct 2005. Bibliography: leaves 163-175. Also available in a print form.
|
385 |
Traffic engineering using multipath routing approaches /Mazandu, Gaston Kuzamunu. January 2007 (has links)
Thesis (MSc)--University of Stellenbosch, 2007. / Bibliography. Also available via the Internet.
|
386 |
Dynamically controllable applications in wireless sensor networksRajan, Sriram, January 2006 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Electrical and Computer Engineering. / Title from title screen. Includes bibliographical references.
|
387 |
A defense system on DDOS attacks in mobile ad hoc networksYu, Xuan. Hamilton, John A. January 2007 (has links) (PDF)
Dissertation (Ph.D.)--Auburn University, 2007. / Abstract. Includes bibliographic references (p.127-137).
|
388 |
Routing in the presence of groups in MANETsParthasarathy, Madhusoodan. January 2009 (has links) (PDF)
Thesis (M.S. in computer science)--Washington State University, May 2009. / Title from PDF title page (viewed on July 21, 2009). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 113-117).
|
389 |
Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basisKilcrease, Patrick N. January 2009 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
|
390 |
Performance evaluation of the cache and forward routing protocol in multihop wireless subnetworksGopinath, Snehapreethi, January 2010 (has links)
Thesis (M.S.)--Rutgers University, 2010. / "Graduate Program in Electrical and Computer Engineering." Includes bibliographical references (p. 48-49).
|
Page generated in 0.0638 seconds