• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 592
  • 41
  • 38
  • 25
  • 17
  • 12
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • Tagged with
  • 821
  • 821
  • 716
  • 262
  • 221
  • 135
  • 89
  • 89
  • 75
  • 72
  • 67
  • 64
  • 63
  • 62
  • 60
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
401

Virtual communities of practice in a mobile learning environment.

Tsela, Dumisani. January 2010 (has links)
Thesis (MTech. degree in Business Information Systems.)--Tshwane University of Technology, 2010. / This research addresses how mobile learning by means of a virtual community of practice can facilitate interaction and knowledge sharing amongst contact university learners as they traverse varied learning environments. Using Activity theory and the theory of social presence, the research aimed to provide an informed understanding of virtual communities of practice and how they manifest in a mobile learning environment. In this dissertation, virtual communities of practice are argued to effectively facilitate personalized learning support in an environment where learning is not confined to particular places. Importantly, virtual communities of practice are fundamentally modeled by awareness of context and social presence. Informed by empirical evidence gathered through a Contextual Inquiry method, a field research framework that depends on interaction with users in the context of their work, this study shows how mobile learners in a typical South African university could be afforded personalized academic support as they traverse varied learning environments.
402

Energy conserving protocols for wireless data networks

Stine, John Andrew, 1959- 06 April 2011 (has links)
Not available / text
403

Packet scheduling techniques for coordinating colocated Bluetooth and IEEE 802.11b in a Linux machine

Yip, Hoi-kit., 葉海傑. January 2004 (has links)
published_or_final_version / abstract / toc / Electrical and Electronic Engineering / Doctoral / Doctor of Philosophy
404

Forward security and certificate management in mobile AD Hoc networks

Go, Hiu-wing., 吳曉頴. January 2004 (has links)
published_or_final_version / abstract / toc / Computer Science and Information Systems / Master / Master of Philosophy
405

Newly modified log-map algorithms for turbo codes in mobile environments

Li, Ka-lun., 李嘉麟. January 2000 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
406

Pilot-symbol-aided techniques for spectrally efficient signals in multipath-fading channels

劉慶強, Lau, Hing-keung. January 1997 (has links)
published_or_final_version / Electrical and Electronic Engineering / Doctoral / Doctor of Philosophy
407

Security protocols for mobile ad hoc networks

Davis, Carlton R. January 2006 (has links)
Mobile ad hoc networks (MANETs) are generating much interest both in academia and the telecommunication industries. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. For example, unlike other wireless networks, MANETs do not require centralized infrastructures such as base stations, and they are arguably more robust due to their avoidance of single point of failures. Interestingly, the attributes that make MANETs attractive as a network paradigm are the same phenomena that compound the challenge of designing adequate security schemes for these innovative networks. / One of the challenging security problems is the issue of certificate revocation in MANETs where there are no on-line access to trusted authorities. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories or distribute them to relevant entities. In purely ad hoc networks, there are typically no access to centralized repositories or trusted authorities; therefore the conventional method of certificate revocation is not applicable. / Another challenging MANET security problem is the issue of secure routing in the presence of selfish or adversarial entities which selectively drop packets they agreed to forward; and in so doing these selfish or adversarial entities can disrupt the network traffic and cause various communication problems. / In this thesis, we present two security protocols we developed for addressing the above-mentioned MANET security needs. The first protocol is a decentralized certificate revocation scheme which allows the nodes within a MANET to have full control over the process of certificate revocation. The scheme is fully contained and it does not rely on any input from centralized or external entities such as trusted CAs. The second protocol is a secure MANET routing scheme we named Robust Source Routing (RSR). In addition to providing data origin authentication services and integrity checks, RSR is able to mitigate against intelligent, colluding malicious agents which selectively drop or modify packets they are required to forward.
408

Tactile display for mobile interaction

Pasquero, Jerome. January 2008 (has links)
Interaction with mobile devices suffers from a number of shortcomings, most of which are linked to the small size of screens. Artificial tactile feedback promises to be particularly well suited to the mobile interaction context. To be practical, tactile transducers for mobile devices must be small and light, and yet be capable of displaying a rich set of expressive stimuli. This thesis introduces a tactile transducer for mobile interaction that is capable of distributed skin stimulation on the fingertip. The transducer works on a principle that was first investigated because of its potential application to the display of Braille. A preliminary study was conducted on an earlier version of the transducer. It concluded that subjects were able to identify simple Braille characters with a high rate of success. Then, a complete re-design of the transducer addressed the goal of integration in a handheld prototype for mobile interaction. The resulting device comprises a liquid crystal graphic display co-located with the miniature, low-power, distributed tactile transducer. Next, it was needed to measure the perceptual differences between the stimuli that the device could display. Our experiences with one evaluation approach raised questions relating to the methodology for data collection. Therefore, an analysis of the process was carried out using a stimulus set obtained with the device. By means of multidimensional scaling analysis, both the perceptual parameters forming the stimuli space and the evaluation technique were validated. Finally, two experiments were carried out with the objective to develop new mobile interactions paradigms that combined visual and tactile feedback. Both experiments modeled a list scrolling task on the device. The first experiment found a marginal improvement in performance when tactile feedback was employed. It also came at a higher attentional cost dedicated to operating the device. For the second experiment, the scrolling paradigm and the tactile feedback were improved. This lead to a decrease in the reliance on vision when tactile feedback was enabled. Results showed a 28% decrease in the number of key presses that controlled the visibility state of the scroll list.
409

Direct sequence spread spectrum cellular radio

Kchao, Camroeum 12 1900 (has links)
No description available.
410

Data access and interaction management in mobile and distributed environments

VanderMeer, Debra 05 1900 (has links)
No description available.

Page generated in 0.1194 seconds