• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1105
  • 284
  • 141
  • 81
  • 81
  • 77
  • 73
  • 73
  • 30
  • 22
  • 21
  • 17
  • 16
  • 15
  • 12
  • Tagged with
  • 2385
  • 482
  • 398
  • 366
  • 309
  • 268
  • 251
  • 250
  • 215
  • 204
  • 201
  • 190
  • 189
  • 189
  • 181
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Performance evaluation of raptor codes in packet-based wireless networks.

Fanoro, Mokesioluwa January 2013 (has links)
M. Tech. Electrical Engineering / In recent years, there has been an increasing interest in real-time and delay sensitive applications. This is partly due to the increase in the use of video and audio streaming services. Most of these services depend on the User Datagram Protocol which is known as a fast and best effort protocol. However, there is no guarantee that packets sent via User Datagram Protocol will be received in their entirety. This is due to the absence of any packet error recovery mechanism in User Datagram Protocol. The purpose of this dissertation is therefore to investigate and evaluate the performance of raptor codes in packet based wireless networks.
232

Behavior Modeling and Analysis in Multimedia Sharing Networks

Hu, Bo Unknown Date
No description available.
233

Becoming visible in invisible space| How the cyborg trickster is (re)inventing American Indian (ndn) identity

Chisum, Pamela Corinne 28 November 2013 (has links)
<p> This dissertation investigates issues of representation surrounding the American Indian (NDN) and the mixedblood. By conflating images of the trickster as described by NDN scholars with the postmodern theories of Donna Haraway, I explore in my dissertation how the trickster provides a way of viewing formerly accepted boundaries of identity from new perspectives. As cyborg, the trickster is in the "system," but it is also enacting change by pushing against those boundaries, exposing them as social fictions. I create a cyborg trickster heuristic, using it as a lens with which to both analyze how NDNs construct online identities and the rhetorical maneuvers they undergo. Moving beyond access issues, I show how NDNs are strengthening their presence through social media. Ultimately, I argue that the cyborg trickster shows how identities (NDN and non-NDN alike) are multiply-created and constantly in flux, transcending the traditional boundaries of self and other, online and offline, space and place, to allow for a new understanding of the individual in society and society within the individual.</p>
234

Switch scheduling in the Multimedia Router (MMR)

Paul, Indrani 05 1900 (has links)
No description available.
235

QoS concerned efficient video communications over wireless networks

Zheng, Hai 08 1900 (has links)
No description available.
236

Power control based QoS provisioning for wireless multimedia networks

Gürbüz, Özgür 05 1900 (has links)
No description available.
237

Fast switch scheduling in the multimedia router

Love, Damon S. 05 1900 (has links)
No description available.
238

Miniature gardens and magic crayons : games, spaces and worlds

Gingold, Chaim 05 1900 (has links)
No description available.
239

Learning through interactive video in secondary science : a study of learner attitudes, anxieties, and preferences for learning settings

Altun, Eralp H. January 1997 (has links)
No description available.
240

Architecture to support ATM and SDH interconnection

Costa, Carlos Manuel Gutierrez Sa da January 1994 (has links)
No description available.

Page generated in 0.2714 seconds