• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 448
  • 49
  • 35
  • 26
  • 8
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 620
  • 620
  • 593
  • 293
  • 210
  • 147
  • 143
  • 99
  • 74
  • 55
  • 55
  • 54
  • 53
  • 51
  • 48
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Content-based multicast in ad hoc networks

Zhou, Hu 22 June 2000 (has links)
An important objective of tactical ad hoc networks is to deliver threat information from sensors to shooters efficiently and quickly. The information sent to a particular shooter should contain warnings about threats that are within some distance and/or within some time of the shooter's current location. In this thesis we develop a novel multicast model that distributes this form of threat information in a message efficient manner. In addition, information about allied force can also be distributed in a similar way. We present results from extensive simulations that demonstrate the efficiency of our protocol and discuss the scalability of this model to larger networks. / Graduation date: 2001
72

CAD-HOC a CAD like tool for generating mobility benchmarks in ad-hoc networks /

Shah, Subodh, January 2001 (has links) (PDF)
Thesis (M.S.)--University of Florida, 2001. / Title from first page of PDF file. Document formatted into pages; contains xiii, 90 p.; also contains graphics. Vita. Includes bibliographical references (p. 85-89).
73

Efficient failure detection protocols for point-to-point communication networks /

Dahlgren, Jeremy. January 2004 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (p. 109-110).
74

Automatic validation of secure authentication protocols

Kim, Kyoil, January 2003 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.
75

A receiver-initiated MAC protocol with enhancements for multi-hop wireless networks

Thind, Balvinder Kaur, January 2004 (has links) (PDF)
Thesis (M.S.)--Washington State University. / Includes bibliographical references.
76

Quality of service aware source initiated ad-hoc routing

Vik, Knut-Helge, January 2004 (has links) (PDF)
Thesis (M.S.)--Washington State University. / Includes bibliographical references.
77

Bluesim a Bluetooth LAN Access Profile simulator /

Parvatham, Sasidhar. January 2002 (has links)
Thesis (M.S.)--University of Florida, 2002. / Title from title page of source document. Includes vita. Includes bibliographical references.
78

SALM : an efficient application-level multicast protocol for dynamic groups /

Wong, Wan-Ching. January 2003 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 75-79). Also available in electronic version. Access restricted to campus users.
79

The extensible run-time infrastructure (XRTI) : an experimental implementation of proposed improvements to the high level architecture /

Kapolka, Andrzej. January 2003 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Michael Zyda, Bret Michael. Includes bibliographical references (p. 111-114). Also available online.
80

Hop integrity: a defense against denial-of-service attacks

Huang, Chin-Tser 28 August 2008 (has links)
Not available / text

Page generated in 0.0687 seconds