Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16577 open access dissertations and theses found for:
if(Networking protocols)  »   Refine Search
1.
Enhancing networking protocols in widely deployed devices
by Verkaik, Patrick, Ph.D.  University of California, San Diego. 2010: 136 pages; 3408028.
2.
Automated Design of Optimal Medium Access Control Protocols for Wireless Networking
by Zhen, Jian, Ph.D.  University of California, Santa Barbara. 2014: 169 pages; 3683002.
4.
Networking support for underwater wireless networks
by Kredo, Kurtis B., II, Ph.D.  University of California, Davis. 2010: 163 pages; 3422773.
6.
Redefining Insteon home control networking protocol
by Abdul Azeez Khan, Mohamed Shoaib Khan, M.S.  California State University, Long Beach. 2015: 106 pages; 1583654.
7.
New cluster-based routing and multi-channel MAC protocols for vehicular ad hoc networks
by Poland, Matthew C., M.S.  California State University, Long Beach. 2010: 156 pages; 1481762.
8.
Integrated Architecture and Routing Protocols for Heterogeneous Wireless Networks
by Cavalcanti, Dave Alberto Tavares, Ph.D.  University of Cincinnati. 2006: 176 pages; 10857145.
9.
Performance evaluation of routing protocols in finding stable paths in vanet
by Ibrahim, Mohamed Elsaid Awad, M.S.Cp.  California State University, Los Angeles. 2015: 98 pages; 1586615.
10.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
11.
Efficient medium access protocols for wireless and RFID networks
by Jain, Shweta, Ph.D.  State University of New York at Stony Brook. 2007: 119 pages; 3334935.
12.
Software-Defined Architectures for Spectrally Efficient Cognitive Networking in Extreme Environments
by Sklivanitis, Georgios, Ph.D.  State University of New York at Buffalo. 2018: 182 pages; 10744705.
14.
Power-controlled channel access and routing protocols for MIMO-capable wireless networks
by Siam, Mohammad Zakariya Abdel Rahman, Ph.D.  The University of Arizona. 2009: 152 pages; 3352371.
15.
NodeBlaze: Using reprogrammable logic to advance sensor networking technology
by Gruenwald, Charles, M.S.  University of Colorado at Boulder. 2007: 57 pages; 1447677.
16.
IslaNet: An isolated and secure approach to implementing computer networking laboratories
by Cruz-Zendejas, Rogelio, M.S.  California State University, Long Beach. 2013: 121 pages; 1527541.
19.
Enabling Communication and Networking Technologies for Smart Grid
by Garlapati, Shravan, Ph.D.  Virginia Polytechnic Institute and State University. 2014: 181 pages; 10595315.
20.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
21.
Affect of handover on the performance of routing protocols in WiMax
by Valivety, Suneel, M.S.  California State University, Long Beach. 2009: 79 pages; 1481804.
22.
23.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
24.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
25.
Implementing MPLS-TP Using SDN: OpenFlow Enabled Control Plane
by Gaikwad, Shailendra K., M.S.  University of Louisiana at Lafayette. 2014: 80 pages; 1585856.
26.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
27.
Programmable and Scalable Software-Defined Networking Controllers
by Voellmy, Andreas Richard, Ph.D.  Yale University. 2014: 219 pages; 3580888.
28.
Modeling and verification techniques for ad hoc network protocols
by Singh, Anu, Ph.D.  State University of New York at Stony Brook. 2009: 130 pages; 3401731.
29.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
30.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
1 - 30 of 16577 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest