Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17424 open access dissertations and theses found for:
if(Protocol)  »   Refine Search
1.
Energy efficient hierarchical wireless routing protocol (EEHW routing protocol)
by Madapatha, Samira Anupama, M.S.  California State University, Long Beach. 2015: 65 pages; 1597778.
2.
Networking support for underwater wireless networks
by Kredo, Kurtis B., II, Ph.D.  University of California, Davis. 2010: 163 pages; 3422773.
4.
5.
Geo-link resilient protocol for MANETs
by Vishnumalakala, Sree Raghuveer, M.S.  California State University, Long Beach. 2016: 35 pages; 10142974.
6.
Redefining Insteon home control networking protocol
by Abdul Azeez Khan, Mohamed Shoaib Khan, M.S.  California State University, Long Beach. 2015: 106 pages; 1583654.
8.
Hiring Leaders in Catholic Schools
by Connelly, Camryn, Ed.D.  Loyola Marymount University. 2014: 128 pages; 3638153.
9.
Reasoning About Wireless Protocol Behavior
by Kwon, Tae Woo, Ph.D.  The Ohio State University. 2012: 133 pages; 10631126.
11.
An enhanced low energy adaptive clustering hierarchy protocol for wireless sensor networks
by Golwalkar, Ankit, M.S.  California State University, Long Beach. 2016: 48 pages; 10137447.
12.
Real-Time Communication with TDMA on Distributed Systems
by Khan, Luqman F., M.S.  California State University, Long Beach. 2018: 38 pages; 10978912.
13.
Connectivity Between Two Distant Sites with Automatic Failover to IPsec
by Singh, Mankaran, M.S.  California State University, Long Beach. 2017: 39 pages; 10262849.
16.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
17.
Designing, Verifying, and Evolving Commitment-based Protocols for Business
by Gerard, Scott Neal, Ph.D.  North Carolina State University. 2013: 150 pages; 3575895.
18.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
19.
Collusion Preserving Computation
by Alwen, Joel, Ph.D.  New York University. 2011: 105 pages; 3482849.
20.
Communication complexity and information complexity
by Pankratov, Denis, Ph.D.  The University of Chicago. 2015: 188 pages; 3711791.
21.
Effects of Lactobacillus rhamnosus MRS6AN on Intestinal GPAT3 Pathway Involved in the Lipid Transport in Enterocytes
by Ipinmoroti, Ayodeji Oludare, M.S.  East Tennessee State University. 2017: 129 pages; 13830177.
22.
Automated Design of Optimal Medium Access Control Protocols for Wireless Networking
by Zhen, Jian, Ph.D.  University of California, Santa Barbara. 2014: 169 pages; 3683002.
23.
Design of a routing protocol for wireless sensor networks
by Thodupunuri, Akarsh, M.S.  California State University, Long Beach. 2016: 76 pages; 10134006.
24.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
25.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
26.
Implementing an Early Mobility Protocol for Patients in the Intensive Care Unit
by Crane, Allison Nicole, D.N.P.  Brandman University. 2017: 97 pages; 10255444.
28.
Collective Critical Conversations: Addressing Equity in Teacher Induction Programs
by Steward, Maia Christine, Ed.D.  San Francisco State University. 2017: 265 pages; 10743554.
29.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
30.
Relativistic quantum cryptography
by Kaniewski, Jedrzej, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006026.
1 - 30 of 17424 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest