Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17828 open access dissertations and theses found for:
if(Protocol)  »   Refine Search
1.
Energy efficient hierarchical wireless routing protocol (EEHW routing protocol)
by Madapatha, Samira Anupama, M.S.  California State University, Long Beach. 2015: 65 pages; 1597778.
2.
Networking support for underwater wireless networks
by Kredo, Kurtis B., II, Ph.D.  University of California, Davis. 2010: 163 pages; 3422773.
4.
5.
Geo-link resilient protocol for MANETs
by Vishnumalakala, Sree Raghuveer, M.S.  California State University, Long Beach. 2016: 35 pages; 10142974.
6.
Reasoning About Wireless Protocol Behavior
by Kwon, Tae Woo, Ph.D.  The Ohio State University. 2012: 133 pages; 10631126.
7.
Redefining Insteon home control networking protocol
by Abdul Azeez Khan, Mohamed Shoaib Khan, M.S.  California State University, Long Beach. 2015: 106 pages; 1583654.
8.
Hiring Leaders in Catholic Schools
by Connelly, Camryn, Ed.D.  Loyola Marymount University. 2014: 128 pages; 3638153.
10.
An enhanced low energy adaptive clustering hierarchy protocol for wireless sensor networks
by Golwalkar, Ankit, M.S.  California State University, Long Beach. 2016: 48 pages; 10137447.
11.
Real-Time Communication with TDMA on Distributed Systems
by Khan, Luqman F., M.S.  California State University, Long Beach. 2018: 38 pages; 10978912.
12.
Connectivity Between Two Distant Sites with Automatic Failover to IPsec
by Singh, Mankaran, M.S.  California State University, Long Beach. 2017: 39 pages; 10262849.
16.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
17.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
18.
Designing, Verifying, and Evolving Commitment-based Protocols for Business
by Gerard, Scott Neal, Ph.D.  North Carolina State University. 2013: 150 pages; 3575895.
19.
Automated Design of Optimal Medium Access Control Protocols for Wireless Networking
by Zhen, Jian, Ph.D.  University of California, Santa Barbara. 2014: 169 pages; 3683002.
20.
Collusion Preserving Computation
by Alwen, Joel, Ph.D.  New York University. 2011: 105 pages; 3482849.
21.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
22.
Effects of Lactobacillus rhamnosus MRS6AN on Intestinal GPAT3 Pathway Involved in the Lipid Transport in Enterocytes
by Ipinmoroti, Ayodeji Oludare, M.S.  East Tennessee State University. 2017: 129 pages; 13830177.
23.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
24.
Communication complexity and information complexity
by Pankratov, Denis, Ph.D.  The University of Chicago. 2015: 188 pages; 3711791.
26.
Collective Critical Conversations: Addressing Equity in Teacher Induction Programs
by Steward, Maia Christine, Ed.D.  San Francisco State University. 2017: 265 pages; 10743554.
27.
Implementing an Early Mobility Protocol for Patients in the Intensive Care Unit
by Crane, Allison Nicole, D.N.P.  Brandman University. 2017: 97 pages; 10255444.
28.
Design of a routing protocol for wireless sensor networks
by Thodupunuri, Akarsh, M.S.  California State University, Long Beach. 2016: 76 pages; 10134006.
29.
Distributed rate allocation for video streaming over wireless networks
by Zhu, Xiaoqing, Ph.D.  Stanford University. 2009: 191 pages; 3364517.
30.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
1 - 30 of 17828 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest