Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Georgia Tech" +contributor:("Fekri, Faramarz"). Showing records 1 – 30 of 48 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Georgia Tech

1. Choudhary, Anirudh. ROBUST COUNTERFACTUAL LEARNING FOR CLINICAL DECISION-MAKING USING ELECTRONIC HEALTH RECORDS.

Degree: MS, Computational Science and Engineering, 2020, Georgia Tech

 Building clinical decision support systems, which includes diagnosing patient’s disease states and formulating a treatment plan, is an important step toward personalized medicine. The counterfactual… (more)

Subjects/Keywords: Clinical Decision Making; Reinforcement Learning; Biomedical Informatics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Choudhary, A. (2020). ROBUST COUNTERFACTUAL LEARNING FOR CLINICAL DECISION-MAKING USING ELECTRONIC HEALTH RECORDS. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/64208

Chicago Manual of Style (16th Edition):

Choudhary, Anirudh. “ROBUST COUNTERFACTUAL LEARNING FOR CLINICAL DECISION-MAKING USING ELECTRONIC HEALTH RECORDS.” 2020. Masters Thesis, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/64208.

MLA Handbook (7th Edition):

Choudhary, Anirudh. “ROBUST COUNTERFACTUAL LEARNING FOR CLINICAL DECISION-MAKING USING ELECTRONIC HEALTH RECORDS.” 2020. Web. 01 Mar 2021.

Vancouver:

Choudhary A. ROBUST COUNTERFACTUAL LEARNING FOR CLINICAL DECISION-MAKING USING ELECTRONIC HEALTH RECORDS. [Internet] [Masters thesis]. Georgia Tech; 2020. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/64208.

Council of Science Editors:

Choudhary A. ROBUST COUNTERFACTUAL LEARNING FOR CLINICAL DECISION-MAKING USING ELECTRONIC HEALTH RECORDS. [Masters Thesis]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/64208

2. Jian, Yubing. Coexistence of wi-fi and LAA-LTE in unlicensed spectrum.

Degree: MS, Electrical and Computer Engineering, 2015, Georgia Tech

 The global mobile data usage has grown nearly 70% annually in recent years. The huge mobile data usage requirement drives the mobile industry to brace… (more)

Subjects/Keywords: LAA-LTE; WiFi; Coexistence; Experimental and simulation evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jian, Y. (2015). Coexistence of wi-fi and LAA-LTE in unlicensed spectrum. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54461

Chicago Manual of Style (16th Edition):

Jian, Yubing. “Coexistence of wi-fi and LAA-LTE in unlicensed spectrum.” 2015. Masters Thesis, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/54461.

MLA Handbook (7th Edition):

Jian, Yubing. “Coexistence of wi-fi and LAA-LTE in unlicensed spectrum.” 2015. Web. 01 Mar 2021.

Vancouver:

Jian Y. Coexistence of wi-fi and LAA-LTE in unlicensed spectrum. [Internet] [Masters thesis]. Georgia Tech; 2015. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/54461.

Council of Science Editors:

Jian Y. Coexistence of wi-fi and LAA-LTE in unlicensed spectrum. [Masters Thesis]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54461

3. Krishnaswamy, Bhuvana. When bacteria talk : time elapse communication for super-slow networks.

Degree: MS, Electrical and Computer Engineering, 2013, Georgia Tech

 In this work we consider nano-scale communication using bacterial popula- tions as transceivers. We demonstrate using a microfluidic test-bed and a population of genetically engineered… (more)

Subjects/Keywords: Molecular communication; On-off keying; Time elapse communication; Bacteria; Nanoscience; Nanotechnology; Microfluidics; Communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnaswamy, B. (2013). When bacteria talk : time elapse communication for super-slow networks. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50312

Chicago Manual of Style (16th Edition):

Krishnaswamy, Bhuvana. “When bacteria talk : time elapse communication for super-slow networks.” 2013. Masters Thesis, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/50312.

MLA Handbook (7th Edition):

Krishnaswamy, Bhuvana. “When bacteria talk : time elapse communication for super-slow networks.” 2013. Web. 01 Mar 2021.

Vancouver:

Krishnaswamy B. When bacteria talk : time elapse communication for super-slow networks. [Internet] [Masters thesis]. Georgia Tech; 2013. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/50312.

Council of Science Editors:

Krishnaswamy B. When bacteria talk : time elapse communication for super-slow networks. [Masters Thesis]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50312

4. Agarwal, Mohit. THINK: Toward practical general-purpose brain-computer communication.

Degree: MS, Electrical and Computer Engineering, 2017, Georgia Tech

 In this work, we present THINK, a practical general-purpose brain-computer communication platform that relies on the OpenBCI and OpenViBE hardware and software platforms, and allows… (more)

Subjects/Keywords: Brain-computer communication; Motor imagery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Agarwal, M. (2017). THINK: Toward practical general-purpose brain-computer communication. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58345

Chicago Manual of Style (16th Edition):

Agarwal, Mohit. “THINK: Toward practical general-purpose brain-computer communication.” 2017. Masters Thesis, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/58345.

MLA Handbook (7th Edition):

Agarwal, Mohit. “THINK: Toward practical general-purpose brain-computer communication.” 2017. Web. 01 Mar 2021.

Vancouver:

Agarwal M. THINK: Toward practical general-purpose brain-computer communication. [Internet] [Masters thesis]. Georgia Tech; 2017. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/58345.

Council of Science Editors:

Agarwal M. THINK: Toward practical general-purpose brain-computer communication. [Masters Thesis]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58345


Georgia Tech

5. Pawar, Rahul Shivaji. Audio diarization for LENA data and its application to computing language behavior statistics for individuals with autism.

Degree: PhD, Electrical and Computer Engineering, 2019, Georgia Tech

 The objective of this dissertation is to develop diarization algorithms for LENA data and study its application to compute language behavior statistics for individuals with… (more)

Subjects/Keywords: Diarization; Autism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pawar, R. S. (2019). Audio diarization for LENA data and its application to computing language behavior statistics for individuals with autism. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62285

Chicago Manual of Style (16th Edition):

Pawar, Rahul Shivaji. “Audio diarization for LENA data and its application to computing language behavior statistics for individuals with autism.” 2019. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/62285.

MLA Handbook (7th Edition):

Pawar, Rahul Shivaji. “Audio diarization for LENA data and its application to computing language behavior statistics for individuals with autism.” 2019. Web. 01 Mar 2021.

Vancouver:

Pawar RS. Audio diarization for LENA data and its application to computing language behavior statistics for individuals with autism. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/62285.

Council of Science Editors:

Pawar RS. Audio diarization for LENA data and its application to computing language behavior statistics for individuals with autism. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62285


Georgia Tech

6. Kadampot, Ishaque Ashar. Optimal codes for information-theoretically covert communication.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 We consider a problem of coding for covert communication, which involves ensuring reliable communication between two legitimate parties while simultaneously guaranteeing a low probability of… (more)

Subjects/Keywords: Covert communication; Physical-layer security; Coding for secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kadampot, I. A. (2020). Optimal codes for information-theoretically covert communication. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62730

Chicago Manual of Style (16th Edition):

Kadampot, Ishaque Ashar. “Optimal codes for information-theoretically covert communication.” 2020. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/62730.

MLA Handbook (7th Edition):

Kadampot, Ishaque Ashar. “Optimal codes for information-theoretically covert communication.” 2020. Web. 01 Mar 2021.

Vancouver:

Kadampot IA. Optimal codes for information-theoretically covert communication. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/62730.

Council of Science Editors:

Kadampot IA. Optimal codes for information-theoretically covert communication. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62730


Georgia Tech

7. Payani, Ali. Differentiable neural logic networks and their application onto inductive logic programming.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 Despite the impressive performance of Deep Neural Networks (DNNs), they usually lack the explanatory power of disciplines such as logic programming. Even though they can… (more)

Subjects/Keywords: Inductive logic programming; ILP; Neural logic; Relational reinforcement learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Payani, A. (2020). Differentiable neural logic networks and their application onto inductive logic programming. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62833

Chicago Manual of Style (16th Edition):

Payani, Ali. “Differentiable neural logic networks and their application onto inductive logic programming.” 2020. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/62833.

MLA Handbook (7th Edition):

Payani, Ali. “Differentiable neural logic networks and their application onto inductive logic programming.” 2020. Web. 01 Mar 2021.

Vancouver:

Payani A. Differentiable neural logic networks and their application onto inductive logic programming. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/62833.

Council of Science Editors:

Payani A. Differentiable neural logic networks and their application onto inductive logic programming. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62833


Georgia Tech

8. Kwon, Seok Chul. Geometrical theory, modeling and applications of channel polarization.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 Long-term evolution (LTE) standard has been successfully stabilized, and launched in several areas. However, the required channel capacity is expected to increase significantly as the… (more)

Subjects/Keywords: Polarization division multiple access (PDMA); Polarization division multiplexing (PDM); Channel modeling; Depolarization; Body area network (BAN)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kwon, S. C. (2013). Geometrical theory, modeling and applications of channel polarization. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52954

Chicago Manual of Style (16th Edition):

Kwon, Seok Chul. “Geometrical theory, modeling and applications of channel polarization.” 2013. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/52954.

MLA Handbook (7th Edition):

Kwon, Seok Chul. “Geometrical theory, modeling and applications of channel polarization.” 2013. Web. 01 Mar 2021.

Vancouver:

Kwon SC. Geometrical theory, modeling and applications of channel polarization. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/52954.

Council of Science Editors:

Kwon SC. Geometrical theory, modeling and applications of channel polarization. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/52954


Georgia Tech

9. Fayyaz, Ubaid Ullah. Polar code design and decoding for magnetic recording.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 Powerful error-correcting codes have enabled a dramatic increase in the bit density on the recording medium of hard-disk drives (HDDs). Error-correcting codes in magnetic recording… (more)

Subjects/Keywords: Polar codes; Polar coding; Soft output; Magnetic recording

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fayyaz, U. U. (2014). Polar code design and decoding for magnetic recording. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52994

Chicago Manual of Style (16th Edition):

Fayyaz, Ubaid Ullah. “Polar code design and decoding for magnetic recording.” 2014. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/52994.

MLA Handbook (7th Edition):

Fayyaz, Ubaid Ullah. “Polar code design and decoding for magnetic recording.” 2014. Web. 01 Mar 2021.

Vancouver:

Fayyaz UU. Polar code design and decoding for magnetic recording. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/52994.

Council of Science Editors:

Fayyaz UU. Polar code design and decoding for magnetic recording. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52994


Georgia Tech

10. Torabkhani, Nima. Modeling and analysis of the performance of networks in finite-buffer regime.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 In networks, using large buffers tend to increase end-to-end packet delay and its deviations, conflicting with real-time applications such as online gaming, audio-video services, IPTV,… (more)

Subjects/Keywords: Random linear network coding; Markov chain; Finite-buffer; Throughput; Networks; Performance analysis; Computer network protocols; Computer network architecture; Buffer storage (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Torabkhani, N. (2014). Modeling and analysis of the performance of networks in finite-buffer regime. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/51810

Chicago Manual of Style (16th Edition):

Torabkhani, Nima. “Modeling and analysis of the performance of networks in finite-buffer regime.” 2014. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/51810.

MLA Handbook (7th Edition):

Torabkhani, Nima. “Modeling and analysis of the performance of networks in finite-buffer regime.” 2014. Web. 01 Mar 2021.

Vancouver:

Torabkhani N. Modeling and analysis of the performance of networks in finite-buffer regime. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/51810.

Council of Science Editors:

Torabkhani N. Modeling and analysis of the performance of networks in finite-buffer regime. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/51810


Georgia Tech

11. Chou, Remi. Information-theoretic security under computational, bandwidth, and randomization constraints.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 The objective of the proposed research is to develop and analyze coding schemes for information-theoretic security, which could bridge a gap between theory an practice.… (more)

Subjects/Keywords: Information-theoretic security; Information-theory; Coding theory; Polar codes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chou, R. (2015). Information-theoretic security under computational, bandwidth, and randomization constraints. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53837

Chicago Manual of Style (16th Edition):

Chou, Remi. “Information-theoretic security under computational, bandwidth, and randomization constraints.” 2015. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/53837.

MLA Handbook (7th Edition):

Chou, Remi. “Information-theoretic security under computational, bandwidth, and randomization constraints.” 2015. Web. 01 Mar 2021.

Vancouver:

Chou R. Information-theoretic security under computational, bandwidth, and randomization constraints. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/53837.

Council of Science Editors:

Chou R. Information-theoretic security under computational, bandwidth, and randomization constraints. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53837


Georgia Tech

12. Einolghozati, Arash. Sensing and molecular communication using synthetic cells: Theory and algorithms.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 Molecular communication (MC) is a novel communication paradigm in which molecules are used to encode, transmit and decode information. MC is the primary method by… (more)

Subjects/Keywords: Molecular communication; Molecular sensing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Einolghozati, A. (2016). Sensing and molecular communication using synthetic cells: Theory and algorithms. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55644

Chicago Manual of Style (16th Edition):

Einolghozati, Arash. “Sensing and molecular communication using synthetic cells: Theory and algorithms.” 2016. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/55644.

MLA Handbook (7th Edition):

Einolghozati, Arash. “Sensing and molecular communication using synthetic cells: Theory and algorithms.” 2016. Web. 01 Mar 2021.

Vancouver:

Einolghozati A. Sensing and molecular communication using synthetic cells: Theory and algorithms. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/55644.

Council of Science Editors:

Einolghozati A. Sensing and molecular communication using synthetic cells: Theory and algorithms. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/55644


Georgia Tech

13. Austin, Caitlin Marie. Dynamics of molecular communication in bacteria within microfluidic environments.

Degree: PhD, Mechanical Engineering, 2016, Georgia Tech

 Biosensors exploiting communication within genetically engineered bacteria are becoming increasingly important for monitoring environmental changes. Recently these sensors have miniaturized towards microfluidics due to the… (more)

Subjects/Keywords: Bacterial communication; Microfluidics; Modeling; Monoliths

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Austin, C. M. (2016). Dynamics of molecular communication in bacteria within microfluidic environments. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/56297

Chicago Manual of Style (16th Edition):

Austin, Caitlin Marie. “Dynamics of molecular communication in bacteria within microfluidic environments.” 2016. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/56297.

MLA Handbook (7th Edition):

Austin, Caitlin Marie. “Dynamics of molecular communication in bacteria within microfluidic environments.” 2016. Web. 01 Mar 2021.

Vancouver:

Austin CM. Dynamics of molecular communication in bacteria within microfluidic environments. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/56297.

Council of Science Editors:

Austin CM. Dynamics of molecular communication in bacteria within microfluidic environments. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/56297


Georgia Tech

14. Abdi, Afshin. Distributed learning and inference in deep models.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 In recent years, the size of deep learning problems has been increased significantly, both in terms of the number of available training samples as well… (more)

Subjects/Keywords: Machine learning; Artificial intelligence; Distributed training; Distributed learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdi, A. (2020). Distributed learning and inference in deep models. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/63671

Chicago Manual of Style (16th Edition):

Abdi, Afshin. “Distributed learning and inference in deep models.” 2020. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/63671.

MLA Handbook (7th Edition):

Abdi, Afshin. “Distributed learning and inference in deep models.” 2020. Web. 01 Mar 2021.

Vancouver:

Abdi A. Distributed learning and inference in deep models. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/63671.

Council of Science Editors:

Abdi A. Distributed learning and inference in deep models. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/63671

15. Harrison, Willie K. Physical-layer security: practical aspects of channel coding and cryptography.

Degree: PhD, Electrical and Computer Engineering, 2012, Georgia Tech

 In this work, a multilayer security solution for digital communication systems is provided by considering the joint effects of physical-layer security channel codes with application-layer… (more)

Subjects/Keywords: Wire-tap channel; Wiretap channel; Low-density parity-check codes; Stopping sets; Multi-layer security; Wiretap codes; Wire-tap codes; Physical-layer security; LDPC codes; Information-theoretic security; Coding theory; Cryptography; Digital communications; Computer security; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harrison, W. K. (2012). Physical-layer security: practical aspects of channel coding and cryptography. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/44818

Chicago Manual of Style (16th Edition):

Harrison, Willie K. “Physical-layer security: practical aspects of channel coding and cryptography.” 2012. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/44818.

MLA Handbook (7th Edition):

Harrison, Willie K. “Physical-layer security: practical aspects of channel coding and cryptography.” 2012. Web. 01 Mar 2021.

Vancouver:

Harrison WK. Physical-layer security: practical aspects of channel coding and cryptography. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/44818.

Council of Science Editors:

Harrison WK. Physical-layer security: practical aspects of channel coding and cryptography. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/44818

16. Al Marzouqi, Hasan. Curvelet transform with adaptive tiling.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 In this dissertation we address the problem of adapting frequency domain tiling using the curvelet transform as the basis algorithm. The optimal tiling, for a… (more)

Subjects/Keywords: Curvelet; Wavelet; Denoising; Compressed sensing; Texture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Marzouqi, H. (2014). Curvelet transform with adaptive tiling. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52961

Chicago Manual of Style (16th Edition):

Al Marzouqi, Hasan. “Curvelet transform with adaptive tiling.” 2014. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/52961.

MLA Handbook (7th Edition):

Al Marzouqi, Hasan. “Curvelet transform with adaptive tiling.” 2014. Web. 01 Mar 2021.

Vancouver:

Al Marzouqi H. Curvelet transform with adaptive tiling. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/52961.

Council of Science Editors:

Al Marzouqi H. Curvelet transform with adaptive tiling. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52961

17. Jones, Malachi G. Asymmetric information games and cyber security.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 A cyber-security problem is a conflict-resolution scenario that typically consists of a security system and at least two decision makers (e.g. attacker and defender) that… (more)

Subjects/Keywords: Game theory; Asymmetric information games; Cyber security; Cyber-attack forecasting; Model predictive control; Stochastic games; Repeated games; Cyber intelligence (Computer security); Decision making; Game theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jones, M. G. (2013). Asymmetric information games and cyber security. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50284

Chicago Manual of Style (16th Edition):

Jones, Malachi G. “Asymmetric information games and cyber security.” 2013. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/50284.

MLA Handbook (7th Edition):

Jones, Malachi G. “Asymmetric information games and cyber security.” 2013. Web. 01 Mar 2021.

Vancouver:

Jones MG. Asymmetric information games and cyber security. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/50284.

Council of Science Editors:

Jones MG. Asymmetric information games and cyber security. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50284

18. Subramanian, Arunkumar. Coding techniques for information-theoretic strong secrecy on wiretap channels.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 Traditional solutions to information security in communication systems act in the application layer and are oblivious to the effects in the physical layer. Physical-layer security… (more)

Subjects/Keywords: Belief propagation; Girth; Sparse graph codes; Low-density parity-check (LDPC) codes; Information-theoretic security; Coding theory; Information theory; Error-correcting codes (Information theory); Data protection; Electronic information resources Access control; Electronic security systems; Wiretapping

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subramanian, A. (2011). Coding techniques for information-theoretic strong secrecy on wiretap channels. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/42776

Chicago Manual of Style (16th Edition):

Subramanian, Arunkumar. “Coding techniques for information-theoretic strong secrecy on wiretap channels.” 2011. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/42776.

MLA Handbook (7th Edition):

Subramanian, Arunkumar. “Coding techniques for information-theoretic strong secrecy on wiretap channels.” 2011. Web. 01 Mar 2021.

Vancouver:

Subramanian A. Coding techniques for information-theoretic strong secrecy on wiretap channels. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/42776.

Council of Science Editors:

Subramanian A. Coding techniques for information-theoretic strong secrecy on wiretap channels. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/42776

19. Kakumanu, Sandeep. Algorithms and protocols for multi-channel wireless networks.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 A wireless channel is shared by all devices, in the vicinity, that are tuned to the channel, and at any given time, only one of… (more)

Subjects/Keywords: Channel assignment; Multi-radio; Throughput aggregation; Multi-hop networks; Multi-channel; Wireless networks; Algorithms; Topology; Wireless communication systems

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kakumanu, S. (2011). Algorithms and protocols for multi-channel wireless networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/42834

Chicago Manual of Style (16th Edition):

Kakumanu, Sandeep. “Algorithms and protocols for multi-channel wireless networks.” 2011. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/42834.

MLA Handbook (7th Edition):

Kakumanu, Sandeep. “Algorithms and protocols for multi-channel wireless networks.” 2011. Web. 01 Mar 2021.

Vancouver:

Kakumanu S. Algorithms and protocols for multi-channel wireless networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/42834.

Council of Science Editors:

Kakumanu S. Algorithms and protocols for multi-channel wireless networks. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/42834

20. Bloch, Matthieu. Physical-layer security.

Degree: PhD, Electrical and Computer Engineering, 2008, Georgia Tech

 As wireless networks continue to flourish worldwide and play an increasingly prominent role, it has become crucial to provide effective solutions to the inherent security… (more)

Subjects/Keywords: Wiretap channel; Information-theoretic security; Physical-layer security; Secret-key agreement; LDPC codes; Wireless communication systems; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bloch, M. (2008). Physical-layer security. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/24658

Chicago Manual of Style (16th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/24658.

MLA Handbook (7th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Web. 01 Mar 2021.

Vancouver:

Bloch M. Physical-layer security. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/24658.

Council of Science Editors:

Bloch M. Physical-layer security. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/24658

21. Ji, Shouling. Evaluating the security of anonymized big graph/structural data.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymization (DA) attacks, comprehensive anonymity, utility, and de-anonymizability quantifications, and a… (more)

Subjects/Keywords: Security and privacy; Graph data; Structural data; De-anonymization; Anonymization; Quantification; Evaluation; Utility; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ji, S. (2016). Evaluating the security of anonymized big graph/structural data. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54913

Chicago Manual of Style (16th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/54913.

MLA Handbook (7th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Web. 01 Mar 2021.

Vancouver:

Ji S. Evaluating the security of anonymized big graph/structural data. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/54913.

Council of Science Editors:

Ji S. Evaluating the security of anonymized big graph/structural data. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/54913

22. Krishnaswamy, Bhuvana. Algorithms for molecular communication networks.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 Bio-sensors are becoming an integral part of our everyday life, implicitly and explicitly. The natural sensing mechanism and advancements in synthetic biology has made bacteria… (more)

Subjects/Keywords: Molecular communication; Bacterial networks; Biological communication; Synthetic biology; Modulation; Medium access; Reliability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnaswamy, B. (2018). Algorithms for molecular communication networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60259

Chicago Manual of Style (16th Edition):

Krishnaswamy, Bhuvana. “Algorithms for molecular communication networks.” 2018. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/60259.

MLA Handbook (7th Edition):

Krishnaswamy, Bhuvana. “Algorithms for molecular communication networks.” 2018. Web. 01 Mar 2021.

Vancouver:

Krishnaswamy B. Algorithms for molecular communication networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/60259.

Council of Science Editors:

Krishnaswamy B. Algorithms for molecular communication networks. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/60259

23. Klinc, Demijan. On applications of puncturing in error-correction coding.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 This thesis investigates applications of puncturing in error-correction coding and physical layer security with an emphasis on binary and non-binary LDPC codes. Theoretical framework for… (more)

Subjects/Keywords: Encryption; Compression; Physical layer security; Binary and non-binary LDPC codes; Shortening; Puncturing; Data encryption (Computer science); Computer security

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Klinc, D. (2011). On applications of puncturing in error-correction coding. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/39610

Chicago Manual of Style (16th Edition):

Klinc, Demijan. “On applications of puncturing in error-correction coding.” 2011. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/39610.

MLA Handbook (7th Edition):

Klinc, Demijan. “On applications of puncturing in error-correction coding.” 2011. Web. 01 Mar 2021.

Vancouver:

Klinc D. On applications of puncturing in error-correction coding. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/39610.

Council of Science Editors:

Klinc D. On applications of puncturing in error-correction coding. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/39610

24. Subramanian, Ramanan. Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective.

Degree: PhD, Electrical and Computer Engineering, 2009, Georgia Tech

 This work focuses on the performance characterization of distributed collaborative ad-hoc networks, focusing on such metrics as the lifetime, latency, and throughput capacity of two… (more)

Subjects/Keywords: Queuing theory; Performance analysis; Intermittently-connected networks; Sensor networks; Information theory; Ad hoc networks (Computer networks); Multicasting (Computer networks); Wireless sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subramanian, R. (2009). Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/37083

Chicago Manual of Style (16th Edition):

Subramanian, Ramanan. “Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective.” 2009. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/37083.

MLA Handbook (7th Edition):

Subramanian, Ramanan. “Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective.” 2009. Web. 01 Mar 2021.

Vancouver:

Subramanian R. Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/37083.

Council of Science Editors:

Subramanian R. Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/37083

25. Vellambi, Badri Narayanan. Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms.

Degree: PhD, Electrical and Computer Engineering, 2008, Georgia Tech

 The conception of turbo codes by Berrou et al. has created a renewed interest in modern graph-based codes. Several encouraging results that have come to… (more)

Subjects/Keywords: Capacity; Improved MP decoder; LDPC codes; Rateless codes; Finite-buffer networks; Graph-based codes; Network codes; Coding theory; Error-correcting codes (Information theory); Graph theory; Markov processes

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vellambi, B. N. (2008). Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/37091

Chicago Manual of Style (16th Edition):

Vellambi, Badri Narayanan. “Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms.” 2008. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/37091.

MLA Handbook (7th Edition):

Vellambi, Badri Narayanan. “Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms.” 2008. Web. 01 Mar 2021.

Vancouver:

Vellambi BN. Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/37091.

Council of Science Editors:

Vellambi BN. Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/37091


Georgia Tech

26. Lim, Yusun. Game theoretic distributed coordination: drifting environments and constrained communications.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 The major objective of this dissertation is extending the capabilities of game theoretic distributed control to more general settings. In particular, we are interested in… (more)

Subjects/Keywords: Game theoretic learning; Cooperative control; Distributed control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lim, Y. (2014). Game theoretic distributed coordination: drifting environments and constrained communications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52986

Chicago Manual of Style (16th Edition):

Lim, Yusun. “Game theoretic distributed coordination: drifting environments and constrained communications.” 2014. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/52986.

MLA Handbook (7th Edition):

Lim, Yusun. “Game theoretic distributed coordination: drifting environments and constrained communications.” 2014. Web. 01 Mar 2021.

Vancouver:

Lim Y. Game theoretic distributed coordination: drifting environments and constrained communications. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/52986.

Council of Science Editors:

Lim Y. Game theoretic distributed coordination: drifting environments and constrained communications. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52986


Georgia Tech

27. Beirami, Ahmad. Network compression via network memory: fundamental performance limits.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 The amount of information that is churned out daily around the world is staggering, and hence, future technological advancements are contingent upon development of scalable… (more)

Subjects/Keywords: Universal compression; Source coding; Redundancy elimination; Memory-assisted compression; Information theory; Distributed source coding; Side information; Redundancy-capacity theorem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beirami, A. (2014). Network compression via network memory: fundamental performance limits. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53448

Chicago Manual of Style (16th Edition):

Beirami, Ahmad. “Network compression via network memory: fundamental performance limits.” 2014. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/53448.

MLA Handbook (7th Edition):

Beirami, Ahmad. “Network compression via network memory: fundamental performance limits.” 2014. Web. 01 Mar 2021.

Vancouver:

Beirami A. Network compression via network memory: fundamental performance limits. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/53448.

Council of Science Editors:

Beirami A. Network compression via network memory: fundamental performance limits. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53448

28. Moravapalle, Uma Parthavi. Mobile computing algorithms and systems for user-aware optimization of enterprise applications.

Degree: PhD, Electrical and Computer Engineering, 2019, Georgia Tech

 The adoption of mobile devices, particularly smartphones, has grown steadily over the last decade, also permeating the enterprise sector. Enterprises are investing heavily in mobilization… (more)

Subjects/Keywords: Enterprise mobility; Smartphone apps; Application development; Smartphone email; Remote computing; Codeless application development

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moravapalle, U. P. (2019). Mobile computing algorithms and systems for user-aware optimization of enterprise applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/61226

Chicago Manual of Style (16th Edition):

Moravapalle, Uma Parthavi. “Mobile computing algorithms and systems for user-aware optimization of enterprise applications.” 2019. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/61226.

MLA Handbook (7th Edition):

Moravapalle, Uma Parthavi. “Mobile computing algorithms and systems for user-aware optimization of enterprise applications.” 2019. Web. 01 Mar 2021.

Vancouver:

Moravapalle UP. Mobile computing algorithms and systems for user-aware optimization of enterprise applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/61226.

Council of Science Editors:

Moravapalle UP. Mobile computing algorithms and systems for user-aware optimization of enterprise applications. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/61226

29. Choi, Gi Wan. Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 In recent years, global mobile data traffic has been increasing exponentially as mobile devices pervade our daily lives. To cope with the ever growing demands… (more)

Subjects/Keywords: Receiver diversity; Cooperative diversity; CC-ARQ; Cooperative relay networks; MIMO; Peak-power constraint; AF; DF; Wireless communication systems; Mobile communication systems; Network performance (Telecommunication)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Choi, G. W. (2013). Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/47721

Chicago Manual of Style (16th Edition):

Choi, Gi Wan. “Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability.” 2013. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/47721.

MLA Handbook (7th Edition):

Choi, Gi Wan. “Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability.” 2013. Web. 01 Mar 2021.

Vancouver:

Choi GW. Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/47721.

Council of Science Editors:

Choi GW. Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/47721

30. Ayday, Erman. Iterative algorithms for trust and reputation management and recommender systems.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 This thesis investigates both theoretical and practical aspects of the design and analysis of iterative algorithms for trust and reputation management and recommender systems. It… (more)

Subjects/Keywords: Inference; Iterative algorithms; Trust and reputation management; Belief propagation; Recommender systems; Online services; Trust; Reputation; Electronic commerce; Commerce; Algorithms

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ayday, E. (2011). Iterative algorithms for trust and reputation management and recommender systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/45868

Chicago Manual of Style (16th Edition):

Ayday, Erman. “Iterative algorithms for trust and reputation management and recommender systems.” 2011. Doctoral Dissertation, Georgia Tech. Accessed March 01, 2021. http://hdl.handle.net/1853/45868.

MLA Handbook (7th Edition):

Ayday, Erman. “Iterative algorithms for trust and reputation management and recommender systems.” 2011. Web. 01 Mar 2021.

Vancouver:

Ayday E. Iterative algorithms for trust and reputation management and recommender systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2021 Mar 01]. Available from: http://hdl.handle.net/1853/45868.

Council of Science Editors:

Ayday E. Iterative algorithms for trust and reputation management and recommender systems. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/45868

[1] [2]

.