Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Georgia Tech" +contributor:("Fekri, Faramarz"). Showing records 1 – 30 of 43 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters

1. Agarwal, Mohit. THINK: Toward practical general-purpose brain-computer communication.

Degree: MS, Electrical and Computer Engineering, 2017, Georgia Tech

 In this work, we present THINK, a practical general-purpose brain-computer communication platform that relies on the OpenBCI and OpenViBE hardware and software platforms, and allows… (more)

Subjects/Keywords: Brain-computer communication; Motor imagery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Agarwal, M. (2017). THINK: Toward practical general-purpose brain-computer communication. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58345

Chicago Manual of Style (16th Edition):

Agarwal, Mohit. “THINK: Toward practical general-purpose brain-computer communication.” 2017. Masters Thesis, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/58345.

MLA Handbook (7th Edition):

Agarwal, Mohit. “THINK: Toward practical general-purpose brain-computer communication.” 2017. Web. 19 Jun 2019.

Vancouver:

Agarwal M. THINK: Toward practical general-purpose brain-computer communication. [Internet] [Masters thesis]. Georgia Tech; 2017. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/58345.

Council of Science Editors:

Agarwal M. THINK: Toward practical general-purpose brain-computer communication. [Masters Thesis]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58345

2. Jian, Yubing. Coexistence of wi-fi and LAA-LTE in unlicensed spectrum.

Degree: MS, Electrical and Computer Engineering, 2015, Georgia Tech

 The global mobile data usage has grown nearly 70% annually in recent years. The huge mobile data usage requirement drives the mobile industry to brace… (more)

Subjects/Keywords: LAA-LTE; WiFi; Coexistence; Experimental and simulation evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jian, Y. (2015). Coexistence of wi-fi and LAA-LTE in unlicensed spectrum. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54461

Chicago Manual of Style (16th Edition):

Jian, Yubing. “Coexistence of wi-fi and LAA-LTE in unlicensed spectrum.” 2015. Masters Thesis, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/54461.

MLA Handbook (7th Edition):

Jian, Yubing. “Coexistence of wi-fi and LAA-LTE in unlicensed spectrum.” 2015. Web. 19 Jun 2019.

Vancouver:

Jian Y. Coexistence of wi-fi and LAA-LTE in unlicensed spectrum. [Internet] [Masters thesis]. Georgia Tech; 2015. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/54461.

Council of Science Editors:

Jian Y. Coexistence of wi-fi and LAA-LTE in unlicensed spectrum. [Masters Thesis]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54461

3. Krishnaswamy, Bhuvana. When bacteria talk : time elapse communication for super-slow networks.

Degree: MS, Electrical and Computer Engineering, 2013, Georgia Tech

 In this work we consider nano-scale communication using bacterial popula- tions as transceivers. We demonstrate using a microfluidic test-bed and a population of genetically engineered… (more)

Subjects/Keywords: Molecular communication; On-off keying; Time elapse communication; Bacteria; Nanoscience; Nanotechnology; Microfluidics; Communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnaswamy, B. (2013). When bacteria talk : time elapse communication for super-slow networks. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50312

Chicago Manual of Style (16th Edition):

Krishnaswamy, Bhuvana. “When bacteria talk : time elapse communication for super-slow networks.” 2013. Masters Thesis, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/50312.

MLA Handbook (7th Edition):

Krishnaswamy, Bhuvana. “When bacteria talk : time elapse communication for super-slow networks.” 2013. Web. 19 Jun 2019.

Vancouver:

Krishnaswamy B. When bacteria talk : time elapse communication for super-slow networks. [Internet] [Masters thesis]. Georgia Tech; 2013. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/50312.

Council of Science Editors:

Krishnaswamy B. When bacteria talk : time elapse communication for super-slow networks. [Masters Thesis]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50312


Georgia Tech

4. Torabkhani, Nima. Modeling and analysis of the performance of networks in finite-buffer regime.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 In networks, using large buffers tend to increase end-to-end packet delay and its deviations, conflicting with real-time applications such as online gaming, audio-video services, IPTV,… (more)

Subjects/Keywords: Random linear network coding; Markov chain; Finite-buffer; Throughput; Networks; Performance analysis; Computer network protocols; Computer network architecture; Buffer storage (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Torabkhani, N. (2014). Modeling and analysis of the performance of networks in finite-buffer regime. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/51810

Chicago Manual of Style (16th Edition):

Torabkhani, Nima. “Modeling and analysis of the performance of networks in finite-buffer regime.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/51810.

MLA Handbook (7th Edition):

Torabkhani, Nima. “Modeling and analysis of the performance of networks in finite-buffer regime.” 2014. Web. 19 Jun 2019.

Vancouver:

Torabkhani N. Modeling and analysis of the performance of networks in finite-buffer regime. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/51810.

Council of Science Editors:

Torabkhani N. Modeling and analysis of the performance of networks in finite-buffer regime. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/51810


Georgia Tech

5. Kwon, Seok Chul. Geometrical theory, modeling and applications of channel polarization.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 Long-term evolution (LTE) standard has been successfully stabilized, and launched in several areas. However, the required channel capacity is expected to increase significantly as the… (more)

Subjects/Keywords: Polarization division multiple access (PDMA); Polarization division multiplexing (PDM); Channel modeling; Depolarization; Body area network (BAN)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kwon, S. C. (2013). Geometrical theory, modeling and applications of channel polarization. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52954

Chicago Manual of Style (16th Edition):

Kwon, Seok Chul. “Geometrical theory, modeling and applications of channel polarization.” 2013. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/52954.

MLA Handbook (7th Edition):

Kwon, Seok Chul. “Geometrical theory, modeling and applications of channel polarization.” 2013. Web. 19 Jun 2019.

Vancouver:

Kwon SC. Geometrical theory, modeling and applications of channel polarization. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/52954.

Council of Science Editors:

Kwon SC. Geometrical theory, modeling and applications of channel polarization. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/52954


Georgia Tech

6. Fayyaz, Ubaid Ullah. Polar code design and decoding for magnetic recording.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 Powerful error-correcting codes have enabled a dramatic increase in the bit density on the recording medium of hard-disk drives (HDDs). Error-correcting codes in magnetic recording… (more)

Subjects/Keywords: Polar codes; Polar coding; Soft output; Magnetic recording

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fayyaz, U. U. (2014). Polar code design and decoding for magnetic recording. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52994

Chicago Manual of Style (16th Edition):

Fayyaz, Ubaid Ullah. “Polar code design and decoding for magnetic recording.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/52994.

MLA Handbook (7th Edition):

Fayyaz, Ubaid Ullah. “Polar code design and decoding for magnetic recording.” 2014. Web. 19 Jun 2019.

Vancouver:

Fayyaz UU. Polar code design and decoding for magnetic recording. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/52994.

Council of Science Editors:

Fayyaz UU. Polar code design and decoding for magnetic recording. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52994


Georgia Tech

7. Chou, Remi. Information-theoretic security under computational, bandwidth, and randomization constraints.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 The objective of the proposed research is to develop and analyze coding schemes for information-theoretic security, which could bridge a gap between theory an practice.… (more)

Subjects/Keywords: Information-theoretic security; Information-theory; Coding theory; Polar codes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chou, R. (2015). Information-theoretic security under computational, bandwidth, and randomization constraints. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53837

Chicago Manual of Style (16th Edition):

Chou, Remi. “Information-theoretic security under computational, bandwidth, and randomization constraints.” 2015. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/53837.

MLA Handbook (7th Edition):

Chou, Remi. “Information-theoretic security under computational, bandwidth, and randomization constraints.” 2015. Web. 19 Jun 2019.

Vancouver:

Chou R. Information-theoretic security under computational, bandwidth, and randomization constraints. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/53837.

Council of Science Editors:

Chou R. Information-theoretic security under computational, bandwidth, and randomization constraints. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53837


Georgia Tech

8. Einolghozati, Arash. Sensing and molecular communication using synthetic cells: Theory and algorithms.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 Molecular communication (MC) is a novel communication paradigm in which molecules are used to encode, transmit and decode information. MC is the primary method by… (more)

Subjects/Keywords: Molecular communication; Molecular sensing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Einolghozati, A. (2016). Sensing and molecular communication using synthetic cells: Theory and algorithms. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55644

Chicago Manual of Style (16th Edition):

Einolghozati, Arash. “Sensing and molecular communication using synthetic cells: Theory and algorithms.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/55644.

MLA Handbook (7th Edition):

Einolghozati, Arash. “Sensing and molecular communication using synthetic cells: Theory and algorithms.” 2016. Web. 19 Jun 2019.

Vancouver:

Einolghozati A. Sensing and molecular communication using synthetic cells: Theory and algorithms. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/55644.

Council of Science Editors:

Einolghozati A. Sensing and molecular communication using synthetic cells: Theory and algorithms. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/55644


Georgia Tech

9. Zou, Jun. Social computing for personalization and credible information mining using probabilistic graphical models.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 In this dissertation, we address challenging social computing problems in personalized recommender systems and social media information mining. We tap into probabilistic graphical models, including… (more)

Subjects/Keywords: Social computing; Recommender systems; Collaborative filtering; Belief propagation; Probabilistic graphical models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zou, J. (2016). Social computing for personalization and credible information mining using probabilistic graphical models. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55646

Chicago Manual of Style (16th Edition):

Zou, Jun. “Social computing for personalization and credible information mining using probabilistic graphical models.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/55646.

MLA Handbook (7th Edition):

Zou, Jun. “Social computing for personalization and credible information mining using probabilistic graphical models.” 2016. Web. 19 Jun 2019.

Vancouver:

Zou J. Social computing for personalization and credible information mining using probabilistic graphical models. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/55646.

Council of Science Editors:

Zou J. Social computing for personalization and credible information mining using probabilistic graphical models. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/55646


Georgia Tech

10. Austin, Caitlin Marie. Dynamics of molecular communication in bacteria within microfluidic environments.

Degree: PhD, Mechanical Engineering, 2016, Georgia Tech

 Biosensors exploiting communication within genetically engineered bacteria are becoming increasingly important for monitoring environmental changes. Recently these sensors have miniaturized towards microfluidics due to the… (more)

Subjects/Keywords: Bacterial communication; Microfluidics; Modeling; Monoliths

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Austin, C. M. (2016). Dynamics of molecular communication in bacteria within microfluidic environments. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/56297

Chicago Manual of Style (16th Edition):

Austin, Caitlin Marie. “Dynamics of molecular communication in bacteria within microfluidic environments.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/56297.

MLA Handbook (7th Edition):

Austin, Caitlin Marie. “Dynamics of molecular communication in bacteria within microfluidic environments.” 2016. Web. 19 Jun 2019.

Vancouver:

Austin CM. Dynamics of molecular communication in bacteria within microfluidic environments. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/56297.

Council of Science Editors:

Austin CM. Dynamics of molecular communication in bacteria within microfluidic environments. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/56297


Georgia Tech

11. Zhuang, Zhenyun. Application acceleration for wireless and mobile data networks.

Degree: PhD, Computing, 2010, Georgia Tech

 This work studies application acceleration for wireless and mobile data networks. The problem of accelerating application can be addressed along multiple dimensions. The first dimension… (more)

Subjects/Keywords: Wireless networks; Mobile networks; Application acceleration; Traffic redundancy; Peer to peer; Android; Wireless communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhuang, Z. (2010). Application acceleration for wireless and mobile data networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/37164

Chicago Manual of Style (16th Edition):

Zhuang, Zhenyun. “Application acceleration for wireless and mobile data networks.” 2010. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/37164.

MLA Handbook (7th Edition):

Zhuang, Zhenyun. “Application acceleration for wireless and mobile data networks.” 2010. Web. 19 Jun 2019.

Vancouver:

Zhuang Z. Application acceleration for wireless and mobile data networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/37164.

Council of Science Editors:

Zhuang Z. Application acceleration for wireless and mobile data networks. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/37164


Georgia Tech

12. Wang, Zhen. Computational seismic interpretation using geometric representation and tensor-based texture analysis.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 In hydrocarbon exploration, seismic interpretation is a process that infers geological information from processed seismic data. With the dramatically growing sizes of collected seismic data,… (more)

Subjects/Keywords: Computational seismic interpretation; Geometric representation; Texture analysis; Tensor-based subspace learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Z. (2018). Computational seismic interpretation using geometric representation and tensor-based texture analysis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60223

Chicago Manual of Style (16th Edition):

Wang, Zhen. “Computational seismic interpretation using geometric representation and tensor-based texture analysis.” 2018. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/60223.

MLA Handbook (7th Edition):

Wang, Zhen. “Computational seismic interpretation using geometric representation and tensor-based texture analysis.” 2018. Web. 19 Jun 2019.

Vancouver:

Wang Z. Computational seismic interpretation using geometric representation and tensor-based texture analysis. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/60223.

Council of Science Editors:

Wang Z. Computational seismic interpretation using geometric representation and tensor-based texture analysis. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/60223


Georgia Tech

13. Krishnaswamy, Bhuvana. Algorithms for molecular communication networks.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 Bio-sensors are becoming an integral part of our everyday life, implicitly and explicitly. The natural sensing mechanism and advancements in synthetic biology has made bacteria… (more)

Subjects/Keywords: Molecular communication; Bacterial networks; Biological communication; Synthetic biology; Modulation; Medium access; Reliability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnaswamy, B. (2018). Algorithms for molecular communication networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60259

Chicago Manual of Style (16th Edition):

Krishnaswamy, Bhuvana. “Algorithms for molecular communication networks.” 2018. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/60259.

MLA Handbook (7th Edition):

Krishnaswamy, Bhuvana. “Algorithms for molecular communication networks.” 2018. Web. 19 Jun 2019.

Vancouver:

Krishnaswamy B. Algorithms for molecular communication networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/60259.

Council of Science Editors:

Krishnaswamy B. Algorithms for molecular communication networks. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/60259


Georgia Tech

14. Moravapalle, Uma Parthavi. Mobile computing algorithms and systems for user-aware optimization of enterprise applications.

Degree: PhD, Electrical and Computer Engineering, 2019, Georgia Tech

 The adoption of mobile devices, particularly smartphones, has grown steadily over the last decade, also permeating the enterprise sector. Enterprises are investing heavily in mobilization… (more)

Subjects/Keywords: Enterprise mobility; smartphone apps; application development; smartphone email; remote computing; codeless application development

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moravapalle, U. P. (2019). Mobile computing algorithms and systems for user-aware optimization of enterprise applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/61226

Chicago Manual of Style (16th Edition):

Moravapalle, Uma Parthavi. “Mobile computing algorithms and systems for user-aware optimization of enterprise applications.” 2019. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/61226.

MLA Handbook (7th Edition):

Moravapalle, Uma Parthavi. “Mobile computing algorithms and systems for user-aware optimization of enterprise applications.” 2019. Web. 19 Jun 2019.

Vancouver:

Moravapalle UP. Mobile computing algorithms and systems for user-aware optimization of enterprise applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/61226.

Council of Science Editors:

Moravapalle UP. Mobile computing algorithms and systems for user-aware optimization of enterprise applications. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/61226

15. Ji, Shouling. Evaluating the security of anonymized big graph/structural data.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymization (DA) attacks, comprehensive anonymity, utility, and de-anonymizability quantifications, and a… (more)

Subjects/Keywords: Security and privacy; Graph data; Structural data; De-anonymization; Anonymization; Quantification; Evaluation; Utility; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ji, S. (2016). Evaluating the security of anonymized big graph/structural data. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54913

Chicago Manual of Style (16th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/54913.

MLA Handbook (7th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Web. 19 Jun 2019.

Vancouver:

Ji S. Evaluating the security of anonymized big graph/structural data. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/54913.

Council of Science Editors:

Ji S. Evaluating the security of anonymized big graph/structural data. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/54913

16. Al Marzouqi, Hasan. Curvelet transform with adaptive tiling.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 In this dissertation we address the problem of adapting frequency domain tiling using the curvelet transform as the basis algorithm. The optimal tiling, for a… (more)

Subjects/Keywords: Curvelet; Wavelet; Denoising; Compressed sensing; Texture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Marzouqi, H. (2014). Curvelet transform with adaptive tiling. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52961

Chicago Manual of Style (16th Edition):

Al Marzouqi, Hasan. “Curvelet transform with adaptive tiling.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/52961.

MLA Handbook (7th Edition):

Al Marzouqi, Hasan. “Curvelet transform with adaptive tiling.” 2014. Web. 19 Jun 2019.

Vancouver:

Al Marzouqi H. Curvelet transform with adaptive tiling. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/52961.

Council of Science Editors:

Al Marzouqi H. Curvelet transform with adaptive tiling. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52961

17. Klinc, Demijan. On applications of puncturing in error-correction coding.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 This thesis investigates applications of puncturing in error-correction coding and physical layer security with an emphasis on binary and non-binary LDPC codes. Theoretical framework for… (more)

Subjects/Keywords: Encryption; Compression; Physical layer security; Binary and non-binary LDPC codes; Shortening; Puncturing; Data encryption (Computer science); Computer security

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Klinc, D. (2011). On applications of puncturing in error-correction coding. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/39610

Chicago Manual of Style (16th Edition):

Klinc, Demijan. “On applications of puncturing in error-correction coding.” 2011. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/39610.

MLA Handbook (7th Edition):

Klinc, Demijan. “On applications of puncturing in error-correction coding.” 2011. Web. 19 Jun 2019.

Vancouver:

Klinc D. On applications of puncturing in error-correction coding. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/39610.

Council of Science Editors:

Klinc D. On applications of puncturing in error-correction coding. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/39610

18. Subramanian, Ramanan. Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective.

Degree: PhD, Electrical and Computer Engineering, 2009, Georgia Tech

 This work focuses on the performance characterization of distributed collaborative ad-hoc networks, focusing on such metrics as the lifetime, latency, and throughput capacity of two… (more)

Subjects/Keywords: Queuing theory; Performance analysis; Intermittently-connected networks; Sensor networks; Information theory; Ad hoc networks (Computer networks); Multicasting (Computer networks); Wireless sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subramanian, R. (2009). Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/37083

Chicago Manual of Style (16th Edition):

Subramanian, Ramanan. “Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective.” 2009. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/37083.

MLA Handbook (7th Edition):

Subramanian, Ramanan. “Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective.” 2009. Web. 19 Jun 2019.

Vancouver:

Subramanian R. Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/37083.

Council of Science Editors:

Subramanian R. Modeling and analysis of the performance of collaborative wireless ad-hoc networks: an information-theoretic perspective. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/37083

19. Subramanian, Arunkumar. Coding techniques for information-theoretic strong secrecy on wiretap channels.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 Traditional solutions to information security in communication systems act in the application layer and are oblivious to the effects in the physical layer. Physical-layer security… (more)

Subjects/Keywords: Belief propagation; Girth; Sparse graph codes; Low-density parity-check (LDPC) codes; Information-theoretic security; Coding theory; Information theory; Error-correcting codes (Information theory); Data protection; Electronic information resources Access control; Electronic security systems; Wiretapping

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subramanian, A. (2011). Coding techniques for information-theoretic strong secrecy on wiretap channels. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/42776

Chicago Manual of Style (16th Edition):

Subramanian, Arunkumar. “Coding techniques for information-theoretic strong secrecy on wiretap channels.” 2011. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/42776.

MLA Handbook (7th Edition):

Subramanian, Arunkumar. “Coding techniques for information-theoretic strong secrecy on wiretap channels.” 2011. Web. 19 Jun 2019.

Vancouver:

Subramanian A. Coding techniques for information-theoretic strong secrecy on wiretap channels. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/42776.

Council of Science Editors:

Subramanian A. Coding techniques for information-theoretic strong secrecy on wiretap channels. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/42776

20. Kakumanu, Sandeep. Algorithms and protocols for multi-channel wireless networks.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 A wireless channel is shared by all devices, in the vicinity, that are tuned to the channel, and at any given time, only one of… (more)

Subjects/Keywords: Channel assignment; Multi-radio; Throughput aggregation; Multi-hop networks; Multi-channel; Wireless networks; Algorithms; Topology; Wireless communication systems

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kakumanu, S. (2011). Algorithms and protocols for multi-channel wireless networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/42834

Chicago Manual of Style (16th Edition):

Kakumanu, Sandeep. “Algorithms and protocols for multi-channel wireless networks.” 2011. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/42834.

MLA Handbook (7th Edition):

Kakumanu, Sandeep. “Algorithms and protocols for multi-channel wireless networks.” 2011. Web. 19 Jun 2019.

Vancouver:

Kakumanu S. Algorithms and protocols for multi-channel wireless networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/42834.

Council of Science Editors:

Kakumanu S. Algorithms and protocols for multi-channel wireless networks. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/42834

21. Vellambi, Badri Narayanan. Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms.

Degree: PhD, Electrical and Computer Engineering, 2008, Georgia Tech

 The conception of turbo codes by Berrou et al. has created a renewed interest in modern graph-based codes. Several encouraging results that have come to… (more)

Subjects/Keywords: Capacity; Improved MP decoder; LDPC codes; Rateless codes; Finite-buffer networks; Graph-based codes; Network codes; Coding theory; Error-correcting codes (Information theory); Graph theory; Markov processes

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vellambi, B. N. (2008). Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/37091

Chicago Manual of Style (16th Edition):

Vellambi, Badri Narayanan. “Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms.” 2008. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/37091.

MLA Handbook (7th Edition):

Vellambi, Badri Narayanan. “Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms.” 2008. Web. 19 Jun 2019.

Vancouver:

Vellambi BN. Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/37091.

Council of Science Editors:

Vellambi BN. Applications of graph-based codes in networks: analysis of capacity and design of improved algorithms. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/37091

22. Jones, Malachi G. Asymmetric information games and cyber security.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 A cyber-security problem is a conflict-resolution scenario that typically consists of a security system and at least two decision makers (e.g. attacker and defender) that… (more)

Subjects/Keywords: Game theory; Asymmetric information games; Cyber security; Cyber-attack forecasting; Model predictive control; Stochastic games; Repeated games; Cyber intelligence (Computer security); Decision making; Game theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jones, M. G. (2013). Asymmetric information games and cyber security. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50284

Chicago Manual of Style (16th Edition):

Jones, Malachi G. “Asymmetric information games and cyber security.” 2013. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/50284.

MLA Handbook (7th Edition):

Jones, Malachi G. “Asymmetric information games and cyber security.” 2013. Web. 19 Jun 2019.

Vancouver:

Jones MG. Asymmetric information games and cyber security. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/50284.

Council of Science Editors:

Jones MG. Asymmetric information games and cyber security. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50284

23. Harrison, Willie K. Physical-layer security: practical aspects of channel coding and cryptography.

Degree: PhD, Electrical and Computer Engineering, 2012, Georgia Tech

 In this work, a multilayer security solution for digital communication systems is provided by considering the joint effects of physical-layer security channel codes with application-layer… (more)

Subjects/Keywords: Wire-tap channel; Wiretap channel; Low-density parity-check codes; Stopping sets; Multi-layer security; Wiretap codes; Wire-tap codes; Physical-layer security; LDPC codes; Information-theoretic security; Coding theory; Cryptography; Digital communications; Computer security; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harrison, W. K. (2012). Physical-layer security: practical aspects of channel coding and cryptography. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/44818

Chicago Manual of Style (16th Edition):

Harrison, Willie K. “Physical-layer security: practical aspects of channel coding and cryptography.” 2012. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/44818.

MLA Handbook (7th Edition):

Harrison, Willie K. “Physical-layer security: practical aspects of channel coding and cryptography.” 2012. Web. 19 Jun 2019.

Vancouver:

Harrison WK. Physical-layer security: practical aspects of channel coding and cryptography. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/44818.

Council of Science Editors:

Harrison WK. Physical-layer security: practical aspects of channel coding and cryptography. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/44818

24. Bloch, Matthieu. Physical-layer security.

Degree: PhD, Electrical and Computer Engineering, 2008, Georgia Tech

 As wireless networks continue to flourish worldwide and play an increasingly prominent role, it has become crucial to provide effective solutions to the inherent security… (more)

Subjects/Keywords: Wiretap channel; Information-theoretic security; Physical-layer security; Secret-key agreement; LDPC codes; Wireless communication systems; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bloch, M. (2008). Physical-layer security. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/24658

Chicago Manual of Style (16th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/24658.

MLA Handbook (7th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Web. 19 Jun 2019.

Vancouver:

Bloch M. Physical-layer security. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/24658.

Council of Science Editors:

Bloch M. Physical-layer security. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/24658


Georgia Tech

25. Lim, Yusun. Game theoretic distributed coordination: drifting environments and constrained communications.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 The major objective of this dissertation is extending the capabilities of game theoretic distributed control to more general settings. In particular, we are interested in… (more)

Subjects/Keywords: Game theoretic learning; Cooperative control; Distributed control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lim, Y. (2014). Game theoretic distributed coordination: drifting environments and constrained communications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52986

Chicago Manual of Style (16th Edition):

Lim, Yusun. “Game theoretic distributed coordination: drifting environments and constrained communications.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/52986.

MLA Handbook (7th Edition):

Lim, Yusun. “Game theoretic distributed coordination: drifting environments and constrained communications.” 2014. Web. 19 Jun 2019.

Vancouver:

Lim Y. Game theoretic distributed coordination: drifting environments and constrained communications. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/52986.

Council of Science Editors:

Lim Y. Game theoretic distributed coordination: drifting environments and constrained communications. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52986


Georgia Tech

26. Beirami, Ahmad. Network compression via network memory: fundamental performance limits.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 The amount of information that is churned out daily around the world is staggering, and hence, future technological advancements are contingent upon development of scalable… (more)

Subjects/Keywords: Universal compression; Source coding; Redundancy elimination; Memory-assisted compression; Information theory; Distributed source coding; Side information; Redundancy-capacity theorem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beirami, A. (2014). Network compression via network memory: fundamental performance limits. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53448

Chicago Manual of Style (16th Edition):

Beirami, Ahmad. “Network compression via network memory: fundamental performance limits.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/53448.

MLA Handbook (7th Edition):

Beirami, Ahmad. “Network compression via network memory: fundamental performance limits.” 2014. Web. 19 Jun 2019.

Vancouver:

Beirami A. Network compression via network memory: fundamental performance limits. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/53448.

Council of Science Editors:

Beirami A. Network compression via network memory: fundamental performance limits. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53448

27. Moen, Kurt Andrew. Predictive modeling of device and circuit reliability in highly scaled CMOS and SiGe BiCMOS technology.

Degree: PhD, Electrical and Computer Engineering, 2012, Georgia Tech

 The advent of high-frequency silicon-based technologies has enabled the design of mixed-signal circuits that incorporate analog, RF, and digital circuit components to build cost-effective system-on-a-chip… (more)

Subjects/Keywords: Reliability; SiGe HBT; Radiation effects; Semiconductor devices; Metal oxide semiconductors, Complementary; Silicon; Mixed signal circuits

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moen, K. A. (2012). Predictive modeling of device and circuit reliability in highly scaled CMOS and SiGe BiCMOS technology. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/44700

Chicago Manual of Style (16th Edition):

Moen, Kurt Andrew. “Predictive modeling of device and circuit reliability in highly scaled CMOS and SiGe BiCMOS technology.” 2012. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/44700.

MLA Handbook (7th Edition):

Moen, Kurt Andrew. “Predictive modeling of device and circuit reliability in highly scaled CMOS and SiGe BiCMOS technology.” 2012. Web. 19 Jun 2019.

Vancouver:

Moen KA. Predictive modeling of device and circuit reliability in highly scaled CMOS and SiGe BiCMOS technology. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/44700.

Council of Science Editors:

Moen KA. Predictive modeling of device and circuit reliability in highly scaled CMOS and SiGe BiCMOS technology. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/44700

28. Choi, Gi Wan. Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 In recent years, global mobile data traffic has been increasing exponentially as mobile devices pervade our daily lives. To cope with the ever growing demands… (more)

Subjects/Keywords: Receiver diversity; Cooperative diversity; CC-ARQ; Cooperative relay networks; MIMO; Peak-power constraint; AF; DF; Wireless communication systems; Mobile communication systems; Network performance (Telecommunication)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Choi, G. W. (2013). Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/47721

Chicago Manual of Style (16th Edition):

Choi, Gi Wan. “Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability.” 2013. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/47721.

MLA Handbook (7th Edition):

Choi, Gi Wan. “Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability.” 2013. Web. 19 Jun 2019.

Vancouver:

Choi GW. Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/47721.

Council of Science Editors:

Choi GW. Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/47721

29. Saleem, Sajid. Frequency-domain equalization for continuous phase modulation.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 Continuous phase modulation~(CPM) is a non-linear, constant-envelope modulation scheme with memory, known for its bandwidth and power efficiency. Multi-h CPM uses multiple modulation indices in… (more)

Subjects/Keywords: Continuous phase modulation; Equalization; CPM; FDE; Multi-h CPM; Diophantine; Frobenius; Modulation (Electronics); Aerospace telemetry

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saleem, S. (2013). Frequency-domain equalization for continuous phase modulation. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50391

Chicago Manual of Style (16th Edition):

Saleem, Sajid. “Frequency-domain equalization for continuous phase modulation.” 2013. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/50391.

MLA Handbook (7th Edition):

Saleem, Sajid. “Frequency-domain equalization for continuous phase modulation.” 2013. Web. 19 Jun 2019.

Vancouver:

Saleem S. Frequency-domain equalization for continuous phase modulation. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/50391.

Council of Science Editors:

Saleem S. Frequency-domain equalization for continuous phase modulation. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50391

30. Sardari, Mohsen. Network compression via network memory: realization principles and coding algorithms.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 The objective of this dissertation is to investigate both the theoretical and practical aspects of redundancy elimination methods in data networks. Redundancy elimination provides a… (more)

Subjects/Keywords: Redundancy elimination; Network compression; Clustering for compression; Wireless networks; Overhearing; Deduplication; Redundancy (Engineering); Computer networks; Data transmission systems; Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sardari, M. (2013). Network compression via network memory: realization principles and coding algorithms. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50329

Chicago Manual of Style (16th Edition):

Sardari, Mohsen. “Network compression via network memory: realization principles and coding algorithms.” 2013. Doctoral Dissertation, Georgia Tech. Accessed June 19, 2019. http://hdl.handle.net/1853/50329.

MLA Handbook (7th Edition):

Sardari, Mohsen. “Network compression via network memory: realization principles and coding algorithms.” 2013. Web. 19 Jun 2019.

Vancouver:

Sardari M. Network compression via network memory: realization principles and coding algorithms. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1853/50329.

Council of Science Editors:

Sardari M. Network compression via network memory: realization principles and coding algorithms. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50329

[1] [2]

.