Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Georgia Tech" +contributor:("Ji, Chuanyi"). Showing records 1 – 30 of 39 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Georgia Tech

1. Lin, Jian. Design and analysis of MAC protocols for wireless multi-hop sensor and terahertz networks.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 The contributions of this thesis include designing and analyzing novel medium access control (MAC) protocols for two types of wireless networks: (1) duty-cycling cooperative multi-hop… (more)

Subjects/Keywords: Wireless sensor networks; Terahertz networks; MAC; Duty cycle; Broad-band communication; Beam switching

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2015). Design and analysis of MAC protocols for wireless multi-hop sensor and terahertz networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54866

Chicago Manual of Style (16th Edition):

Lin, Jian. “Design and analysis of MAC protocols for wireless multi-hop sensor and terahertz networks.” 2015. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/54866.

MLA Handbook (7th Edition):

Lin, Jian. “Design and analysis of MAC protocols for wireless multi-hop sensor and terahertz networks.” 2015. Web. 24 Apr 2019.

Vancouver:

Lin J. Design and analysis of MAC protocols for wireless multi-hop sensor and terahertz networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/54866.

Council of Science Editors:

Lin J. Design and analysis of MAC protocols for wireless multi-hop sensor and terahertz networks. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54866


Georgia Tech

2. Fairbanks, Kevin D. Forensic framework for honeypot analysis.

Degree: PhD, Electrical and Computer Engineering, 2010, Georgia Tech

 The objective of this research is to evaluate and develop new forensic techniques for use in honeynet environments, in an effort to address areas where… (more)

Subjects/Keywords: Dentry; TimeKeeper; Ext4; File system forensics; Ext3; Honeypot; Computer crimes Investigation; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fairbanks, K. D. (2010). Forensic framework for honeypot analysis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33977

Chicago Manual of Style (16th Edition):

Fairbanks, Kevin D. “Forensic framework for honeypot analysis.” 2010. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/33977.

MLA Handbook (7th Edition):

Fairbanks, Kevin D. “Forensic framework for honeypot analysis.” 2010. Web. 24 Apr 2019.

Vancouver:

Fairbanks KD. Forensic framework for honeypot analysis. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/33977.

Council of Science Editors:

Fairbanks KD. Forensic framework for honeypot analysis. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33977


Georgia Tech

3. Zhuang, Zhenyun. Application acceleration for wireless and mobile data networks.

Degree: PhD, Computing, 2010, Georgia Tech

 This work studies application acceleration for wireless and mobile data networks. The problem of accelerating application can be addressed along multiple dimensions. The first dimension… (more)

Subjects/Keywords: Wireless networks; Mobile networks; Application acceleration; Traffic redundancy; Peer to peer; Android; Wireless communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhuang, Z. (2010). Application acceleration for wireless and mobile data networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/37164

Chicago Manual of Style (16th Edition):

Zhuang, Zhenyun. “Application acceleration for wireless and mobile data networks.” 2010. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/37164.

MLA Handbook (7th Edition):

Zhuang, Zhenyun. “Application acceleration for wireless and mobile data networks.” 2010. Web. 24 Apr 2019.

Vancouver:

Zhuang Z. Application acceleration for wireless and mobile data networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/37164.

Council of Science Editors:

Zhuang Z. Application acceleration for wireless and mobile data networks. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/37164


Georgia Tech

4. Erjongmanee, Supaporn. Study of network-service disruptions using heterogeneous data and statistical learning.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 The study of network-service disruptions caused by large-scale disturbances has mainly focused on assessing network damage; however, network-disruption responses, i.e., how the disruptions occur depending… (more)

Subjects/Keywords: Statistical learning; Heterogeneous data; Network availability; Large-scale disturbances; Network dependence; Network disruptions; Network performance (Telecommunication); Telecommunication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Erjongmanee, S. (2011). Study of network-service disruptions using heterogeneous data and statistical learning. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/43601

Chicago Manual of Style (16th Edition):

Erjongmanee, Supaporn. “Study of network-service disruptions using heterogeneous data and statistical learning.” 2011. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/43601.

MLA Handbook (7th Edition):

Erjongmanee, Supaporn. “Study of network-service disruptions using heterogeneous data and statistical learning.” 2011. Web. 24 Apr 2019.

Vancouver:

Erjongmanee S. Study of network-service disruptions using heterogeneous data and statistical learning. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/43601.

Council of Science Editors:

Erjongmanee S. Study of network-service disruptions using heterogeneous data and statistical learning. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/43601


Georgia Tech

5. Wei, Yun. Large-scale data analytics, modeling and resilience of energy infrastructure and service.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 Large scale power failures induced by severe weather have become frequent and damaging in recent years, causing millions of people to be without electricity service… (more)

Subjects/Keywords: Power distribution infrastructure; Services to customers; Failure; Recovery; Non-stationary spatiotemporal models; Data analytics; Resilience metrics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wei, Y. (2017). Large-scale data analytics, modeling and resilience of energy infrastructure and service. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59758

Chicago Manual of Style (16th Edition):

Wei, Yun. “Large-scale data analytics, modeling and resilience of energy infrastructure and service.” 2017. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/59758.

MLA Handbook (7th Edition):

Wei, Yun. “Large-scale data analytics, modeling and resilience of energy infrastructure and service.” 2017. Web. 24 Apr 2019.

Vancouver:

Wei Y. Large-scale data analytics, modeling and resilience of energy infrastructure and service. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/59758.

Council of Science Editors:

Wei Y. Large-scale data analytics, modeling and resilience of energy infrastructure and service. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/59758


Georgia Tech

6. Estevez, Claudio Ignacio. Carrier ethernet network solutions: transport protocol and optical backplane design.

Degree: PhD, Electrical and Computer Engineering, 2010, Georgia Tech

 The Metro Ethernet network (MEN) expands the advantages of Ethernet to cover areas wider than LAN. MENs running Ethernet Services as specified by the Metro… (more)

Subjects/Keywords: Carrier ethernet; Transport protocol; VCSEL; QoS; Optical coupling; Ethernet services; Ethernet (Local area network system); Computer network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Estevez, C. I. (2010). Carrier ethernet network solutions: transport protocol and optical backplane design. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33999

Chicago Manual of Style (16th Edition):

Estevez, Claudio Ignacio. “Carrier ethernet network solutions: transport protocol and optical backplane design.” 2010. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/33999.

MLA Handbook (7th Edition):

Estevez, Claudio Ignacio. “Carrier ethernet network solutions: transport protocol and optical backplane design.” 2010. Web. 24 Apr 2019.

Vancouver:

Estevez CI. Carrier ethernet network solutions: transport protocol and optical backplane design. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/33999.

Council of Science Editors:

Estevez CI. Carrier ethernet network solutions: transport protocol and optical backplane design. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33999

7. Dai, Rui. Correlation-based communication in wireless multimedia sensor networks.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 Wireless multimedia sensor networks (WMSNs) are networks of interconnected devices that allow retrieving video and audio streams, still images, and scalar data from the environment.… (more)

Subjects/Keywords: Communication protocols; Wireless sensor networks; Spatial correlation; Source coding; QoS; Multimedia; Wireless communication systems; Source code (Computer science); Computer science; Multimedia communications; Multimedia systems

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dai, R. (2011). Correlation-based communication in wireless multimedia sensor networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/42736

Chicago Manual of Style (16th Edition):

Dai, Rui. “Correlation-based communication in wireless multimedia sensor networks.” 2011. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/42736.

MLA Handbook (7th Edition):

Dai, Rui. “Correlation-based communication in wireless multimedia sensor networks.” 2011. Web. 24 Apr 2019.

Vancouver:

Dai R. Correlation-based communication in wireless multimedia sensor networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/42736.

Council of Science Editors:

Dai R. Correlation-based communication in wireless multimedia sensor networks. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/42736

8. Wang, Pu. Modeling, analysis, and optimization for wireless networks in the presence of heavy tails.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 The heavy-tailed traffic from wireless users, caused by the emerging Internet and multimedia applications, induces extremely dynamic and variable network environment, which can fundamentally change… (more)

Subjects/Keywords: Wireless networks; Optimization; Traffic modeling; Performance analysis; Heavy tails; Wireless communication systems; Distribution (Probability theory); Extreme value theory; Network performance (Telecommunication)

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, P. (2013). Modeling, analysis, and optimization for wireless networks in the presence of heavy tails. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50232

Chicago Manual of Style (16th Edition):

Wang, Pu. “Modeling, analysis, and optimization for wireless networks in the presence of heavy tails.” 2013. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/50232.

MLA Handbook (7th Edition):

Wang, Pu. “Modeling, analysis, and optimization for wireless networks in the presence of heavy tails.” 2013. Web. 24 Apr 2019.

Vancouver:

Wang P. Modeling, analysis, and optimization for wireless networks in the presence of heavy tails. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/50232.

Council of Science Editors:

Wang P. Modeling, analysis, and optimization for wireless networks in the presence of heavy tails. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50232

9. Gu, Guofei. Correlation-based Botnet Detection in Enterprise Networks.

Degree: PhD, Computing, 2008, Georgia Tech

 Most of the attacks and fraudulent activities on the Internet are carried out by malware. In particular, botnets, as state-of-the-art malware, are now considered as… (more)

Subjects/Keywords: Malware detection; Network security; Anomaly detection; Intrusion detection; Local area networks (Computer networks); Computer networks Security measures; Computer crimes; Correlation (Statistics)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gu, G. (2008). Correlation-based Botnet Detection in Enterprise Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/24634

Chicago Manual of Style (16th Edition):

Gu, Guofei. “Correlation-based Botnet Detection in Enterprise Networks.” 2008. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/24634.

MLA Handbook (7th Edition):

Gu, Guofei. “Correlation-based Botnet Detection in Enterprise Networks.” 2008. Web. 24 Apr 2019.

Vancouver:

Gu G. Correlation-based Botnet Detection in Enterprise Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/24634.

Council of Science Editors:

Gu G. Correlation-based Botnet Detection in Enterprise Networks. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/24634

10. Xu, Hongteng. Point process-based modeling and analysis of asynchronous event sequences.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 Real-world interactions among multiple entities, such as user behaviors in social networks, job hunting and hopping, and diseases and their complications, often exhibit self-triggering and… (more)

Subjects/Keywords: Point process; Hawkes process; correcting process; Granger causality; impact function; infectivity network; multi-task learning; Dirichlet mixture model; structural regularizer; disciriminative learning; doubly-censored data; attractiveness model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, H. (2017). Point process-based modeling and analysis of asynchronous event sequences. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58690

Chicago Manual of Style (16th Edition):

Xu, Hongteng. “Point process-based modeling and analysis of asynchronous event sequences.” 2017. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/58690.

MLA Handbook (7th Edition):

Xu, Hongteng. “Point process-based modeling and analysis of asynchronous event sequences.” 2017. Web. 24 Apr 2019.

Vancouver:

Xu H. Point process-based modeling and analysis of asynchronous event sequences. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/58690.

Council of Science Editors:

Xu H. Point process-based modeling and analysis of asynchronous event sequences. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58690

11. Lin, Shih-Chun. Softair: Software-defined networking and network function virtualization solutions for 5g cellular systems.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 One of the main building blocks and major challenges for 5G cellular systems is the design of flexible network architectures, which can be realized by… (more)

Subjects/Keywords: Software defined networking; Network function virtualization; 5G cellular systems; Software defined traffic engineering; Network virtualization; Cloudification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, S. (2017). Softair: Software-defined networking and network function virtualization solutions for 5g cellular systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58347

Chicago Manual of Style (16th Edition):

Lin, Shih-Chun. “Softair: Software-defined networking and network function virtualization solutions for 5g cellular systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/58347.

MLA Handbook (7th Edition):

Lin, Shih-Chun. “Softair: Software-defined networking and network function virtualization solutions for 5g cellular systems.” 2017. Web. 24 Apr 2019.

Vancouver:

Lin S. Softair: Software-defined networking and network function virtualization solutions for 5g cellular systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/58347.

Council of Science Editors:

Lin S. Softair: Software-defined networking and network function virtualization solutions for 5g cellular systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58347

12. Balakrishnan, Ravikumar. Handover management in heterogeneous networks for 4G and beyond cellular systems.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 New technologies are expected to play a major role for wireless cellular systems beyond the existing 4G paradigm. The need for several orders of magnitude… (more)

Subjects/Keywords: Handover; Admission control; Small cells; HetNets; Multistream carrier aggregation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Balakrishnan, R. (2015). Handover management in heterogeneous networks for 4G and beyond cellular systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53634

Chicago Manual of Style (16th Edition):

Balakrishnan, Ravikumar. “Handover management in heterogeneous networks for 4G and beyond cellular systems.” 2015. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/53634.

MLA Handbook (7th Edition):

Balakrishnan, Ravikumar. “Handover management in heterogeneous networks for 4G and beyond cellular systems.” 2015. Web. 24 Apr 2019.

Vancouver:

Balakrishnan R. Handover management in heterogeneous networks for 4G and beyond cellular systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/53634.

Council of Science Editors:

Balakrishnan R. Handover management in heterogeneous networks for 4G and beyond cellular systems. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53634

13. Edwards, Derek L. Designing optimal demand-responsive transportation feeder systems and comparing performance in heterogeneous environments.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 The goal of this research is to develop a method of objectively comparing and optimizing the performance of demand-responsive transportation systems in heterogeneous environments. Demand-responsive… (more)

Subjects/Keywords: Intelligent transportation; Demand-responsive transportation; Route optimization; Transit

…transportation systems are universities, such as Georgia Tech [8], Duke University [9… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, D. L. (2014). Designing optimal demand-responsive transportation feeder systems and comparing performance in heterogeneous environments. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52230

Chicago Manual of Style (16th Edition):

Edwards, Derek L. “Designing optimal demand-responsive transportation feeder systems and comparing performance in heterogeneous environments.” 2014. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/52230.

MLA Handbook (7th Edition):

Edwards, Derek L. “Designing optimal demand-responsive transportation feeder systems and comparing performance in heterogeneous environments.” 2014. Web. 24 Apr 2019.

Vancouver:

Edwards DL. Designing optimal demand-responsive transportation feeder systems and comparing performance in heterogeneous environments. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/52230.

Council of Science Editors:

Edwards DL. Designing optimal demand-responsive transportation feeder systems and comparing performance in heterogeneous environments. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52230

14. Kim, Jonghoek. Simultaneous cooperative exploration and networking.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 This thesis provides strategies for multiple vehicles to explore unknown environments in a cooperative and systematic manner. These strategies are called Simultaneous Cooperative Exploration and… (more)

Subjects/Keywords: Capturing intruders on graphs; Curve-tracking control; Voronoi diagrams; Multi-robot exploration and mapping; Voronoi polygons; Algorithms; Information networks

…The Sting-1 vehicle at Georgia Tech. . . . . . . . . . . . . . . . . . . 16 5 A vehicle… …Figure 4 shows the autonomous vehicle Sting-I that represented Georgia Tech in the DARPA Urban… …vector to the lane. Figure 4: The Sting-1 vehicle at Georgia Tech. 16 In this chapter, we… …desired lane-following behavior to be used as a component in the Georgia Tech urban grand… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, J. (2011). Simultaneous cooperative exploration and networking. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/39536

Chicago Manual of Style (16th Edition):

Kim, Jonghoek. “Simultaneous cooperative exploration and networking.” 2011. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/39536.

MLA Handbook (7th Edition):

Kim, Jonghoek. “Simultaneous cooperative exploration and networking.” 2011. Web. 24 Apr 2019.

Vancouver:

Kim J. Simultaneous cooperative exploration and networking. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/39536.

Council of Science Editors:

Kim J. Simultaneous cooperative exploration and networking. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/39536

15. Mohan, Apurva. Design and implementation of an attribute-based authorization management system.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 The proposed research is in the area of attribute-based authorization systems. We address two specific research problems in this area. First, evaluating authorization policies in… (more)

Subjects/Keywords: Policy-based systems; Reputation systems; XACML; Trust metrics; Attribute-based systems; Authorization systems; Computer security; Data protection; Computers Access control; Software protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohan, A. (2011). Design and implementation of an attribute-based authorization management system. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/39585

Chicago Manual of Style (16th Edition):

Mohan, Apurva. “Design and implementation of an attribute-based authorization management system.” 2011. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/39585.

MLA Handbook (7th Edition):

Mohan, Apurva. “Design and implementation of an attribute-based authorization management system.” 2011. Web. 24 Apr 2019.

Vancouver:

Mohan A. Design and implementation of an attribute-based authorization management system. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/39585.

Council of Science Editors:

Mohan A. Design and implementation of an attribute-based authorization management system. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/39585

16. Wang, Yan. Asymptotic theory for decentralized sequential hypothesis testing problems and sequential minimum energy design algorithm.

Degree: PhD, Industrial and Systems Engineering, 2011, Georgia Tech

 The dissertation investigates asymptotic theory of decentralized sequential hypothesis testing problems as well as asymptotic behaviors of the Sequential Minimum Energy Design (SMED). The main… (more)

Subjects/Keywords: Asymptotic optimality; Quantizers; Sequential minimum energy design; Hypothesis Testing; Decentralized sequential design; Algorithms; Mathematical optimization; Statistical hypothesis testing; Asymptotic efficiencies (Statistics)

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2011). Asymptotic theory for decentralized sequential hypothesis testing problems and sequential minimum energy design algorithm. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/41082

Chicago Manual of Style (16th Edition):

Wang, Yan. “Asymptotic theory for decentralized sequential hypothesis testing problems and sequential minimum energy design algorithm.” 2011. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/41082.

MLA Handbook (7th Edition):

Wang, Yan. “Asymptotic theory for decentralized sequential hypothesis testing problems and sequential minimum energy design algorithm.” 2011. Web. 24 Apr 2019.

Vancouver:

Wang Y. Asymptotic theory for decentralized sequential hypothesis testing problems and sequential minimum energy design algorithm. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/41082.

Council of Science Editors:

Wang Y. Asymptotic theory for decentralized sequential hypothesis testing problems and sequential minimum energy design algorithm. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/41082

17. Howard, Dustin F. Short-circuit currents in wind-turbine generator networks.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 Protection of both the wind plant and the interconnecting transmission system during short-circuit faults is imperative for maintaining system structural integrity and reliability. The circuit… (more)

Subjects/Keywords: Wind turbine; Power system protection; Power system transients; Short circuit currents; Power system modeling; Wind turbines; Short circuits

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Howard, D. F. (2013). Short-circuit currents in wind-turbine generator networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50361

Chicago Manual of Style (16th Edition):

Howard, Dustin F. “Short-circuit currents in wind-turbine generator networks.” 2013. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/50361.

MLA Handbook (7th Edition):

Howard, Dustin F. “Short-circuit currents in wind-turbine generator networks.” 2013. Web. 24 Apr 2019.

Vancouver:

Howard DF. Short-circuit currents in wind-turbine generator networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/50361.

Council of Science Editors:

Howard DF. Short-circuit currents in wind-turbine generator networks. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50361


Georgia Tech

18. Velayutham, Aravind Murugesan. Transport Protocols for Next Generation Wireless Data Networks.

Degree: MS, Electrical and Computer Engineering, 2005, Georgia Tech

 Emerging wireless networks are characterized by increased heterogeneity in wireless access technologies as well as increased peer-to-peer communication among wireless hosts. The heterogeneity among wireless… (more)

Subjects/Keywords: Wireless networks; Transport protocols; Wireless communication systems; TCP/IP (Computer network protocol); Peer-to-peer architecture (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Velayutham, A. M. (2005). Transport Protocols for Next Generation Wireless Data Networks. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/6957

Chicago Manual of Style (16th Edition):

Velayutham, Aravind Murugesan. “Transport Protocols for Next Generation Wireless Data Networks.” 2005. Masters Thesis, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/6957.

MLA Handbook (7th Edition):

Velayutham, Aravind Murugesan. “Transport Protocols for Next Generation Wireless Data Networks.” 2005. Web. 24 Apr 2019.

Vancouver:

Velayutham AM. Transport Protocols for Next Generation Wireless Data Networks. [Internet] [Masters thesis]. Georgia Tech; 2005. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/6957.

Council of Science Editors:

Velayutham AM. Transport Protocols for Next Generation Wireless Data Networks. [Masters Thesis]. Georgia Tech; 2005. Available from: http://hdl.handle.net/1853/6957


Georgia Tech

19. Zhu, Yong. Routing, Resource Allocation and Network Design for Overlay Networks.

Degree: PhD, Computing, 2006, Georgia Tech

 Overlay networks have been the subject of significant research and practical interest recently in addressing the inefficiency and ossification of the current Internet. In this… (more)

Subjects/Keywords: NetFinder; Multihomed overlay network; Multihoming; Automatic configuration; Network virtualization; PlanetLab; Routing; Overlay networks; Dynamic; Virtual network; Routing (Computer network management); Computer network architectures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2006). Routing, Resource Allocation and Network Design for Overlay Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/14017

Chicago Manual of Style (16th Edition):

Zhu, Yong. “Routing, Resource Allocation and Network Design for Overlay Networks.” 2006. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/14017.

MLA Handbook (7th Edition):

Zhu, Yong. “Routing, Resource Allocation and Network Design for Overlay Networks.” 2006. Web. 24 Apr 2019.

Vancouver:

Zhu Y. Routing, Resource Allocation and Network Design for Overlay Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/14017.

Council of Science Editors:

Zhu Y. Routing, Resource Allocation and Network Design for Overlay Networks. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/14017


Georgia Tech

20. Huang, Yi-an. Intrusion Detection and Response Systems for Mobile Ad Hoc Networks.

Degree: PhD, Computing, 2006, Georgia Tech

 A mobile ad hoc network (MANET) consists of a group of autonomous mobile nodes with no infrastructure support. In this research, we develop a distributed… (more)

Subjects/Keywords: Data mining; Intrusion detection; Routing security; Mobile ad hoc networks; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2006). Intrusion Detection and Response Systems for Mobile Ad Hoc Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/14053

Chicago Manual of Style (16th Edition):

Huang, Yi-an. “Intrusion Detection and Response Systems for Mobile Ad Hoc Networks.” 2006. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/14053.

MLA Handbook (7th Edition):

Huang, Yi-an. “Intrusion Detection and Response Systems for Mobile Ad Hoc Networks.” 2006. Web. 24 Apr 2019.

Vancouver:

Huang Y. Intrusion Detection and Response Systems for Mobile Ad Hoc Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/14053.

Council of Science Editors:

Huang Y. Intrusion Detection and Response Systems for Mobile Ad Hoc Networks. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/14053


Georgia Tech

21. Jeon, Sung-eok. Near-Optimality of Distributed Network Management with a Machine Learning Approach.

Degree: PhD, Electrical and Computer Engineering, 2007, Georgia Tech

 An analytical framework is developed for distributed management of large networks where each node makes locally its decisions. Two issues remain open. One is whether… (more)

Subjects/Keywords: Near-optimality; Distributed management; Machine learning; Mathematical optimization; Telecommunication systems Management; Computer networks Management; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jeon, S. (2007). Near-Optimality of Distributed Network Management with a Machine Learning Approach. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/16136

Chicago Manual of Style (16th Edition):

Jeon, Sung-eok. “Near-Optimality of Distributed Network Management with a Machine Learning Approach.” 2007. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/16136.

MLA Handbook (7th Edition):

Jeon, Sung-eok. “Near-Optimality of Distributed Network Management with a Machine Learning Approach.” 2007. Web. 24 Apr 2019.

Vancouver:

Jeon S. Near-Optimality of Distributed Network Management with a Machine Learning Approach. [Internet] [Doctoral dissertation]. Georgia Tech; 2007. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/16136.

Council of Science Editors:

Jeon S. Near-Optimality of Distributed Network Management with a Machine Learning Approach. [Doctoral Dissertation]. Georgia Tech; 2007. Available from: http://hdl.handle.net/1853/16136


Georgia Tech

22. Ji, Meng. Graph-Based Control of Networked Systems.

Degree: PhD, Electrical and Computer Engineering, 2007, Georgia Tech

 Networked systems have attracted great interests from the control society during the last decade. Several issues rising from the recent research are addressed in this… (more)

Subjects/Keywords: Graph theory; Coordination control; Multi-agent systems; Networked systems; Controllability; Observability; Graph theory; Heterogeneous computing; Computer networks; Control theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ji, M. (2007). Graph-Based Control of Networked Systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/16313

Chicago Manual of Style (16th Edition):

Ji, Meng. “Graph-Based Control of Networked Systems.” 2007. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/16313.

MLA Handbook (7th Edition):

Ji, Meng. “Graph-Based Control of Networked Systems.” 2007. Web. 24 Apr 2019.

Vancouver:

Ji M. Graph-Based Control of Networked Systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2007. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/16313.

Council of Science Editors:

Ji M. Graph-Based Control of Networked Systems. [Doctoral Dissertation]. Georgia Tech; 2007. Available from: http://hdl.handle.net/1853/16313


Georgia Tech

23. Corbett, Cherita L. Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification.

Degree: PhD, Electrical and Computer Engineering, 2006, Georgia Tech

 IEEE 802.11 wireless networks are plagued with problems of unauthorized access. Left undetected, unauthorized access is the precursor to additional mischief. Current approaches to detecting… (more)

Subjects/Keywords: Access control; Device identification; Wireless security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Corbett, C. L. (2006). Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/10500

Chicago Manual of Style (16th Edition):

Corbett, Cherita L. “Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification.” 2006. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/10500.

MLA Handbook (7th Edition):

Corbett, Cherita L. “Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification.” 2006. Web. 24 Apr 2019.

Vancouver:

Corbett CL. Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/10500.

Council of Science Editors:

Corbett CL. Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/10500


Georgia Tech

24. Abdullah, Kulsoom B. Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks.

Degree: PhD, Electrical and Computer Engineering, 2006, Georgia Tech

 As the trend of successful network attacks continue to rise, better forms of intrusion, detection and prevention are needed. This thesis addresses network traffic visualization… (more)

Subjects/Keywords: Intrusion detection; Alarm visualization; Network security visualization; Network security; Port visualization; Network visualization; Computer security; Visualization; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdullah, K. B. (2006). Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/10509

Chicago Manual of Style (16th Edition):

Abdullah, Kulsoom B. “Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks.” 2006. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/10509.

MLA Handbook (7th Edition):

Abdullah, Kulsoom B. “Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks.” 2006. Web. 24 Apr 2019.

Vancouver:

Abdullah KB. Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/10509.

Council of Science Editors:

Abdullah KB. Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/10509


Georgia Tech

25. Krasser, Sven. Adaptive Measurement-Based Traffic Engineering in Packet-Switched Radio Access Networks.

Degree: PhD, Electrical and Computer Engineering, 2004, Georgia Tech

 In this research, we propose a framework for measurement-based traffic engineering and connection admission control in radio access networks based on the Internet Protocol (IP).… (more)

Subjects/Keywords: MPLS; Connection admission control; DiffServ; Quality of service; Traffic engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krasser, S. (2004). Adaptive Measurement-Based Traffic Engineering in Packet-Switched Radio Access Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/5004

Chicago Manual of Style (16th Edition):

Krasser, Sven. “Adaptive Measurement-Based Traffic Engineering in Packet-Switched Radio Access Networks.” 2004. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/5004.

MLA Handbook (7th Edition):

Krasser, Sven. “Adaptive Measurement-Based Traffic Engineering in Packet-Switched Radio Access Networks.” 2004. Web. 24 Apr 2019.

Vancouver:

Krasser S. Adaptive Measurement-Based Traffic Engineering in Packet-Switched Radio Access Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2004. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/5004.

Council of Science Editors:

Krasser S. Adaptive Measurement-Based Traffic Engineering in Packet-Switched Radio Access Networks. [Doctoral Dissertation]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/5004


Georgia Tech

26. Anjali, Tricha. DiffServ/MPLS Network Design and Management.

Degree: PhD, Electrical and Computer Engineering, 2004, Georgia Tech

 The MultiProtocol Label Switching (MPLS) framework is used in many networks to provide efficient load balancing which distributes the traffic for efficient Quality of Service… (more)

Subjects/Keywords: Traffic engineering; TEAM; QoS; Network management; MPLS; DiffServ; Traffic engineering Computer networks; Telecommunication Traffic; Network performance (Telecommunication); MPLS standard

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anjali, T. (2004). DiffServ/MPLS Network Design and Management. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/5191

Chicago Manual of Style (16th Edition):

Anjali, Tricha. “DiffServ/MPLS Network Design and Management.” 2004. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/5191.

MLA Handbook (7th Edition):

Anjali, Tricha. “DiffServ/MPLS Network Design and Management.” 2004. Web. 24 Apr 2019.

Vancouver:

Anjali T. DiffServ/MPLS Network Design and Management. [Internet] [Doctoral dissertation]. Georgia Tech; 2004. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/5191.

Council of Science Editors:

Anjali T. DiffServ/MPLS Network Design and Management. [Doctoral Dissertation]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/5191


Georgia Tech

27. Chen, Zesheng. Modeling and Defending Against Internet Worm Attacks.

Degree: PhD, Electrical and Computer Engineering, 2007, Georgia Tech

 As computer and communication networks become prevalent, the Internet has been a battlefield for attackers and defenders. One of the most powerful weapons for attackers… (more)

Subjects/Keywords: Internet worms; Game theory; Defense; Modeling; Information theory; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Z. (2007). Modeling and Defending Against Internet Worm Attacks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/14582

Chicago Manual of Style (16th Edition):

Chen, Zesheng. “Modeling and Defending Against Internet Worm Attacks.” 2007. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/14582.

MLA Handbook (7th Edition):

Chen, Zesheng. “Modeling and Defending Against Internet Worm Attacks.” 2007. Web. 24 Apr 2019.

Vancouver:

Chen Z. Modeling and Defending Against Internet Worm Attacks. [Internet] [Doctoral dissertation]. Georgia Tech; 2007. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/14582.

Council of Science Editors:

Chen Z. Modeling and Defending Against Internet Worm Attacks. [Doctoral Dissertation]. Georgia Tech; 2007. Available from: http://hdl.handle.net/1853/14582


Georgia Tech

28. Tang, Jin. Mobile IPv4 Secure Access to Home Networks.

Degree: PhD, Electrical and Computer Engineering, 2006, Georgia Tech

 With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet… (more)

Subjects/Keywords: Private addresses; AAA; IPsec; Firewall; Network security; Mobile IP; Wireless Internet; Mobile agents (Computer software); Firewalls (Computer security); Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tang, J. (2006). Mobile IPv4 Secure Access to Home Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/11536

Chicago Manual of Style (16th Edition):

Tang, Jin. “Mobile IPv4 Secure Access to Home Networks.” 2006. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/11536.

MLA Handbook (7th Edition):

Tang, Jin. “Mobile IPv4 Secure Access to Home Networks.” 2006. Web. 24 Apr 2019.

Vancouver:

Tang J. Mobile IPv4 Secure Access to Home Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/11536.

Council of Science Editors:

Tang J. Mobile IPv4 Secure Access to Home Networks. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/11536


Georgia Tech

29. Vedantham, Ramanuja. Energy-Efficient Network Protocols for Wireless Sensor and Actor Networks.

Degree: PhD, Electrical and Computer Engineering, 2006, Georgia Tech

 Wireless sensor networks (WSNs) have a wide variety of applications in civilian, medical and military applications. However, the nodes in such a network are limited… (more)

Subjects/Keywords: Congestion Control; Hazard Avoidance and Mutual Exclusion; Wireless Sensor and Actuator Networks; Wireless Sensor and Actor Networks; Energy-Efficient Network Protocols; Wireless communication systems; Sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vedantham, R. (2006). Energy-Efficient Network Protocols for Wireless Sensor and Actor Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/13959

Chicago Manual of Style (16th Edition):

Vedantham, Ramanuja. “Energy-Efficient Network Protocols for Wireless Sensor and Actor Networks.” 2006. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/13959.

MLA Handbook (7th Edition):

Vedantham, Ramanuja. “Energy-Efficient Network Protocols for Wireless Sensor and Actor Networks.” 2006. Web. 24 Apr 2019.

Vancouver:

Vedantham R. Energy-Efficient Network Protocols for Wireless Sensor and Actor Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/13959.

Council of Science Editors:

Vedantham R. Energy-Efficient Network Protocols for Wireless Sensor and Actor Networks. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/13959


Georgia Tech

30. Akan, Ozgur Baris. Advanced Transport Protocols for Next Generation Heterogeneous Wireless Network Architectures.

Degree: PhD, Electrical and Computer Engineering, 2004, Georgia Tech

 The revolutionary advances in the wireless communication technologies are inspiring the researchers to envision the next generation wireless networking architectures, i.e., Next Generation Wireless Internet… (more)

Subjects/Keywords: InterPlaNetary Internet; Next generation wireless Internet; Wireless networks; Transport protocols; Wireless sensor networks; Wireless Internet; Wireless communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akan, O. B. (2004). Advanced Transport Protocols for Next Generation Heterogeneous Wireless Network Architectures. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/5231

Chicago Manual of Style (16th Edition):

Akan, Ozgur Baris. “Advanced Transport Protocols for Next Generation Heterogeneous Wireless Network Architectures.” 2004. Doctoral Dissertation, Georgia Tech. Accessed April 24, 2019. http://hdl.handle.net/1853/5231.

MLA Handbook (7th Edition):

Akan, Ozgur Baris. “Advanced Transport Protocols for Next Generation Heterogeneous Wireless Network Architectures.” 2004. Web. 24 Apr 2019.

Vancouver:

Akan OB. Advanced Transport Protocols for Next Generation Heterogeneous Wireless Network Architectures. [Internet] [Doctoral dissertation]. Georgia Tech; 2004. [cited 2019 Apr 24]. Available from: http://hdl.handle.net/1853/5231.

Council of Science Editors:

Akan OB. Advanced Transport Protocols for Next Generation Heterogeneous Wireless Network Architectures. [Doctoral Dissertation]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/5231

[1] [2]

.