Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Oklahoma State University" +contributor:("Kak, Subhash C."). Showing records 1 – 30 of 47 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Oklahoma State University

1. Memon, Adnan Ahmed. Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions.

Degree: Electrical Engineering, 2017, Oklahoma State University

 This thesis investigates the use of Goldbach partitions for secure communication protocols and for finding large prime numbers that are fundamental to these protocols. It… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Memon, A. A. (2017). Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/300033

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Memon, Adnan Ahmed. “Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions.” 2017. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/300033.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Memon, Adnan Ahmed. “Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions.” 2017. Web. 15 Jun 2019.

Vancouver:

Memon AA. Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions. [Internet] [Thesis]. Oklahoma State University; 2017. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/300033.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Memon AA. Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions. [Thesis]. Oklahoma State University; 2017. Available from: http://hdl.handle.net/11244/300033

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

2. Akshay, Antony. Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol.

Degree: Computer Science, 2014, Oklahoma State University

 The current standards for wireless security are WPA and its revised version WPA2 (IEEE 802.11i). At the basis of both of these is the WEP… (more)

Subjects/Keywords: 4-way handshake; blom's scheme; primitive pythagorean triples

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akshay, A. (2014). Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/14685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Akshay, Antony. “Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol.” 2014. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/14685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Akshay, Antony. “Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol.” 2014. Web. 15 Jun 2019.

Vancouver:

Akshay A. Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/14685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Akshay A. Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/14685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

3. Kotagiri, Vamsi Sashank. Information Processing Using Circulant Matrices.

Degree: Computer Science, 2014, Oklahoma State University

 Circulant matrices may be used to process certain kinds of signals in computer science applications. Specifically, they can be used as signal transforms. In this… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kotagiri, V. S. (2014). Information Processing Using Circulant Matrices. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/14944

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kotagiri, Vamsi Sashank. “Information Processing Using Circulant Matrices.” 2014. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/14944.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kotagiri, Vamsi Sashank. “Information Processing Using Circulant Matrices.” 2014. Web. 15 Jun 2019.

Vancouver:

Kotagiri VS. Information Processing Using Circulant Matrices. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/14944.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kotagiri VS. Information Processing Using Circulant Matrices. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/14944

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

4. Nagireddygari, Dileep. Stasis Trap: Cross - Layer Attack & Its Defense in Cognitive Radio Networks.

Degree: Computer Science, 2014, Oklahoma State University

 Spectrum shortage is a major problem in wireless communications. Existing research on attacks and security issues in CR networks focus on individual network layers. In… (more)

Subjects/Keywords: attacks & security; cognitive radio networks; cross layer attack; defense mechanism; key pre distribution

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nagireddygari, D. (2014). Stasis Trap: Cross - Layer Attack & Its Defense in Cognitive Radio Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/15037

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nagireddygari, Dileep. “Stasis Trap: Cross - Layer Attack & Its Defense in Cognitive Radio Networks.” 2014. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/15037.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nagireddygari, Dileep. “Stasis Trap: Cross - Layer Attack & Its Defense in Cognitive Radio Networks.” 2014. Web. 15 Jun 2019.

Vancouver:

Nagireddygari D. Stasis Trap: Cross - Layer Attack & Its Defense in Cognitive Radio Networks. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/15037.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nagireddygari D. Stasis Trap: Cross - Layer Attack & Its Defense in Cognitive Radio Networks. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/15037

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

5. Chitikela, Sindhu. Methods to Counter Attacks on Quantum Cryptography Protocols.

Degree: Computer Science, 2013, Oklahoma State University

 The need for secure transmission in the fields of banking and defense has led to the interest in quantum cryptographic protocols which are theoretically more… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chitikela, S. (2013). Methods to Counter Attacks on Quantum Cryptography Protocols. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/11075

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chitikela, Sindhu. “Methods to Counter Attacks on Quantum Cryptography Protocols.” 2013. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/11075.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chitikela, Sindhu. “Methods to Counter Attacks on Quantum Cryptography Protocols.” 2013. Web. 15 Jun 2019.

Vancouver:

Chitikela S. Methods to Counter Attacks on Quantum Cryptography Protocols. [Internet] [Thesis]. Oklahoma State University; 2013. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/11075.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chitikela S. Methods to Counter Attacks on Quantum Cryptography Protocols. [Thesis]. Oklahoma State University; 2013. Available from: http://hdl.handle.net/11244/11075

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

6. Kanchu, Krishnama Raju. Secure Key Transfer Protocol Using Goldbach Sequences.

Degree: Computer Science, 2013, Oklahoma State University

 Cryptography has been most successfully deployed in protocols where a client-server relationship exists, such as Secure Socket Layer(SSL) and Transport Layer security(TSL). A data can… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kanchu, K. R. (2013). Secure Key Transfer Protocol Using Goldbach Sequences. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/11097

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kanchu, Krishnama Raju. “Secure Key Transfer Protocol Using Goldbach Sequences.” 2013. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/11097.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kanchu, Krishnama Raju. “Secure Key Transfer Protocol Using Goldbach Sequences.” 2013. Web. 15 Jun 2019.

Vancouver:

Kanchu KR. Secure Key Transfer Protocol Using Goldbach Sequences. [Internet] [Thesis]. Oklahoma State University; 2013. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/11097.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kanchu KR. Secure Key Transfer Protocol Using Goldbach Sequences. [Thesis]. Oklahoma State University; 2013. Available from: http://hdl.handle.net/11244/11097

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

7. Letcher, Charles Wesley. Green Computing - Desktop Computer Power Management at the City of Tulsa.

Degree: Computer Science, 2013, Oklahoma State University

 One type of Green Computing focuses on reducing power consumption of computers. Specialized software like 1E/Nightwatchman aids in reducing the power consumption of desktop computers… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Letcher, C. W. (2013). Green Computing - Desktop Computer Power Management at the City of Tulsa. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/11105

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Letcher, Charles Wesley. “Green Computing - Desktop Computer Power Management at the City of Tulsa.” 2013. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/11105.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Letcher, Charles Wesley. “Green Computing - Desktop Computer Power Management at the City of Tulsa.” 2013. Web. 15 Jun 2019.

Vancouver:

Letcher CW. Green Computing - Desktop Computer Power Management at the City of Tulsa. [Internet] [Thesis]. Oklahoma State University; 2013. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/11105.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Letcher CW. Green Computing - Desktop Computer Power Management at the City of Tulsa. [Thesis]. Oklahoma State University; 2013. Available from: http://hdl.handle.net/11244/11105

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

8. Prabhu, Monisha. Key Distribution Using Primitive Pythogeren Triples.

Degree: Computer Science, 2013, Oklahoma State University

 The thesis shows that the six classes of primitive Pythagorean triples (PPTs) can be put into two groups. Auto correlation and cross-correlation functions of the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Prabhu, M. (2013). Key Distribution Using Primitive Pythogeren Triples. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/11115

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Prabhu, Monisha. “Key Distribution Using Primitive Pythogeren Triples.” 2013. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/11115.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Prabhu, Monisha. “Key Distribution Using Primitive Pythogeren Triples.” 2013. Web. 15 Jun 2019.

Vancouver:

Prabhu M. Key Distribution Using Primitive Pythogeren Triples. [Internet] [Thesis]. Oklahoma State University; 2013. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/11115.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Prabhu M. Key Distribution Using Primitive Pythogeren Triples. [Thesis]. Oklahoma State University; 2013. Available from: http://hdl.handle.net/11244/11115

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

9. Nagabhyrava, Divya Harika. Efficient Key Generation for Dynamic Blom's Scheme.

Degree: Computer Science, 2014, Oklahoma State University

 The need for totally secure communication between the nodes in a network has led to many key distribution schemes. Blom's scheme is a prominent key… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nagabhyrava, D. H. (2014). Efficient Key Generation for Dynamic Blom's Scheme. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/25692

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nagabhyrava, Divya Harika. “Efficient Key Generation for Dynamic Blom's Scheme.” 2014. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/25692.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nagabhyrava, Divya Harika. “Efficient Key Generation for Dynamic Blom's Scheme.” 2014. Web. 15 Jun 2019.

Vancouver:

Nagabhyrava DH. Efficient Key Generation for Dynamic Blom's Scheme. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/25692.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nagabhyrava DH. Efficient Key Generation for Dynamic Blom's Scheme. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/25692

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

10. Yu, Sheng. Applications of Attention Economics in Studying Equilibria in Social Networking.

Degree: Computer Science, 2014, Oklahoma State University

 Within social networking services, users construct their personal social networks by creating asymmetric or symmetric social links. They usually follow friends and selected professional users,… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, S. (2014). Applications of Attention Economics in Studying Equilibria in Social Networking. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/25740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Sheng. “Applications of Attention Economics in Studying Equilibria in Social Networking.” 2014. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/25740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Sheng. “Applications of Attention Economics in Studying Equilibria in Social Networking.” 2014. Web. 15 Jun 2019.

Vancouver:

Yu S. Applications of Attention Economics in Studying Equilibria in Social Networking. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/25740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu S. Applications of Attention Economics in Studying Equilibria in Social Networking. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/25740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

11. Aileni, Anvesh Reddy. Key Management in Static and Mobile Sensor Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. These networks are dynamic in nature that they allow addition of nodes… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aileni, A. R. (2011). Key Management in Static and Mobile Sensor Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aileni, Anvesh Reddy. “Key Management in Static and Mobile Sensor Networks.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aileni, Anvesh Reddy. “Key Management in Static and Mobile Sensor Networks.” 2011. Web. 15 Jun 2019.

Vancouver:

Aileni AR. Key Management in Static and Mobile Sensor Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aileni AR. Key Management in Static and Mobile Sensor Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

12. Ayerdis Espinoza, Carmen Patricia. Looc: a Cyber-physical Social Network on Android Platforms.

Degree: Computer Science Department, 2010, Oklahoma State University

 As the mobile Internet becomes pervasive, mobile devices have permeated into every aspect of our life, work, and society. This rapid technology evolution calls for… (more)

Subjects/Keywords: android; cyberphysical; mobile applications; social networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ayerdis Espinoza, C. P. (2010). Looc: a Cyber-physical Social Network on Android Platforms. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8119

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ayerdis Espinoza, Carmen Patricia. “Looc: a Cyber-physical Social Network on Android Platforms.” 2010. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8119.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ayerdis Espinoza, Carmen Patricia. “Looc: a Cyber-physical Social Network on Android Platforms.” 2010. Web. 15 Jun 2019.

Vancouver:

Ayerdis Espinoza CP. Looc: a Cyber-physical Social Network on Android Platforms. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8119.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ayerdis Espinoza CP. Looc: a Cyber-physical Social Network on Android Platforms. [Thesis]. Oklahoma State University; 2010. Available from: http://hdl.handle.net/11244/8119

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

13. Chandra, Bipul. Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 Ad-Hoc Mobile Wireless Network (MANETs) have emerged and evolved in many forms. MANETs are rapidly gaining popularity because they do not rely on a pre… (more)

Subjects/Keywords: adhoc network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chandra, B. (2011). Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chandra, Bipul. “Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chandra, Bipul. “Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks.” 2011. Web. 15 Jun 2019.

Vancouver:

Chandra B. Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chandra B. Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

14. Chinthapanti, Chakradhara Reddy. Two Dimensional Random Patterns.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis presents a new approach to the generation of random sequences and two dimensional random patterns in which random sequences are generated by making… (more)

Subjects/Keywords: autocorrelation; decimal sequences; delaunay triangulation; diehard tests; pseudo-random sequences; voronoi diagram

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chinthapanti, C. R. (2011). Two Dimensional Random Patterns. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8134

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chinthapanti, Chakradhara Reddy. “Two Dimensional Random Patterns.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8134.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chinthapanti, Chakradhara Reddy. “Two Dimensional Random Patterns.” 2011. Web. 15 Jun 2019.

Vancouver:

Chinthapanti CR. Two Dimensional Random Patterns. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8134.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chinthapanti CR. Two Dimensional Random Patterns. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8134

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

15. Dantala, Pradeep Kumar. Authentication for Multi-located Parties and Wireless Ad Hoc Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis present a new authentication protocol for multi-located parties which uses an agent based scheme that divides the message into two parts together with… (more)

Subjects/Keywords: ad hoc networks; authentication; authentication agents; multi-located parties; three stage protocol; wireless networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dantala, P. K. (2011). Authentication for Multi-located Parties and Wireless Ad Hoc Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dantala, Pradeep Kumar. “Authentication for Multi-located Parties and Wireless Ad Hoc Networks.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dantala, Pradeep Kumar. “Authentication for Multi-located Parties and Wireless Ad Hoc Networks.” 2011. Web. 15 Jun 2019.

Vancouver:

Dantala PK. Authentication for Multi-located Parties and Wireless Ad Hoc Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dantala PK. Authentication for Multi-located Parties and Wireless Ad Hoc Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

16. Dasari, Thrishukanth. Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments.

Degree: Computer Science Department, 2011, Oklahoma State University

 With the proliferation of sensors and actuators in today's world, we envisage the world as an inter-connected network of millions of Sensing and Actuating resources… (more)

Subjects/Keywords: actuators; resource allocation; sanet; sensors

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dasari, T. (2011). Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dasari, Thrishukanth. “Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dasari, Thrishukanth. “Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments.” 2011. Web. 15 Jun 2019.

Vancouver:

Dasari T. Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dasari T. Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

17. Dhanapal, Naveen Raj. Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System.

Degree: Computer Science Department, 2012, Oklahoma State University

 The general scope of our work is to propose an architecture to integrate the healthcare cloud with wireless sensor network (WSN) technology through smart phones.… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dhanapal, N. R. (2012). Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dhanapal, Naveen Raj. “Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System.” 2012. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dhanapal, Naveen Raj. “Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System.” 2012. Web. 15 Jun 2019.

Vancouver:

Dhanapal NR. Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System. [Internet] [Thesis]. Oklahoma State University; 2012. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dhanapal NR. Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System. [Thesis]. Oklahoma State University; 2012. Available from: http://hdl.handle.net/11244/8145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

18. Gunda, Raviteja. Design of a Cyber Physical Framework for the Assembly of Micro Devices.

Degree: Computer Science Department, 2012, Oklahoma State University

 Micro Devices Assembly (MDA) is an emerging domain with a significant economic potential. Existing methods for assembly of micro devices are tedious and costly. For… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gunda, R. (2012). Design of a Cyber Physical Framework for the Assembly of Micro Devices. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8161

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gunda, Raviteja. “Design of a Cyber Physical Framework for the Assembly of Micro Devices.” 2012. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8161.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gunda, Raviteja. “Design of a Cyber Physical Framework for the Assembly of Micro Devices.” 2012. Web. 15 Jun 2019.

Vancouver:

Gunda R. Design of a Cyber Physical Framework for the Assembly of Micro Devices. [Internet] [Thesis]. Oklahoma State University; 2012. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8161.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gunda R. Design of a Cyber Physical Framework for the Assembly of Micro Devices. [Thesis]. Oklahoma State University; 2012. Available from: http://hdl.handle.net/11244/8161

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

19. Huang, Fangjie. Performance of Multiple Sinks in Wireless Sensor Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 The applications of Wireless Sensor Networks (WSNs) are rapidly increasing. WSNs are used widely for collecting, storing, and sharing data in all kinds of applications.… (more)

Subjects/Keywords: hybrid sink; mobile sink; static sink; telosb; wireless sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, F. (2011). Performance of Multiple Sinks in Wireless Sensor Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8169

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Fangjie. “Performance of Multiple Sinks in Wireless Sensor Networks.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8169.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Fangjie. “Performance of Multiple Sinks in Wireless Sensor Networks.” 2011. Web. 15 Jun 2019.

Vancouver:

Huang F. Performance of Multiple Sinks in Wireless Sensor Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8169.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang F. Performance of Multiple Sinks in Wireless Sensor Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8169

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

20. Kandregula, Renuka. Game Theory Based Deception for Security in Networks.

Degree: Computer Science Department, 2010, Oklahoma State University

 In contrast to the complex techniques to secure a network which involve computation and communication overhead, a game theoretic based deception model is proposed in… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kandregula, R. (2010). Game Theory Based Deception for Security in Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kandregula, Renuka. “Game Theory Based Deception for Security in Networks.” 2010. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kandregula, Renuka. “Game Theory Based Deception for Security in Networks.” 2010. Web. 15 Jun 2019.

Vancouver:

Kandregula R. Game Theory Based Deception for Security in Networks. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kandregula R. Game Theory Based Deception for Security in Networks. [Thesis]. Oklahoma State University; 2010. Available from: http://hdl.handle.net/11244/8175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

21. Katta, Sandeep. Secret Sharing in Visual Cryptography.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis examines techniques for recursive hiding scheme for 3 out of 5 secret sharing and a probabilistic 2 out of 3 secret sharing scheme… (more)

Subjects/Keywords: 3 out of 5 secret sharing; gray scale cryptography; information efficiency; recursive hiding of secrets; secret sharing; visual cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Katta, S. (2011). Secret Sharing in Visual Cryptography. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8178

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Katta, Sandeep. “Secret Sharing in Visual Cryptography.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8178.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Katta, Sandeep. “Secret Sharing in Visual Cryptography.” 2011. Web. 15 Jun 2019.

Vancouver:

Katta S. Secret Sharing in Visual Cryptography. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8178.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Katta S. Secret Sharing in Visual Cryptography. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8178

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

22. Koskei, Jordan Kiprop. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.

Degree: Computer Science Department, 2011, Oklahoma State University

 Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high level intentions. Understanding an intruder's intention greatly enhances network security as it… (more)

Subjects/Keywords: intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koskei, J. K. (2011). Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Web. 15 Jun 2019.

Vancouver:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

23. Yashwanth, Kothapalli. Primitive Pythagorean Triples in Key Management of Sensor Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis deals with a new approach to key establishment in wireless sensor networks where the nodes have limited memory and communication capabilities. Primitive Pythagorean… (more)

Subjects/Keywords: primitive pythogerean triples

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yashwanth, K. (2011). Primitive Pythagorean Triples in Key Management of Sensor Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8185

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yashwanth, Kothapalli. “Primitive Pythagorean Triples in Key Management of Sensor Networks.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8185.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yashwanth, Kothapalli. “Primitive Pythagorean Triples in Key Management of Sensor Networks.” 2011. Web. 15 Jun 2019.

Vancouver:

Yashwanth K. Primitive Pythagorean Triples in Key Management of Sensor Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8185.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yashwanth K. Primitive Pythagorean Triples in Key Management of Sensor Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8185

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

24. Kuruvada, Praveen. Memory Storage in a Variable Threshold Artificial Neural Network.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis is concerned with the problem of memory storage in a feedback neural network. A new learning approach has been developed that assigns variable… (more)

Subjects/Keywords: learning; variable threshold

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuruvada, P. (2011). Memory Storage in a Variable Threshold Artificial Neural Network. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8191

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuruvada, Praveen. “Memory Storage in a Variable Threshold Artificial Neural Network.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8191.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuruvada, Praveen. “Memory Storage in a Variable Threshold Artificial Neural Network.” 2011. Web. 15 Jun 2019.

Vancouver:

Kuruvada P. Memory Storage in a Variable Threshold Artificial Neural Network. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8191.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuruvada P. Memory Storage in a Variable Threshold Artificial Neural Network. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8191

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

25. Laddha, Prerana Rani. Increasing the Capacity of a B-matrix Neural Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 In an effort to create computing structures that are as efficient as the brain at cognitive tasks, interconnected artificial neurons are used in cognitive science… (more)

Subjects/Keywords: b- matrix; network; neural

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laddha, P. R. (2011). Increasing the Capacity of a B-matrix Neural Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laddha, Prerana Rani. “Increasing the Capacity of a B-matrix Neural Networks.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laddha, Prerana Rani. “Increasing the Capacity of a B-matrix Neural Networks.” 2011. Web. 15 Jun 2019.

Vancouver:

Laddha PR. Increasing the Capacity of a B-matrix Neural Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laddha PR. Increasing the Capacity of a B-matrix Neural Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

26. Lingashetty, Krishna Chaithanya. Active Sites Implementation for the B-Matrix Neural Network.

Degree: Computer Science Department, 2010, Oklahoma State University

 This thesis is concerned with the problem of memory recall for the feedback neural network called the B-Matrix network. A new model  – the Active… (more)

Subjects/Keywords: active sites; b matrix; delta rule; memory retrieval

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lingashetty, K. C. (2010). Active Sites Implementation for the B-Matrix Neural Network. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8195

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lingashetty, Krishna Chaithanya. “Active Sites Implementation for the B-Matrix Neural Network.” 2010. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8195.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lingashetty, Krishna Chaithanya. “Active Sites Implementation for the B-Matrix Neural Network.” 2010. Web. 15 Jun 2019.

Vancouver:

Lingashetty KC. Active Sites Implementation for the B-Matrix Neural Network. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8195.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lingashetty KC. Active Sites Implementation for the B-Matrix Neural Network. [Thesis]. Oklahoma State University; 2010. Available from: http://hdl.handle.net/11244/8195

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

27. Magee, Marion C. Increasing Memory Performance in Multi-core Processors.

Degree: Computer Science Department, 2010, Oklahoma State University

 To continue to develop performance increases in modern processors, an old paradigm in computer science must be re-explored. Flat memory architecture, provided with modern processor… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Magee, M. C. (2010). Increasing Memory Performance in Multi-core Processors. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8197

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Magee, Marion C. “Increasing Memory Performance in Multi-core Processors.” 2010. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8197.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Magee, Marion C. “Increasing Memory Performance in Multi-core Processors.” 2010. Web. 15 Jun 2019.

Vancouver:

Magee MC. Increasing Memory Performance in Multi-core Processors. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8197.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Magee MC. Increasing Memory Performance in Multi-core Processors. [Thesis]. Oklahoma State University; 2010. Available from: http://hdl.handle.net/11244/8197

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

28. Nguyen, Nhat Dong. Igems - Resource-oriented System for Telerobotics Testbeds.

Degree: Computer Science Department, 2011, Oklahoma State University

 Although robotics is currently a very popular and interesting research area, there still exist two main problems of finance and technology that create barriers for… (more)

Subjects/Keywords: resource-oriented; rest; robotics; telerobotics; video streaming; web services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, N. D. (2011). Igems - Resource-oriented System for Telerobotics Testbeds. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nguyen, Nhat Dong. “Igems - Resource-oriented System for Telerobotics Testbeds.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nguyen, Nhat Dong. “Igems - Resource-oriented System for Telerobotics Testbeds.” 2011. Web. 15 Jun 2019.

Vancouver:

Nguyen ND. Igems - Resource-oriented System for Telerobotics Testbeds. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nguyen ND. Igems - Resource-oriented System for Telerobotics Testbeds. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

29. Nutalapati, Sravya. Task Resource Probabilistic Scheduling Algorithm.

Degree: Computer Science Department, 2011, Oklahoma State University

 The future of mobile health monitoring combined with cloud computing is expected to see a lot of technological advances. In this thesis we assume that… (more)

Subjects/Keywords: computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nutalapati, S. (2011). Task Resource Probabilistic Scheduling Algorithm. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nutalapati, Sravya. “Task Resource Probabilistic Scheduling Algorithm.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nutalapati, Sravya. “Task Resource Probabilistic Scheduling Algorithm.” 2011. Web. 15 Jun 2019.

Vancouver:

Nutalapati S. Task Resource Probabilistic Scheduling Algorithm. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nutalapati S. Task Resource Probabilistic Scheduling Algorithm. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

30. Paruchuri, Venkata Ravinder. Approximate String Matching and Applications to Indian Scripts.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis is concerned with the analysis of approximate string matching and its applications to Indian scripts. It starts with the analysis of the problem… (more)

Subjects/Keywords: approximate string matching; approximate string matching for english; approximate string matching for indian scripts; damerau- levenshtein for english and telugu; entropy; telugu entropy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paruchuri, V. R. (2011). Approximate String Matching and Applications to Indian Scripts. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Paruchuri, Venkata Ravinder. “Approximate String Matching and Applications to Indian Scripts.” 2011. Thesis, Oklahoma State University. Accessed June 15, 2019. http://hdl.handle.net/11244/8219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Paruchuri, Venkata Ravinder. “Approximate String Matching and Applications to Indian Scripts.” 2011. Web. 15 Jun 2019.

Vancouver:

Paruchuri VR. Approximate String Matching and Applications to Indian Scripts. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 15]. Available from: http://hdl.handle.net/11244/8219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Paruchuri VR. Approximate String Matching and Applications to Indian Scripts. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.