Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Penn State University" +contributor:("David Jonathan Miller, Committee Member"). Showing records 1 – 30 of 31 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Penn State University

1. Feng, Chao. Polynomial Optimization Based Approaches to System Design, Analysis and Identification.

Degree: 2013, Penn State University

 In recent developments of system and control theory, a large effort has been devoted to finding equivalent convex formulation of the problems of interest. A… (more)

Subjects/Keywords: Robust Control; Probabilistic Control; Distributional Robustness; Switched System; Identification; Interpolation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Feng, C. (2013). Polynomial Optimization Based Approaches to System Design, Analysis and Identification. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/18792

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Feng, Chao. “Polynomial Optimization Based Approaches to System Design, Analysis and Identification.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/18792.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Feng, Chao. “Polynomial Optimization Based Approaches to System Design, Analysis and Identification.” 2013. Web. 05 Dec 2020.

Vancouver:

Feng C. Polynomial Optimization Based Approaches to System Design, Analysis and Identification. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/18792.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Feng C. Polynomial Optimization Based Approaches to System Design, Analysis and Identification. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/18792

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

2. Nedorezov, Adam Jonathan. Active Contour Motion Planning in the Inverse Perspective Mapping Frame.

Degree: 2016, Penn State University

 This work explores the use of active contours for the purposes of motion planning in a highway environment. Traditionally active contours have been used in… (more)

Subjects/Keywords: Active Contour; Path Planning; Vanishing Point Estimation; Inverse Perspective Mapping; Motion Planning; Obstacle Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nedorezov, A. J. (2016). Active Contour Motion Planning in the Inverse Perspective Mapping Frame. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/13364ajn5049

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nedorezov, Adam Jonathan. “Active Contour Motion Planning in the Inverse Perspective Mapping Frame.” 2016. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/13364ajn5049.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nedorezov, Adam Jonathan. “Active Contour Motion Planning in the Inverse Perspective Mapping Frame.” 2016. Web. 05 Dec 2020.

Vancouver:

Nedorezov AJ. Active Contour Motion Planning in the Inverse Perspective Mapping Frame. [Internet] [Thesis]. Penn State University; 2016. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/13364ajn5049.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nedorezov AJ. Active Contour Motion Planning in the Inverse Perspective Mapping Frame. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/13364ajn5049

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

3. Huang, Heqing. A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID.

Degree: 2016, Penn State University

 The increasing popularity of mobile devices (e.g., Android, iOS and etc.) attracts both normal users and malware writers. In this dissertation, we conduct research on… (more)

Subjects/Keywords: Android Security; Vulnerability; Malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, H. (2016). A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/28717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Heqing. “A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID.” 2016. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/28717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Heqing. “A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID.” 2016. Web. 05 Dec 2020.

Vancouver:

Huang H. A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID. [Internet] [Thesis]. Penn State University; 2016. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/28717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang H. A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/28717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

4. Chen, Hung-hsuan. Identifying Similar Objects in Social Networks and Digital Libraries.

Degree: 2013, Penn State University

 With the rise of the computer age, various kinds of information can be easily accessed in digital format. However, the objects found within this information,… (more)

Subjects/Keywords: link prediction; vertex similarity; expert search; social network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, H. (2013). Identifying Similar Objects in Social Networks and Digital Libraries. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/19753

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Hung-hsuan. “Identifying Similar Objects in Social Networks and Digital Libraries.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/19753.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Hung-hsuan. “Identifying Similar Objects in Social Networks and Digital Libraries.” 2013. Web. 05 Dec 2020.

Vancouver:

Chen H. Identifying Similar Objects in Social Networks and Digital Libraries. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/19753.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen H. Identifying Similar Objects in Social Networks and Digital Libraries. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/19753

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

5. Jha, Manjari. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.

Degree: 2018, Penn State University

 This thesis focuses on developing probabilistic models for the analysis of diverse datasets using unsupervised clustering techniques. Primarily, we focus on two main fields: the… (more)

Subjects/Keywords: metagenomics; intrusion detection; clustering; unsupervised

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jha, M. (2018). Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Web. 05 Dec 2020.

Vancouver:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

6. Shan, Yuquan. Resource Management and Security in Distributed Computing Systems.

Degree: 2018, Penn State University

 This thesis investigates the relationship among distributed computing systems and jobs/tasks running in them. More specifically, how the properties of the distributed system or the… (more)

Subjects/Keywords: Distributed Systems; Cloud Computing; Resource Scheduling; DDoS Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shan, Y. (2018). Resource Management and Security in Distributed Computing Systems. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/16030yxs182

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shan, Yuquan. “Resource Management and Security in Distributed Computing Systems.” 2018. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/16030yxs182.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shan, Yuquan. “Resource Management and Security in Distributed Computing Systems.” 2018. Web. 05 Dec 2020.

Vancouver:

Shan Y. Resource Management and Security in Distributed Computing Systems. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/16030yxs182.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shan Y. Resource Management and Security in Distributed Computing Systems. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/16030yxs182

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

7. Gollapalli, Sujatha Das. Researcher Expertise Search, Homepage Finding and Metadata Extraction.

Degree: 2013, Penn State University

 Expert Search, the problem of retrieving people with expertise on a queried topic, has important applications [1]. For instance, conference organizers can use expert search… (more)

Subjects/Keywords: Academic homepages; Co-training; Feature labeling; Expert search; PageRank; Author-document-topic graph

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gollapalli, S. D. (2013). Researcher Expertise Search, Homepage Finding and Metadata Extraction. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/19203

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gollapalli, Sujatha Das. “Researcher Expertise Search, Homepage Finding and Metadata Extraction.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/19203.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gollapalli, Sujatha Das. “Researcher Expertise Search, Homepage Finding and Metadata Extraction.” 2013. Web. 05 Dec 2020.

Vancouver:

Gollapalli SD. Researcher Expertise Search, Homepage Finding and Metadata Extraction. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/19203.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gollapalli SD. Researcher Expertise Search, Homepage Finding and Metadata Extraction. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/19203

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

8. Guler, Basak. Information Transmission in Networks with Social and Semantic Constraints.

Degree: 2017, Penn State University

 Modern networks are designed to facilitate the interaction between machines and humans. These networks consist of parties with different characteristics, goals, and interests. Although various… (more)

Subjects/Keywords: bayesian games; joint source channel coding; social networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guler, B. (2017). Information Transmission in Networks with Social and Semantic Constraints. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14655bxg215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Guler, Basak. “Information Transmission in Networks with Social and Semantic Constraints.” 2017. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/14655bxg215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Guler, Basak. “Information Transmission in Networks with Social and Semantic Constraints.” 2017. Web. 05 Dec 2020.

Vancouver:

Guler B. Information Transmission in Networks with Social and Semantic Constraints. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/14655bxg215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Guler B. Information Transmission in Networks with Social and Semantic Constraints. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/14655bxg215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

9. Li, Min. Information Theoretic Limits of Multi-user Channels with State.

Degree: 2012, Penn State University

 The communication channel with a random parameter called state was first introduced by Shannon and has received considerable attention in recent years because of its… (more)

Subjects/Keywords: state-dependent channels; strictly causal state; non-causal state; multiple-access channels; relay channels; GP binning; feedback

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, M. (2012). Information Theoretic Limits of Multi-user Channels with State. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15170

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Min. “Information Theoretic Limits of Multi-user Channels with State.” 2012. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/15170.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Min. “Information Theoretic Limits of Multi-user Channels with State.” 2012. Web. 05 Dec 2020.

Vancouver:

Li M. Information Theoretic Limits of Multi-user Channels with State. [Internet] [Thesis]. Penn State University; 2012. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/15170.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li M. Information Theoretic Limits of Multi-user Channels with State. [Thesis]. Penn State University; 2012. Available from: https://submit-etda.libraries.psu.edu/catalog/15170

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

10. Kurve, Aditya C. Novel Task Decomposition And Aggregation methods For Knowledge Discovery In Multi-agent systems.

Degree: 2013, Penn State University

 Multi-agent systems allow us to study and co-ordinate autonomous processes or agents for achieving macroscopic system-level goals. Agents are typically characterized by self-organizing behavior with… (more)

Subjects/Keywords: multi-agent systems; knowledge discovery; game theory; machine learning; Nash equilibrium; crowdsourcing; generative modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kurve, A. C. (2013). Novel Task Decomposition And Aggregation methods For Knowledge Discovery In Multi-agent systems. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/19415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kurve, Aditya C. “Novel Task Decomposition And Aggregation methods For Knowledge Discovery In Multi-agent systems.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/19415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kurve, Aditya C. “Novel Task Decomposition And Aggregation methods For Knowledge Discovery In Multi-agent systems.” 2013. Web. 05 Dec 2020.

Vancouver:

Kurve AC. Novel Task Decomposition And Aggregation methods For Knowledge Discovery In Multi-agent systems. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/19415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kurve AC. Novel Task Decomposition And Aggregation methods For Knowledge Discovery In Multi-agent systems. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/19415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

11. Ali, Ramy. Harnessing Data Correlation and Network Information in Distributed Key-Value Stores.

Degree: 2020, Penn State University

 Distributed key-value stores are an essential component of the cloud computing infrastructure and are used by several applications including reservation systems and financial transactions. These… (more)

Subjects/Keywords: Erasure-coded key-value stores; strong consistency; eventual consistency; probabilistic consistency; multi-version coding; data correlation; geo-distributed

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ali, R. (2020). Harnessing Data Correlation and Network Information in Distributed Key-Value Stores. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17492rxa5203

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ali, Ramy. “Harnessing Data Correlation and Network Information in Distributed Key-Value Stores.” 2020. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/17492rxa5203.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ali, Ramy. “Harnessing Data Correlation and Network Information in Distributed Key-Value Stores.” 2020. Web. 05 Dec 2020.

Vancouver:

Ali R. Harnessing Data Correlation and Network Information in Distributed Key-Value Stores. [Internet] [Thesis]. Penn State University; 2020. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/17492rxa5203.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ali R. Harnessing Data Correlation and Network Information in Distributed Key-Value Stores. [Thesis]. Penn State University; 2020. Available from: https://submit-etda.libraries.psu.edu/catalog/17492rxa5203

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

12. Tekin, Ender. Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels .

Degree: 2008, Penn State University

 The widespread use of multiuser wireless communications has been raising the demand for higher data rates and until now that has been the main design… (more)

Subjects/Keywords: wire-tap channel; secrecy capacity; wireless communications; information theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tekin, E. (2008). Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/8415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tekin, Ender. “Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels .” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/8415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tekin, Ender. “Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels .” 2008. Web. 05 Dec 2020.

Vancouver:

Tekin E. Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels . [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/8415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tekin E. Information Theoretic Secrecy for Some Multiuser Wireless Communication Channels . [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/8415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

13. Krahnstoever, Nils. Articulated Models from Video.

Degree: 2008, Penn State University

 The use of models for visual tracking provides robustness towards image noise, clutter and occlusion and offers the ability to recover three-dimensional pose information of… (more)

Subjects/Keywords: computer vision; image processing; visual tracking; model-based tracking; model acquisition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krahnstoever, N. (2008). Articulated Models from Video. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/6102

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krahnstoever, Nils. “Articulated Models from Video.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/6102.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krahnstoever, Nils. “Articulated Models from Video.” 2008. Web. 05 Dec 2020.

Vancouver:

Krahnstoever N. Articulated Models from Video. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/6102.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krahnstoever N. Articulated Models from Video. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/6102

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

14. Navidpour, Seyed Mohammad. CODING FOR BROADBAND COMMUNICATION SYSTEMS.

Degree: 2008, Penn State University

 Fast Internet access is growing from a convenience into a necessity in all aspects of our daily lives. Unfortunately, this has been held back by… (more)

Subjects/Keywords: Channel Coding; Free Space Optics; MIMO; Powerline Communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Navidpour, S. M. (2008). CODING FOR BROADBAND COMMUNICATION SYSTEMS. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/7211

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Navidpour, Seyed Mohammad. “CODING FOR BROADBAND COMMUNICATION SYSTEMS.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/7211.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Navidpour, Seyed Mohammad. “CODING FOR BROADBAND COMMUNICATION SYSTEMS.” 2008. Web. 05 Dec 2020.

Vancouver:

Navidpour SM. CODING FOR BROADBAND COMMUNICATION SYSTEMS. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/7211.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Navidpour SM. CODING FOR BROADBAND COMMUNICATION SYSTEMS. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/7211

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

15. Hamadeh, Ihab. Attack Attribution for Distributed Denial-of-Service and Worm Attacks.

Degree: 2008, Penn State University

 Attack attribution has been a very challenging problem for years. Perpetrators have become skillful in masquerading their identity and launching various attacks on the Internet,… (more)

Subjects/Keywords: attribution; packet marking; ddos; worm; network security; forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hamadeh, I. (2008). Attack Attribution for Distributed Denial-of-Service and Worm Attacks. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/7149

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hamadeh, Ihab. “Attack Attribution for Distributed Denial-of-Service and Worm Attacks.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/7149.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hamadeh, Ihab. “Attack Attribution for Distributed Denial-of-Service and Worm Attacks.” 2008. Web. 05 Dec 2020.

Vancouver:

Hamadeh I. Attack Attribution for Distributed Denial-of-Service and Worm Attacks. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/7149.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hamadeh I. Attack Attribution for Distributed Denial-of-Service and Worm Attacks. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/7149

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

16. Park, Dongkook. Design of High-Performance, Energy-Efficient, and Reliable Network-on-Chip (NoC) Architectures.

Degree: 2008, Penn State University

 The notion of a Network-on-Chip (NoC) is rapidly gaining a foothold as the communication fabric in complex System-on-Chip (SoC) architectures including recent Multi-Core architectures. Scalability… (more)

Subjects/Keywords: Network-on-Chip; on-chip interconnection; low-power; reliability; router architecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Park, D. (2008). Design of High-Performance, Energy-Efficient, and Reliable Network-on-Chip (NoC) Architectures. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/8203

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Park, Dongkook. “Design of High-Performance, Energy-Efficient, and Reliable Network-on-Chip (NoC) Architectures.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/8203.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Park, Dongkook. “Design of High-Performance, Energy-Efficient, and Reliable Network-on-Chip (NoC) Architectures.” 2008. Web. 05 Dec 2020.

Vancouver:

Park D. Design of High-Performance, Energy-Efficient, and Reliable Network-on-Chip (NoC) Architectures. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/8203.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Park D. Design of High-Performance, Energy-Efficient, and Reliable Network-on-Chip (NoC) Architectures. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/8203

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

17. Carl, Glenn. Towards Large-Scale Testing of Policy-Based Routing via Path Algebraic and Scaled-Down Topological Modeling.

Degree: 2008, Penn State University

 Due to the Internet's large scale and increasing complexity, many weaknesses have been discovered in its policy-based inter-domain routing protocol BGP. Accordingly, solutions have been… (more)

Subjects/Keywords: policy-based routing; network testing and evaluation; large-scale simulation; path algebras; topological scale-down

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carl, G. (2008). Towards Large-Scale Testing of Policy-Based Routing via Path Algebraic and Scaled-Down Topological Modeling. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/8182

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Carl, Glenn. “Towards Large-Scale Testing of Policy-Based Routing via Path Algebraic and Scaled-Down Topological Modeling.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/8182.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Carl, Glenn. “Towards Large-Scale Testing of Policy-Based Routing via Path Algebraic and Scaled-Down Topological Modeling.” 2008. Web. 05 Dec 2020.

Vancouver:

Carl G. Towards Large-Scale Testing of Policy-Based Routing via Path Algebraic and Scaled-Down Topological Modeling. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/8182.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Carl G. Towards Large-Scale Testing of Policy-Based Routing via Path Algebraic and Scaled-Down Topological Modeling. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/8182

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

18. Rao, Rajesh N. Purposeful mobility and capacity issues in sensor network.

Degree: 2008, Penn State University

 In this thesis methods to exploit ``purposeful' mobility to improve the efficiency and performance of a sensor network are presented. For example a mobile node… (more)

Subjects/Keywords: sensor network; controlled mobility; purposeful mobility; capacity; simulated annealing; surveillance strategy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rao, R. N. (2008). Purposeful mobility and capacity issues in sensor network. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/7538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rao, Rajesh N. “Purposeful mobility and capacity issues in sensor network.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/7538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rao, Rajesh N. “Purposeful mobility and capacity issues in sensor network.” 2008. Web. 05 Dec 2020.

Vancouver:

Rao RN. Purposeful mobility and capacity issues in sensor network. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/7538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rao RN. Purposeful mobility and capacity issues in sensor network. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/7538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

19. Gandhi, Tarak L. Image Sequence Analysis for Object Detection and Segmentation .

Degree: 2008, Penn State University

 A sequence of images contains more information than a single image. Due to this reason, image sequence analysis has been used in computer vision for… (more)

Subjects/Keywords: Image Motion Analysis; Target Detection; Computer Vision; Image Processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gandhi, T. L. (2008). Image Sequence Analysis for Object Detection and Segmentation . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/5810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gandhi, Tarak L. “Image Sequence Analysis for Object Detection and Segmentation .” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/5810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gandhi, Tarak L. “Image Sequence Analysis for Object Detection and Segmentation .” 2008. Web. 05 Dec 2020.

Vancouver:

Gandhi TL. Image Sequence Analysis for Object Detection and Segmentation . [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/5810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gandhi TL. Image Sequence Analysis for Object Detection and Segmentation . [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/5810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

20. Tuntoolavest, Usana. Vector Symbol Decoding with Lists of Alternative Vector Symbol Choices and Outer Convolutional Codes.

Degree: 2008, Penn State University

 Vector Symbol Decoding (VSD) with list of alternative vector symbol choices is presented as a relatively simple and high performance decoding technique for convolutional outer… (more)

Subjects/Keywords: Vector Symbol decoding; convolutional code; nonbinary code; concatenated code; Reed-Solomon code; nonbinary code decoding

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tuntoolavest, U. (2008). Vector Symbol Decoding with Lists of Alternative Vector Symbol Choices and Outer Convolutional Codes. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/5914

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tuntoolavest, Usana. “Vector Symbol Decoding with Lists of Alternative Vector Symbol Choices and Outer Convolutional Codes.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/5914.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tuntoolavest, Usana. “Vector Symbol Decoding with Lists of Alternative Vector Symbol Choices and Outer Convolutional Codes.” 2008. Web. 05 Dec 2020.

Vancouver:

Tuntoolavest U. Vector Symbol Decoding with Lists of Alternative Vector Symbol Choices and Outer Convolutional Codes. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/5914.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tuntoolavest U. Vector Symbol Decoding with Lists of Alternative Vector Symbol Choices and Outer Convolutional Codes. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/5914

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

21. Graham, Michael William. Robust Methods for Human Airway-Tree Segmentation and Anatomical-Tree Matching.

Degree: 2008, Penn State University

 Robust and accurate segmentation of the human airway tree from multi-detector computed-tomography (MDCT) chest scans is vital for many pulmonary-imaging applications. Accurately segmented airways are… (more)

Subjects/Keywords: medical imaging; image segmentation; image-guided therapy; tree matching

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Graham, M. W. (2008). Robust Methods for Human Airway-Tree Segmentation and Anatomical-Tree Matching. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/8561

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Graham, Michael William. “Robust Methods for Human Airway-Tree Segmentation and Anatomical-Tree Matching.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/8561.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Graham, Michael William. “Robust Methods for Human Airway-Tree Segmentation and Anatomical-Tree Matching.” 2008. Web. 05 Dec 2020.

Vancouver:

Graham MW. Robust Methods for Human Airway-Tree Segmentation and Anatomical-Tree Matching. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/8561.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Graham MW. Robust Methods for Human Airway-Tree Segmentation and Anatomical-Tree Matching. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/8561

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

22. Neishaboori, Azin. Interference-Aware Resource Management in Multihop Wireless Networks .

Degree: 2008, Penn State University

 This thesis is written with an attempt to address some of the challenges of resource allocation in multihop wireless mesh and ad hoc networks. The… (more)

Subjects/Keywords: power control; CDMA; ad hoc networks; mesh networks; multihop; wireless; routing; scheduling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Neishaboori, A. (2008). Interference-Aware Resource Management in Multihop Wireless Networks . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9226

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Neishaboori, Azin. “Interference-Aware Resource Management in Multihop Wireless Networks .” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/9226.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Neishaboori, Azin. “Interference-Aware Resource Management in Multihop Wireless Networks .” 2008. Web. 05 Dec 2020.

Vancouver:

Neishaboori A. Interference-Aware Resource Management in Multihop Wireless Networks . [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/9226.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Neishaboori A. Interference-Aware Resource Management in Multihop Wireless Networks . [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/9226

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

23. Patankar, Pushkar Deepak. Adaptive Social Networking With Applications To Security.

Degree: 2009, Penn State University

 With an unprecedented rise in the number of users relying on social-networking based applications, social network analysis has received renewed interest. Analyzing social networks has… (more)

Subjects/Keywords: Social Networks; Peer-to-Peer Systems; Unstructured Networks; Botnets

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patankar, P. D. (2009). Adaptive Social Networking With Applications To Security. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9879

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Patankar, Pushkar Deepak. “Adaptive Social Networking With Applications To Security.” 2009. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/9879.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Patankar, Pushkar Deepak. “Adaptive Social Networking With Applications To Security.” 2009. Web. 05 Dec 2020.

Vancouver:

Patankar PD. Adaptive Social Networking With Applications To Security. [Internet] [Thesis]. Penn State University; 2009. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/9879.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Patankar PD. Adaptive Social Networking With Applications To Security. [Thesis]. Penn State University; 2009. Available from: https://submit-etda.libraries.psu.edu/catalog/9879

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

24. Yun, Jungnam. Adaptive Resource Allocation for D-TDD Systems in Wireless Multimedia Networks.

Degree: 2008, Penn State University

 In accordance with the demand for robust and spectrally efficient communications systems design for multimedia communication with heterogeneous traffic in fading channels, various adaptive approaches… (more)

Subjects/Keywords: Adaptive Modulation; Resource Allocation; D-TDD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yun, J. (2008). Adaptive Resource Allocation for D-TDD Systems in Wireless Multimedia Networks. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/6240

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yun, Jungnam. “Adaptive Resource Allocation for D-TDD Systems in Wireless Multimedia Networks.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/6240.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yun, Jungnam. “Adaptive Resource Allocation for D-TDD Systems in Wireless Multimedia Networks.” 2008. Web. 05 Dec 2020.

Vancouver:

Yun J. Adaptive Resource Allocation for D-TDD Systems in Wireless Multimedia Networks. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/6240.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yun J. Adaptive Resource Allocation for D-TDD Systems in Wireless Multimedia Networks. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/6240

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

25. Li, Xiang. Probabilistic Robust Control System Design by Stochastic Optimization.

Degree: 2008, Penn State University

 This dissertation concentrates on recent results on probabilistic robust controller design. In contrast to approaches taken in classical robustness theory, probabilistic robust controller design allows… (more)

Subjects/Keywords: probabilistic algorithms; stochastic optimization; robust control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, X. (2008). Probabilistic Robust Control System Design by Stochastic Optimization. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/6382

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Xiang. “Probabilistic Robust Control System Design by Stochastic Optimization.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/6382.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Xiang. “Probabilistic Robust Control System Design by Stochastic Optimization.” 2008. Web. 05 Dec 2020.

Vancouver:

Li X. Probabilistic Robust Control System Design by Stochastic Optimization. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/6382.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li X. Probabilistic Robust Control System Design by Stochastic Optimization. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/6382

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

26. Zhou , Ding. MINING SOCIAL DOCUMENTS AND NETWORKS.

Degree: 2008, Penn State University

 The Web has connected millions of users by various communication tools for social purposes. Daily, huge amount of social data are being created through fingertips,… (more)

Subjects/Keywords: social network; machine learning; information retrieval; user modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhou , Ding. (2008). MINING SOCIAL DOCUMENTS AND NETWORKS. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/8120

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhou , Ding. “MINING SOCIAL DOCUMENTS AND NETWORKS.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/8120.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhou , Ding. “MINING SOCIAL DOCUMENTS AND NETWORKS.” 2008. Web. 05 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Zhou , Ding. MINING SOCIAL DOCUMENTS AND NETWORKS. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/8120.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhou , Ding. MINING SOCIAL DOCUMENTS AND NETWORKS. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/8120

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

27. Inanc, Tamer. A NOVEL APPROACH TO ACTIVE VISION SYSTEMS: MODELLING, CONTROL AND REAL TIME TRACKING.

Degree: 2008, Penn State University

 Recent hardware developments have rendered controlled active vision a practical option for a broad range of problems: spanning applications as diverse as intelligent vehicle highway… (more)

Subjects/Keywords: robotics; real time tracking; computer vision; robust control; modelling; active vision; robust identification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Inanc, T. (2008). A NOVEL APPROACH TO ACTIVE VISION SYSTEMS: MODELLING, CONTROL AND REAL TIME TRACKING. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/5985

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Inanc, Tamer. “A NOVEL APPROACH TO ACTIVE VISION SYSTEMS: MODELLING, CONTROL AND REAL TIME TRACKING.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/5985.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Inanc, Tamer. “A NOVEL APPROACH TO ACTIVE VISION SYSTEMS: MODELLING, CONTROL AND REAL TIME TRACKING.” 2008. Web. 05 Dec 2020.

Vancouver:

Inanc T. A NOVEL APPROACH TO ACTIVE VISION SYSTEMS: MODELLING, CONTROL AND REAL TIME TRACKING. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/5985.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Inanc T. A NOVEL APPROACH TO ACTIVE VISION SYSTEMS: MODELLING, CONTROL AND REAL TIME TRACKING. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/5985

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

28. Lu, Min. Low-Density Parity-Check Codes: Asymptotic Behavior and Zeta Functions.

Degree: 2009, Penn State University

 A LDPC code is binary linear code equipped with a sparse parity-check matrix. A bipartite graph, called Tanner graph, can be associated to a parity-check… (more)

Subjects/Keywords: LDPC codes; iterative decoding; pseudo-codewords; capacity-achieving sequences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, M. (2009). Low-Density Parity-Check Codes: Asymptotic Behavior and Zeta Functions. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/10088

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lu, Min. “Low-Density Parity-Check Codes: Asymptotic Behavior and Zeta Functions.” 2009. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/10088.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lu, Min. “Low-Density Parity-Check Codes: Asymptotic Behavior and Zeta Functions.” 2009. Web. 05 Dec 2020.

Vancouver:

Lu M. Low-Density Parity-Check Codes: Asymptotic Behavior and Zeta Functions. [Internet] [Thesis]. Penn State University; 2009. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/10088.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lu M. Low-Density Parity-Check Codes: Asymptotic Behavior and Zeta Functions. [Thesis]. Penn State University; 2009. Available from: https://submit-etda.libraries.psu.edu/catalog/10088

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

29. Tangpong, Athichart. Managing Sybil Identities in Distributed Networks.

Degree: 2010, Penn State University

 This dissertation addresses Sybil identity obfuscation attacks in two environments, namely Mobile Ad-hoc Network (MANET) and BitTorrent. We proposed a location- based Sybil detection framework… (more)

Subjects/Keywords: Mobil Ad-hoc Network (MANET); Sybil Attack Detection; Game Theory; Sybilproof Referral System; BitTorrent Incentives

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tangpong, A. (2010). Managing Sybil Identities in Distributed Networks. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/10685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tangpong, Athichart. “Managing Sybil Identities in Distributed Networks.” 2010. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/10685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tangpong, Athichart. “Managing Sybil Identities in Distributed Networks.” 2010. Web. 05 Dec 2020.

Vancouver:

Tangpong A. Managing Sybil Identities in Distributed Networks. [Internet] [Thesis]. Penn State University; 2010. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/10685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tangpong A. Managing Sybil Identities in Distributed Networks. [Thesis]. Penn State University; 2010. Available from: https://submit-etda.libraries.psu.edu/catalog/10685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

30. Xiao, Xiaoqiang. PARAMETRIC MODEL BASED SPEECH ENHANCEMENT.

Degree: 2010, Penn State University

 Speech enhancement is a long standing problem in speech signal processing research. The distortion of speech signals with additive noise has hampered the success of… (more)

Subjects/Keywords: Speech Enhancement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiao, X. (2010). PARAMETRIC MODEL BASED SPEECH ENHANCEMENT. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/10684

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xiao, Xiaoqiang. “PARAMETRIC MODEL BASED SPEECH ENHANCEMENT.” 2010. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/10684.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xiao, Xiaoqiang. “PARAMETRIC MODEL BASED SPEECH ENHANCEMENT.” 2010. Web. 05 Dec 2020.

Vancouver:

Xiao X. PARAMETRIC MODEL BASED SPEECH ENHANCEMENT. [Internet] [Thesis]. Penn State University; 2010. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/10684.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xiao X. PARAMETRIC MODEL BASED SPEECH ENHANCEMENT. [Thesis]. Penn State University; 2010. Available from: https://submit-etda.libraries.psu.edu/catalog/10684

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.