Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Michigan" +contributor:("Liu, Mingyan"). Showing records 1 – 30 of 52 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of Michigan

1. Kong, Yuqing. Eliciting and Aggregating Information: An Information Theoretic Approach.

Degree: PhD, Computer Science & Engineering, 2018, University of Michigan

 Crowdsourcing – outsourcing tasks to a crowd of workers (e.g. Amazon Mechanical Turk, peer grading for massive open online courseware (MOOCs), scholarly peer review, and Yahoo… (more)

Subjects/Keywords: Peer prediction; Information theory; Mechanism design; Unsupervised learning; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kong, Y. (2018). Eliciting and Aggregating Information: An Information Theoretic Approach. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/145809

Chicago Manual of Style (16th Edition):

Kong, Yuqing. “Eliciting and Aggregating Information: An Information Theoretic Approach.” 2018. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/145809.

MLA Handbook (7th Edition):

Kong, Yuqing. “Eliciting and Aggregating Information: An Information Theoretic Approach.” 2018. Web. 27 Nov 2020.

Vancouver:

Kong Y. Eliciting and Aggregating Information: An Information Theoretic Approach. [Internet] [Doctoral dissertation]. University of Michigan; 2018. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/145809.

Council of Science Editors:

Kong Y. Eliciting and Aggregating Information: An Information Theoretic Approach. [Doctoral Dissertation]. University of Michigan; 2018. Available from: http://hdl.handle.net/2027.42/145809


University of Michigan

2. Khaliligarekani, Mohammadmahdi. Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling.

Degree: PhD, Electrical and Computer Engineering, 2020, University of Michigan

 Faced with a myriad of costly and frequent cyber threats, organizations not only invest in software security mechanisms such as firewalls and intrusion detection systems… (more)

Subjects/Keywords: Cybersecurity; Cyber insurance; Contract design; Game theory; Security Economics; Optimization; Computer Science; Electrical Engineering; Industrial and Operations Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khaliligarekani, M. (2020). Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/155236

Chicago Manual of Style (16th Edition):

Khaliligarekani, Mohammadmahdi. “Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling.” 2020. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/155236.

MLA Handbook (7th Edition):

Khaliligarekani, Mohammadmahdi. “Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling.” 2020. Web. 27 Nov 2020.

Vancouver:

Khaliligarekani M. Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling. [Internet] [Doctoral dissertation]. University of Michigan; 2020. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/155236.

Council of Science Editors:

Khaliligarekani M. Incentive Mechanisms for Managing and Controlling Cyber Risks: The Role of Cyber Insurance and Resource Pooling. [Doctoral Dissertation]. University of Michigan; 2020. Available from: http://hdl.handle.net/2027.42/155236


University of Michigan

3. Ouyang, Yi. On the Interaction of Information and Decisions in Dynamic Networked Systems.

Degree: PhD, Electrical Engineering: Systems, 2016, University of Michigan

 Efficient operation of modern dynamic networked systems, such as communication systems, queueing networks, power systems, and surveillance systems, can significantly improve our quality of life.… (more)

Subjects/Keywords: Stochastic control; Dynamic games; Decentralized information; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ouyang, Y. (2016). On the Interaction of Information and Decisions in Dynamic Networked Systems. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/120820

Chicago Manual of Style (16th Edition):

Ouyang, Yi. “On the Interaction of Information and Decisions in Dynamic Networked Systems.” 2016. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/120820.

MLA Handbook (7th Edition):

Ouyang, Yi. “On the Interaction of Information and Decisions in Dynamic Networked Systems.” 2016. Web. 27 Nov 2020.

Vancouver:

Ouyang Y. On the Interaction of Information and Decisions in Dynamic Networked Systems. [Internet] [Doctoral dissertation]. University of Michigan; 2016. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/120820.

Council of Science Editors:

Ouyang Y. On the Interaction of Information and Decisions in Dynamic Networked Systems. [Doctoral Dissertation]. University of Michigan; 2016. Available from: http://hdl.handle.net/2027.42/120820


University of Michigan

4. Liu, Yue. Supporting Large Scale Communication Systems on Infrastructureless Networks Composed of Commodity Mobile Devices: Practicality, Scalability, and Security.

Degree: PhD, Electrical Engineering: Systems, 2016, University of Michigan

 Infrastructureless Delay Tolerant Networks (DTNs) composed of commodity mobile devices have the potential to support communication applications resistant to blocking and censorship, as well as… (more)

Subjects/Keywords: security; censorship; Infrastructureless networks; delay tolerant networks; the Sybil attack; human mobility and contacts; Computer Science; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Y. (2016). Supporting Large Scale Communication Systems on Infrastructureless Networks Composed of Commodity Mobile Devices: Practicality, Scalability, and Security. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/120779

Chicago Manual of Style (16th Edition):

Liu, Yue. “Supporting Large Scale Communication Systems on Infrastructureless Networks Composed of Commodity Mobile Devices: Practicality, Scalability, and Security.” 2016. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/120779.

MLA Handbook (7th Edition):

Liu, Yue. “Supporting Large Scale Communication Systems on Infrastructureless Networks Composed of Commodity Mobile Devices: Practicality, Scalability, and Security.” 2016. Web. 27 Nov 2020.

Vancouver:

Liu Y. Supporting Large Scale Communication Systems on Infrastructureless Networks Composed of Commodity Mobile Devices: Practicality, Scalability, and Security. [Internet] [Doctoral dissertation]. University of Michigan; 2016. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/120779.

Council of Science Editors:

Liu Y. Supporting Large Scale Communication Systems on Infrastructureless Networks Composed of Commodity Mobile Devices: Practicality, Scalability, and Security. [Doctoral Dissertation]. University of Michigan; 2016. Available from: http://hdl.handle.net/2027.42/120779


University of Michigan

5. Garikipati, Krishna Chaitanya. Towards Scalable Design of Future Wireless Networks.

Degree: PhD, Electrical Engineering: Systems, 2016, University of Michigan

 Wireless operators face an ever-growing challenge to meet the throughput and processing requirements of billions of devices that are getting connected. In current wireless networks,… (more)

Subjects/Keywords: wireless networks; cellular networks; baseband processing; Computer Science; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garikipati, K. C. (2016). Towards Scalable Design of Future Wireless Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/133358

Chicago Manual of Style (16th Edition):

Garikipati, Krishna Chaitanya. “Towards Scalable Design of Future Wireless Networks.” 2016. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/133358.

MLA Handbook (7th Edition):

Garikipati, Krishna Chaitanya. “Towards Scalable Design of Future Wireless Networks.” 2016. Web. 27 Nov 2020.

Vancouver:

Garikipati KC. Towards Scalable Design of Future Wireless Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2016. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/133358.

Council of Science Editors:

Garikipati KC. Towards Scalable Design of Future Wireless Networks. [Doctoral Dissertation]. University of Michigan; 2016. Available from: http://hdl.handle.net/2027.42/133358


University of Michigan

6. Cheng, Frank. Agent-Based Models for Analyzing Strategic Adaptations to Government Regulation.

Degree: PhD, Computer Science & Engineering, 2020, University of Michigan

 In many economic systems, participants are unable to internalize social costs. These can be anything from pollution to default risk in financial systems. To deal… (more)

Subjects/Keywords: Game theory; Economics; Networks; Banking; Basel; Emissions regulation; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, F. (2020). Agent-Based Models for Analyzing Strategic Adaptations to Government Regulation. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/155192

Chicago Manual of Style (16th Edition):

Cheng, Frank. “Agent-Based Models for Analyzing Strategic Adaptations to Government Regulation.” 2020. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/155192.

MLA Handbook (7th Edition):

Cheng, Frank. “Agent-Based Models for Analyzing Strategic Adaptations to Government Regulation.” 2020. Web. 27 Nov 2020.

Vancouver:

Cheng F. Agent-Based Models for Analyzing Strategic Adaptations to Government Regulation. [Internet] [Doctoral dissertation]. University of Michigan; 2020. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/155192.

Council of Science Editors:

Cheng F. Agent-Based Models for Analyzing Strategic Adaptations to Government Regulation. [Doctoral Dissertation]. University of Michigan; 2020. Available from: http://hdl.handle.net/2027.42/155192


University of Michigan

7. Kasten Jr., James Douglas. Server Authentication on the Past, Present, and Future Internet.

Degree: PhD, Computer Science and Engineering, 2015, University of Michigan

 HTTPS is used for nearly all secure web communication, yet very little is known about the security of HTTPS' deployment overall on the Internet. In… (more)

Subjects/Keywords: HTTPS; X.509 certificates; Computer Science; Engineering; Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kasten Jr., J. D. (2015). Server Authentication on the Past, Present, and Future Internet. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/116632

Chicago Manual of Style (16th Edition):

Kasten Jr., James Douglas. “Server Authentication on the Past, Present, and Future Internet.” 2015. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/116632.

MLA Handbook (7th Edition):

Kasten Jr., James Douglas. “Server Authentication on the Past, Present, and Future Internet.” 2015. Web. 27 Nov 2020.

Vancouver:

Kasten Jr. JD. Server Authentication on the Past, Present, and Future Internet. [Internet] [Doctoral dissertation]. University of Michigan; 2015. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/116632.

Council of Science Editors:

Kasten Jr. JD. Server Authentication on the Past, Present, and Future Internet. [Doctoral Dissertation]. University of Michigan; 2015. Available from: http://hdl.handle.net/2027.42/116632


University of Michigan

8. Aga, Shaizeen. Near Data Processing for Efficient and Trusted Systems.

Degree: PhD, Computer Science & Engineering, 2017, University of Michigan

 We live in a world which constantly produces data at a rate which only increases with time. Conventional processor architectures fail to process this abundant… (more)

Subjects/Keywords: near data computing; secure cloud; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aga, S. (2017). Near Data Processing for Efficient and Trusted Systems. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/144139

Chicago Manual of Style (16th Edition):

Aga, Shaizeen. “Near Data Processing for Efficient and Trusted Systems.” 2017. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/144139.

MLA Handbook (7th Edition):

Aga, Shaizeen. “Near Data Processing for Efficient and Trusted Systems.” 2017. Web. 27 Nov 2020.

Vancouver:

Aga S. Near Data Processing for Efficient and Trusted Systems. [Internet] [Doctoral dissertation]. University of Michigan; 2017. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/144139.

Council of Science Editors:

Aga S. Near Data Processing for Efficient and Trusted Systems. [Doctoral Dissertation]. University of Michigan; 2017. Available from: http://hdl.handle.net/2027.42/144139


University of Michigan

9. Xiao, Chaowei. Machine Learning in Adversarial Environments.

Degree: PhD, Computer Science & Engineering, 2020, University of Michigan

 Machine Learning, especially Deep Neural Nets (DNNs), has achieved great success in a variety of applications. Unlike classical algorithms that could be formally analyzed, there… (more)

Subjects/Keywords: adversarial machine learning; security; adversarial attacks; adversarial examples; defense; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiao, C. (2020). Machine Learning in Adversarial Environments. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/162944

Chicago Manual of Style (16th Edition):

Xiao, Chaowei. “Machine Learning in Adversarial Environments.” 2020. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/162944.

MLA Handbook (7th Edition):

Xiao, Chaowei. “Machine Learning in Adversarial Environments.” 2020. Web. 27 Nov 2020.

Vancouver:

Xiao C. Machine Learning in Adversarial Environments. [Internet] [Doctoral dissertation]. University of Michigan; 2020. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/162944.

Council of Science Editors:

Xiao C. Machine Learning in Adversarial Environments. [Doctoral Dissertation]. University of Michigan; 2020. Available from: http://hdl.handle.net/2027.42/162944


University of Michigan

10. Kim, Junhee. System Identification of Civil Engineering Structures through Wireless Structural Monitoring and Subspace System Identification Methods.

Degree: PhD, Civil Engineering, 2011, University of Michigan

 Recent dramatic catastrophic failures of civil engineering infrastructure systems such as the I-35 Bridge collapse (Minneapolis, MN, 2007) and PG&E gas pipeline explosion (San Bruno,… (more)

Subjects/Keywords: System Identification; Wireless Monitoring System; Structural Health Montoring; Civil and Environmental Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, J. (2011). System Identification of Civil Engineering Structures through Wireless Structural Monitoring and Subspace System Identification Methods. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/84466

Chicago Manual of Style (16th Edition):

Kim, Junhee. “System Identification of Civil Engineering Structures through Wireless Structural Monitoring and Subspace System Identification Methods.” 2011. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/84466.

MLA Handbook (7th Edition):

Kim, Junhee. “System Identification of Civil Engineering Structures through Wireless Structural Monitoring and Subspace System Identification Methods.” 2011. Web. 27 Nov 2020.

Vancouver:

Kim J. System Identification of Civil Engineering Structures through Wireless Structural Monitoring and Subspace System Identification Methods. [Internet] [Doctoral dissertation]. University of Michigan; 2011. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/84466.

Council of Science Editors:

Kim J. System Identification of Civil Engineering Structures through Wireless Structural Monitoring and Subspace System Identification Methods. [Doctoral Dissertation]. University of Michigan; 2011. Available from: http://hdl.handle.net/2027.42/84466


University of Michigan

11. Zhang, Jing. A Macroscopic Study of Network Security Threats at the Organizational Level.

Degree: PhD, Computer Science and Engineering, 2015, University of Michigan

 Defenders of today's network are confronted with a large number of malicious activities such as spam, malware, and denial-of-service attacks. Although many studies have been… (more)

Subjects/Keywords: Network security; Organization; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, J. (2015). A Macroscopic Study of Network Security Threats at the Organizational Level. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/116714

Chicago Manual of Style (16th Edition):

Zhang, Jing. “A Macroscopic Study of Network Security Threats at the Organizational Level.” 2015. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/116714.

MLA Handbook (7th Edition):

Zhang, Jing. “A Macroscopic Study of Network Security Threats at the Organizational Level.” 2015. Web. 27 Nov 2020.

Vancouver:

Zhang J. A Macroscopic Study of Network Security Threats at the Organizational Level. [Internet] [Doctoral dissertation]. University of Michigan; 2015. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/116714.

Council of Science Editors:

Zhang J. A Macroscopic Study of Network Security Threats at the Organizational Level. [Doctoral Dissertation]. University of Michigan; 2015. Available from: http://hdl.handle.net/2027.42/116714


University of Michigan

12. Tavafoghi Jahromi, Hamidreza. On Design and Analysis of Cyber-Physical Systems with Strategic Agents.

Degree: PhD, Electrical Engineering: Systems, 2017, University of Michigan

 In contrast to traditional CPS where a designer can specify an action plan for each agent, in CPS with strategic agents, every agent acts selfishly… (more)

Subjects/Keywords: Market mechanisms for renewable energy; Demand response program; Information disclosure in transportation networks; Dynamic games with asymmetric information; Dynamic multi-agent decision problems; Economics; Civil and Environmental Engineering; Electrical Engineering; Transportation; Business and Economics; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tavafoghi Jahromi, H. (2017). On Design and Analysis of Cyber-Physical Systems with Strategic Agents. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/140850

Chicago Manual of Style (16th Edition):

Tavafoghi Jahromi, Hamidreza. “On Design and Analysis of Cyber-Physical Systems with Strategic Agents.” 2017. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/140850.

MLA Handbook (7th Edition):

Tavafoghi Jahromi, Hamidreza. “On Design and Analysis of Cyber-Physical Systems with Strategic Agents.” 2017. Web. 27 Nov 2020.

Vancouver:

Tavafoghi Jahromi H. On Design and Analysis of Cyber-Physical Systems with Strategic Agents. [Internet] [Doctoral dissertation]. University of Michigan; 2017. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/140850.

Council of Science Editors:

Tavafoghi Jahromi H. On Design and Analysis of Cyber-Physical Systems with Strategic Agents. [Doctoral Dissertation]. University of Michigan; 2017. Available from: http://hdl.handle.net/2027.42/140850


University of Michigan

13. Moharrami, Mehrdad. A Study of Phase Transition in New Random Graph Families.

Degree: PhD, Electrical Engineering: Systems, 2020, University of Michigan

 Random graphs are mathematical models for understanding real-world networks. Important properties can be captured, processes studied, and rigorous predictions made. Phase transitions (sudden changes in… (more)

Subjects/Keywords: phase transitions; random graphs; combinatorial optimization; local weak convergence; differential equation approximation; Mathematics; Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moharrami, M. (2020). A Study of Phase Transition in New Random Graph Families. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/155026

Chicago Manual of Style (16th Edition):

Moharrami, Mehrdad. “A Study of Phase Transition in New Random Graph Families.” 2020. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/155026.

MLA Handbook (7th Edition):

Moharrami, Mehrdad. “A Study of Phase Transition in New Random Graph Families.” 2020. Web. 27 Nov 2020.

Vancouver:

Moharrami M. A Study of Phase Transition in New Random Graph Families. [Internet] [Doctoral dissertation]. University of Michigan; 2020. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/155026.

Council of Science Editors:

Moharrami M. A Study of Phase Transition in New Random Graph Families. [Doctoral Dissertation]. University of Michigan; 2020. Available from: http://hdl.handle.net/2027.42/155026


University of Michigan

14. Chang, Nicholas B. Sequential resource allocation in communication networks: Guessing games, strategies, and online algorithms.

Degree: PhD, Statistics, 2007, University of Michigan

 Emerging wireless communication technologies have posed numerous challenges in the efficient and robust design of wireless networks, in particular the efficient use of scarce resources,… (more)

Subjects/Keywords: Algorithms; Communication Networks; Competitive Analysis; Games; Guessing; Online; Probability; Resource Allocation; Sequential; Stochastic Control; Strategies; Wireless Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, N. B. (2007). Sequential resource allocation in communication networks: Guessing games, strategies, and online algorithms. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/126893

Chicago Manual of Style (16th Edition):

Chang, Nicholas B. “Sequential resource allocation in communication networks: Guessing games, strategies, and online algorithms.” 2007. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/126893.

MLA Handbook (7th Edition):

Chang, Nicholas B. “Sequential resource allocation in communication networks: Guessing games, strategies, and online algorithms.” 2007. Web. 27 Nov 2020.

Vancouver:

Chang NB. Sequential resource allocation in communication networks: Guessing games, strategies, and online algorithms. [Internet] [Doctoral dissertation]. University of Michigan; 2007. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/126893.

Council of Science Editors:

Chang NB. Sequential resource allocation in communication networks: Guessing games, strategies, and online algorithms. [Doctoral Dissertation]. University of Michigan; 2007. Available from: http://hdl.handle.net/2027.42/126893


University of Michigan

15. Duarte-Melo, Enrique Jose. Field -gathering wireless sensor networks: Throughput scaling laws and network lifetime.

Degree: PhD, Electrical engineering, 2005, University of Michigan

 This thesis attempts to understand certain performance limits of field-gathering wireless sensor networks, and to use such understanding toward the energy efficient design of these… (more)

Subjects/Keywords: Field-gathering; Laws; Lifetime; Network; Scaling; Throughput; Wireless Sensor Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Duarte-Melo, E. J. (2005). Field -gathering wireless sensor networks: Throughput scaling laws and network lifetime. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/125069

Chicago Manual of Style (16th Edition):

Duarte-Melo, Enrique Jose. “Field -gathering wireless sensor networks: Throughput scaling laws and network lifetime.” 2005. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/125069.

MLA Handbook (7th Edition):

Duarte-Melo, Enrique Jose. “Field -gathering wireless sensor networks: Throughput scaling laws and network lifetime.” 2005. Web. 27 Nov 2020.

Vancouver:

Duarte-Melo EJ. Field -gathering wireless sensor networks: Throughput scaling laws and network lifetime. [Internet] [Doctoral dissertation]. University of Michigan; 2005. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/125069.

Council of Science Editors:

Duarte-Melo EJ. Field -gathering wireless sensor networks: Throughput scaling laws and network lifetime. [Doctoral Dissertation]. University of Michigan; 2005. Available from: http://hdl.handle.net/2027.42/125069

16. Sheng, Shang-Pin. Incentivizing Secondary Spectrum Trading: A Profit Perspective.

Degree: PhD, Electrical Engineering: Systems, 2014, University of Michigan

 With the ever-increasingly connected mobile devices, demand for mobile broadband service is likely to outstrip spectrum capacity in the near-term. Without action to address this… (more)

Subjects/Keywords: Secondary Spectrum Market; Contract Design; Incentives; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sheng, S. (2014). Incentivizing Secondary Spectrum Trading: A Profit Perspective. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/109017

Chicago Manual of Style (16th Edition):

Sheng, Shang-Pin. “Incentivizing Secondary Spectrum Trading: A Profit Perspective.” 2014. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/109017.

MLA Handbook (7th Edition):

Sheng, Shang-Pin. “Incentivizing Secondary Spectrum Trading: A Profit Perspective.” 2014. Web. 27 Nov 2020.

Vancouver:

Sheng S. Incentivizing Secondary Spectrum Trading: A Profit Perspective. [Internet] [Doctoral dissertation]. University of Michigan; 2014. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/109017.

Council of Science Editors:

Sheng S. Incentivizing Secondary Spectrum Trading: A Profit Perspective. [Doctoral Dissertation]. University of Michigan; 2014. Available from: http://hdl.handle.net/2027.42/109017

17. Shuman, David I. From Sleeping to Stockpiling: Energy Conservation via Stochastic Scheduling in Wireless Networks.

Degree: PhD, Electrical Engineering: Systems, 2010, University of Michigan

 Motivated by the need to conserve energy in wireless networks, we study three stochastic dynamic scheduling problems. In the first problem, we consider a wireless… (more)

Subjects/Keywords: Energy Conservation; Wireless Networks; Resource Allocation; Opportunistic Scheduling; Markov Decision Process; Inventory Theory; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shuman, D. I. (2010). From Sleeping to Stockpiling: Energy Conservation via Stochastic Scheduling in Wireless Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/77839

Chicago Manual of Style (16th Edition):

Shuman, David I. “From Sleeping to Stockpiling: Energy Conservation via Stochastic Scheduling in Wireless Networks.” 2010. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/77839.

MLA Handbook (7th Edition):

Shuman, David I. “From Sleeping to Stockpiling: Energy Conservation via Stochastic Scheduling in Wireless Networks.” 2010. Web. 27 Nov 2020.

Vancouver:

Shuman DI. From Sleeping to Stockpiling: Energy Conservation via Stochastic Scheduling in Wireless Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2010. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/77839.

Council of Science Editors:

Shuman DI. From Sleeping to Stockpiling: Energy Conservation via Stochastic Scheduling in Wireless Networks. [Doctoral Dissertation]. University of Michigan; 2010. Available from: http://hdl.handle.net/2027.42/77839

18. Wang, Qingsi. Optimal Channel-Switching Strategies in Multi-channel Wireless Networks.

Degree: PhD, Electrical Engineering: Systems, 2014, University of Michigan

 The dual nature of scarcity and under-utilization of spectrum resources, as well as recent advances in software-defined radio, led to extensive study on the design… (more)

Subjects/Keywords: Channel Allocation; Multi-channel Communication System; Online Learning; Throughput Optimality; Electrical Engineering; Engineering

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Q. (2014). Optimal Channel-Switching Strategies in Multi-channel Wireless Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/108949

Chicago Manual of Style (16th Edition):

Wang, Qingsi. “Optimal Channel-Switching Strategies in Multi-channel Wireless Networks.” 2014. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/108949.

MLA Handbook (7th Edition):

Wang, Qingsi. “Optimal Channel-Switching Strategies in Multi-channel Wireless Networks.” 2014. Web. 27 Nov 2020.

Vancouver:

Wang Q. Optimal Channel-Switching Strategies in Multi-channel Wireless Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2014. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/108949.

Council of Science Editors:

Wang Q. Optimal Channel-Switching Strategies in Multi-channel Wireless Networks. [Doctoral Dissertation]. University of Michigan; 2014. Available from: http://hdl.handle.net/2027.42/108949


University of Michigan

19. Ehsan, Navid. Optimal resource allocation and performance modeling in wireless networks in the presence of delay or fading.

Degree: PhD, Electrical engineering, 2005, University of Michigan

 This thesis addresses a number of problems in optimal resource allocation and performance analysis in wireless networks characterized by delay and fading. In the first… (more)

Subjects/Keywords: Delay; Fading; Modeling; Optimal; Performance; Presence; Resource Allocation; Wireless Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ehsan, N. (2005). Optimal resource allocation and performance modeling in wireless networks in the presence of delay or fading. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/125350

Chicago Manual of Style (16th Edition):

Ehsan, Navid. “Optimal resource allocation and performance modeling in wireless networks in the presence of delay or fading.” 2005. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/125350.

MLA Handbook (7th Edition):

Ehsan, Navid. “Optimal resource allocation and performance modeling in wireless networks in the presence of delay or fading.” 2005. Web. 27 Nov 2020.

Vancouver:

Ehsan N. Optimal resource allocation and performance modeling in wireless networks in the presence of delay or fading. [Internet] [Doctoral dissertation]. University of Michigan; 2005. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/125350.

Council of Science Editors:

Ehsan N. Optimal resource allocation and performance modeling in wireless networks in the presence of delay or fading. [Doctoral Dissertation]. University of Michigan; 2005. Available from: http://hdl.handle.net/2027.42/125350


University of Michigan

20. Hsin, Chih-fan. Reliable and energy-efficient wireless sensor networks for surveillance and monitoring.

Degree: PhD, Electrical engineering, 2006, University of Michigan

 We consider a class of surveillance and monitoring wireless sensor networks, where sensors are highly energy constrained. The goal is to explore the design space… (more)

Subjects/Keywords: Energy-efficient; Monitoring; Reliable; Surveillance; Wireless Sensor Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsin, C. (2006). Reliable and energy-efficient wireless sensor networks for surveillance and monitoring. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/125666

Chicago Manual of Style (16th Edition):

Hsin, Chih-fan. “Reliable and energy-efficient wireless sensor networks for surveillance and monitoring.” 2006. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/125666.

MLA Handbook (7th Edition):

Hsin, Chih-fan. “Reliable and energy-efficient wireless sensor networks for surveillance and monitoring.” 2006. Web. 27 Nov 2020.

Vancouver:

Hsin C. Reliable and energy-efficient wireless sensor networks for surveillance and monitoring. [Internet] [Doctoral dissertation]. University of Michigan; 2006. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/125666.

Council of Science Editors:

Hsin C. Reliable and energy-efficient wireless sensor networks for surveillance and monitoring. [Doctoral Dissertation]. University of Michigan; 2006. Available from: http://hdl.handle.net/2027.42/125666

21. Chai, Eugene Songyou. Rethinking Wireless: Building Next-Generation Networks.

Degree: PhD, Computer Science and Engineering, 2013, University of Michigan

 We face a growing challenge to the design, deployment and management of wireless networks that largely stems from the need to operate in an increasingly… (more)

Subjects/Keywords: Wireless Networks; Software-defined Radios; Spectrum Management; Network Mimo; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chai, E. S. (2013). Rethinking Wireless: Building Next-Generation Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/102341

Chicago Manual of Style (16th Edition):

Chai, Eugene Songyou. “Rethinking Wireless: Building Next-Generation Networks.” 2013. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/102341.

MLA Handbook (7th Edition):

Chai, Eugene Songyou. “Rethinking Wireless: Building Next-Generation Networks.” 2013. Web. 27 Nov 2020.

Vancouver:

Chai ES. Rethinking Wireless: Building Next-Generation Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2013. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/102341.

Council of Science Editors:

Chai ES. Rethinking Wireless: Building Next-Generation Networks. [Doctoral Dissertation]. University of Michigan; 2013. Available from: http://hdl.handle.net/2027.42/102341

22. Higgins, Brett Douglas. Balancing Interactive Performance and Budgeted Resources in Mobile Computing.

Degree: PhD, Computer Science and Engineering, 2014, University of Michigan

 In this dissertation, we explore the various limited resources involved in mobile applications  – battery energy, cellular data usage, and, critically, user attention  – and… (more)

Subjects/Keywords: Balancing Interactive Performance and Budgeted Resources in Mobile Computing; Mobile Computing; Interactive Performance; Budgeted Resources; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Higgins, B. D. (2014). Balancing Interactive Performance and Budgeted Resources in Mobile Computing. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/108956

Chicago Manual of Style (16th Edition):

Higgins, Brett Douglas. “Balancing Interactive Performance and Budgeted Resources in Mobile Computing.” 2014. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/108956.

MLA Handbook (7th Edition):

Higgins, Brett Douglas. “Balancing Interactive Performance and Budgeted Resources in Mobile Computing.” 2014. Web. 27 Nov 2020.

Vancouver:

Higgins BD. Balancing Interactive Performance and Budgeted Resources in Mobile Computing. [Internet] [Doctoral dissertation]. University of Michigan; 2014. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/108956.

Council of Science Editors:

Higgins BD. Balancing Interactive Performance and Budgeted Resources in Mobile Computing. [Doctoral Dissertation]. University of Michigan; 2014. Available from: http://hdl.handle.net/2027.42/108956

23. Choi, Yoo Jin. Performance Scalability in Communication Networks.

Degree: PhD, Electrical Engineering: Systems, 2012, University of Michigan

 Performance scalability is an essential problem in modern communication networks that expand rapidly. In this dissertation, we consider three models of large-scale communication networks with… (more)

Subjects/Keywords: Performance Scalability; Finite-buffer Networks; Asymptotic Properties; Scaling Laws; Electrical Engineering; Engineering

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Choi, Y. J. (2012). Performance Scalability in Communication Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/91568

Chicago Manual of Style (16th Edition):

Choi, Yoo Jin. “Performance Scalability in Communication Networks.” 2012. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/91568.

MLA Handbook (7th Edition):

Choi, Yoo Jin. “Performance Scalability in Communication Networks.” 2012. Web. 27 Nov 2020.

Vancouver:

Choi YJ. Performance Scalability in Communication Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2012. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/91568.

Council of Science Editors:

Choi YJ. Performance Scalability in Communication Networks. [Doctoral Dissertation]. University of Michigan; 2012. Available from: http://hdl.handle.net/2027.42/91568

24. Abdel Khalek, Rawan. Achieving Functional Correctness in Large Interconnect Systems.

Degree: PhD, Computer Science and Engineering, 2015, University of Michigan

 In today's semi-conductor industry, large chip-multiprocessors and systems-on-chip are being developed, integrating a large number of components on a single chip. The sheer size of… (more)

Subjects/Keywords: Functional verification; On-chip interconnects; Networks-on-chip; Emulation; Post-silicon Validation; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdel Khalek, R. (2015). Achieving Functional Correctness in Large Interconnect Systems. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/116741

Chicago Manual of Style (16th Edition):

Abdel Khalek, Rawan. “Achieving Functional Correctness in Large Interconnect Systems.” 2015. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/116741.

MLA Handbook (7th Edition):

Abdel Khalek, Rawan. “Achieving Functional Correctness in Large Interconnect Systems.” 2015. Web. 27 Nov 2020.

Vancouver:

Abdel Khalek R. Achieving Functional Correctness in Large Interconnect Systems. [Internet] [Doctoral dissertation]. University of Michigan; 2015. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/116741.

Council of Science Editors:

Abdel Khalek R. Achieving Functional Correctness in Large Interconnect Systems. [Doctoral Dissertation]. University of Michigan; 2015. Available from: http://hdl.handle.net/2027.42/116741

25. Nicholson, Anthony J. Systems-Level Support for Mobile Device Connectivity.

Degree: PhD, Computer Science & Engineering, 2008, University of Michigan

 The rise of handheld computing devices has inspired a great deal of research aimed at addressing the unique problems posed by their mobile, "always-on" nature.… (more)

Subjects/Keywords: Mobile Computing; Wireless Networking; Derivative of Connectivity; Connectivity Forecast; Juggler; BreadCrumbs; Engineering

…reference server (RS) was a dedicated machine at the University of Michigan, directly… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nicholson, A. J. (2008). Systems-Level Support for Mobile Device Connectivity. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/61718

Chicago Manual of Style (16th Edition):

Nicholson, Anthony J. “Systems-Level Support for Mobile Device Connectivity.” 2008. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/61718.

MLA Handbook (7th Edition):

Nicholson, Anthony J. “Systems-Level Support for Mobile Device Connectivity.” 2008. Web. 27 Nov 2020.

Vancouver:

Nicholson AJ. Systems-Level Support for Mobile Device Connectivity. [Internet] [Doctoral dissertation]. University of Michigan; 2008. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/61718.

Council of Science Editors:

Nicholson AJ. Systems-Level Support for Mobile Device Connectivity. [Doctoral Dissertation]. University of Michigan; 2008. Available from: http://hdl.handle.net/2027.42/61718

26. Lo, Chun. Efficient Sensor Fault Diagnosis in Wireless Sensor Networks.

Degree: PhD, Electrical Engineering: Systems, 2014, University of Michigan

 Nodes in wireless sensor networks (WSN) are prone to faults due to their inexpensive components and due to the harsh environments in which they are… (more)

Subjects/Keywords: Fault Detection; Wireless Sensor Network; Group Testing; Civil and Environmental Engineering; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lo, C. (2014). Efficient Sensor Fault Diagnosis in Wireless Sensor Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/107242

Chicago Manual of Style (16th Edition):

Lo, Chun. “Efficient Sensor Fault Diagnosis in Wireless Sensor Networks.” 2014. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/107242.

MLA Handbook (7th Edition):

Lo, Chun. “Efficient Sensor Fault Diagnosis in Wireless Sensor Networks.” 2014. Web. 27 Nov 2020.

Vancouver:

Lo C. Efficient Sensor Fault Diagnosis in Wireless Sensor Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2014. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/107242.

Council of Science Editors:

Lo C. Efficient Sensor Fault Diagnosis in Wireless Sensor Networks. [Doctoral Dissertation]. University of Michigan; 2014. Available from: http://hdl.handle.net/2027.42/107242

27. Zhou, Hao. Two Applications of Intelligent Transportation System.

Degree: PhD, Industrial & Operations Engineering, 2013, University of Michigan

 We consider here two essential technologies of Intelligent Transportation System (ITS): Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication. In Chapter II, we present a method to… (more)

Subjects/Keywords: ITS; Platoon Control; Combinatorial Auction; Industrial and Operations Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhou, H. (2013). Two Applications of Intelligent Transportation System. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/102386

Chicago Manual of Style (16th Edition):

Zhou, Hao. “Two Applications of Intelligent Transportation System.” 2013. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/102386.

MLA Handbook (7th Edition):

Zhou, Hao. “Two Applications of Intelligent Transportation System.” 2013. Web. 27 Nov 2020.

Vancouver:

Zhou H. Two Applications of Intelligent Transportation System. [Internet] [Doctoral dissertation]. University of Michigan; 2013. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/102386.

Council of Science Editors:

Zhou H. Two Applications of Intelligent Transportation System. [Doctoral Dissertation]. University of Michigan; 2013. Available from: http://hdl.handle.net/2027.42/102386

28. Josan, Awlok S. Throughput Scaling and Data Gathering in Wireless Networks.

Degree: PhD, Electrical Engineering: Systems, 2011, University of Michigan

 This dissertation investigates three problems associated with wireless networks. First, throughput scaling in extended random access communication networks is examined. In these networks, the number… (more)

Subjects/Keywords: Throughput Scaling; Reliability; Sensor Placement; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Josan, A. S. (2011). Throughput Scaling and Data Gathering in Wireless Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/86467

Chicago Manual of Style (16th Edition):

Josan, Awlok S. “Throughput Scaling and Data Gathering in Wireless Networks.” 2011. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/86467.

MLA Handbook (7th Edition):

Josan, Awlok S. “Throughput Scaling and Data Gathering in Wireless Networks.” 2011. Web. 27 Nov 2020.

Vancouver:

Josan AS. Throughput Scaling and Data Gathering in Wireless Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2011. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/86467.

Council of Science Editors:

Josan AS. Throughput Scaling and Data Gathering in Wireless Networks. [Doctoral Dissertation]. University of Michigan; 2011. Available from: http://hdl.handle.net/2027.42/86467

29. Kim, Sanghoon. Cross Layer Analysis and Optimization of Relay Networks.

Degree: PhD, Electrical Engineering: Systems, 2013, University of Michigan

 Recently, there has been significant interest in relay networks. Due to the wireless signal power attenuation with transmission distance, using relays in a wireless network… (more)

Subjects/Keywords: Relay Networks; Cooperative Communication; PHY/MAC Cross Layer Analysis and Optimization; MAC Protocol; Energy Efficient Communication; Distributed Wireless Networks; Electrical Engineering; Engineering

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, S. (2013). Cross Layer Analysis and Optimization of Relay Networks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/102387

Chicago Manual of Style (16th Edition):

Kim, Sanghoon. “Cross Layer Analysis and Optimization of Relay Networks.” 2013. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/102387.

MLA Handbook (7th Edition):

Kim, Sanghoon. “Cross Layer Analysis and Optimization of Relay Networks.” 2013. Web. 27 Nov 2020.

Vancouver:

Kim S. Cross Layer Analysis and Optimization of Relay Networks. [Internet] [Doctoral dissertation]. University of Michigan; 2013. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/102387.

Council of Science Editors:

Kim S. Cross Layer Analysis and Optimization of Relay Networks. [Doctoral Dissertation]. University of Michigan; 2013. Available from: http://hdl.handle.net/2027.42/102387

30. Sarabi, Armin. Quantifying Security: Methods, Challenges and Applications.

Degree: PhD, Electrical Engineering: Systems, 2018, University of Michigan

 Data and cyber security, whether defined from the point of view of corporations, individuals, or Internet hosts/networks, have been studied from a variety of perspectives,… (more)

Subjects/Keywords: Machine Learning and Quantitaive Analysis for Security; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sarabi, A. (2018). Quantifying Security: Methods, Challenges and Applications. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/144033

Chicago Manual of Style (16th Edition):

Sarabi, Armin. “Quantifying Security: Methods, Challenges and Applications.” 2018. Doctoral Dissertation, University of Michigan. Accessed November 27, 2020. http://hdl.handle.net/2027.42/144033.

MLA Handbook (7th Edition):

Sarabi, Armin. “Quantifying Security: Methods, Challenges and Applications.” 2018. Web. 27 Nov 2020.

Vancouver:

Sarabi A. Quantifying Security: Methods, Challenges and Applications. [Internet] [Doctoral dissertation]. University of Michigan; 2018. [cited 2020 Nov 27]. Available from: http://hdl.handle.net/2027.42/144033.

Council of Science Editors:

Sarabi A. Quantifying Security: Methods, Challenges and Applications. [Doctoral Dissertation]. University of Michigan; 2018. Available from: http://hdl.handle.net/2027.42/144033

[1] [2]

.