Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Texas – Austin" +contributor:("Gouda, Mohamed"). Showing records 1 – 22 of 22 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Texas – Austin

1. -6848-2988. Exploiting leakage in privacy-protecting systems.

Degree: Computer Sciences, 2016, University of Texas – Austin

 Conventional systems store data unencrypted. This allows them to easily access and manipulate their data. However, by not protecting their data, these systems are at… (more)

Subjects/Keywords: Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-6848-2988. (2016). Exploiting leakage in privacy-protecting systems. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Web. 16 Jun 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Internet] [Thesis]. University of Texas – Austin; 2016. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

2. Yun, Sangki. Towards accurate object tracking using acoustic signal.

Degree: Computer Sciences, 2016, University of Texas – Austin

 We are living in the era of mobile computing where people are surrounded by many smart devices such as smartphone, smart watch, smart TV, and… (more)

Subjects/Keywords: Mobile systems; Ubiquitous computing; Virtual reality; Acoustic sensing; Human-computer interaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yun, S. (2016). Towards accurate object tracking using acoustic signal. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/68598

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yun, Sangki. “Towards accurate object tracking using acoustic signal.” 2016. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/68598.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yun, Sangki. “Towards accurate object tracking using acoustic signal.” 2016. Web. 16 Jun 2019.

Vancouver:

Yun S. Towards accurate object tracking using acoustic signal. [Internet] [Thesis]. University of Texas – Austin; 2016. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/68598.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yun S. Towards accurate object tracking using acoustic signal. [Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/68598

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

3. Aiyer, Amitanand S. Alternative implementations for storage and communication abstractions in distributed systems.

Degree: Computer Sciences, 2010, University of Texas – Austin

 Abstractions are widely used in building reliable distributed systems as they simplifies the task of building complex systems and aid in reasoning about them. Implementing… (more)

Subjects/Keywords: Distributed systems; Abstractions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aiyer, A. S. (2010). Alternative implementations for storage and communication abstractions in distributed systems. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-08-1918

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aiyer, Amitanand S. “Alternative implementations for storage and communication abstractions in distributed systems.” 2010. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/ETD-UT-2010-08-1918.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aiyer, Amitanand S. “Alternative implementations for storage and communication abstractions in distributed systems.” 2010. Web. 16 Jun 2019.

Vancouver:

Aiyer AS. Alternative implementations for storage and communication abstractions in distributed systems. [Internet] [Thesis]. University of Texas – Austin; 2010. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1918.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aiyer AS. Alternative implementations for storage and communication abstractions in distributed systems. [Thesis]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1918

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

4. Khan, Muhammad Owais. Improving the performance and efficiency of wireless networks using rate adaptation.

Degree: Electrical and Computer Engineering, 2015, University of Texas – Austin

 Recent years have seen a staggering increase in the deployment and utilization of wireless networks. More and more devices are being equipped with Wireless LAN… (more)

Subjects/Keywords: Rate adaptation; Wireless networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, M. O. (2015). Improving the performance and efficiency of wireless networks using rate adaptation. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/33497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Muhammad Owais. “Improving the performance and efficiency of wireless networks using rate adaptation.” 2015. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/33497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Muhammad Owais. “Improving the performance and efficiency of wireless networks using rate adaptation.” 2015. Web. 16 Jun 2019.

Vancouver:

Khan MO. Improving the performance and efficiency of wireless networks using rate adaptation. [Internet] [Thesis]. University of Texas – Austin; 2015. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/33497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan MO. Improving the performance and efficiency of wireless networks using rate adaptation. [Thesis]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/33497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

5. -1959-502X. RT-WiFi networks for wireless cyber-physical applications.

Degree: Computer Sciences, 2017, University of Texas – Austin

 Applying wireless technologies to cyber-physical systems (CPSs) has received significant attention owing to their great advantages in enhanced system mobility and reduced deployment and maintenance… (more)

Subjects/Keywords: Real-time wireless network; Wireless local area network; Cyber-physical systems; TDMA; Scheduling; Jitter-free scheduling; Network management; Co-channel interference; Channel assignment; Networked control system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-1959-502X. (2017). RT-WiFi networks for wireless cyber-physical applications. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/61530

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

-1959-502X. “RT-WiFi networks for wireless cyber-physical applications.” 2017. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/61530.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

-1959-502X. “RT-WiFi networks for wireless cyber-physical applications.” 2017. Web. 16 Jun 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-1959-502X. RT-WiFi networks for wireless cyber-physical applications. [Internet] [Thesis]. University of Texas – Austin; 2017. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/61530.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

-1959-502X. RT-WiFi networks for wireless cyber-physical applications. [Thesis]. University of Texas – Austin; 2017. Available from: http://hdl.handle.net/2152/61530

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

6. Wei, Yi-Hung. Real-time communication platfrom for wireless cyber-physical applications.

Degree: Computer Sciences, 2016, University of Texas – Austin

 A Cyber-Physical System (CPS) is a physical system whose operations are monitored, coordinated, and controlled by computation and communication processes. Applying wireless technologies to cyber-physical… (more)

Subjects/Keywords: Cyber-physical systems; Real-time systems; Real-time wireless communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wei, Y. (2016). Real-time communication platfrom for wireless cyber-physical applications. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/43585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wei, Yi-Hung. “Real-time communication platfrom for wireless cyber-physical applications.” 2016. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/43585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wei, Yi-Hung. “Real-time communication platfrom for wireless cyber-physical applications.” 2016. Web. 16 Jun 2019.

Vancouver:

Wei Y. Real-time communication platfrom for wireless cyber-physical applications. [Internet] [Thesis]. University of Texas – Austin; 2016. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/43585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wei Y. Real-time communication platfrom for wireless cyber-physical applications. [Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/43585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

7. Ali, Muqeet. A second generation of nonrepudiation protocols.

Degree: Computer Sciences, 2017, University of Texas – Austin

 A non-repudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text… (more)

Subjects/Keywords: Non-repudiation; Trusted party

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ali, M. (2017). A second generation of nonrepudiation protocols. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/61906

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ali, Muqeet. “A second generation of nonrepudiation protocols.” 2017. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/61906.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ali, Muqeet. “A second generation of nonrepudiation protocols.” 2017. Web. 16 Jun 2019.

Vancouver:

Ali M. A second generation of nonrepudiation protocols. [Internet] [Thesis]. University of Texas – Austin; 2017. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/61906.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ali M. A second generation of nonrepudiation protocols. [Thesis]. University of Texas – Austin; 2017. Available from: http://hdl.handle.net/2152/61906

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

8. -2779-6876. Secure protocols for contactless credit cards and electronic wallets.

Degree: Computer Sciences, 2018, University of Texas – Austin

 The contactless credit card protocol in use today is insecure. The credit card industry has chosen to use the NFC channel for contactless transactions. However,… (more)

Subjects/Keywords: Security; Privacy; Credit cards; Payments; Transactions; Nfc; Rfid; Proximity; Electronic wallet; Unlinkability; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-2779-6876. (2018). Secure protocols for contactless credit cards and electronic wallets. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63350

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

-2779-6876. “Secure protocols for contactless credit cards and electronic wallets.” 2018. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/63350.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

-2779-6876. “Secure protocols for contactless credit cards and electronic wallets.” 2018. Web. 16 Jun 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-2779-6876. Secure protocols for contactless credit cards and electronic wallets. [Internet] [Thesis]. University of Texas – Austin; 2018. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/63350.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

-2779-6876. Secure protocols for contactless credit cards and electronic wallets. [Thesis]. University of Texas – Austin; 2018. Available from: http://hdl.handle.net/2152/63350

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

9. Song, Jianping. Constraint-based real-time scheduling for process control.

Degree: Computer Sciences, 2010, University of Texas – Austin

 This research addresses real-time task scheduling in industrial process control. It includes a constraint-based scheduler which is based on MSP.RTL, a tool for real-time multiprocessor… (more)

Subjects/Keywords: Multiprocessor scheduling; Industrial process control; MSP.RTL; Fieldbus; WirelessHART; Wireless sensor networks; PID; PIDPlus

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, J. (2010). Constraint-based real-time scheduling for process control. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-05-1102

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Song, Jianping. “Constraint-based real-time scheduling for process control.” 2010. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/ETD-UT-2010-05-1102.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Song, Jianping. “Constraint-based real-time scheduling for process control.” 2010. Web. 16 Jun 2019.

Vancouver:

Song J. Constraint-based real-time scheduling for process control. [Internet] [Thesis]. University of Texas – Austin; 2010. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-05-1102.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Song J. Constraint-based real-time scheduling for process control. [Thesis]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-05-1102

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

10. Cho, Tae Won, 1978-. Enabling information-centric networking : architecture, protocols, and applications.

Degree: Computer Sciences, 2010, University of Texas – Austin

 As the Internet is becoming information-centric, network services increasingly demand scalable and efficient communication of information between a multitude of information producers and large groups… (more)

Subjects/Keywords: Information-centric networking; Network protocols; Social networks; Multicast; Networks; Proximity measures; Link prediction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, Tae Won, 1. (2010). Enabling information-centric networking : architecture, protocols, and applications. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-08-1765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cho, Tae Won, 1978-. “Enabling information-centric networking : architecture, protocols, and applications.” 2010. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/ETD-UT-2010-08-1765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cho, Tae Won, 1978-. “Enabling information-centric networking : architecture, protocols, and applications.” 2010. Web. 16 Jun 2019.

Vancouver:

Cho, Tae Won 1. Enabling information-centric networking : architecture, protocols, and applications. [Internet] [Thesis]. University of Texas – Austin; 2010. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cho, Tae Won 1. Enabling information-centric networking : architecture, protocols, and applications. [Thesis]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

11. Yang, Hongkun. Efficient verification of packet networks.

Degree: Computer Sciences, 2015, University of Texas – Austin

 Network management will benefit from automated tools based upon formal methods. In these tools, the algorithm for computing reachability is the core algorithm for verifying… (more)

Subjects/Keywords: Network verification; Formal methods; Automated tools

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, H. (2015). Efficient verification of packet networks. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/33271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yang, Hongkun. “Efficient verification of packet networks.” 2015. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/33271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yang, Hongkun. “Efficient verification of packet networks.” 2015. Web. 16 Jun 2019.

Vancouver:

Yang H. Efficient verification of packet networks. [Internet] [Thesis]. University of Texas – Austin; 2015. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/33271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yang H. Efficient verification of packet networks. [Thesis]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/33271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Jung, Eunjin. Dispersability and vulnerability analysis certificate systems.

Degree: Computer Sciences, 2006, University of Texas – Austin

 A certificate is a way to distribute public keys of users in a distributed system. For example, in the current Internet, certificates are heavily used… (more)

Subjects/Keywords: Internet – Security measures

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jung, E. (2006). Dispersability and vulnerability analysis certificate systems. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/2730

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jung, Eunjin. “Dispersability and vulnerability analysis certificate systems.” 2006. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/2730.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jung, Eunjin. “Dispersability and vulnerability analysis certificate systems.” 2006. Web. 16 Jun 2019.

Vancouver:

Jung E. Dispersability and vulnerability analysis certificate systems. [Internet] [Thesis]. University of Texas – Austin; 2006. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/2730.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jung E. Dispersability and vulnerability analysis certificate systems. [Thesis]. University of Texas – Austin; 2006. Available from: http://hdl.handle.net/2152/2730

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

13. Liu, Xiang-Yang Alexander. A theory for the design and analysis of firewalls.

Degree: Computer Sciences, 2006, University of Texas – Austin

Subjects/Keywords: Firewalls (Computer security)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, X. A. (2006). A theory for the design and analysis of firewalls. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/2765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Xiang-Yang Alexander. “A theory for the design and analysis of firewalls.” 2006. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/2765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Xiang-Yang Alexander. “A theory for the design and analysis of firewalls.” 2006. Web. 16 Jun 2019.

Vancouver:

Liu XA. A theory for the design and analysis of firewalls. [Internet] [Thesis]. University of Texas – Austin; 2006. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/2765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu XA. A theory for the design and analysis of firewalls. [Thesis]. University of Texas – Austin; 2006. Available from: http://hdl.handle.net/2152/2765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

14. Choi, Young-ri. Design and analysis of self-stabilizing sensor network protocols.

Degree: Computer Sciences, 2007, University of Texas – Austin

 A sensor is a battery-operated small computer with an antenna and a sensing board that can sense magnetism, sound, heat, etc. Sensors in a network… (more)

Subjects/Keywords: Sensor networks; Computer network protocols – Design; Self-stabilization (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Choi, Y. (2007). Design and analysis of self-stabilizing sensor network protocols. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/3168

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Choi, Young-ri. “Design and analysis of self-stabilizing sensor network protocols.” 2007. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/3168.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Choi, Young-ri. “Design and analysis of self-stabilizing sensor network protocols.” 2007. Web. 16 Jun 2019.

Vancouver:

Choi Y. Design and analysis of self-stabilizing sensor network protocols. [Internet] [Thesis]. University of Texas – Austin; 2007. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/3168.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Choi Y. Design and analysis of self-stabilizing sensor network protocols. [Thesis]. University of Texas – Austin; 2007. Available from: http://hdl.handle.net/2152/3168

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

15. Steves, Douglas Howard. Contract in electronic commerce.

Degree: Computer Sciences, 2005, University of Texas – Austin

Subjects/Keywords: Forum (Computer system); Electronic commerce; Contracts

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steves, D. H. (2005). Contract in electronic commerce. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/2320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Steves, Douglas Howard. “Contract in electronic commerce.” 2005. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/2320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Steves, Douglas Howard. “Contract in electronic commerce.” 2005. Web. 16 Jun 2019.

Vancouver:

Steves DH. Contract in electronic commerce. [Internet] [Thesis]. University of Texas – Austin; 2005. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/2320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Steves DH. Contract in electronic commerce. [Thesis]. University of Texas – Austin; 2005. Available from: http://hdl.handle.net/2152/2320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

16. McGuire, Tommy Marcus. Correct implementation of network protocols.

Degree: Computer Sciences, 2004, University of Texas – Austin

 A number of issues combine to make network protocol development signif- icantly more difficult than other areas of computer programming: problems with time, concurrency, and… (more)

Subjects/Keywords: Computer network protocols; Compilers (Computer programs)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McGuire, T. M. (2004). Correct implementation of network protocols. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/1140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McGuire, Tommy Marcus. “Correct implementation of network protocols.” 2004. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/1140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McGuire, Tommy Marcus. “Correct implementation of network protocols.” 2004. Web. 16 Jun 2019.

Vancouver:

McGuire TM. Correct implementation of network protocols. [Internet] [Thesis]. University of Texas – Austin; 2004. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/1140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McGuire TM. Correct implementation of network protocols. [Thesis]. University of Texas – Austin; 2004. Available from: http://hdl.handle.net/2152/1140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

17. Huang, Chin-Tser. Hop integrity: a defense against denial-of-service attacks.

Degree: Computer Sciences, 2003, University of Texas – Austin

 A computer network is said to provide hop integrity iff the following three conditions hold for every pair of adjacent routers p and q in… (more)

Subjects/Keywords: Computer network protocols – Design; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, C. (2003). Hop integrity: a defense against denial-of-service attacks. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Chin-Tser. “Hop integrity: a defense against denial-of-service attacks.” 2003. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Chin-Tser. “Hop integrity: a defense against denial-of-service attacks.” 2003. Web. 16 Jun 2019.

Vancouver:

Huang C. Hop integrity: a defense against denial-of-service attacks. [Internet] [Thesis]. University of Texas – Austin; 2003. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang C. Hop integrity: a defense against denial-of-service attacks. [Thesis]. University of Texas – Austin; 2003. Available from: http://hdl.handle.net/2152/652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Li, Yulin, Ph. D. The diagrammatic specification and automatic generation of geometry subroutines.

Degree: Computer Sciences, 2010, University of Texas – Austin

 Programming has advanced a great deal since the appearance of the stored-program architecture. Through the successive generations of machine codes, assembly languages, high-level languages, and… (more)

Subjects/Keywords: Automatic programming; Code generator; Component reuse; Knowledge representation; Reasoning; Geometry; Diagram; Program synthesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, Yulin, P. D. (2010). The diagrammatic specification and automatic generation of geometry subroutines. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-05-1287

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Yulin, Ph D. “The diagrammatic specification and automatic generation of geometry subroutines.” 2010. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/ETD-UT-2010-05-1287.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Yulin, Ph D. “The diagrammatic specification and automatic generation of geometry subroutines.” 2010. Web. 16 Jun 2019.

Vancouver:

Li, Yulin PD. The diagrammatic specification and automatic generation of geometry subroutines. [Internet] [Thesis]. University of Texas – Austin; 2010. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-05-1287.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li, Yulin PD. The diagrammatic specification and automatic generation of geometry subroutines. [Thesis]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-05-1287

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Bhattacharya, Hrishikesh. On the modular verification and design of firewalls.

Degree: Computer Sciences, 2012, University of Texas – Austin

 Firewalls, packet filters placed at the boundary of a network in order to screen incoming packets of traffic (and discard any undesirable packets), are a… (more)

Subjects/Keywords: Firewalls; First match; Verification; Rule sequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhattacharya, H. (2012). On the modular verification and design of firewalls. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2012-08-5931

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bhattacharya, Hrishikesh. “On the modular verification and design of firewalls.” 2012. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/ETD-UT-2012-08-5931.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bhattacharya, Hrishikesh. “On the modular verification and design of firewalls.” 2012. Web. 16 Jun 2019.

Vancouver:

Bhattacharya H. On the modular verification and design of firewalls. [Internet] [Thesis]. University of Texas – Austin; 2012. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/ETD-UT-2012-08-5931.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bhattacharya H. On the modular verification and design of firewalls. [Thesis]. University of Texas – Austin; 2012. Available from: http://hdl.handle.net/2152/ETD-UT-2012-08-5931

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Choi, Taehwan. Weak and strong authentication in computer networks.

Degree: Computer Sciences, 2012, University of Texas – Austin

 In this dissertation, we design and analyze five authentication protocols that answer to the a firmative the following fi ve questions associated with the authentication… (more)

Subjects/Keywords: Authentication; Authentication protocols; Server authentication; Client authentication; Integrity; HTTP; HTTPS; Password protocol; TLS; Anonymous authentication; Sensor networks; Keying protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Choi, T. (2012). Weak and strong authentication in computer networks. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/19532

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Choi, Taehwan. “Weak and strong authentication in computer networks.” 2012. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/19532.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Choi, Taehwan. “Weak and strong authentication in computer networks.” 2012. Web. 16 Jun 2019.

Vancouver:

Choi T. Weak and strong authentication in computer networks. [Internet] [Thesis]. University of Texas – Austin; 2012. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/19532.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Choi T. Weak and strong authentication in computer networks. [Thesis]. University of Texas – Austin; 2012. Available from: http://hdl.handle.net/2152/19532

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Li, Yan, doctor of computer science. Reliability and security of vector routing protocols.

Degree: Computer Sciences, 2011, University of Texas – Austin

 As the Internet becomes the ubiquitous infrastructure for various applications, demands on the reliability, availability and security of routing protocols in the Internet are becoming… (more)

Subjects/Keywords: Routing protocols; Reliability; Denial of service; IP fast reroute; Failure recovery; Blocking option; Computer security; IP prefix hijacking; Collusion-resistant; Balanced peer lists

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, Yan, d. o. c. s. (2011). Reliability and security of vector routing protocols. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-05-2658

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Yan, doctor of computer science. “Reliability and security of vector routing protocols.” 2011. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/ETD-UT-2011-05-2658.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Yan, doctor of computer science. “Reliability and security of vector routing protocols.” 2011. Web. 16 Jun 2019.

Vancouver:

Li, Yan docs. Reliability and security of vector routing protocols. [Internet] [Thesis]. University of Texas – Austin; 2011. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-05-2658.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li, Yan docs. Reliability and security of vector routing protocols. [Thesis]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-05-2658

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Kim, Seong-Wan. Design of parallel multipliers and dividers in quantum-dot cellular automata.

Degree: Electrical and Computer Engineering, 2011, University of Texas – Austin

 Conventional CMOS (the current dominant technology for VLSI) implemented with ever smaller transistors is expected to encounter serious problems in the near future with the… (more)

Subjects/Keywords: Parallel multipliers; Dividers; Nanotechnology; Quantum-dot cellular automata

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, S. (2011). Design of parallel multipliers and dividers in quantum-dot cellular automata. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-05-2730

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kim, Seong-Wan. “Design of parallel multipliers and dividers in quantum-dot cellular automata.” 2011. Thesis, University of Texas – Austin. Accessed June 16, 2019. http://hdl.handle.net/2152/ETD-UT-2011-05-2730.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kim, Seong-Wan. “Design of parallel multipliers and dividers in quantum-dot cellular automata.” 2011. Web. 16 Jun 2019.

Vancouver:

Kim S. Design of parallel multipliers and dividers in quantum-dot cellular automata. [Internet] [Thesis]. University of Texas – Austin; 2011. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-05-2730.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kim S. Design of parallel multipliers and dividers in quantum-dot cellular automata. [Thesis]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-05-2730

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.