Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Virginia Tech" +contributor:("Clancy, Thomas Charles"). Showing records 1 – 30 of 39 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Virginia Tech

1. Karra, Kiran. Wireless Distributed Computing on the Android Platform.

Degree: MS, Electrical and Computer Engineering, 2012, Virginia Tech

 The last couple of years have seen an explosive growth in smartphone sales. Additionally, the computational power of modern smartphones has been increasing at a… (more)

Subjects/Keywords: android; mesh networks; wireless distributed computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karra, K. (2012). Wireless Distributed Computing on the Android Platform. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/35256

Chicago Manual of Style (16th Edition):

Karra, Kiran. “Wireless Distributed Computing on the Android Platform.” 2012. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/35256.

MLA Handbook (7th Edition):

Karra, Kiran. “Wireless Distributed Computing on the Android Platform.” 2012. Web. 19 Sep 2019.

Vancouver:

Karra K. Wireless Distributed Computing on the Android Platform. [Internet] [Masters thesis]. Virginia Tech; 2012. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/35256.

Council of Science Editors:

Karra K. Wireless Distributed Computing on the Android Platform. [Masters Thesis]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/35256


Virginia Tech

2. Kracht, Matthew Wallace. Real-Time Embedded Software Modeling and Synthesis using Polychronous Data Flow Languages.

Degree: MS, Electrical and Computer Engineering, 2014, Virginia Tech

 As embedded software and platforms become more complicated, many safety properties are left to simulation and testing. MRICDF is a formal polychronous language used to… (more)

Subjects/Keywords: Synchronous Languages; Real-Time Systems; Schedulability Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kracht, M. W. (2014). Real-Time Embedded Software Modeling and Synthesis using Polychronous Data Flow Languages. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/46866

Chicago Manual of Style (16th Edition):

Kracht, Matthew Wallace. “Real-Time Embedded Software Modeling and Synthesis using Polychronous Data Flow Languages.” 2014. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/46866.

MLA Handbook (7th Edition):

Kracht, Matthew Wallace. “Real-Time Embedded Software Modeling and Synthesis using Polychronous Data Flow Languages.” 2014. Web. 19 Sep 2019.

Vancouver:

Kracht MW. Real-Time Embedded Software Modeling and Synthesis using Polychronous Data Flow Languages. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/46866.

Council of Science Editors:

Kracht MW. Real-Time Embedded Software Modeling and Synthesis using Polychronous Data Flow Languages. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/46866


Virginia Tech

3. Kurrle, Rebecca Lynne. Resource Allocation for Smart Phones in 4G LTE-Advanced Carrier Aggregation.

Degree: MS, Electrical and Computer Engineering, 2012, Virginia Tech

 The purpose of this thesis is to explore the concept of resource scheduling and pricing and its relation to carrier aggregation. The first main topic… (more)

Subjects/Keywords: Rate Allocation; 4G LTE-Advanced; Carrier Aggregation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kurrle, R. L. (2012). Resource Allocation for Smart Phones in 4G LTE-Advanced Carrier Aggregation. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49559

Chicago Manual of Style (16th Edition):

Kurrle, Rebecca Lynne. “Resource Allocation for Smart Phones in 4G LTE-Advanced Carrier Aggregation.” 2012. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/49559.

MLA Handbook (7th Edition):

Kurrle, Rebecca Lynne. “Resource Allocation for Smart Phones in 4G LTE-Advanced Carrier Aggregation.” 2012. Web. 19 Sep 2019.

Vancouver:

Kurrle RL. Resource Allocation for Smart Phones in 4G LTE-Advanced Carrier Aggregation. [Internet] [Masters thesis]. Virginia Tech; 2012. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/49559.

Council of Science Editors:

Kurrle RL. Resource Allocation for Smart Phones in 4G LTE-Advanced Carrier Aggregation. [Masters Thesis]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/49559


Virginia Tech

4. Pham, Andrew Minh-Quan. An Implementation of Utility-Based Traffic Shaping on Android Devices.

Degree: MS, Electrical and Computer Engineering, 2014, Virginia Tech

 Long Term Evolution (LTE) was designed to provide fast data rates to replace 3G service for mobile devices. As LTE networks and the user base… (more)

Subjects/Keywords: traffic shaping; LTE; mobile applications; quality of service; Android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pham, A. M. (2014). An Implementation of Utility-Based Traffic Shaping on Android Devices. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49670

Chicago Manual of Style (16th Edition):

Pham, Andrew Minh-Quan. “An Implementation of Utility-Based Traffic Shaping on Android Devices.” 2014. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/49670.

MLA Handbook (7th Edition):

Pham, Andrew Minh-Quan. “An Implementation of Utility-Based Traffic Shaping on Android Devices.” 2014. Web. 19 Sep 2019.

Vancouver:

Pham AM. An Implementation of Utility-Based Traffic Shaping on Android Devices. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/49670.

Council of Science Editors:

Pham AM. An Implementation of Utility-Based Traffic Shaping on Android Devices. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49670


Virginia Tech

5. Sowers, David Albert. Architecture for Issuing DoD Mobile Derived Credentials.

Degree: MS, Electrical and Computer Engineering, 2014, Virginia Tech

 With an increase in performance, dependency and ubiquitousness, the necessity for secure mobile device functionality is rapidly increasing. Authentication of an individual's identity is the… (more)

Subjects/Keywords: Derived Credentials; Public Key Infrastructure; Common Access Card; Department of Defense; x509; Mobile Phone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sowers, D. A. (2014). Architecture for Issuing DoD Mobile Derived Credentials. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/64351

Chicago Manual of Style (16th Edition):

Sowers, David Albert. “Architecture for Issuing DoD Mobile Derived Credentials.” 2014. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/64351.

MLA Handbook (7th Edition):

Sowers, David Albert. “Architecture for Issuing DoD Mobile Derived Credentials.” 2014. Web. 19 Sep 2019.

Vancouver:

Sowers DA. Architecture for Issuing DoD Mobile Derived Credentials. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/64351.

Council of Science Editors:

Sowers DA. Architecture for Issuing DoD Mobile Derived Credentials. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/64351


Virginia Tech

6. Buchholz, Alexander Karl. DPP: Dual Path PKI for Secure Aircraft Data Communication.

Degree: MS, Computer Science, 2013, Virginia Tech

 Through application of modern technology, aviation systems are becoming more automated and are relying less on antiquated air traffic control (ATC) voice systems. Aircraft are… (more)

Subjects/Keywords: Air Traffic Control; ADS-B; PKI; ECC; Certificate Revocation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Buchholz, A. K. (2013). DPP: Dual Path PKI for Secure Aircraft Data Communication. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/20373

Chicago Manual of Style (16th Edition):

Buchholz, Alexander Karl. “DPP: Dual Path PKI for Secure Aircraft Data Communication.” 2013. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/20373.

MLA Handbook (7th Edition):

Buchholz, Alexander Karl. “DPP: Dual Path PKI for Secure Aircraft Data Communication.” 2013. Web. 19 Sep 2019.

Vancouver:

Buchholz AK. DPP: Dual Path PKI for Secure Aircraft Data Communication. [Internet] [Masters thesis]. Virginia Tech; 2013. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/20373.

Council of Science Editors:

Buchholz AK. DPP: Dual Path PKI for Secure Aircraft Data Communication. [Masters Thesis]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/20373


Virginia Tech

7. Chen, Yang. Robust Prediction of Large Spatio-Temporal Datasets.

Degree: MS, Computer Science, 2013, Virginia Tech

 This thesis describes a robust and efficient design of Student-t based Robust Spatio-Temporal Prediction, namely, St-RSTP, to provide estimation based on observations over spatio-temporal neighbors.… (more)

Subjects/Keywords: Robust Prediction; Expectation Propagation; Student's t Model; Bayesian Hierarchical Model; Spatio-Temporal Process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2013). Robust Prediction of Large Spatio-Temporal Datasets. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/23098

Chicago Manual of Style (16th Edition):

Chen, Yang. “Robust Prediction of Large Spatio-Temporal Datasets.” 2013. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/23098.

MLA Handbook (7th Edition):

Chen, Yang. “Robust Prediction of Large Spatio-Temporal Datasets.” 2013. Web. 19 Sep 2019.

Vancouver:

Chen Y. Robust Prediction of Large Spatio-Temporal Datasets. [Internet] [Masters thesis]. Virginia Tech; 2013. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/23098.

Council of Science Editors:

Chen Y. Robust Prediction of Large Spatio-Temporal Datasets. [Masters Thesis]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/23098


Virginia Tech

8. Ma, Zhongmin. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection.

Degree: MS, Electrical and Computer Engineering, 2014, Virginia Tech

 The open source structure of Android applications introduces security vulnerabilities that can be readily exploited by third-party applications. We address certain vulnerabilities at both installation… (more)

Subjects/Keywords: Android; Security; Android Permission Label; Machine Learning Neural Network; Action; Intent; Intent Log; Hidden Markov Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ma, Z. (2014). Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/25238

Chicago Manual of Style (16th Edition):

Ma, Zhongmin. “Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection.” 2014. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/25238.

MLA Handbook (7th Edition):

Ma, Zhongmin. “Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection.” 2014. Web. 19 Sep 2019.

Vancouver:

Ma Z. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/25238.

Council of Science Editors:

Ma Z. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/25238


Virginia Tech

9. Ryland, Kevin Sherwood. Software-Defined Radio Implementation of Two Physical Layer Security Techniques.

Degree: MS, Electrical Engineering, 2018, Virginia Tech

 This thesis discusses the design of two Physical Layer Security (PLS) techniques on Software Defined Radios (SDRs). PLS is a classification of security methods that… (more)

Subjects/Keywords: Physical Layer Security; Software Defined Radio; Alamouti STBC; Artificial Noise; Over-the-Air

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ryland, K. S. (2018). Software-Defined Radio Implementation of Two Physical Layer Security Techniques. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/82055

Chicago Manual of Style (16th Edition):

Ryland, Kevin Sherwood. “Software-Defined Radio Implementation of Two Physical Layer Security Techniques.” 2018. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/82055.

MLA Handbook (7th Edition):

Ryland, Kevin Sherwood. “Software-Defined Radio Implementation of Two Physical Layer Security Techniques.” 2018. Web. 19 Sep 2019.

Vancouver:

Ryland KS. Software-Defined Radio Implementation of Two Physical Layer Security Techniques. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/82055.

Council of Science Editors:

Ryland KS. Software-Defined Radio Implementation of Two Physical Layer Security Techniques. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/82055


Virginia Tech

10. Berges, Paul Martin. Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation.

Degree: MS, Electrical and Computer Engineering, 2019, Virginia Tech

 Traffic Collision Avoidance Systems (TCAS) are safety-critical systems that are deployed on most commercial aircraft in service today. However, TCAS transactions were not designed to… (more)

Subjects/Keywords: Cyber-Physical; Security; TCAS; SSR; SDR

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Berges, P. M. (2019). Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/90165

Chicago Manual of Style (16th Edition):

Berges, Paul Martin. “Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation.” 2019. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/90165.

MLA Handbook (7th Edition):

Berges, Paul Martin. “Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation.” 2019. Web. 19 Sep 2019.

Vancouver:

Berges PM. Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation. [Internet] [Masters thesis]. Virginia Tech; 2019. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/90165.

Council of Science Editors:

Berges PM. Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation. [Masters Thesis]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/90165

11. Tate, Jeremy. Security Weaknesses of the Android Advertising Ecosystem.

Degree: MS, Electrical and Computer Engineering, 2015, Virginia Tech

 Mobile device security is becoming increasingly important as the number of devices that are used continues to grow and has surpassed one billion active devices… (more)

Subjects/Keywords: Android; Cyber Security; Advertising Network

Virginia Tech Arlington Research Center where the tests were conducted. . . . . . . . . . . 70… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tate, J. (2015). Security Weaknesses of the Android Advertising Ecosystem. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/51231

Chicago Manual of Style (16th Edition):

Tate, Jeremy. “Security Weaknesses of the Android Advertising Ecosystem.” 2015. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/51231.

MLA Handbook (7th Edition):

Tate, Jeremy. “Security Weaknesses of the Android Advertising Ecosystem.” 2015. Web. 19 Sep 2019.

Vancouver:

Tate J. Security Weaknesses of the Android Advertising Ecosystem. [Internet] [Masters thesis]. Virginia Tech; 2015. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/51231.

Council of Science Editors:

Tate J. Security Weaknesses of the Android Advertising Ecosystem. [Masters Thesis]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/51231


Virginia Tech

12. Mahal, Jasmin Ara. Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems.

Degree: PhD, Electrical Engineering, 2018, Virginia Tech

 The ever-increasing demand for private and sensitive data transmission over wireless networks has made security a crucial concern in the current and future large-scale, dynamic,… (more)

Subjects/Keywords: Jamming; Anti-jamming; OFDM; OFDMA; SC-FDMA; MISO; Pilot-spoofing; Channel estimation; Multi-carrier Systems; Physical Layer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahal, J. A. (2018). Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83570

Chicago Manual of Style (16th Edition):

Mahal, Jasmin Ara. “Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems.” 2018. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/83570.

MLA Handbook (7th Edition):

Mahal, Jasmin Ara. “Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems.” 2018. Web. 19 Sep 2019.

Vancouver:

Mahal JA. Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/83570.

Council of Science Editors:

Mahal JA. Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83570


Virginia Tech

13. Shahriar, Chowdhury MR. Resilient Waveform Design for OFDM-MIMO Communication Systems.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto'… (more)

Subjects/Keywords: Physical-Layer Security; Communications Security; OFDM; MIMO; Jamming; Antijam; Equalization Attack; Pilot Attack; LTE; WiMAX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahriar, C. M. (2015). Resilient Waveform Design for OFDM-MIMO Communication Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/56973

Chicago Manual of Style (16th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/56973.

MLA Handbook (7th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Web. 19 Sep 2019.

Vancouver:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/56973.

Council of Science Editors:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/56973


Virginia Tech

14. Ghorbanzadeh, Mohammad. Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 This research addresses the concept of radio resource allocation for cellular communications systems operating in congested and contested environments with an emphasis on end-to-end quality… (more)

Subjects/Keywords: Resource Allocation; Radio Resource Blocks; Discrete Optimization; Quality of Service (QoS); Secure Auctions; LTE; Convex Optimization; Radar Spectrum Sharing; Channel Conditions.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghorbanzadeh, M. (2015). Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/64390

Chicago Manual of Style (16th Edition):

Ghorbanzadeh, Mohammad. “Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/64390.

MLA Handbook (7th Edition):

Ghorbanzadeh, Mohammad. “Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments.” 2015. Web. 19 Sep 2019.

Vancouver:

Ghorbanzadeh M. Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/64390.

Council of Science Editors:

Ghorbanzadeh M. Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/64390


Virginia Tech

15. La Pan, Matthew Jonathan. Security Issues for Modern Communications Systems: Fundamental Electronic Warfare Tactics for 4G Systems and Beyond.

Degree: PhD, Electrical and Computer Engineering, 2014, Virginia Tech

 In the modern era of wireless communications, radios are becoming increasingly more cognitive. As the complexity and robustness of friendly communications increases, so do the… (more)

Subjects/Keywords: Wireless Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

La Pan, M. J. (2014). Security Issues for Modern Communications Systems: Fundamental Electronic Warfare Tactics for 4G Systems and Beyond. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/51042

Chicago Manual of Style (16th Edition):

La Pan, Matthew Jonathan. “Security Issues for Modern Communications Systems: Fundamental Electronic Warfare Tactics for 4G Systems and Beyond.” 2014. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/51042.

MLA Handbook (7th Edition):

La Pan, Matthew Jonathan. “Security Issues for Modern Communications Systems: Fundamental Electronic Warfare Tactics for 4G Systems and Beyond.” 2014. Web. 19 Sep 2019.

Vancouver:

La Pan MJ. Security Issues for Modern Communications Systems: Fundamental Electronic Warfare Tactics for 4G Systems and Beyond. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/51042.

Council of Science Editors:

La Pan MJ. Security Issues for Modern Communications Systems: Fundamental Electronic Warfare Tactics for 4G Systems and Beyond. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/51042


Virginia Tech

16. Lerch, Marc Alger. Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments.

Degree: MS, Electrical and Computer Engineering, 2014, Virginia Tech

 As wireless communication mediums develop and Dynamic Spectrum Access (DSA) is implemented as a means to increase capacity on a limited spectrum, the threat of… (more)

Subjects/Keywords: Cognitive Radio; Dynamic Spectrum Access; Decoy-Based Approach

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lerch, M. A. (2014). Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/25842

Chicago Manual of Style (16th Edition):

Lerch, Marc Alger. “Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments.” 2014. Masters Thesis, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/25842.

MLA Handbook (7th Edition):

Lerch, Marc Alger. “Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments.” 2014. Web. 19 Sep 2019.

Vancouver:

Lerch MA. Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/25842.

Council of Science Editors:

Lerch MA. Using Decoys as a Resiliency Mechanism in Spectrally Harsh DSA Environments. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/25842


Virginia Tech

17. Sohul, Munawwar Mahmud. Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems.

Degree: PhD, Electrical and Computer Engineering, 2017, Virginia Tech

 The radio spectrum dependent applications are facing a huge scarcity of the resource. To address this issue, future wireless systems require new wireless network architectures… (more)

Subjects/Keywords: Spectrum sharing; Dynamic spectrum access; Spectrum Access System (SAS); Primary-Secondary cooperation; Spectrum opportunity duration assurance (SODA)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sohul, M. M. (2017). Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/88018

Chicago Manual of Style (16th Edition):

Sohul, Munawwar Mahmud. “Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/88018.

MLA Handbook (7th Edition):

Sohul, Munawwar Mahmud. “Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems.” 2017. Web. 19 Sep 2019.

Vancouver:

Sohul MM. Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/88018.

Council of Science Editors:

Sohul MM. Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/88018


Virginia Tech

18. Yamada, Randy Matthew. New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity.

Degree: PhD, Electrical Engineering, 2017, Virginia Tech

 The proliferation of connected embedded devices has driven wireless communications into commercial, military, industrial, and personal systems. It is unreasonable to expect privacy and security… (more)

Subjects/Keywords: Directional Modulation; Physical Layer Security; Beamforming; Array; Broadcast Channel; Secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yamada, R. M. (2017). New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/88956

Chicago Manual of Style (16th Edition):

Yamada, Randy Matthew. “New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/88956.

MLA Handbook (7th Edition):

Yamada, Randy Matthew. “New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity.” 2017. Web. 19 Sep 2019.

Vancouver:

Yamada RM. New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/88956.

Council of Science Editors:

Yamada RM. New Method for Directional Modulation Using Beamforming: Applications to Simultaneous Wireless Information and Power Transfer and Increased Secrecy Capacity. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/88956


Virginia Tech

19. Nanjundappa, Mahesh. Formal Techniques for Design and Development of Safety Critical Embedded Systems from Polychronous Models.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 Formally-based design and implementation techniques for complex safety-critical embedded systems are required not only to handle the complexity, but also to provide correctness guarantees. Traditional… (more)

Subjects/Keywords: Model-based Design; MBD; Software Synthesis; Formal techniques; Code generation; Formal analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nanjundappa, M. (2015). Formal Techniques for Design and Development of Safety Critical Embedded Systems from Polychronous Models. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/73483

Chicago Manual of Style (16th Edition):

Nanjundappa, Mahesh. “Formal Techniques for Design and Development of Safety Critical Embedded Systems from Polychronous Models.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/73483.

MLA Handbook (7th Edition):

Nanjundappa, Mahesh. “Formal Techniques for Design and Development of Safety Critical Embedded Systems from Polychronous Models.” 2015. Web. 19 Sep 2019.

Vancouver:

Nanjundappa M. Formal Techniques for Design and Development of Safety Critical Embedded Systems from Polychronous Models. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/73483.

Council of Science Editors:

Nanjundappa M. Formal Techniques for Design and Development of Safety Critical Embedded Systems from Polychronous Models. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/73483


Virginia Tech

20. Youssef, Ibrahim Mohamed. Multi-Platform Molecular Data Integration and Disease Outcome Analysis.

Degree: PhD, Electrical and Computer Engineering, 2016, Virginia Tech

 One of the most common measures of clinical outcomes is the survival time. Accurately linking cancer molecular profiling with survival outcome advances clinical management of… (more)

Subjects/Keywords: survival analysis; Cox proportional hazards model; molecular data integration; intratumor vascular heterogeneity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Youssef, I. M. (2016). Multi-Platform Molecular Data Integration and Disease Outcome Analysis. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/73580

Chicago Manual of Style (16th Edition):

Youssef, Ibrahim Mohamed. “Multi-Platform Molecular Data Integration and Disease Outcome Analysis.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/73580.

MLA Handbook (7th Edition):

Youssef, Ibrahim Mohamed. “Multi-Platform Molecular Data Integration and Disease Outcome Analysis.” 2016. Web. 19 Sep 2019.

Vancouver:

Youssef IM. Multi-Platform Molecular Data Integration and Disease Outcome Analysis. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/73580.

Council of Science Editors:

Youssef IM. Multi-Platform Molecular Data Integration and Disease Outcome Analysis. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/73580

21. Sengupta, Avik. Fundamentals of Cache Aided Wireless Networks.

Degree: PhD, Electrical and Computer Engineering, 2016, Virginia Tech

 Caching at the network edge has emerged as a viable solution for alleviating the severe capacity crunch in content-centric next generation 5G wireless networks by… (more)

Subjects/Keywords: Caching; Wireless Networks; Content Delivery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sengupta, A. (2016). Fundamentals of Cache Aided Wireless Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/73583

Chicago Manual of Style (16th Edition):

Sengupta, Avik. “Fundamentals of Cache Aided Wireless Networks.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/73583.

MLA Handbook (7th Edition):

Sengupta, Avik. “Fundamentals of Cache Aided Wireless Networks.” 2016. Web. 19 Sep 2019.

Vancouver:

Sengupta A. Fundamentals of Cache Aided Wireless Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/73583.

Council of Science Editors:

Sengupta A. Fundamentals of Cache Aided Wireless Networks. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/73583


Virginia Tech

22. Zuo, Yiming. Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery.

Degree: PhD, Electrical and Computer Engineering, 2017, Virginia Tech

 Recent advances in high-throughput technique enables the generation of a large amount of omic data such as genomics, transcriptomics, proteomics, metabolomics, glycomics etc. Typically, differential… (more)

Subjects/Keywords: differential expression analysis; differential network analysis; cancer biomarker discovery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zuo, Y. (2017). Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78217

Chicago Manual of Style (16th Edition):

Zuo, Yiming. “Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/78217.

MLA Handbook (7th Edition):

Zuo, Yiming. “Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery.” 2017. Web. 19 Sep 2019.

Vancouver:

Zuo Y. Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/78217.

Council of Science Editors:

Zuo Y. Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78217


Virginia Tech

23. Tian, Ye. Knowledge-fused Identification of Condition-specific Rewiring of Dependencies in Biological Networks.

Degree: PhD, Electrical and Computer Engineering, 2014, Virginia Tech

 Gene network modeling is one of the major goals of systems biology research. Gene network modeling targets the middle layer of active biological systems that… (more)

Subjects/Keywords: Gaussian Graphical model; differential dependency network; Lasso; l1-regularization; knowledge incorporation; excess risk; degree of knowledge incorporation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tian, Y. (2014). Knowledge-fused Identification of Condition-specific Rewiring of Dependencies in Biological Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/52557

Chicago Manual of Style (16th Edition):

Tian, Ye. “Knowledge-fused Identification of Condition-specific Rewiring of Dependencies in Biological Networks.” 2014. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/52557.

MLA Handbook (7th Edition):

Tian, Ye. “Knowledge-fused Identification of Condition-specific Rewiring of Dependencies in Biological Networks.” 2014. Web. 19 Sep 2019.

Vancouver:

Tian Y. Knowledge-fused Identification of Condition-specific Rewiring of Dependencies in Biological Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/52557.

Council of Science Editors:

Tian Y. Knowledge-fused Identification of Condition-specific Rewiring of Dependencies in Biological Networks. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/52557

24. Sanjab, Anibal Jean. Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality.

Degree: PhD, Electrical Engineering, 2018, Virginia Tech

 Cyber-physical systems (CPSs) are large-scale systems that seamlessly integrate physical and human elements via a cyber layer that enables connectivity, sensing, and data processing. Key… (more)

Subjects/Keywords: Cyber-Physical Systems Security; Game Theory; Prospect Theory; Smart Grids; Unmanned Aerial Vehicles; Internet of Things.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sanjab, A. J. (2018). Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86204

Chicago Manual of Style (16th Edition):

Sanjab, Anibal Jean. “Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality.” 2018. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/86204.

MLA Handbook (7th Edition):

Sanjab, Anibal Jean. “Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality.” 2018. Web. 19 Sep 2019.

Vancouver:

Sanjab AJ. Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/86204.

Council of Science Editors:

Sanjab AJ. Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/86204


Virginia Tech

25. Kumar, Akshay. Efficient Resource Allocation Schemes for Wireless Networks with with Diverse Quality-of-Service Requirements.

Degree: PhD, Electrical Engineering, 2016, Virginia Tech

 Quality-of-Service (QoS) to users is a critical requirement of resource allocation in wireless networks and has drawn significant research attention over a long time. However,… (more)

Subjects/Keywords: Quality-of-Service; Dynamic Resource Allocation; Cross-Layer Optimization; Distributed Storage; M2M Communication; Delay-Optimal Scheduler

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, A. (2016). Efficient Resource Allocation Schemes for Wireless Networks with with Diverse Quality-of-Service Requirements. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/87529

Chicago Manual of Style (16th Edition):

Kumar, Akshay. “Efficient Resource Allocation Schemes for Wireless Networks with with Diverse Quality-of-Service Requirements.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/87529.

MLA Handbook (7th Edition):

Kumar, Akshay. “Efficient Resource Allocation Schemes for Wireless Networks with with Diverse Quality-of-Service Requirements.” 2016. Web. 19 Sep 2019.

Vancouver:

Kumar A. Efficient Resource Allocation Schemes for Wireless Networks with with Diverse Quality-of-Service Requirements. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/87529.

Council of Science Editors:

Kumar A. Efficient Resource Allocation Schemes for Wireless Networks with with Diverse Quality-of-Service Requirements. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/87529


Virginia Tech

26. O'Shea, Timothy James. Learning from Data in Radio Algorithm Design.

Degree: PhD, Electrical Engineering, 2017, Virginia Tech

 Algorithm design methods for radio communications systems are poised to undergo a massive disruption over the next several years. Today, such algorithms are typically designed… (more)

Subjects/Keywords: deep learning; radio; physical layer; software radio; machine learning; neural networks; sensing; communications system design; modulation; coding; sensing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

O'Shea, T. J. (2017). Learning from Data in Radio Algorithm Design. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/89649

Chicago Manual of Style (16th Edition):

O'Shea, Timothy James. “Learning from Data in Radio Algorithm Design.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/89649.

MLA Handbook (7th Edition):

O'Shea, Timothy James. “Learning from Data in Radio Algorithm Design.” 2017. Web. 19 Sep 2019.

Vancouver:

O'Shea TJ. Learning from Data in Radio Algorithm Design. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/89649.

Council of Science Editors:

O'Shea TJ. Learning from Data in Radio Algorithm Design. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/89649


Virginia Tech

27. McGinthy, Jason M. Solutions for Internet of Things Security Challenges: Trust and Authentication.

Degree: PhD, Electrical and Computer Engineering, 2019, Virginia Tech

 The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many… (more)

Subjects/Keywords: Security; Internet of Things; Standardization; Authentication; Lightweight

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McGinthy, J. M. (2019). Solutions for Internet of Things Security Challenges: Trust and Authentication. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/91443

Chicago Manual of Style (16th Edition):

McGinthy, Jason M. “Solutions for Internet of Things Security Challenges: Trust and Authentication.” 2019. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/91443.

MLA Handbook (7th Edition):

McGinthy, Jason M. “Solutions for Internet of Things Security Challenges: Trust and Authentication.” 2019. Web. 19 Sep 2019.

Vancouver:

McGinthy JM. Solutions for Internet of Things Security Challenges: Trust and Authentication. [Internet] [Doctoral dissertation]. Virginia Tech; 2019. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/91443.

Council of Science Editors:

McGinthy JM. Solutions for Internet of Things Security Challenges: Trust and Authentication. [Doctoral Dissertation]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/91443


Virginia Tech

28. Ullah, Abid. Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System.

Degree: PhD, Electrical and ComputerEngineering, 2017, Virginia Tech

 The goal of this thesis is to build a Protected Shared Access Model (PSAM) through database enabled Spectrum Access System (SAS). A model for the… (more)

Subjects/Keywords: Spectrum Management; MIMO Beamforming; Exclusion Zones; Propagation Models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ullah, A. (2017). Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/84932

Chicago Manual of Style (16th Edition):

Ullah, Abid. “Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/84932.

MLA Handbook (7th Edition):

Ullah, Abid. “Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System.” 2017. Web. 19 Sep 2019.

Vancouver:

Ullah A. Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/84932.

Council of Science Editors:

Ullah A. Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/84932


Virginia Tech

29. Khamphanchai, Warodom. An Agent-based Platform for Demand Response Implementation in Smart Buildings.

Degree: PhD, Electrical and Computer Engineering, 2016, Virginia Tech

 The efficiency, security and resiliency are very important factors for the operation of a distribution power system. Taking into account customer demand and energy resource… (more)

Subjects/Keywords: Demand Response; Home Energy Management System; Building Energy Management System; Internet of Things; Multi-Agent Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khamphanchai, W. (2016). An Agent-based Platform for Demand Response Implementation in Smart Buildings. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/70869

Chicago Manual of Style (16th Edition):

Khamphanchai, Warodom. “An Agent-based Platform for Demand Response Implementation in Smart Buildings.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/70869.

MLA Handbook (7th Edition):

Khamphanchai, Warodom. “An Agent-based Platform for Demand Response Implementation in Smart Buildings.” 2016. Web. 19 Sep 2019.

Vancouver:

Khamphanchai W. An Agent-based Platform for Demand Response Implementation in Smart Buildings. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/70869.

Council of Science Editors:

Khamphanchai W. An Agent-based Platform for Demand Response Implementation in Smart Buildings. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/70869


Virginia Tech

30. Lichtman, Marc Louis. Antifragile Communications.

Degree: PhD, Electrical and Computer Engineering, 2016, Virginia Tech

 Jamming is an ongoing threat that plagues wireless communications in contested areas. Unfortunately, jamming complexity and sophistication will continue to increase over time. The traditional… (more)

Subjects/Keywords: Jamming; Electronic Warfare; Jammer Exploitation; Machine Learning; Cognitive Radio; Wireless System Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lichtman, M. L. (2016). Antifragile Communications. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/72267

Chicago Manual of Style (16th Edition):

Lichtman, Marc Louis. “Antifragile Communications.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 19, 2019. http://hdl.handle.net/10919/72267.

MLA Handbook (7th Edition):

Lichtman, Marc Louis. “Antifragile Communications.” 2016. Web. 19 Sep 2019.

Vancouver:

Lichtman ML. Antifragile Communications. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10919/72267.

Council of Science Editors:

Lichtman ML. Antifragile Communications. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/72267

[1] [2]

.