Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(protocol). Showing records 1 – 30 of 2407 total matches.

[1] [2] [3] [4] [5] … [81]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters

1. Liu, Feng-Hao. Error Tolerant Cryptography.

Degree: PhD, Computer Science, 2013, Brown University

 One of the major goals in cryptography is to design protocols that withstand malicious behavior of an adversary. Traditionally, the focus was on a setting… (more)

Subjects/Keywords: protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, F. (2013). Error Tolerant Cryptography. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:320604/

Chicago Manual of Style (16th Edition):

Liu, Feng-Hao. “Error Tolerant Cryptography.” 2013. Doctoral Dissertation, Brown University. Accessed September 15, 2019. https://repository.library.brown.edu/studio/item/bdr:320604/.

MLA Handbook (7th Edition):

Liu, Feng-Hao. “Error Tolerant Cryptography.” 2013. Web. 15 Sep 2019.

Vancouver:

Liu F. Error Tolerant Cryptography. [Internet] [Doctoral dissertation]. Brown University; 2013. [cited 2019 Sep 15]. Available from: https://repository.library.brown.edu/studio/item/bdr:320604/.

Council of Science Editors:

Liu F. Error Tolerant Cryptography. [Doctoral Dissertation]. Brown University; 2013. Available from: https://repository.library.brown.edu/studio/item/bdr:320604/


Universiteit Utrecht

2. Baars, I.D. A comparison of two animal welfare protocols for dairy cattle.

Degree: 2010, Universiteit Utrecht

 For the scoring of cow comfort more options are possible. In this study two scoring systems are compared, being the cow comfort score system [20]… (more)

Subjects/Keywords: welfare protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Baars, I. D. (2010). A comparison of two animal welfare protocols for dairy cattle. (Doctoral Dissertation). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/289304

Chicago Manual of Style (16th Edition):

Baars, I D. “A comparison of two animal welfare protocols for dairy cattle.” 2010. Doctoral Dissertation, Universiteit Utrecht. Accessed September 15, 2019. http://dspace.library.uu.nl:8080/handle/1874/289304.

MLA Handbook (7th Edition):

Baars, I D. “A comparison of two animal welfare protocols for dairy cattle.” 2010. Web. 15 Sep 2019.

Vancouver:

Baars ID. A comparison of two animal welfare protocols for dairy cattle. [Internet] [Doctoral dissertation]. Universiteit Utrecht; 2010. [cited 2019 Sep 15]. Available from: http://dspace.library.uu.nl:8080/handle/1874/289304.

Council of Science Editors:

Baars ID. A comparison of two animal welfare protocols for dairy cattle. [Doctoral Dissertation]. Universiteit Utrecht; 2010. Available from: http://dspace.library.uu.nl:8080/handle/1874/289304


University of Kashmir

3. Mehnaz Khan. Design of Interactive Feature Space Construction Protocol;.

Degree: 2014, University of Kashmir

Machine learning deals with designing systems that learn from data i.e. automatically improve with experience. Systems gain experience by detecting patterns or regularities and using… (more)

Subjects/Keywords: Construction Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, M. (2014). Design of Interactive Feature Space Construction Protocol;. (Thesis). University of Kashmir. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/14652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Mehnaz. “Design of Interactive Feature Space Construction Protocol;.” 2014. Thesis, University of Kashmir. Accessed September 15, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/14652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Mehnaz. “Design of Interactive Feature Space Construction Protocol;.” 2014. Web. 15 Sep 2019.

Vancouver:

Khan M. Design of Interactive Feature Space Construction Protocol;. [Internet] [Thesis]. University of Kashmir; 2014. [cited 2019 Sep 15]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/14652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan M. Design of Interactive Feature Space Construction Protocol;. [Thesis]. University of Kashmir; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/14652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

4. Halepoto, Imtiaz Ali. Scheduling and flow control in CMT-SCTP.

Degree: PhD, 2014, University of Hong Kong

 Stream Control Transmission Protocol (SCTP) is a reliable transport layer protocol that supports multihoming. An extension of the SCTP that supports simultaneous data transfer over… (more)

Subjects/Keywords: Stream Control Transmission Protocol (Computer network protocol)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Halepoto, I. A. (2014). Scheduling and flow control in CMT-SCTP. (Doctoral Dissertation). University of Hong Kong. Retrieved from Halepoto, I. A.. (2014). Scheduling and flow control in CMT-SCTP. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5446482 ; http://dx.doi.org/10.5353/th_b5446482 ; http://hdl.handle.net/10722/224812

Chicago Manual of Style (16th Edition):

Halepoto, Imtiaz Ali. “Scheduling and flow control in CMT-SCTP.” 2014. Doctoral Dissertation, University of Hong Kong. Accessed September 15, 2019. Halepoto, I. A.. (2014). Scheduling and flow control in CMT-SCTP. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5446482 ; http://dx.doi.org/10.5353/th_b5446482 ; http://hdl.handle.net/10722/224812.

MLA Handbook (7th Edition):

Halepoto, Imtiaz Ali. “Scheduling and flow control in CMT-SCTP.” 2014. Web. 15 Sep 2019.

Vancouver:

Halepoto IA. Scheduling and flow control in CMT-SCTP. [Internet] [Doctoral dissertation]. University of Hong Kong; 2014. [cited 2019 Sep 15]. Available from: Halepoto, I. A.. (2014). Scheduling and flow control in CMT-SCTP. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5446482 ; http://dx.doi.org/10.5353/th_b5446482 ; http://hdl.handle.net/10722/224812.

Council of Science Editors:

Halepoto IA. Scheduling and flow control in CMT-SCTP. [Doctoral Dissertation]. University of Hong Kong; 2014. Available from: Halepoto, I. A.. (2014). Scheduling and flow control in CMT-SCTP. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5446482 ; http://dx.doi.org/10.5353/th_b5446482 ; http://hdl.handle.net/10722/224812


Victoria University of Wellington

5. Davenport, Hugh. Implementation and Evaluation of Security Protocols in E-Commerce Applications.

Degree: 2013, Victoria University of Wellington

 There are a large amount of programs in the development process in todays technology environment, and many of these involve some type of security needs.… (more)

Subjects/Keywords: Security; Evaluation; Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davenport, H. (2013). Implementation and Evaluation of Security Protocols in E-Commerce Applications. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/2631

Chicago Manual of Style (16th Edition):

Davenport, Hugh. “Implementation and Evaluation of Security Protocols in E-Commerce Applications.” 2013. Masters Thesis, Victoria University of Wellington. Accessed September 15, 2019. http://hdl.handle.net/10063/2631.

MLA Handbook (7th Edition):

Davenport, Hugh. “Implementation and Evaluation of Security Protocols in E-Commerce Applications.” 2013. Web. 15 Sep 2019.

Vancouver:

Davenport H. Implementation and Evaluation of Security Protocols in E-Commerce Applications. [Internet] [Masters thesis]. Victoria University of Wellington; 2013. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/10063/2631.

Council of Science Editors:

Davenport H. Implementation and Evaluation of Security Protocols in E-Commerce Applications. [Masters Thesis]. Victoria University of Wellington; 2013. Available from: http://hdl.handle.net/10063/2631


University of Southern California

6. Bhaskara, Ganesha. Topology generation for protocol testing: methodology and case studies.

Degree: PhD, Electrical Engineering, 2010, University of Southern California

 One of the key steps in the design or refinement of an application or network protocol is, testing of the protocol for correctness and performance.… (more)

Subjects/Keywords: network protocol; protocol; systematic testing; testing; topology generation: computer network protocol; protocol testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhaskara, G. (2010). Topology generation for protocol testing: methodology and case studies. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/294568/rec/7505

Chicago Manual of Style (16th Edition):

Bhaskara, Ganesha. “Topology generation for protocol testing: methodology and case studies.” 2010. Doctoral Dissertation, University of Southern California. Accessed September 15, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/294568/rec/7505.

MLA Handbook (7th Edition):

Bhaskara, Ganesha. “Topology generation for protocol testing: methodology and case studies.” 2010. Web. 15 Sep 2019.

Vancouver:

Bhaskara G. Topology generation for protocol testing: methodology and case studies. [Internet] [Doctoral dissertation]. University of Southern California; 2010. [cited 2019 Sep 15]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/294568/rec/7505.

Council of Science Editors:

Bhaskara G. Topology generation for protocol testing: methodology and case studies. [Doctoral Dissertation]. University of Southern California; 2010. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/294568/rec/7505


University of New South Wales

7. Al-Bataineh , Omar Ibrahim. Model checking of knowledge in unconditionally secure cryptographic protocols.

Degree: Computer Science & Engineering, 2011, University of New South Wales

 Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The thesis describes how… (more)

Subjects/Keywords: Dining Cryptographers protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Bataineh , O. I. (2011). Model checking of knowledge in unconditionally secure cryptographic protocols. (Masters Thesis). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/50840 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9734/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Al-Bataineh , Omar Ibrahim. “Model checking of knowledge in unconditionally secure cryptographic protocols.” 2011. Masters Thesis, University of New South Wales. Accessed September 15, 2019. http://handle.unsw.edu.au/1959.4/50840 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9734/SOURCE02?view=true.

MLA Handbook (7th Edition):

Al-Bataineh , Omar Ibrahim. “Model checking of knowledge in unconditionally secure cryptographic protocols.” 2011. Web. 15 Sep 2019.

Vancouver:

Al-Bataineh OI. Model checking of knowledge in unconditionally secure cryptographic protocols. [Internet] [Masters thesis]. University of New South Wales; 2011. [cited 2019 Sep 15]. Available from: http://handle.unsw.edu.au/1959.4/50840 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9734/SOURCE02?view=true.

Council of Science Editors:

Al-Bataineh OI. Model checking of knowledge in unconditionally secure cryptographic protocols. [Masters Thesis]. University of New South Wales; 2011. Available from: http://handle.unsw.edu.au/1959.4/50840 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:9734/SOURCE02?view=true


Penn State University

8. Weiss, Daniel Ross. An Automated Detection Scheme For.

Degree: MS, Electrical Engineering, 2014, Penn State University

 The field of protocol analysis arose from the increasing need for network security. Analysis and identification of the protocols of traffic on a network allowed… (more)

Subjects/Keywords: Protocol Analysis; Wireless Protocols; Wireless Protocol Classification; Automated Protocol Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Weiss, D. R. (2014). An Automated Detection Scheme For. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/23703

Chicago Manual of Style (16th Edition):

Weiss, Daniel Ross. “An Automated Detection Scheme For.” 2014. Masters Thesis, Penn State University. Accessed September 15, 2019. https://etda.libraries.psu.edu/catalog/23703.

MLA Handbook (7th Edition):

Weiss, Daniel Ross. “An Automated Detection Scheme For.” 2014. Web. 15 Sep 2019.

Vancouver:

Weiss DR. An Automated Detection Scheme For. [Internet] [Masters thesis]. Penn State University; 2014. [cited 2019 Sep 15]. Available from: https://etda.libraries.psu.edu/catalog/23703.

Council of Science Editors:

Weiss DR. An Automated Detection Scheme For. [Masters Thesis]. Penn State University; 2014. Available from: https://etda.libraries.psu.edu/catalog/23703


Université Catholique de Louvain

9. Gégo, Anthony. Study and performance analysis of cache coherence protocols in shared-memory multiprocessors.

Degree: 2016, Université Catholique de Louvain

Cache coherence is one of the main challenges to tackle when designing a shared-memory multiprocessors system. Incoherence may happen when multiple actors in a system… (more)

Subjects/Keywords: shared-memory; multiprocessors; cache coherence; protocol; performance; analysis; snooping protocol; directory protocol; gem5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gégo, A. (2016). Study and performance analysis of cache coherence protocols in shared-memory multiprocessors. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/thesis:6679

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gégo, Anthony. “Study and performance analysis of cache coherence protocols in shared-memory multiprocessors.” 2016. Thesis, Université Catholique de Louvain. Accessed September 15, 2019. http://hdl.handle.net/2078.1/thesis:6679.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gégo, Anthony. “Study and performance analysis of cache coherence protocols in shared-memory multiprocessors.” 2016. Web. 15 Sep 2019.

Vancouver:

Gégo A. Study and performance analysis of cache coherence protocols in shared-memory multiprocessors. [Internet] [Thesis]. Université Catholique de Louvain; 2016. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/2078.1/thesis:6679.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gégo A. Study and performance analysis of cache coherence protocols in shared-memory multiprocessors. [Thesis]. Université Catholique de Louvain; 2016. Available from: http://hdl.handle.net/2078.1/thesis:6679

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

10. Kannan, Gopinathan. Specification and rapid deployment of communication protocols for peer-to-peer systems.

Degree: MS, Computer Science, 2002, University of Georgia

Protocol Specification techniques have been used traditionally for verification of communication protocols. With the fast growing Internet and increasing uses of mobile devices, ubiquitous computing… (more)

Subjects/Keywords: PROTOCOL SPECIFICATION

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kannan, G. (2002). Specification and rapid deployment of communication protocols for peer-to-peer systems. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/kannan_gopinathan_200208_ms

Chicago Manual of Style (16th Edition):

Kannan, Gopinathan. “Specification and rapid deployment of communication protocols for peer-to-peer systems.” 2002. Masters Thesis, University of Georgia. Accessed September 15, 2019. http://purl.galileo.usg.edu/uga_etd/kannan_gopinathan_200208_ms.

MLA Handbook (7th Edition):

Kannan, Gopinathan. “Specification and rapid deployment of communication protocols for peer-to-peer systems.” 2002. Web. 15 Sep 2019.

Vancouver:

Kannan G. Specification and rapid deployment of communication protocols for peer-to-peer systems. [Internet] [Masters thesis]. University of Georgia; 2002. [cited 2019 Sep 15]. Available from: http://purl.galileo.usg.edu/uga_etd/kannan_gopinathan_200208_ms.

Council of Science Editors:

Kannan G. Specification and rapid deployment of communication protocols for peer-to-peer systems. [Masters Thesis]. University of Georgia; 2002. Available from: http://purl.galileo.usg.edu/uga_etd/kannan_gopinathan_200208_ms


University of Limerick

11. Mathur, Avijit. A secure patient monitoring solution using wireless sensor networks.

Degree: 2017, University of Limerick

peer-reviewed

The Wireless sensor networks (WSN) is developing over time in terms of technologies, protocols and security. Each of these have different requirements, challenges, and… (more)

Subjects/Keywords: WSN; wireless security networks; protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mathur, A. (2017). A secure patient monitoring solution using wireless sensor networks. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/6558

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mathur, Avijit. “A secure patient monitoring solution using wireless sensor networks.” 2017. Thesis, University of Limerick. Accessed September 15, 2019. http://hdl.handle.net/10344/6558.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mathur, Avijit. “A secure patient monitoring solution using wireless sensor networks.” 2017. Web. 15 Sep 2019.

Vancouver:

Mathur A. A secure patient monitoring solution using wireless sensor networks. [Internet] [Thesis]. University of Limerick; 2017. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/10344/6558.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mathur A. A secure patient monitoring solution using wireless sensor networks. [Thesis]. University of Limerick; 2017. Available from: http://hdl.handle.net/10344/6558

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Chellaprabha, B. Improved congestion control using reset frequency controlled dynamic parameter re estimation in wireless sensor networks; -.

Degree: Information and Communication Engineering, 2014, Anna University

Congestion is a phenomenon which occurs in data communication newlinenetworks while transmitting packets beyond the admissible limit of a link newlineThe function of transport layer… (more)

Subjects/Keywords: Datagram Congestion Control Protocol; Information and communication engineering; Stream control Transmission Protocol; Transmission Control Protocol; User Datagram Protocol; Wireless Sensor Network

Page 1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chellaprabha, B. (2014). Improved congestion control using reset frequency controlled dynamic parameter re estimation in wireless sensor networks; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/22616

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chellaprabha, B. “Improved congestion control using reset frequency controlled dynamic parameter re estimation in wireless sensor networks; -.” 2014. Thesis, Anna University. Accessed September 15, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/22616.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chellaprabha, B. “Improved congestion control using reset frequency controlled dynamic parameter re estimation in wireless sensor networks; -.” 2014. Web. 15 Sep 2019.

Vancouver:

Chellaprabha B. Improved congestion control using reset frequency controlled dynamic parameter re estimation in wireless sensor networks; -. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Sep 15]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22616.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chellaprabha B. Improved congestion control using reset frequency controlled dynamic parameter re estimation in wireless sensor networks; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22616

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

13. Kim, Hogil. Topology management protocols in ad hoc wireless sensor networks.

Degree: 2009, Texas A&M University

 A wireless sensor network (WSN) is comprised of a few hundred or thousand au-tonomous sensor nodes spatially distributed over a particular region. Each sensornode is… (more)

Subjects/Keywords: Wireless Sensor Networks; protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, H. (2009). Topology management protocols in ad hoc wireless sensor networks. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2461

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kim, Hogil. “Topology management protocols in ad hoc wireless sensor networks.” 2009. Thesis, Texas A&M University. Accessed September 15, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-2461.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kim, Hogil. “Topology management protocols in ad hoc wireless sensor networks.” 2009. Web. 15 Sep 2019.

Vancouver:

Kim H. Topology management protocols in ad hoc wireless sensor networks. [Internet] [Thesis]. Texas A&M University; 2009. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2461.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kim H. Topology management protocols in ad hoc wireless sensor networks. [Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2461

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

14. Tadi, Krishna C. A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS.

Degree: 2010, Texas A&M University

 Border Gateway Protocol (BGP) prefix hijacking is a serious problem in the Internet today. Although there are several services being offered to detect a prefix… (more)

Subjects/Keywords: Prefix Hijacking; Border Gateway Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tadi, K. C. (2010). A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-285

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tadi, Krishna C. “A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS.” 2010. Thesis, Texas A&M University. Accessed September 15, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-285.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tadi, Krishna C. “A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS.” 2010. Web. 15 Sep 2019.

Vancouver:

Tadi KC. A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS. [Internet] [Thesis]. Texas A&M University; 2010. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-285.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tadi KC. A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS. [Thesis]. Texas A&M University; 2010. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2009-05-285

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

15. Yin, Fan 1990-. Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt.

Degree: 2012, Texas A&M University

 Warm-Mix Asphalt (WMA) refers to the asphalt concrete paving material produced and placed at temperatures approximately 50?F lower than those used for Hot-Mix Asphalt (HMA).… (more)

Subjects/Keywords: Stiffness; Conditioing Protocol; WMA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yin, F. 1. (2012). Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/148143

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yin, Fan 1990-. “Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt.” 2012. Thesis, Texas A&M University. Accessed September 15, 2019. http://hdl.handle.net/1969.1/148143.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yin, Fan 1990-. “Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt.” 2012. Web. 15 Sep 2019.

Vancouver:

Yin F1. Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt. [Internet] [Thesis]. Texas A&M University; 2012. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/1969.1/148143.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yin F1. Evaluation of Laboratory Conditioning Protocols for Warm-Mix Asphalt. [Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/148143

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Surampudi, Srinivasa Rao. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.

Degree: Electrical and communication engineering, 2012, Jawaharlal Nehru Technological University, Hyderabad

Radio Frequency Identification (RFID) technology has a number of applications in day to day affairs, especially when security is of main concern. Human activity tracking… (more)

Subjects/Keywords: Access; Adaptive; Adaptive; Control; Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Surampudi, S. R. (2012). Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed September 15, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Surampudi, Srinivasa Rao. “Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -.” 2012. Web. 15 Sep 2019.

Vancouver:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. [cited 2019 Sep 15]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Surampudi SR. Adaptive Slot Adaptive Frame Medium Access Control Protocol for Human Tracking; -. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Bhavneet Kaur. Stabilization of Interdomain Routing Protocol; No.

Degree: Engineering and Technology, 2014, Guru Nanak Dev University

Available newline

Summary: 145-147,List of Publication:148 Reference: 149-157, Appendix: 158-181

Advisors/Committee Members: Kahlon,Karanjeet Singh.

Subjects/Keywords: Stabilization; Protocol

Page 1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaur, B. (2014). Stabilization of Interdomain Routing Protocol; No. (Thesis). Guru Nanak Dev University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/29750

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kaur, Bhavneet. “Stabilization of Interdomain Routing Protocol; No.” 2014. Thesis, Guru Nanak Dev University. Accessed September 15, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/29750.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kaur, Bhavneet. “Stabilization of Interdomain Routing Protocol; No.” 2014. Web. 15 Sep 2019.

Vancouver:

Kaur B. Stabilization of Interdomain Routing Protocol; No. [Internet] [Thesis]. Guru Nanak Dev University; 2014. [cited 2019 Sep 15]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/29750.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kaur B. Stabilization of Interdomain Routing Protocol; No. [Thesis]. Guru Nanak Dev University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/29750

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Katsikis, Athanasios. Συγκριτική μελέτη καθιερωμένου και ταχέος πρωτοκόλλου μιας ημέρας για την απεικόνιση της μυοκαρδιακής αιμάτωσης με τη χρήση Tetrofosmin-Tc 99m.

Degree: 2016, National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ)

INTRODUCTIONThe purpose of this research project was to comparatively evaluate the feasibility and performance of a fast myocardial perfusion imaging (MPI) protocol with the use… (more)

Subjects/Keywords: Ταχύ πρωτόκολλο; Fast protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Katsikis, A. (2016). Συγκριτική μελέτη καθιερωμένου και ταχέος πρωτοκόλλου μιας ημέρας για την απεικόνιση της μυοκαρδιακής αιμάτωσης με τη χρήση Tetrofosmin-Tc 99m. (Thesis). National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ). Retrieved from http://hdl.handle.net/10442/hedi/38949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Katsikis, Athanasios. “Συγκριτική μελέτη καθιερωμένου και ταχέος πρωτοκόλλου μιας ημέρας για την απεικόνιση της μυοκαρδιακής αιμάτωσης με τη χρήση Tetrofosmin-Tc 99m.” 2016. Thesis, National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ). Accessed September 15, 2019. http://hdl.handle.net/10442/hedi/38949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Katsikis, Athanasios. “Συγκριτική μελέτη καθιερωμένου και ταχέος πρωτοκόλλου μιας ημέρας για την απεικόνιση της μυοκαρδιακής αιμάτωσης με τη χρήση Tetrofosmin-Tc 99m.” 2016. Web. 15 Sep 2019.

Vancouver:

Katsikis A. Συγκριτική μελέτη καθιερωμένου και ταχέος πρωτοκόλλου μιας ημέρας για την απεικόνιση της μυοκαρδιακής αιμάτωσης με τη χρήση Tetrofosmin-Tc 99m. [Internet] [Thesis]. National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ); 2016. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/10442/hedi/38949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Katsikis A. Συγκριτική μελέτη καθιερωμένου και ταχέος πρωτοκόλλου μιας ημέρας για την απεικόνιση της μυοκαρδιακής αιμάτωσης με τη χρήση Tetrofosmin-Tc 99m. [Thesis]. National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ); 2016. Available from: http://hdl.handle.net/10442/hedi/38949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

19. AYAMBA, OJONGMBOH. CHALLENGES TO THE IMPLEMENTATION OF THE MAPUTO PROTOCOL: THE CASE OF CAMEROON .

Degree: 2010, Addis Ababa University

 This aim of this study is to explore the challenges faced by many African countries which have ratified the Protocol to the African Charter on… (more)

Subjects/Keywords: Protocol to the African

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

AYAMBA, O. (2010). CHALLENGES TO THE IMPLEMENTATION OF THE MAPUTO PROTOCOL: THE CASE OF CAMEROON . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/6708

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

AYAMBA, OJONGMBOH. “CHALLENGES TO THE IMPLEMENTATION OF THE MAPUTO PROTOCOL: THE CASE OF CAMEROON .” 2010. Thesis, Addis Ababa University. Accessed September 15, 2019. http://etd.aau.edu.et/dspace/handle/123456789/6708.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

AYAMBA, OJONGMBOH. “CHALLENGES TO THE IMPLEMENTATION OF THE MAPUTO PROTOCOL: THE CASE OF CAMEROON .” 2010. Web. 15 Sep 2019.

Vancouver:

AYAMBA O. CHALLENGES TO THE IMPLEMENTATION OF THE MAPUTO PROTOCOL: THE CASE OF CAMEROON . [Internet] [Thesis]. Addis Ababa University; 2010. [cited 2019 Sep 15]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/6708.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

AYAMBA O. CHALLENGES TO THE IMPLEMENTATION OF THE MAPUTO PROTOCOL: THE CASE OF CAMEROON . [Thesis]. Addis Ababa University; 2010. Available from: http://etd.aau.edu.et/dspace/handle/123456789/6708

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

20. Chelashaw, Karl. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .

Degree: 2001, University of Nairobi

 The Windows IP Security integrated into Windows 2000 Server should provide network managers with a critically important line of security. Windows IP Security is an… (more)

Subjects/Keywords: Protocol Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chelashaw, K. (2001). Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chelashaw, Karl. “Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .” 2001. Thesis, University of Nairobi. Accessed September 15, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chelashaw, Karl. “Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .” 2001. Web. 15 Sep 2019.

Vancouver:

Chelashaw K. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . [Internet] [Thesis]. University of Nairobi; 2001. [cited 2019 Sep 15]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chelashaw K. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . [Thesis]. University of Nairobi; 2001. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Kho, Kuan-ping. Hybrid Routing Protocol Based on k-hop Clustering Structure in MANETs.

Degree: Master, Electrical Engineering, 2009, NSYSU

 This paper proposes a hybrid routing protocol based on the k-hop clustering structure for MANETs. The source sends packets to the destination directly if it… (more)

Subjects/Keywords: clustering structure; hybrid routing protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kho, K. (2009). Hybrid Routing Protocol Based on k-hop Clustering Structure in MANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824109-191148

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kho, Kuan-ping. “Hybrid Routing Protocol Based on k-hop Clustering Structure in MANETs.” 2009. Thesis, NSYSU. Accessed September 15, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824109-191148.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kho, Kuan-ping. “Hybrid Routing Protocol Based on k-hop Clustering Structure in MANETs.” 2009. Web. 15 Sep 2019.

Vancouver:

Kho K. Hybrid Routing Protocol Based on k-hop Clustering Structure in MANETs. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 15]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824109-191148.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kho K. Hybrid Routing Protocol Based on k-hop Clustering Structure in MANETs. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824109-191148

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ghana

22. Brenya, A.S. Adherence To Treatment Protocol Among Diabetics And The Impact On Nutritional Status .

Degree: 2013, University of Ghana

 Background: Diabetes is a chronic disease and has been found to be the fourth or fifth leading cause of death in most developed, developing and… (more)

Subjects/Keywords: Treatment Protocol; Diabetics; Nutritional Status

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brenya, A. S. (2013). Adherence To Treatment Protocol Among Diabetics And The Impact On Nutritional Status . (Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/23647

Chicago Manual of Style (16th Edition):

Brenya, A S. “Adherence To Treatment Protocol Among Diabetics And The Impact On Nutritional Status .” 2013. Masters Thesis, University of Ghana. Accessed September 15, 2019. http://ugspace.ug.edu.gh/handle/123456789/23647.

MLA Handbook (7th Edition):

Brenya, A S. “Adherence To Treatment Protocol Among Diabetics And The Impact On Nutritional Status .” 2013. Web. 15 Sep 2019.

Vancouver:

Brenya AS. Adherence To Treatment Protocol Among Diabetics And The Impact On Nutritional Status . [Internet] [Masters thesis]. University of Ghana; 2013. [cited 2019 Sep 15]. Available from: http://ugspace.ug.edu.gh/handle/123456789/23647.

Council of Science Editors:

Brenya AS. Adherence To Treatment Protocol Among Diabetics And The Impact On Nutritional Status . [Masters Thesis]. University of Ghana; 2013. Available from: http://ugspace.ug.edu.gh/handle/123456789/23647


Penn State University

23. Kashalkar, Kiran Ashok. Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers.

Degree: MS, Computer Science and Engineering, 2009, Penn State University

 Mobile Ad-Hoc Networks (MANETs) have evolved tremendously over the past few years. Today MANETs contain not only simple mobile routers but also those with the… (more)

Subjects/Keywords: Routing protocol; implementation; ns-2

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kashalkar, K. A. (2009). Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/9064

Chicago Manual of Style (16th Edition):

Kashalkar, Kiran Ashok. “Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers.” 2009. Masters Thesis, Penn State University. Accessed September 15, 2019. https://etda.libraries.psu.edu/catalog/9064.

MLA Handbook (7th Edition):

Kashalkar, Kiran Ashok. “Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers.” 2009. Web. 15 Sep 2019.

Vancouver:

Kashalkar KA. Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers. [Internet] [Masters thesis]. Penn State University; 2009. [cited 2019 Sep 15]. Available from: https://etda.libraries.psu.edu/catalog/9064.

Council of Science Editors:

Kashalkar KA. Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers. [Masters Thesis]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/9064


Penn State University

24. Kim, Jangyoung. PERFORMANCE ANALYSIS OF END-TO-END.

Degree: MS, Computer Science and Engineering, 2010, Penn State University

 ABSTRACT In networking communication, there are several nodes and stations such as base station or destination nodes. For communication among each node, they send packets… (more)

Subjects/Keywords: routing protocol; sequence numbers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, J. (2010). PERFORMANCE ANALYSIS OF END-TO-END. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/10647

Chicago Manual of Style (16th Edition):

Kim, Jangyoung. “PERFORMANCE ANALYSIS OF END-TO-END.” 2010. Masters Thesis, Penn State University. Accessed September 15, 2019. https://etda.libraries.psu.edu/catalog/10647.

MLA Handbook (7th Edition):

Kim, Jangyoung. “PERFORMANCE ANALYSIS OF END-TO-END.” 2010. Web. 15 Sep 2019.

Vancouver:

Kim J. PERFORMANCE ANALYSIS OF END-TO-END. [Internet] [Masters thesis]. Penn State University; 2010. [cited 2019 Sep 15]. Available from: https://etda.libraries.psu.edu/catalog/10647.

Council of Science Editors:

Kim J. PERFORMANCE ANALYSIS OF END-TO-END. [Masters Thesis]. Penn State University; 2010. Available from: https://etda.libraries.psu.edu/catalog/10647


University of California – Berkeley

25. Zulkowski, Patrick. The Geometry of Thermodynamic Control.

Degree: Physics, 2014, University of California – Berkeley

 Living systems are distinguished by their self-organization. Given the entropic driving force embodied in the second law of thermodynamics, creating and maintaining such organization requires… (more)

Subjects/Keywords: Physics; nonequilibrium; optimal protocol; statistical

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zulkowski, P. (2014). The Geometry of Thermodynamic Control. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/7tr08578

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zulkowski, Patrick. “The Geometry of Thermodynamic Control.” 2014. Thesis, University of California – Berkeley. Accessed September 15, 2019. http://www.escholarship.org/uc/item/7tr08578.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zulkowski, Patrick. “The Geometry of Thermodynamic Control.” 2014. Web. 15 Sep 2019.

Vancouver:

Zulkowski P. The Geometry of Thermodynamic Control. [Internet] [Thesis]. University of California – Berkeley; 2014. [cited 2019 Sep 15]. Available from: http://www.escholarship.org/uc/item/7tr08578.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zulkowski P. The Geometry of Thermodynamic Control. [Thesis]. University of California – Berkeley; 2014. Available from: http://www.escholarship.org/uc/item/7tr08578

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Plainchault, Mélanie. Conception de protocoles DDF pour le déploiement de relais auto-configurables : Design of DDF protocols for plug-and-play relays.

Degree: Docteur es, Electronique et Communications, 2012, Paris, ENST

Dans cette thèse, nous avons proposé et étudié une implémentation pratique du protocole DDF pour des relais auto-configurables au niveaux lien et système. Cette implémentation… (more)

Subjects/Keywords: Protocole de relayage; Protocol relay

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Plainchault, M. (2012). Conception de protocoles DDF pour le déploiement de relais auto-configurables : Design of DDF protocols for plug-and-play relays. (Doctoral Dissertation). Paris, ENST. Retrieved from http://www.theses.fr/2012ENST0023

Chicago Manual of Style (16th Edition):

Plainchault, Mélanie. “Conception de protocoles DDF pour le déploiement de relais auto-configurables : Design of DDF protocols for plug-and-play relays.” 2012. Doctoral Dissertation, Paris, ENST. Accessed September 15, 2019. http://www.theses.fr/2012ENST0023.

MLA Handbook (7th Edition):

Plainchault, Mélanie. “Conception de protocoles DDF pour le déploiement de relais auto-configurables : Design of DDF protocols for plug-and-play relays.” 2012. Web. 15 Sep 2019.

Vancouver:

Plainchault M. Conception de protocoles DDF pour le déploiement de relais auto-configurables : Design of DDF protocols for plug-and-play relays. [Internet] [Doctoral dissertation]. Paris, ENST; 2012. [cited 2019 Sep 15]. Available from: http://www.theses.fr/2012ENST0023.

Council of Science Editors:

Plainchault M. Conception de protocoles DDF pour le déploiement de relais auto-configurables : Design of DDF protocols for plug-and-play relays. [Doctoral Dissertation]. Paris, ENST; 2012. Available from: http://www.theses.fr/2012ENST0023


Open Universiteit Nederland

27. Verheul, J. Adaptive to change? Compositional modelling of Healthcare Insurances using Protocol Modelling .

Degree: 2011, Open Universiteit Nederland

 This report presents the results of research on application of Protocol Modelling in the domain of healthcare insurance claims processing in the Dutch context. The… (more)

Subjects/Keywords: Protocol Modelling; CSP parallel composition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verheul, J. (2011). Adaptive to change? Compositional modelling of Healthcare Insurances using Protocol Modelling . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/3731

Chicago Manual of Style (16th Edition):

Verheul, J. “Adaptive to change? Compositional modelling of Healthcare Insurances using Protocol Modelling .” 2011. Masters Thesis, Open Universiteit Nederland. Accessed September 15, 2019. http://hdl.handle.net/1820/3731.

MLA Handbook (7th Edition):

Verheul, J. “Adaptive to change? Compositional modelling of Healthcare Insurances using Protocol Modelling .” 2011. Web. 15 Sep 2019.

Vancouver:

Verheul J. Adaptive to change? Compositional modelling of Healthcare Insurances using Protocol Modelling . [Internet] [Masters thesis]. Open Universiteit Nederland; 2011. [cited 2019 Sep 15]. Available from: http://hdl.handle.net/1820/3731.

Council of Science Editors:

Verheul J. Adaptive to change? Compositional modelling of Healthcare Insurances using Protocol Modelling . [Masters Thesis]. Open Universiteit Nederland; 2011. Available from: http://hdl.handle.net/1820/3731


University of Ghana

28. Tsibo, B.K. An Assessment of the Malabo Protocol on Impunity in Africa.

Degree: 2018, University of Ghana

 In June 2014, the AU Assembly of Heads of State and Government meeting in Malabo, Equatorial Guinea adopted the Protocol on Amendments to the Protocol(more)

Subjects/Keywords: Malabo Protocol; Africa; Equatorial Guinea

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsibo, B. K. (2018). An Assessment of the Malabo Protocol on Impunity in Africa. (Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/28424

Chicago Manual of Style (16th Edition):

Tsibo, B K. “An Assessment of the Malabo Protocol on Impunity in Africa. ” 2018. Masters Thesis, University of Ghana. Accessed September 15, 2019. http://ugspace.ug.edu.gh/handle/123456789/28424.

MLA Handbook (7th Edition):

Tsibo, B K. “An Assessment of the Malabo Protocol on Impunity in Africa. ” 2018. Web. 15 Sep 2019.

Vancouver:

Tsibo BK. An Assessment of the Malabo Protocol on Impunity in Africa. [Internet] [Masters thesis]. University of Ghana; 2018. [cited 2019 Sep 15]. Available from: http://ugspace.ug.edu.gh/handle/123456789/28424.

Council of Science Editors:

Tsibo BK. An Assessment of the Malabo Protocol on Impunity in Africa. [Masters Thesis]. University of Ghana; 2018. Available from: http://ugspace.ug.edu.gh/handle/123456789/28424


Delft University of Technology

29. Van Eijnatten, R. Creating a Directory protocol specification for networked services:.

Degree: 2010, Delft University of Technology

 Technological and economical developments create new market opportunities for networked services. Many of these opportunities are addressed, however for many new developments the infrastructure is… (more)

Subjects/Keywords: directory; protocol; networked services; infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Eijnatten, R. (2010). Creating a Directory protocol specification for networked services:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e2e2f563-9d09-47b2-8255-7cdcd0f4860f

Chicago Manual of Style (16th Edition):

Van Eijnatten, R. “Creating a Directory protocol specification for networked services:.” 2010. Masters Thesis, Delft University of Technology. Accessed September 15, 2019. http://resolver.tudelft.nl/uuid:e2e2f563-9d09-47b2-8255-7cdcd0f4860f.

MLA Handbook (7th Edition):

Van Eijnatten, R. “Creating a Directory protocol specification for networked services:.” 2010. Web. 15 Sep 2019.

Vancouver:

Van Eijnatten R. Creating a Directory protocol specification for networked services:. [Internet] [Masters thesis]. Delft University of Technology; 2010. [cited 2019 Sep 15]. Available from: http://resolver.tudelft.nl/uuid:e2e2f563-9d09-47b2-8255-7cdcd0f4860f.

Council of Science Editors:

Van Eijnatten R. Creating a Directory protocol specification for networked services:. [Masters Thesis]. Delft University of Technology; 2010. Available from: http://resolver.tudelft.nl/uuid:e2e2f563-9d09-47b2-8255-7cdcd0f4860f


Delft University of Technology

30. De Wit, R. PPU: A Protocol Parsing Unit in Hardware :.

Degree: 2015, Delft University of Technology

The design of a protocol parser in hardware based on language theory to improve time-to-market, reduce development cost and increase performance compared to protocol parsing in software. Advisors/Committee Members: Wong, J.S.S.M., Van der Valk, R..

Subjects/Keywords: protocol language parser hardware accelerator

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

De Wit, R. (2015). PPU: A Protocol Parsing Unit in Hardware :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:8fd22239-6559-48bd-8f55-54c33d64dd32

Chicago Manual of Style (16th Edition):

De Wit, R. “PPU: A Protocol Parsing Unit in Hardware :.” 2015. Masters Thesis, Delft University of Technology. Accessed September 15, 2019. http://resolver.tudelft.nl/uuid:8fd22239-6559-48bd-8f55-54c33d64dd32.

MLA Handbook (7th Edition):

De Wit, R. “PPU: A Protocol Parsing Unit in Hardware :.” 2015. Web. 15 Sep 2019.

Vancouver:

De Wit R. PPU: A Protocol Parsing Unit in Hardware :. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Sep 15]. Available from: http://resolver.tudelft.nl/uuid:8fd22239-6559-48bd-8f55-54c33d64dd32.

Council of Science Editors:

De Wit R. PPU: A Protocol Parsing Unit in Hardware :. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:8fd22239-6559-48bd-8f55-54c33d64dd32

[1] [2] [3] [4] [5] … [81]

.