Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Networks | 9 |
Computer Simulation | 9 |
Efficiency | 2 |
Engineering | 2 |
Information Security | 2 |
Information Storage | 2 |
Information Technology | 2 |
Interaction | 2 |
Mathematics | 2 |
Models | 2 |
Simulated Environment | 2 |
More ▼ |
Source
ProQuest LLC | 9 |
Author
Avci, Serhat Nazim | 1 |
Douglas R. Bowie | 1 |
Gendreau, Audrey | 1 |
Ho, Shuyuan Mary | 1 |
Lampi, Evans | 1 |
Mayrath, Michael Charles | 1 |
Wilson, Joe M. | 1 |
Younge, Andrew J. | 1 |
Zhang, Guyu | 1 |
Publication Type
Dissertations/Theses -… | 9 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Zambia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Douglas R. Bowie – ProQuest LLC, 2023
This mixed methods research study explores the university student learning experience of IP subnetting. Using a constructivist perspective, VR software was designed, written, and utilized in a learning process to gather both quantitative and qualitative data about the experience of learning IP subnetting. Participants underwent pre-test and…
Descriptors: Simulated Environment, Computer Simulation, Student Experience, Computer Networks
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Zhang, Guyu – ProQuest LLC, 2013
This dissertation presents a study of an Unmanned Ground Vehicle (UGV) navigation and coverage hole patching in coordinate-free and localization-free Wireless Sensor Networks (WSNs). Navigation and coverage maintenance are related problems since coverage hole patching requires effective navigation in the sensor network environment. A…
Descriptors: Engineering Technology, Transportation, Navigation (Information Systems), Computer Networks
Avci, Serhat Nazim – ProQuest LLC, 2013
Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow, require complex signaling, and instable. Diversity coding is a proactive coding-based recovery technique which offers near-hitless (sub-ms) restoration with a competitive spare capacity…
Descriptors: Computer Networks, Failure, Coding, Database Management Systems
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Lampi, Evans – ProQuest LLC, 2013
The effectiveness of using virtual labs to train students in computer networking skills, when real equipment is limited or unavailable, is uncertain. The purpose of this study was to determine the effectiveness of using virtual labs to train students in the acquisition of computer network configuration and troubleshooting skills. The study was…
Descriptors: Foreign Countries, Simulated Environment, Computer Simulation, Teaching Methods
Ho, Shuyuan Mary – ProQuest LLC, 2009
This study examines perceptions of human "trustworthiness" as a key component in countering insider threats. The term "insider threat" refers to situations where a critical member of an organization behaves against the interests of the organization, in an illegal and/or unethical manner. Identifying and detecting how an individual's behavior…
Descriptors: Computer Networks, Credibility, Perception, Organizations (Groups)
Mayrath, Michael Charles – ProQuest LLC, 2009
This study examined the effects of manipulating the modality (text-only, voice-only, voice+text) of a tutorial and restriction (restricted vs. unrestricted) of a simulation's interface on retention and transfer of tutorial content. The tutorial prepared novice students to use Packet Tracer, a simulation developed by Cisco that teaches network…
Descriptors: Multiple Choice Tests, Interaction, Educational Technology, Computer Networks