NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Ronny Pacheco – ProQuest LLC, 2020
Motivated by applications in health care systems, this study focused on queueing network models with instances of simultaneous resource possession under capacity restrictions in different stages. Customers during service at certain nodes in the first-level or primary system may simultaneously need service from a second-level server. In this…
Descriptors: Engineering, Engineering Technology, Computer Networks, Resource Allocation
DeSerranno, Allen Ronald – ProQuest LLC, 2017
Internet of Things ("IoT") systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within…
Descriptors: Computer Software, Internet, Computer Networks, Engineering
Chang, Christopher SungWook – ProQuest LLC, 2012
This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…
Descriptors: Telecommunications, Computer Networks, Coding, Information Science
Yu, Chao – ProQuest LLC, 2013
In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…
Descriptors: Engineering, Computer Networks, Networks, Electronic Equipment
Avci, Serhat Nazim – ProQuest LLC, 2013
Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow, require complex signaling, and instable. Diversity coding is a proactive coding-based recovery technique which offers near-hitless (sub-ms) restoration with a competitive spare capacity…
Descriptors: Computer Networks, Failure, Coding, Database Management Systems
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Yousif, Wael K. – ProQuest LLC, 2010
This causal and correlational study was designed to extend the Technology Acceptance Model (TAM) and to test its applicability to Valencia Community College (VCC) Engineering and Technology students as the target user group when investigating the factors influencing their decision to adopt and to utilize VMware as the target technology. In…
Descriptors: Employment Level, Self Efficacy, Academic Achievement, Intention