Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 67 |
Descriptor
Computer System Design | 67 |
Information Technology | 67 |
Computer Software | 27 |
Internet | 20 |
Programming | 18 |
Computer Security | 15 |
Information Systems | 12 |
Models | 12 |
Computer Networks | 10 |
Information Management | 9 |
Computer Science | 8 |
More ▼ |
Source
ProQuest LLC | 67 |
Author
AL Faresi, Ahmed | 1 |
Abaas, Kanari | 1 |
Agyapong, Parick Kwadwo | 1 |
Ali, Qasim | 1 |
Alodhaibi, Khalid | 1 |
Amin, Rohan Mahesh | 1 |
An, Ho | 1 |
Anderson, George W. | 1 |
Bitton, Ephrat | 1 |
Boxwell, Stephen A. | 1 |
Chaudhry, Hina | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 67 |
Education Level
Adult Education | 4 |
Higher Education | 4 |
Elementary Secondary Education | 2 |
Audience
Location
United States | 2 |
Indiana | 1 |
Minnesota | 1 |
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
Nicholas Kofi Akortia Hagan – ProQuest LLC, 2024
Entity Resolution (ER) has been one of the bedrocks in the creation of information systems by ensuring ambiguous entities are identified and resolved by linking. One common design approach of traditional ER systems is to run in single-threaded mode, which makes the system prone to out-of-memory error when processing larger datasets. The Data…
Descriptors: Information Systems, Multivariate Analysis, Information Management, Computer System Design
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Kathryn Gray – ProQuest LLC, 2024
Graph data, especially large graph data, come up in many domains, such as social networks, the map of science, biological data, and even knitting! This presents a problem when we consider visualizing these structures. Layouts must be chosen carefully so that the structure of the graph is visible. Some graphs are large enough and connected enough…
Descriptors: Visualization, Graphs, Layout (Publications), Readability
Yoas, Daniel W. – ProQuest LLC, 2013
Researchers have spent years understanding resource utilization to improve scheduling, load balancing, and system management through short-term prediction of resource utilization. Early research focused primarily on single operating systems; later, interest shifted to distributed systems and, finally, into web services. In each case researchers…
Descriptors: Information Technology, Prediction, Internet, Computer System Design
Russell, Kyle – ProQuest LLC, 2014
While accessibility of information technologies is often acknowledged as important, it is frequently not well addressed in practice. The purpose of this study was to examine the work of web developers and content managers to explore why and how accessibility is or is not addressed as an objective as websites are planned, built and maintained.…
Descriptors: Computer System Design, Web Sites, Access to Information, Information Technology
Chaudhry, Hina – ProQuest LLC, 2013
This study is a part of the smart grid initiative providing electric vehicle charging infrastructure. It is a refueling structure, an energy generating photovoltaic system and charge point electric vehicle charging station. The system will utilize advanced design and technology allowing electricity to flow from the site's normal electric service…
Descriptors: Energy, Motor Vehicles, Computer System Design, Information Technology
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy
Agyapong, Parick Kwadwo – ProQuest LLC, 2013
Content-centric networking (CCN) has emerged as a dominant paradigm for future Internet architecture design due to its efficient support for content dissemination, which currently dominates Internet use. This dissertation shows how economic and social welfare analysis can be used to inform the design of a CCN architecture that provides network…
Descriptors: Computer Networks, Internet, Information Dissemination, Computer System Design
Kramer, Aleksey – ProQuest LLC, 2013
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
Descriptors: Computer Software, Computer Security, Information Technology, Demography
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
Loh, Matthew – ProQuest LLC, 2013
The scalability of CMOS technology has driven computation into a diverse range of applications across the power consumption, performance and size spectra. Communication is a necessary adjunct to computation, and whether this is to push data from node-to-node in a high-performance computing cluster or from the receiver of wireless link to a neural…
Descriptors: Power Technology, Scaling, Computer Science, Computation
Clark, Joseph Warren – ProQuest LLC, 2012
In turbulent business environments, change is rapid, continuous, and unpredictable. Turbulence undermines those adaptive problem solving methods that generate solutions by extrapolating from what worked (or did not work) in the past. To cope with this challenge, organizations utilize trial-based problem solving (TBPS) approaches in which they…
Descriptors: Problem Solving, Simulation, Marketing, Models
Kharabe, Amol T. – ProQuest LLC, 2012
Over the last two decades, firms have operated in "increasingly" accelerated "high-velocity" dynamic markets, which require them to become "agile." During the same time frame, firms have increasingly deployed complex enterprise systems--large-scale packaged software "innovations" that integrate and automate…
Descriptors: Computer Software, Computer System Design, Innovation, Organizational Effectiveness
Zhao, Weiyi – ProQuest LLC, 2011
Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…
Descriptors: Telecommunications, Internet, Computer System Design, Handheld Devices
An Approach to Semantic Interoperability for Improved Capability Exchanges in Federations of Systems
Moschoglou, Georgios – ProQuest LLC, 2013
This study seeks an affirmative answer to the question whether a knowledge-based approach to system of systems interoperation using semantic web standards and technologies can provide the centralized control of the capability for exchanging data and services lacking in a federation of systems. Given the need to collect and share real-time…
Descriptors: Semantics, Information Technology, Standards, Information Systems