Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 10 |
| Since 2017 (last 10 years) | 27 |
| Since 2007 (last 20 years) | 142 |
Descriptor
Source
| ProQuest LLC | 142 |
Author
Publication Type
| Dissertations/Theses -… | 142 |
Education Level
| Higher Education | 21 |
| Postsecondary Education | 13 |
| Adult Education | 3 |
| Elementary Secondary Education | 3 |
| Secondary Education | 2 |
| Two Year Colleges | 2 |
| High School Equivalency… | 1 |
| High Schools | 1 |
| Middle Schools | 1 |
Audience
| Administrators | 1 |
Location
| Texas | 3 |
| United States | 3 |
| Florida | 2 |
| New York | 2 |
| Arkansas | 1 |
| Bangladesh | 1 |
| California | 1 |
| Cameroon | 1 |
| District of Columbia | 1 |
| Ethiopia | 1 |
| Kansas | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Peabody Individual… | 1 |
What Works Clearinghouse Rating
Sangpetch, Akkarit – ProQuest LLC, 2013
Large-scale enterprise applications are deployed as distributed applications. These applications consist of many inter-connected components with heterogeneous roles and complex dependencies. Each component typically consumes 5-15% of the server capacity. Deploying each component as a separate virtual machine (VM) allows us to consolidate the…
Descriptors: Computer Networks, Computer Oriented Programs, Reaction Time, Automation
Sukwong, Orathai – ProQuest LLC, 2013
Virtualization enables the ability to consolidate multiple servers on a single physical machine, increasing the infrastructure utilization. Maximizing the ratio of server virtual machines (VMs) to physical machines, namely the consolidation ratio, becomes an important goal toward infrastructure cost saving in a cloud. However, the consolidation…
Descriptors: Information Storage, Scheduling, Internet, Client Server Architecture
Chang, Christopher SungWook – ProQuest LLC, 2012
This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…
Descriptors: Telecommunications, Computer Networks, Coding, Information Science
Liu, Yucong – ProQuest LLC, 2012
Information Technology (IT) business value research is suggested as fundamental to the contribution of the IS discipline. The IS research community has accumulated a critical mass of IT business value studies, but only limited or mixed results have been found on the direct relationship between IT and firm performance. Extant studies mostly focus…
Descriptors: Information Technology, Business Administration, Computer Networks, Innovation
Alomari, Firas – ProQuest LLC, 2013
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
Descriptors: Information Security, Information Systems, Databases, Models
Perigo, Levi – ProQuest LLC, 2013
In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…
Descriptors: Internet, Computer Networks, Business, Information Systems
Chaudhry, Hina – ProQuest LLC, 2013
This study is a part of the smart grid initiative providing electric vehicle charging infrastructure. It is a refueling structure, an energy generating photovoltaic system and charge point electric vehicle charging station. The system will utilize advanced design and technology allowing electricity to flow from the site's normal electric service…
Descriptors: Energy, Motor Vehicles, Computer System Design, Information Technology
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Zhang, Guyu – ProQuest LLC, 2013
This dissertation presents a study of an Unmanned Ground Vehicle (UGV) navigation and coverage hole patching in coordinate-free and localization-free Wireless Sensor Networks (WSNs). Navigation and coverage maintenance are related problems since coverage hole patching requires effective navigation in the sensor network environment. A…
Descriptors: Engineering Technology, Transportation, Navigation (Information Systems), Computer Networks
Alsmirat, Mohammad Abdullah – ProQuest LLC, 2013
Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…
Descriptors: Video Technology, Internet, Equipment Utilization, Time
Yu, Chao – ProQuest LLC, 2013
In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…
Descriptors: Engineering, Computer Networks, Networks, Electronic Equipment
Iqbal, Hammad A. – ProQuest LLC, 2012
Management of large enterprise and Internet service provider networks is a complex, error-prone, and costly challenge. It is widely accepted that the key contributors to this complexity are the bundling of control and data forwarding in traditional routers and the use of fully distributed protocols for network control. To address these…
Descriptors: Computer Networks, Centralization, Administration, Planning
Xu, Yun – ProQuest LLC, 2013
Since information theory was developed by Claude E. Shannon, in addition to its primary role in communications and networking, it has broadened to find applications in many other areas of science and technology, such as microeconomics, statistics, and neuroscience. This thesis investigates the application of information theoretic viewpoints to two…
Descriptors: Microeconomics, Information Theory, Social Networks, Computer Networks
Avci, Serhat Nazim – ProQuest LLC, 2013
Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow, require complex signaling, and instable. Diversity coding is a proactive coding-based recovery technique which offers near-hitless (sub-ms) restoration with a competitive spare capacity…
Descriptors: Computer Networks, Failure, Coding, Database Management Systems
Blakely, Benjamin A. – ProQuest LLC, 2012
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Descriptors: Computer Security, Information Technology, Crime, Crime Prevention

Direct link
