Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 10 |
| Since 2017 (last 10 years) | 27 |
| Since 2007 (last 20 years) | 142 |
Descriptor
Source
| ProQuest LLC | 142 |
Author
Publication Type
| Dissertations/Theses -… | 142 |
Education Level
| Higher Education | 21 |
| Postsecondary Education | 13 |
| Adult Education | 3 |
| Elementary Secondary Education | 3 |
| Secondary Education | 2 |
| Two Year Colleges | 2 |
| High School Equivalency… | 1 |
| High Schools | 1 |
| Middle Schools | 1 |
Audience
| Administrators | 1 |
Location
| Texas | 3 |
| United States | 3 |
| Florida | 2 |
| New York | 2 |
| Arkansas | 1 |
| Bangladesh | 1 |
| California | 1 |
| Cameroon | 1 |
| District of Columbia | 1 |
| Ethiopia | 1 |
| Kansas | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Peabody Individual… | 1 |
What Works Clearinghouse Rating
Peacock, Christopher – ProQuest LLC, 2012
The purpose of this research effort was to develop a model that provides repeatable Location Management (LM) testing using a network simulation tool, QualNet version 5.1 (2011). The model will provide current and future protocol developers a framework to simulate stable protocol environments for development. This study used the Design Science…
Descriptors: Computer Networks, Telecommunications, Models, Simulation
Nguyen, Lilly Uyen – ProQuest LLC, 2013
This dissertation explores the social worlds of pirated software discs and free/open source software in Vietnam to describe the practices of copying, evangelizing, and translation. This dissertation also reveals the cultural logics of similarity and continuity that sustain these social worlds. Taken together, this dissertation argues that the…
Descriptors: Foreign Countries, Computer Networks, Computer Software, Copyrights
Arnold, Bradley A. – ProQuest LLC, 2018
The purpose of this qualitative case study was to develop descriptions of how teenage students remain engaged in learning while using mobile technology. Developments in technology have expanded learning contexts and provided learners with improved capacities to connect with others to exchange, gain, and construct knowledge. Developments in…
Descriptors: Middle School Students, Telecommunications, Learning Activities, Qualitative Research
Lundquist, Doug – ProQuest LLC, 2011
The increasing power and ubiquity of mobile wireless devices is enabling real-time information delivery for many diverse applications. A crucial question is how to allocate finite network resources efficiently and fairly despite the uncertainty common in highly dynamic mobile ad hoc networks. We propose a set of routing protocols, Self-Balancing…
Descriptors: Handheld Devices, Telecommunications, Computer Networks
He, Jing – ProQuest LLC, 2012
Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network.…
Descriptors: Computer Networks, Telecommunications, Topology, Energy Conservation
Yu, Han – ProQuest LLC, 2012
In this dissertation, several control problems are studied that arise when passive or dissipative systems are interconnected and controlled over a communication network. Since communication networks can impact the systems' stability and performance, there is a need to extend the results on control of passive or dissipative systems to networked…
Descriptors: Information Systems, Information Technology, Network Analysis, Computer Networks
Van Epps, Daniel L. – ProQuest LLC, 2013
Expanded telecommunications was deemed a serious need for end users. The "Local Market" and "Last Mile" market segments have largely consolidated into "natural utilities". Competition and access problems occur if new providers enter the local market and desire competitive access and service to end users. Local and…
Descriptors: Telecommunications, Competition, Barriers, Laboratories
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Islam, Muhammad Faysal – ProQuest LLC, 2013
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or downsize their services as needed. In a cloud environment,…
Descriptors: Risk Assessment, Statistical Analysis, Reliability, Computer Networks
Mitra, Pramita – ProQuest LLC, 2013
Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…
Descriptors: Handheld Devices, Shared Resources and Services, Computer Oriented Programs, Protocol Materials
Melkonyan, Arsen – ProQuest LLC, 2013
Location technologies constitute an essential component of systems design for autonomous operations and control. The Global Positioning System (GPS) works well in outdoor areas, but the satellite signals are not strong enough to penetrate inside most indoor environments. As a result, a new strain of indoor positioning technologies that make use of…
Descriptors: Computer Networks, Telecommunications, Educational Technology, Handheld Devices
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Roble, Amanda Jean – ProQuest LLC, 2015
The use of formative assessment can increase student achievement (Black & Wiliam, 1998a). However, some of the challenges of incorporating formative assessment into instruction include the length of time needed to collect, assess and provide feedback to all students and dealing with students misunderstandings and incorrect answers that are…
Descriptors: Formative Evaluation, Evaluation Methods, Secondary School Teachers, Mathematics Teachers
Herrera-Ruiz, Octavio – ProQuest LLC, 2012
Peer-to-Peer (P2P) technology has emerged as an important alternative to the traditional client-server communication paradigm to build large-scale distributed systems. P2P enables the creation, dissemination and access to information at low cost and without the need of dedicated coordinating entities. However, existing P2P systems fail to provide…
Descriptors: Information Technology, Client Server Architecture, Computer Networks, Automation
Vigil-Hayes, Morgan Ashlee – ProQuest LLC, 2017
The Internet as a networked system has been rendered more complex than ever before as human endpoints are grafted into the system via increasingly pervasive and personalized networked devices. According to the United Nations, the Internet is a transnational enabler of a number of human rights, and as such, access to the Internet has been…
Descriptors: Internet, Computer Networks, Social Networks, Access to Information

Direct link
