NotesFAQContact Us
Collection
Advanced
Search Tips
Source
ProQuest LLC142
Publication Type
Dissertations/Theses -…142
Laws, Policies, & Programs
Assessments and Surveys
Peabody Individual…1
What Works Clearinghouse Rating
Showing 91 to 105 of 142 results Save | Export
McNeal, McKenzie, III. – ProQuest LLC, 2012
Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…
Descriptors: Computer Mediated Communication, Information Security, Computer Security, Communications
Arnold, Erik P. – ProQuest LLC, 2014
A multiple-case qualitative study of five school districts that had implemented various large-scale technology initiatives was conducted to describe what superintendents do to gain acceptance of those initiatives. The large-scale technology initiatives in the five participating districts included 1:1 District-Provided Device laptop and tablet…
Descriptors: Superintendents, Case Studies, Qualitative Research, School Districts
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Giordano, Eugenio – ProQuest LLC, 2011
Many of the devices we interact with on a daily basis are currently equipped with wireless connectivity. Soon this will be extended to the vehicles we drive/ride every day. Wirelessly connected vehicles will form a new kind of network that will enable a wide set of innovative applications ranging from enhanced safety to entertainment. To…
Descriptors: Telecommunications, Computer Networks, Motor Vehicles, Mobility
Wang, Wei – ProQuest LLC, 2010
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Descriptors: Computer Networks, Computer Security, Graphs, Evaluation Methods
Pazdrowski, Tomasz – ProQuest LLC, 2013
Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…
Descriptors: Innovation, Resistance to Change, Internet, Adoption (Ideas)
Rangan, Prahalad – ProQuest LLC, 2010
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
Descriptors: Computer Security, Topology, Computer Networks, Computers
Srinivasan, Satish Mahadevan – ProQuest LLC, 2010
Data Aggregation (DA) is a set of functions that provide components of a distributed system access to global information for purposes of network management and user services. With the diverse new capabilities that networks can provide, applicability of DA is growing. DA is useful in dealing with multi-value domain information and often requires…
Descriptors: Data, Computer Networks, Computer Security, Access to Information
Johnson, R. LeWayne – ProQuest LLC, 2012
Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…
Descriptors: Information Technology, Governance, Federal Government, Information Security
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Shambare, Narcissus – ProQuest LLC, 2013
The problem examined in the proposed study was the underutilization of the intranet portals (IP) by faculty in institutions of higher education (IHE). Despite the time and investment allocated to the IP, the technology remains underutilized to improve productivity, efficiency, and justify its investment yet there is lack of understanding of why…
Descriptors: Computer Networks, Computer Uses in Education, College Faculty, Educational Technology
Paul, Utpal Kumar – ProQuest LLC, 2012
Since the days Internet traffic proliferated, measurement, monitoring and analysis of network traffic have been critical to not only the basic understanding of large networks, but also to seek improvements in resource management, traffic engineering and security. At the current times traffic in wireless local and wide area networks are facing…
Descriptors: Computer Networks, Telecommunications, Information Networks, Handheld Devices
Salamanca, Juan – ProQuest LLC, 2012
With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…
Descriptors: Social Theories, Social Networks, Computer Networks, Man Machine Systems
Cuthrell, Michael Gerard – ProQuest LLC, 2011
Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…
Descriptors: Information Technology, Information Systems, Telecommunications, Expertise
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10