NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 16 results Save | Export
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Xiang, Qiao – ProQuest LLC, 2014
As wireless cyber-physical systems (WCPS) are increasingly being deployed in mission-critical applications, it becomes imperative that we consider application QoS requirements in in-network processing (INP). In this dissertation, we explore the potentials of two INP methods, packet packing and network coding, on improving network performance while…
Descriptors: Computer Networks, Telecommunications, Efficiency, Reliability
Dikaliotis, Theodoros K. – ProQuest LLC, 2013
In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…
Descriptors: Computer Networks, Information Security, Information Systems, Coding
Chang, Christopher SungWook – ProQuest LLC, 2012
This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…
Descriptors: Telecommunications, Computer Networks, Coding, Information Science
Yu, Chao – ProQuest LLC, 2013
In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…
Descriptors: Engineering, Computer Networks, Networks, Electronic Equipment
Xu, Yun – ProQuest LLC, 2013
Since information theory was developed by Claude E. Shannon, in addition to its primary role in communications and networking, it has broadened to find applications in many other areas of science and technology, such as microeconomics, statistics, and neuroscience. This thesis investigates the application of information theoretic viewpoints to two…
Descriptors: Microeconomics, Information Theory, Social Networks, Computer Networks
Avci, Serhat Nazim – ProQuest LLC, 2013
Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow, require complex signaling, and instable. Diversity coding is a proactive coding-based recovery technique which offers near-hitless (sub-ms) restoration with a competitive spare capacity…
Descriptors: Computer Networks, Failure, Coding, Database Management Systems
Arnold, Bradley A. – ProQuest LLC, 2018
The purpose of this qualitative case study was to develop descriptions of how teenage students remain engaged in learning while using mobile technology. Developments in technology have expanded learning contexts and provided learners with improved capacities to connect with others to exchange, gain, and construct knowledge. Developments in…
Descriptors: Middle School Students, Telecommunications, Learning Activities, Qualitative Research
Appuswamy, Rathinakumar – ProQuest LLC, 2011
In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…
Descriptors: Computer Networks, Computation, Problem Solving, Computer Science
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Losee, Robert M., Jr. – 1990
Messages entering an educational information distribution network may be ranked for an ordered introduction into the network to maximize the timeliness of message arrivals over the set of users. Electronic mail, EDI documents, and broadcast news may be ranked by the users who choose to examine those messages of interest or benefit to themselves.…
Descriptors: Coding, Computer Networks, Electronic Mail, Gateway Systems
Peer reviewed Peer reviewed
Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Previous Page | Next Page ยป
Pages: 1  |  2