Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Coding | 4 |
Computer Networks | 4 |
Information Technology | 4 |
Computer Security | 3 |
Computer Science | 2 |
Computer Software | 2 |
Models | 2 |
Risk | 2 |
Telecommunications | 2 |
Access to Information | 1 |
Acoustics | 1 |
More ▼ |
Source
ProQuest LLC | 3 |
Online Submission | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Collected Works - Serial | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software