Dissertationen zum Thema „Computer network protocols“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Computer network protocols" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
alyanbaawi, ashraf. „DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS“. OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Der volle Inhalt der QuelleLu, Ching-sung. „Automated validation of communication protocols /“. The Ohio State University, 1986. http://rave.ohiolink.edu/etdc/view?acc_num=osu148726702499786.
Der volle Inhalt der QuelleZissopoulos, Athanassios. „On buffer allocation in transport protocols“. Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66245.
Der volle Inhalt der QuelleDahlgren, Jeremy. „Efficient failure detection protocols for point-to-point communication networks /“. Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.
Der volle Inhalt der QuelleSundaresan, Latha. „Simple network management protocol /“. Online version of thesis, 1995. http://hdl.handle.net/1850/12254.
Der volle Inhalt der QuelleJayakeerthy, Arunkumar Thippur Lim Alvin S. „Query-localized route repair mechanism for ad-hoc on-demand distance vector routing algorithm“. Auburn, Ala, 2009. http://hdl.handle.net/10415/1608.
Der volle Inhalt der QuelleFord, Daniel Alexander. „Semi-automatic implementation of network protocols“. Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24665.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Berglund, Anders. „On the understanding of computer network protocols“. Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86076.
Der volle Inhalt der QuelleAlexander, David. „A Network Metadata Infrastructure for Locating Network Devices“. Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.
Der volle Inhalt der QuelleBaronikian, Haig. „Modelling and analysis of a computer conferencing system“. Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=63756.
Der volle Inhalt der QuelleKou, Tian. „Conformance testing of OSI protocols : the class O transport protocol as an example“. Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Lundy, G. M. „Systems of communicating machines : a model for communication protocols“. Diss., Georgia Institute of Technology, 1988. http://hdl.handle.net/1853/8210.
Der volle Inhalt der QuelleKondareddy, Yogesh Reddy Agrawal Prathima. „MAC and routing protocols for multi-hop cognitive radio networks“. Auburn, Ala, 2008. http://repo.lib.auburn.edu/EtdRoot/2008/SUMMER/Electrical_and_Computer_Engineering/Thesis/Kondareddy_Yogesh_18.pdf.
Der volle Inhalt der QuelleZhou, Yuanyuan. „Energy-efficient protocols and topologies for sensor and personal-area networks“. Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/y_zhou_072307.pdf.
Der volle Inhalt der QuelleRajagopal, Murali. „Protocol conversion : an algorithmic approach“. Diss., Georgia Institute of Technology, 1990. http://hdl.handle.net/1853/13352.
Der volle Inhalt der QuelleLi, Kang. „Modeling the bandwidth sharing behavior of congestion controlled flows /“. Full text open access at:, 2002. http://content.ohsu.edu/u?/etd,632.
Der volle Inhalt der QuelleZhao, Xiaogeng. „An adaptive approach for optimized opportunistic routing over Delay Tolerant Mobile Ad hoc Networks“. Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1004822.
Der volle Inhalt der QuelleLim, Kok Seng. „Analysis of network management protocols in optical networks“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FLim%5FK.pdf.
Der volle Inhalt der QuellePraveenkumar, Ramesh. „Investigation of routing protocols in a sensor network“. Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/praveenkumar.pdf.
Der volle Inhalt der QuelleHui, Daniel Hang-Yan. „Protocol validation via reachability analysis : an implementation“. Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24689.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Gong, Shujia. „Solutions to constrained path computation in multi-layer networks“. Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2932.
Der volle Inhalt der QuelleTitle from PDF t.p. (viewed Jan. 18, 2008). Thesis director: Bijan Jabbari Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Vita: p. 113. Includes bibliographical references (p. 109-112). Also available in print.
Nematbakhsh, Mohammadali. „TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR“. Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.
Der volle Inhalt der QuelleAmirFaiz, Farhad 1959. „DESIGN OF A COMMUNICATION PORT AND IMPLEMENTATION OF A RECONFIGURABLE MEDIA TRANSLATION GATEWAY (COMPUTER, CONNECTION, NETWORK, BRIDGE, COMPATIBLE)“. Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275529.
Der volle Inhalt der QuelleIyengar, Janardhan R. „End-to-end concurrent multipath transfer using transport layer multihoming“. Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.
Der volle Inhalt der QuelleMartina, Jean Everson. „Verification of security protocols based on multicast communication“. Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609650.
Der volle Inhalt der QuelleDany, Hendra. „Application of the ferry clip approach to multi-party and interoperability testing“. Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28971.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Ko, Kai-Chung. „Protocol test sequence generation and analysis using AI techniques“. Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Lo, Jeffrey Kin Hung. „Open systems interconnection passive monitor OSI-PM“. Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29418.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Perlman, Radia Joy. „Network layer protocols with Byzantine robustness“. Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14403.
Der volle Inhalt der QuelleZang, Joanna Q. „Design of a redundancy protocol /“. free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.
Der volle Inhalt der QuelleYang, Junmo Sun Min-Te. „Practical consideration of routing protocols in ad hoc networks“. Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Fall/Dissertations/YANG_JUNMO_37.pdf.
Der volle Inhalt der QuelleMustell, Eliot John. „Internet Protocol Version 6: The Next Generation?“ [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.
Der volle Inhalt der QuelleWu, Chen. „A new TCP protocol based on end-to-end available bandwidth measurement /“. View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.
Der volle Inhalt der QuelleLu, Jing. „Semi-automatic protocol implementation using an Estelle-C compiler, LAPB and RTS protocols as examples“. Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29419.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Jin, Jingren Lim Alvin S. „Improving geographic routing with neighbor sectoring“. Auburn, Ala., 2007. http://hdl.handle.net/10415/1337.
Der volle Inhalt der QuelleHo, Yao Hua. „Connectionless approach--a localized scheme to mobile ad hoc networks“. Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002742.
Der volle Inhalt der QuellePelletier, Larry Edward. „Description of a file access protocol for computer networks“. Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9870.
Der volle Inhalt der QuelleMascarenhas, da Veiga Alves Manoel Eduardo. „Characterisation of end-to-end performance for web-based file server respositories“. Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09ENS/09ensm395.pdf.
Der volle Inhalt der QuelleDobson, Lucas E. „Security analysis of session initiation protocol“. Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Wibling, Oskar. „Creating Correct Network Protocols“. Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.
Der volle Inhalt der QuelleKulkarni, Shrinivas Bhalachandra. „The simulation studies on a behaviour based trust routing protocol for ad hoc networks“. Diss., Online access via UMI:, 2006.
Den vollen Inhalt der Quelle findenShah, Subodh. „CAD-HOC a CAD like tool for generating mobility benchmarks in ad-hoc networks /“. [Gainesville, Fla.] : University of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/anp1049/FinalETDCopy.pdf.
Der volle Inhalt der QuelleTitle from first page of PDF file. Document formatted into pages; contains xiii, 90 p.; also contains graphics. Vita. Includes bibliographical references (p. 85-89).
Wong, Wan-Ching. „SALM : an efficient application-level multicast protocol for dynamic groups /“. View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WONGW.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 75-79). Also available in electronic version. Access restricted to campus users.
Vik, Knut-Helge. „Quality of service aware source initiated ad-hoc routing“. Online access for everyone, 2004. http://www.dissertations.wsu.edu/thesis/Spring2004/K%5FVik%5F050704.pdf.
Der volle Inhalt der QuelleMiao, Jun. „Load balance in overlay multicast /“. View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20MIAO.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 59-62). Also available in electronic version. Access restricted to campus users.
Cheuk, Kin-Wai. „Island multicast : the combination of IP-multicast with application-level multicast /“. View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20CHEUK.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 34-37). Also available in electronic version. Access restricted to campus users.
Ahmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. „Performance analysis and improvement of the Open Shortest Path First routing protocol“. Ottawa.:, 1999.
Den vollen Inhalt der Quelle findenPenton, Jason Barry. „An empirical, in-depth investigation into service creation in H.323 Version 4 Networks“. Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1007637.
Der volle Inhalt der QuelleSon, Chang Won. „Functional description and formal specification of a generic gateway“. Diss., The University of Arizona, 1988. http://hdl.handle.net/10150/184534.
Der volle Inhalt der QuelleTam, Wing-yan. „Quality of service routing with path information aggregation“. Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36782956.
Der volle Inhalt der Quelle