Rozprawy doktorskie na temat „Multi-access”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Multi-access”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Greaves, David J. "Multi-access metropolitan area networks". Thesis, University of Cambridge, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303053.
Pełny tekst źródłaShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Pełny tekst źródłaChoi, Byoung Jo. "Multi-carrier code division multiple access". Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394098.
Pełny tekst źródłaStirling-Gallacher, Richard. "Multi-carrier code division multiple access". Thesis, University of Edinburgh, 1997. http://hdl.handle.net/1842/13027.
Pełny tekst źródłaAthamnah, Malek. "ENABLING MULTI-PARTY COLLABORATIVE DATA ACCESS". Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/528695.
Pełny tekst źródłaPh.D.
Cloud computing has brought availability of services at unprecedented scales but data accessibility considerations become more complex due to involvement of multiple parties in providing the infrastructure. In this thesis, we discuss the problem of enabling cooperative data access in a multi-cloud environment where the data is owned and managed by multiple enterprises. We consider a multi-party collaboration scheme whereby a set of parties collectively decide accessibility to data from individual parties using different data models such as relational databases, and graph databases. In order to implement desired business services, parties need to share a selected portion of information with one another. We consider a model with a set of authorization rules over the joins of basic relations, and such rules are defined by these cooperating parties. The accessible information is constrained by these rules. Specifically, the following critical issues were examined: Combine rule enforcement and query planning and devise an algorithm which simultaneously checks for the enforceability of each rule and generation of minimum cost plan of its execution using a cost metric whenever the enforcement is possible; We also consider other forms of limiting the access to the shared data using safety properties and selection conditions. We proposed algorithms for both forms to remove any conflicts or violations between the limited accesses and model queries; Used graph databases with our authorization rules and query planning model to conduct similarity search between tuples, where we represent the relational database tuples as a graph with weighted edges, which enables queries involving "similarity" across the tuples. We proposed an algorithm to exploit the correlations between attributes to create virtual attributes that can be used to catch much of the data variance, and enhance the speed at which similarity search occurs; Proposed a framework for defining test functionalities their composition, and their access control. We discussed an algorithm to determine the realization of the given test via valid compositions of individual functionalities in a way to minimize the number of parties involved. The research significance resides in solving real-world issues that arise in using cloud services for enterprises After extensive evaluations, results revealed: collaborative data access model improves the security during cooperative data processes; systematic and efficient solving access rules conflict issues minimizes the possible data leakage; and, a systematic approach tackling control failure diagnosis helps reducing troubleshooting times and all that improve availability and resiliency. The study contributes to the knowledge, literature, and practice. This research opens up the space for further studies in various aspects of secure data cooperation in large-scale cyber and cyber-physical infrastructures.
Temple University--Theses
Wang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective". Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.
Pełny tekst źródłaGarnes, Håvard Husevåg. "Access Control in Multi-Thousand-Machine Datacenters". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9730.
Pełny tekst źródłaLarge data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in large-scale data centers. This thesis looks into existing solutions for the authentication step of access control in large data centers, and analyses how two authentication systems, Kerberos and PKI, will perform when employed on a larger scale, beyond what is normal in a large data center today. The emphasis in the analysis is on possible bottlenecks in the system, computational power spent on access control routines, procedures for administration and key distribution and availability of extension features needed in large scale data center scenarios. Our administration analysis will propose and present possible methods for initial key distribution to new machines in the data center, as well as methods for enrolling new users. We will also propose a method for automatic service instantiation in Kerberos and present a method for service instantiation in PKI. We will look at how the systems handle failed machines in the network, and look at how the systems handle breaches of trusted components. Our performance analysis will show that under given assumptions, both Kerberos and PKI will handle the average load in a hypothetical data center consisting of 100000 machines and 1000 users. We will also see that under an assumed peak load, Kerberos will be able to handle 10000 service requests in under 1 second, whereas the PKI solution would need at least 15 seconds to handle the same number of requests using recommended public key sizes. This means that some programs may need special configurations to work in a PKI system under high load.
羅福隆 i Fook-loong Lo. "Performance of multi-channel random access networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31236029.
Pełny tekst źródłaTelatar, Ä°brahim Emre. "Multi-access communications with decision feedback decoding". Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/13237.
Pełny tekst źródłaIncludes bibliographical references (leaves 84-85) and index.
by Ä°brahim Emre Telatar.
Ph.D.
Yang, Xu. "Multi-channel Mobile Access to Web Services". Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/30270.
Pełny tekst źródłaPh. D.
Lo, Fook-loong. "Performance of multi-channel random access networks /". Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18635568.
Pełny tekst źródłaChebrolu, Kameswari. "Multi-access services in heterogeneous wireless networks /". Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3127621.
Pełny tekst źródłaKhadraoui, Younes. "Towards a seamless multi-technology access network". Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0411/document.
Pełny tekst źródłaThe mobile data traffic has been continuously increasing. To avoid saturation of cellular network, operators need to use alternative access networks for offloading purpose. WiFi is a good solution as the operator can take advantage of its unlicensed spectrum as well as the large number of deployed WiFi access points.In this thesis, we first provide a state-of-the-art of the different coupling solutions between LTE and WiFi. We show that most solutions cannot guarantee session continuity or duplicate the security procedures. This leads to propose "Very Tight Coupling" between LTE and WiFi. In this architecture, WiFi access points are connected to the LTE base stations and the security mechanisms of LTE are reused to ensure fast access to WiFi. It allows dual connectivity and to keep control signalling in the LTE network, which gives the possibility to have optimized interface selection procedures.We study how very tight coupling can be implemented and how WiFi APs that integrated in customer residential gateways can be connected to LTE base stations in a converged fixed/cellular network. We then mathematically evaluate the performance of different deployment schemes and compute how much capacity can be saved on the LTE network. Furthermore, we implement the solution on a platform with a real LTE radio interface based on the Open Air Interface framework as a proof-of-concept. We perform several experiments to find the configuration of the link-layer protocols that gives the highest bit rate. In particular, we show that using WiFi and LTE simultaneously does not always increase the bit rate
Anastasopoulos, Achilles. "Cross model access in the multi-lingual, multi-model database management system". Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8178.
Pełny tekst źródłaRelational, hierarchical, network, functional, and object oriented databases support its corresponding query language, SQL, DL/I, CODASYL-DML, DAPLEX, and OO-DML, respectively. However, each database type may be accessed only by its own language. The goal of M2DBMS is to provide a heterogeneous environment in which any supported database is accessible by any supported query language. This is known as cross model access capability. In this thesis, relational to object oriented database cross model access is successfully implemented for a test database. Data from the object oriented database EWIROODB is accessed and retrieved, using an SQL query from the relational database EWIROODB. One problem is that the two interfaces (object oriented and relational) create catalog files with different formation, which makes the cross model access impossible, initially. In this thesis the relational created catalog file is used, and the cross model access capability is achieved. The object oriented catalog file must be identical with the relational one. Therefore, work yet to be done is to write a program that automatically reformats the object oriented catalog file into an equivalent relational catalog file
Susani, Nahid. "On Open Platform for Multi-Access Edge Computing". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Znajdź pełny tekst źródłaWuilbercq, Romain. "Multi-disciplinary modelling of future space-access vehicles". Thesis, University of Strathclyde, 2015. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=24967.
Pełny tekst źródłaSETTE, Ioram Schechtman. "Access control in IaaS multi-cloud heterogeneous environments". Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/22436.
Pełny tekst źródłaMade available in DSpace on 2017-11-30T16:45:19Z (GMT). No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) Ioram_Sette_PhD_Thesis.pdf: 10382850 bytes, checksum: a2a362f0971460d5758e3cf1ff71db96 (MD5) Previous issue date: 2016-08-11
CNPQ
Multiple Cloud Service Providers (CSPs) coexist nowadays offering their services competitively. To avoid vendor lock-in, users hire many services from an outsourced heterogeneous multi-cloud environment. This way, data and system security usually depend on isolated mechanism existing in each provider. Access Control (AC) mechanisms are responsible for the authentication, identification and authorisation of users to resources. In the case of a multi-cloud environment, users often need to authenticate multiple times and also to define security policies for each CSP, which can possibly result in inconsistencies. The objective of this thesis is to provide a homogeneous access experience for users of heterogeneous multi-cloud services. Identity federations allow the Single Sign-On (SSO), i.e. users are identified and authenticated once by Identity Providers (IdPs) and gain access to trusted federated services. Nevertheless, authorisation federations or AC federations are not usual. Each cloud service uses to have its own AC mechanism, with their own policy definition languages. This work defines a solution that provides homogeneous authentication and authorisation to multiple heterogeneous Infrastructure as a Service (IaaS) platforms. This is possible through Identity Federations and Authorisation Policy Federations (APFs). In this solution, security policies are centrally stored in a “Disjunctive Normal Form (DNF)” and are semantically defined in terms of an Ontology. Therefore, cloud tenants can create APFs and bind their different accounts to them. Thus, global authorisation rules, defined and managed by the APF, can be enforced on all federated member accounts, providing a homogeneous access experience. A system prototype, composed of a central Policy Administration Point (PAP), called Federated Authorisation Policy Management Service (FAPManS), policy adaptors (translators) and a policy synchronization mechanism, was implemented for OpenStack and Amazon Web Services (AWS) cloud platforms. An ontology was also created based on their access control technologies. The “Level of Semantic Equivalence (LSE)” was defined as a metric that gives the percentage of policy rules that could be translated to the ontology terms. In the validation of this solution, authorization policies based on examples publicly provided by OpenStack and AWS were converted to ontology-based global rules and vice-versa with LSE above 80%.
Múltiplos provedores de computação em nuvem convivem hoje ofertando seus serviços de forma competitiva. Para evitar dependência (o chamado vendor lock-in), usuários utilizam muitos serviços em ambiente terceirizado e heterogêneo multi-nuvens. Desta forma, a segurança de dados e sistemas depende normalmente de mecanismos existentes isoladamente em cada um dos provedores. Mecanismos de controle de acesso são responsáveis pela autenticação, identificação e autorização dos usuários aos recursos. No caso de ambiente multi-nuvens, usuários geralmente precisam se autenticar diversas vezes e definir políticas de segurança para cada um dos serviços, que possivelmente podem apresentar inconsistências. O objetivo desta tese é proporcionar aos usuários de sistemas heterogêneos multi-nuvens uma experiência de acesso homogênea a estes serviços. Federações de identidade proporcionam o Single Sign-On (SSO), ou seja, os usuários são identificados e autenticados por provedores de identidade (IdPs) uma única vez e, através de protocolos como OpenID Connect, SAML ou ABFAB, recebem acesso a serviços federados com os quais possuem relação de confiança. No entanto, federações de autorização ou de políticas de controle de acesso não são comuns. Cada serviço de nuvem costuma ter seu próprio mecanismo de controle de acesso, com linguagens próprias de definição de políticas. Este trabalho define uma solução que provê autenticação e autorização homogêneas a usuários de múltiplos serviços de computação em nuvem heterogêneos no modelo de Infraestrutura como Serviço (IaaS). Isso é possível através de federações de identidade e de políticas de autorização. Nesta solução, políticas de segurança são armazenadas de forma centralizada no padrão “DNF” com semântica definida em uma Ontologia. Portanto, clientes de nuvens podem criar “Federações de Políticas de Autorização (APFs)” e associar suas contas em cada provedor a estas federações. Desta forma, regras de autorização globais, definidas e gerenciadas pela APF, passam a valer em todas as contas que fazem parte da federação, garantindo uma experiência homogênea de acesso. Um protótipo do sistema, composto de um Ponto de Administração de Políticas (PAP) centralizado e mecanismos de tradução e sincronismo de políticas, foi implementado para nuvens OpenStack e Amazon Web Services (AWS). Uma ontologia também foi definida baseada no controle de acesso destas tecnologias. A métrica “nível de equivalência semântica (LSE)” foi definida para calcular o percentual de regras de uma política que pode ser traduzido para termos de uma ontologia. Na validação da solução, políticas de autorização baseadas em exemplos fornecidos por OpenStack e AWS foram convertidos para regras globais, baseadas na ontologia, e vice-versa, com nível de equivalência semântica superior a 80%.
CHOWDHURY, KAUSHIK ROY. "MULTI-CHANNEL MEDIUM ACCESS PROTOCOLS FOR WIRELESS NETWORKS". University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1142571415.
Pełny tekst źródłaLim, Christopher. "Optimizing access radio in multi-radio mesh network /". View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIM.
Pełny tekst źródłaForte, Manuela. "Access to broadcasting platforms in multi-sided markets". Thesis, IMT Alti Studi Lucca, 2010. http://e-theses.imtlucca.it/40/1/Forte_phdthesis.pdf.
Pełny tekst źródłaZandegran, Antony Jeyasehar Ansel. "Multi-operator, Multi-Radio Performance Monitoring and Context-Aware access Provision Test-bed". Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141707.
Pełny tekst źródłaRondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Znajdź pełny tekst źródłaHussain, Tassadaq. "A novel access pattern-based multi-core memory architecture". Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/284910.
Pełny tekst źródłaLes aplicacions de computació d'alt rendiment (HPC) s'executen cada vegada més en plataformes heterogènies de múltiples nuclis. El motiu bàsic de la creixent popularitat d'aquestes arquitectures és el seu baix consum i la seva natura orientada a alt throughput. No obstant, aquest thoughput imposa el requeriment de que les dades es proporcionin al sistema també amb alt throughput. Això resulta en la necessitat de gestionar eficientment les trasferències de memòria (dins i fora del chip), un repte significatiu. Els patrons de transferències de memòria regulars però complexos així com els irregulars són cada vegada més dominants per a diversos dominis d'aplicacions, incloent el científic i el processat d'imagte i senyals. Aquests accessos a dades poden ser organitzats en patrons independents que un gestor de memòria eficient pot explotar. Els mètodes basats en programari emprant memòries cau de propòsit general i memòries al chip són beneficioses fins a cert punt. No obstant, la tasca de gestionar eficientment les transferències de dades per a dispositius orientats a throughput pot ser millorada oferint mecanismes hardware que explotin el coneixement dels patrons d'accés de les aplicacions, així com la planificació dels accessos a una arquitectura de múltiples nuclis. Aquesta tesis està enfocada a explorar una arquitectura de memòria novedosa per a processadors de múltiples nuclis, basada en els patrons d'accés. En general, la recerca de la tesis cobreix quatres aspectes principals del sistema de memòria. Aquests aspectes són: i) sistema de memòria per a un únic nucli amb patrons regulars, ii) sistema de memòria per a múltiples nuclis amb patrons regulars, iii) sistema de memòria per a un únic nucli amb patrons irregulars, iv) sistema de memòria per a múltiples nuclis amb patrons irregulars.
Kwak, Hyunsun. "Study on Access Protocols for Multi-hop Wireless LAN". 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/147594.
Pełny tekst źródłaYe, Qianyun. "2.4-GHz Wireless Network Based Multi-Tag Access System". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188491.
Pełny tekst źródłaMuayyadi, Ali. "Wavelet-based multi-carrier code division multiple access systems". Thesis, University of Plymouth, 2003. http://hdl.handle.net/10026.1/527.
Pełny tekst źródłaJun, Sang-Woo. "Scalable multi-access flash store for Big Data analytics". Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/87947.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 47-49).
For many "Big Data" applications, the limiting factor in performance is often the transportation of large amount of data from hard disks to where it can be processed, i.e. DRAM. In this work we examine an architecture for a scalable distributed flash store which aims to overcome this limitation in two ways. First, the architecture provides a high-performance, high-capacity, scalable random-access storage. It achieves high-throughput by sharing large numbers of flash chips across a low-latency, chip-to-chip backplane network managed by the flash controllers. The additional latency for remote data access via this network is negligible as compared to flash access time. Second, it permits some computation near the data via a FPGA-based programmable flash controller. The controller is located in the datapath between the storage and the host, and provides hardware acceleration for applications without any additional latency. We have constructed a small-scale prototype whose network bandwidth scales directly with the number of nodes, and where average latency for user software to access flash store is less than 70[mu]s, including 3.5[mu]s of network overhead.
by Sang-Woo Jun.
S.M.
美霖, 何., i Meilin He. "Multi-rate coding schemes for gaussian multiple access channel". Thesis, https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB13071670/?lang=0, 2018. https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB13071670/?lang=0.
Pełny tekst źródłaIn this dissertation, the same encoder is employed for each user, and different rate transmissions is realized by adjusting the parameter of the encoder. We analyze the decoding performances of our coding schemes, and obtain the optimal coding parameters, which gives the maximum sum rates and approach the theoretical limits of the channel. The proposed coding schemes support multimedia services, and avoid employing multiple channel encoders to implement the multi-rate transmission.
博士(工学)
Doctor of Philosophy in Engineering
同志社大学
Doshisha University
Mursia, Placido. "Multi-antenna methods for scalable beyond-5G access networks". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS532.
Pełny tekst źródłaThe exponential increase of wireless user equipments (UEs) and network services associated with current 5G deployments poses several unprecedented design challenges that need to be addressed with the advent of future beyond-5G networks and novel signal processing and transmission schemes. In this regard, massive MIMO is a well-established access technology, which allows to serve many tens of UEs using the same time-frequency resources. However, massive MIMO exhibits scalability issues in massive access scenarios where the UE population is composed of a large number of heterogeneous devices. In this thesis, we propose novel scalable multiple antenna methods for performance enhancement in several scenarios of interest. Specifically, we describe the fundamental role played by statistical channel state information (CSI) that can be leveraged for reduction of both complexity and overhead for CSI acquisition, and for multiuser interference suppression. Moreover, we exploit device-to-device communications to overcome the fundamental bottleneck of conventional multicasting. Lastly, in the context of millimiter wave communications, we explore the benefits of the recently proposed reconfigurable intelligent surfaces (RISs). Thanks to their inherently passive structure, RISs allow to control the propagation environment and effectively counteract propagation losses and substantially increase the network performance
Farhat, Soha. "Access Selection and Pricing in Multi-operator Wireless Networks". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S029/document.
Pełny tekst źródłaWe consider a roaming-based infrastructure sharing system, where multiple operators share their radio access in a multi-operator environment. Indeed, when the home operator of a user is unable to satisfy its constraints, because of lack of resources or QoS, a transaction event is triggered. It consists in transferring the considered user to another operator in order to access the service. Moreover, when there are more than two operators sharing their access, the user transfer process includes an access selection decision in order to choose the best operator for service. Furthermore, when a user is transferred, its home operator must pay some transaction cost as cooperation fees for the new service operator. This transaction is seamless to the user. Therefore, the inter-operators sharing agreement set for cooperation must include three important issues: the selection decision algorithm, the transaction cost pricing scenario, and the percentage of resources shared by each operator. In the first part, we introduce our selection decision algorithm in a multi-operator environment, NP-BPA (Nearest Performance and Best Profit Algorithm). It is based on a multi-criteria cost function which groups the different parameters that enable a satisfying selection decision, for the operators and users. In the second part, we study the transaction cost. We find rational that an operator sets its transaction cost as a function of its service price. We consider a sharing system of three partners, interacting to decide the best transaction cost. Taking into account that the service of a guest user may affect the probability of acceptance of a client, an operator looks for preserving the expected revenue from its client. Therefore, we propose the first pricing scenario, ACAG (As Client As Guest) that aims to set the transaction cost of an operator equal to its service price. However, every operator seeks to maximize its revenue; therefore it is expected to set a higher transaction cost. How much higher? This must respect the sharing agreement between different partners and the service prices they adopt. To be optimistic, we propose a second pricing scenario MIWC (Max In When Cooperating). With this scenario all partners agree to have a transaction cost equal to the highest service price announced in the system. But, this scenario may cause losses in some cases where an operator setting a low service price performs a lot of transactions. To be fair, we propose a third pricing scenario MCWC (Min Cost When Cooperating). With this scenario all partners agree to have a transaction cost equal to the lowest service price announced in the system. In order to decide the best pricing scenario to adopt in the sharing system, a two stage Stackelberg game, TPA (Transaction Pricing and Access Selection) game, is formulated. In this game, the operators are the players; the service operators are the leaders and the home operator of a transferred user is a follower. In the third part, we consider a three operator sharing system with hybrid access mode. In this system partners decide to share a restricted amount of their capacity. We show how the sharing factor affects the blocking rates and affect the global profits. Further, the achieved profit does not depend only on the sharing factor, but also on the adopted pricing scenario. Therefore an economic framework based on game theoretical analysis is proposed. It models the interaction between the sharing system operators for resource sharing and pricing, in addition to the access selection. A sequential game is formulated, where the players are the operators. In the first stage, the sharing partners decide the proportion of resources they will share and the transaction pricing scenario in order to maximize their own profits. In the second stage, the home operator of a transferred user selects the suitable service operator. A bi-level optimization problem is solved and equilibrium is found
Bhuchhada, Jay Kumar. "Multi-Access Edge Computing Assisted Mobile Ad-hoc Cloud". Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39572.
Pełny tekst źródłaFuruskär, Anders. "Radio resource sharing and bearer service allocation for multi-bearer service, multi-access wireless networks". Doctoral thesis, KTH, Signals, Sensors and Systems, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3502.
Pełny tekst źródłaTwo expected characteristics of future wireless networks aresupport for multiple bearer services, which in turn enablemultiple end-user services, and the parallel use of multipleradio access technologies. This dissertation discusses radioresource management principles to improve capacity for suchmulti-bearer service, multi-access networks.
More specifically, it is first focused on how to mostefficiently share the radio resource between bearer servicegroups within one access technology. A general principle forsharing resources in interference limited systems is proposed,and its expected performance estimated. The proposedinterference balancing principle maximizes capacity byadjusting the power budgets per bearer service group so thatthe maximum tolerable interference levels are equal for allbearer services. To verify its validity, the interferencebalancing principle is applied to the 3rd generation cellularsystems GSM/EDGE and WCDMA in a set of multi-bearer servicecase studies. It is seen that interference balancing maystraightforwardly be introduced in these systems, and thatsignificant capacity gains over non-balanced scenarios can beachieved.
Secondly, how to best share traffic load between thedifferent sub-systems in a multi-access scenario isinvestigated. The capability to handle bearer services, andthereby also end-user services, typically differs betweensub-systems. The overall multi-access system capacity istherefore affected by the allocation of bearer services on tosub-systems. Based on this, a simple principle for findingfavorable, under certain constraints near-optimum, sub-systembearer service allocations is derived. It is seen that for agiven service mix combined capacities beyond the sum of thesub-system capacities may be achieved by using the favorablebearer service allocations. Significant capacity gains are alsoseen in a case study in which the bearer service allocationprinciple is applied to a combined GSM/EDGE and WCDMAmulti-access system. The bearer service type may be said toreflect an expected radio resource cost for supporting a userin each sub-system. By taking into account the actual radioresource cost, which may differ from the expected cost, whenassigning users to subsystems, further capacity gains areachievable.
Abedi, Saied. "Genetic multi-user detection for code division multiple access systems". Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/843016/.
Pełny tekst źródłaBacka, John Andrew. "Network access to multi-level secure databases from desktop clients". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/mq23778.pdf.
Pełny tekst źródłaHultell, Johan. "Access selection in multi-system architectures : cooperative and competitive contexts". Licentiate thesis, Stockholm : Kommunikationssystem, Kungl. Tekniska högskolan (KTH), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4286.
Pełny tekst źródłaKoudouridis, Georgios. "Study of Multi-Radio Transmission Diversity in Heterogeneous Access Networks". Licentiate thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122723.
Pełny tekst źródłaQC 20130531
Beainy, Charif. "On modeling and interference cancellation in some multi-access channels". Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=29529.
Pełny tekst źródłaLimits on CDMA transmission are obtained using multi-access channel models and capacity calculations. Using these insights, a technique is proposed to increase throughput over MAC channels by exploiting controlled amount of user asynchronism. Consequently, a trellis based multiuser detector is proposed as a means to exploit the MAC channel capacity. Simulation results indicate that the proposed iterative detector has polynomial implementation complexity; achieves close to optimal performance in uncoded CDMA environments with strong interference, and outperforms the upper-bound of perfectly synchronized and noiseless BPSK based TDMA.
Bourret, Jason C. "Response restriction and contingent access to responding in multi-response environments". [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012800.
Pełny tekst źródłaZhang, Jian. "Equilibrium design for multi-channel random access networks with selfish users". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-32646.
Pełny tekst źródłaYanikömeroglu, Halim. "Multi-antenna systems and interconnection strategies for CDMA wireless access networks". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0007/NQ41536.pdf.
Pełny tekst źródłaRajendran, Venkatesh. "Medium access control protocols for multi-hop wireless ad hoc networks /". Diss., Digital Dissertations Database. Restricted to UC campuses, 2006. http://uclibs.org/PID/11984.
Pełny tekst źródłaPiao, Guihua. "Radio resource management for integrated services in multi-radio access networks". Kassel Kassel Univ. Press, 2006. http://www.uni-kassel.de/hrz/db4/extern/dbupress/publik/abstract.php?978-3-89958-269-7.
Pełny tekst źródłaPiao, Guihua. "Radio resource management for integrated services in multi-radio access networks". Kassel Kassel Univ. Press, 2007. http://d-nb.info/986595012/34.
Pełny tekst źródłaSkelton, Benjamin C. "Reduced complexity asynchronous multi-user receivers for spread spectrum multiple access". Thesis, University of Canterbury. Electrical and Electronic Engineering, 2000. http://hdl.handle.net/10092/5743.
Pełny tekst źródłaFarhoudi, Mohammad Hassan. "Multi-plane routing practical applications in future all-IP access networks". Thesis, King's College London (University of London), 2018. https://kclpure.kcl.ac.uk/portal/en/theses/multiplane-routing-practical-applications-in-future-allip-access-networks(be4b52e5-c43f-4b23-8a58-8ccd8c5b8eff).html.
Pełny tekst źródłaBand, Ian W. "Multi-user receiver structures for direct sequence code division multiple access". Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/10722.
Pełny tekst źródłaWan, Zhiwen. "Cooperative and Adaptive Medium Access Control in Multi-hop Wireless Networks". FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/272.
Pełny tekst źródłaAbuhaija, Belal Saleh. "A simulation framework for service continuity over multi access wireless networks". Thesis, University of South Wales, 2010. https://pure.southwales.ac.uk/en/studentthesis/a-simulation-framework-for-service-continuity-over-multi-access-wireless-networks(5b370ae0-47b2-43b7-b0f2-91b1fd5fd3b8).html.
Pełny tekst źródłaHoblos, Jalaa. "Access Disparity Modeling and Fairness Provisioning in Multi-Hop Wireless Networks". Kent State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=kent1365703079.
Pełny tekst źródłaDjahel, Soufiene. "Secure routing and medium access protocols in wireless multi-hop networks". Thesis, Lille 1, 2010. http://www.theses.fr/2010LIL10094/document.
Pełny tekst źródłaWhile the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes.To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them