Dissertations / Theses on the topic 'Hierarchical schemes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Hierarchical schemes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
MURALIDHAR, KURUDI HANUMANTHARAO. "HIERARCHICAL SCHEMES FOR ROUTING AND FLOW CONTROL IN COMMUNICATION NETWORKS." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187913.
Full textCastiglione, Arcangelo. "New Insights on cryptographic hierarchical access control: models, schemes and analysis." Doctoral thesis, Universita degli studi di Salerno, 2016. http://hdl.handle.net/10556/2489.
Full textGiang, Truong Minh Triet, and trietgiang@yahoo com. "Efficient Admission Control Schemes in Cellular IP Networks." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20060829.113000.
Full textFidelman, Emily S. "Metadata Quality and the Use of Hierarchical Schemes to Determine Meta Keywords: An Exploration." Thesis, School of Information and Library Science, 2006. http://hdl.handle.net/1901/288.
Full textAlexander, Simon. "Two- and Three-Dimensional Coding Schemes for Wavelet and Fractal-Wavelet Image Compression." Thesis, University of Waterloo, 2001. http://hdl.handle.net/10012/1180.
Full textZabanoot, Zaid Ahmed Said. "Modelling and Analysis of Resource Management Schemes in Wireless Networks. Analytical Models and Performance Evaluation of Handoff Schemes and Resource Re-Allocation in Homogeneous and Heterogeneous Wireless Cellular Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5383.
Full textTomaras, Panagiotis J. "Decomposition of general queueing network models : an investigation into the implementation of hierarchical decomposition schemes of general closed queueing network models using the principle of minimum relative entropy subject to fully decomposable constraints." Thesis, University of Bradford, 1989. http://hdl.handle.net/10454/4212.
Full textSpence, James B. "Habitat analysis by hierarchical scheme and stream geomorphology." Huntington, WV : [Marshall University Libraries], 2005. http://www.marshall.edu/etd/descript.asp?ref=555.
Full textBakolas, Efstathios. "A Hierarchical On-Line Path Planning Scheme using Wavelets." Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14489.
Full textJimenez, Carrizosa Miguel. "Hierarchical control scheme for multi-terminal high voltage direct current power networks." Thesis, Paris 11, 2015. http://www.theses.fr/2015PA112039/document.
Full textLee, Tiffany T. "The Influence of Negative Information on Trust in Virtual Teams." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5887.
Full textBukhari, Fakhri A. "A hierarchical evolutionary algorithmic design (HEAD) system for generating and evolving building design models." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/50964/1/Fakhri_Bukhari_Thesis.pdf.
Full textLiu, Jia. "Heterogeneous Sensor Data based Online Quality Assurance for Advanced Manufacturing using Spatiotemporal Modeling." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/78722.
Full textLebreton, Olivier. "Adaptation du modèle de la Construction-Intégration de Kintsch à la compréhension des énoncés et à la résolution des problèmes arithmétiques complexes." Phd thesis, Université de la Réunion, 2011. http://tel.archives-ouvertes.fr/tel-00716841.
Full textLo, Kuen-Rong, and 羅坤榮. "Channel Assignment Schemes for Hierarchical Cellular Systems." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/84177540136138851638.
Full textLiao, Hui-Ju, and 廖慧如. "Verifiable Multisecret Sharing Schemes for Hierarchical Organizations." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/65795086106572970518.
Full textHuang, Chun-Ming, and 黃俊銘. "Hierarchical GOP Coding Schemes for Video Streaming Applications." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/78771736648771459267.
Full textChang, Tsung-Hsiang, and 張琮翔. "Hierarchical Data Gathering Schemes in Wireless Sensor Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40026536607064080061.
Full textLee, Ting-Ying, and 李定穎. "Design and Applications of Hierarchical Key Management Schemes." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/10605275460660308737.
Full textYen, Chen Wen, and 陳玟燕. "Design and Applications of Hierarchical Key Management Schemes." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/45343925832352608439.
Full textChang, Wen Li, and 張紋莉. "Hierarchical Twin Visual Secrets Sharing Schemes without Pixel Expansion." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/78465336320544607465.
Full textYu, Su-Fang, and 余書芳. "Using Inside-class Information to Construct Hierarchical Classification Schemes." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/56944679707475149031.
Full textFuh-Gwo, Jeng. "A Study of Key Management Schemes for Hierarchical Access Control." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0005-1808200608571800.
Full textJeng, Fuh-Gwo, and 鄭富國. "A Study of Key Management Schemes for Hierarchical Access Control." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/92614478330503408722.
Full textLee, Jia-Hao, and 李家豪. "A Study of Hierarchical Key Management Schemes Based on Elliptic Curves." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/07709634314661621941.
Full textChiu, Shian-Ren, and 邱顯仁. "Study of Hierarchical Tampering Detection and Recovery Schemes for Digital Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/80485277939778786629.
Full textLin, Hsiu-Pei, and 林秀蓓. "A Study on Hierarchical Multiple Visual Secret Sharing Schemes and Application." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/24801493801524653962.
Full textYu, Chun-Jen, and 游純仁. "A Study on Dymanic Key Management Schemes in MANET Hierarchical Cluster Networks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/78982542246911205478.
Full textHuang, Nan-Hsiang, and 黃南翔. "Dynamic Access Control Schemes for Hierarchical-clustering-based Mobile Ad Hoc Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/51841956299135145749.
Full textChen, Tzu-Jung, and 陳姿蓉. "Prefetching and Caching Schemes for IoT Data in Hierarchical Edge Computing Architecture." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/q7me7w.
Full textShih-Chuan, Chuang. "Hierarchical Grid-Based Data Dissemination Schemes for Mobility Support in Wireless Sensor Networks." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0016-1303200709332307.
Full textChuang, Shih-Chuan, and 莊汜玔. "Hierarchical Grid-Based Data Dissemination Schemes for Mobility Support in Wireless Sensor Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/69311809881625086272.
Full text"Three Essays on Comparative Simulation in Three-level Hierarchical Data Structure." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.46248.
Full textSu, Yu-An, and 蘇俞安. "A hierarchical secret sharing scheme." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/29635387611639142580.
Full textChang, Chao-Yi, and 張兆儀. "A Hierarchical Dynamic Group Signature Scheme." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/65091453055868104354.
Full textLin, Wei-Cheng, and 林威丞. "Distributed Login Scheme in Hierarchical P2P Architectures." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/70730173851035808020.
Full textYang, Zong-Lin, and 楊宗霖. "Hierarchical Fragile Watermarking Scheme for Image Authentication." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/43910475624556196430.
Full textHsieh, Chung-Kai, and 謝仲凱. "Hierarchical Watermarking Scheme for Image Authentication and Recovery." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/57527862985549255885.
Full textKung, Yu-Chieh, and 龔郁傑. "Investigations for a MPLS High Performance Hierarchical Multicast Scheme." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/05318353961911294373.
Full textMei, Jhu-Shyuan, and 梅竹軒. "The Hierarchical Path-Selection Scheme Based on Multihoming NEMO." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/j5ce29.
Full textSu, Hui-Po, and 蘇暉博. "Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kuku5v.
Full textChen, Taicheng, and 陳泰成. "Hierarchical Image-based Walkthrough Scheme with Local Optimal Camera Sampling." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/03255559950336296371.
Full textHuang, Chi-Huan, and 黃紀寰. "A Proxy-based Fast Handover Scheme for Hierarchical Mobile IPv6." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/40070269659249620075.
Full textMaa, Yeong-Chang. "A hierarchical directory scheme for large-scale cache coherent multiprocessors." 1994. https://scholarworks.umass.edu/dissertations/AAI9420654.
Full textFang, Li-Chin, and 方儷瑾. "A Hierarchical Visual Multi-Secret Sharing Scheme without Pixel Expansion." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/07232603250679221563.
Full textChen, Ying-lun, and 陳英倫. "Application and Design of Time-Bound Hierarchical Key Assignment Scheme." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/55557703396712850471.
Full textChen, Yi-Ju, and 陳奕儒. "A 6T Transpose SRAM using Hierarchical-Bitline-Steering Control Scheme." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/knv282.
Full textTiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.
Full textWu, Chih-Jen, and 鄔智仁. "A HIERARCHICAL CLUSTERING CHANNEL ASSIGNMENT SCHEME FOR MULTI-CHANNEL WIRELESS NETWORKS." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/01402476635845315673.
Full textHo, Chia-Chao, and 何嘉兆. "An Efficient Date-constraint Hierarchical Key Management Scheme for Mobile Agents." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/02243315691057860410.
Full text