Search
Now showing items 1-10 of 56
Use of partner agents in training systems for complex tasks
(Texas A&M University, 2002)
Complex tasks are an important part of the world today, but training people to perform complex tasks is difficult. These kinds of tasks usually have variable cognitive loads on the trainee, and, once trained, different ...
Optimizations enabling transformations and code generation for th HP V class
(Texas A&M University, 2000)
It is generally accepted that state-of-the-art restructuring compiler systems can parallelize automatically only about 25% of existing Fortran codes. This thesis presents some code transformations that improve the power ...
An intelligent filter for an educational virtual laboratory
(Texas A&M University, 2001)
As computer technology increases and more students become interested in Network Engineering, virtual laboratories will become more popular to use as educational tools for students. Virtual laboratories provide an efficient ...
Implementation and evaluation of a 2 Channel MAC protocol to improve fairness in multihop networks
(Texas A&M University, 2001)
The standard 802.11 MAC protocol, for wireless networks, is a single channel implementation. In multihop wireless networks, scenarios can arise where a single channel MAC protocol may not perform as fairly as a 2-Channel ...
Partial state routers: design, analysis and evaluation
(Texas A&M University, 2002)
The current Internet traffic is distributed in a heavy tailed fashion between Web mice (short web connections which are numerous in number but carry only a small proportion of data) and elephants (long term bulk data flows). ...
Study of distributed Fair Scheduling in wireless local area networks
(Texas A&M University, 2000)
A Fair Scheduling policy is required to support differentiated QoS requirements of contending flows in a wireless channel. This thesis presents a study of the Distributed Fair Scheduling (DFS) algorithm proposed for wireless ...
Engineering secure software
(Texas A&M University, 2001)
In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems ...
Delay analysis of bursty tasks using workload arrival functions
(Texas A&M University, 2001)
A real-time application must satisfy timing requirements meaning that hard deadlines must be enforced. It is largely dependent on the defined resources and workload characteristics. In large-scale distributed real-time ...
Dynamic address allocation protocols for Mobile ad hoc networks
(Texas A&M University, 2001)
Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address ...
An alternative to constant rate link padding for the prevention of traffic analysis
(Texas A&M University, 2002)
As encryption becomes more prevalent across the internet, techniques that can give an attacker information without needing to overcome encryption will become more important. One such technique, traffic analysis, is already ...