Browse Dissertations and Theses - Electrical and Computer Engineering by Contributor "Caesar, Matthew C."

  • Hosseinabadi, Ghazale (2014-01-16)
    Because a wireless channel is a shared medium, messages sent on the wireless links might be overheard by the neighboring stations. The information obtained from the overheard messages can be used in order to design more ...

    application/pdf

    application/pdfPDF (1MB)
  • Agarwal, Rachit (2014-01-16)
    The availability of large datasets and on-demand system capacity to analyze these datasets has led to exciting new applications in the context of big graph data. Many big graph data applications --- social search and ...

    application/pdf

    application/pdfPDF (1MB)
  • Jin, Dong (2013-08-22)
    The United States and many other countries are conducting a major upgrade of their electrical grids. The new “smart grid” is not a physically isolated network like the older power grid was, but a complicated network of ...

    application/pdf

    application/pdfPDF (3MB)
  • Mochizuki, Brent A. (2010-08-20)
    While the traditional division between hardware and software development provides a useful layer of abstraction that allows developers to create complex software applications with limited knowledge of the underlying hardware, ...

    application/pdf

    application/pdfPDF (618kB)
  • Kim, Dongho (2012-09-18)
    This dissertation reports research conducted in two aspects of secure network resource management: strengthening security by proposing a defense architecture with stronger security property and increasing deployability. ...

    application/pdf

    application/pdfPDF (2MB)
  • Choi, Jihyuk (2012-09-18)
    Medium access control (MAC) protocol security is important in wireless networks due to the lack of physical access control that normally exists in wired networks in the form of connecting a cable. Most efforts in standards ...

    application/pdf

    application/pdfPDF (5MB)
  • Gong, Xun (2014-09-16)
    We study two timing channel problems abstracted from practices of network traffic analysis. The first timing channel exists in a router receiving packets from two users; due to the sharing of router buffer, queuing delays ...

    application/pdf

    application/pdfPDF (3MB)
  • Raman, Vijay (2012-05-22)
    Modern day wireless network applications exhibit varying service demands to satisfy user requirements, while differing in the nature of traffic they generate. Future wireless networks should, therefore, be capable of ...

    application/pdf

    application/pdfPDF (2MB)
  • Mittal, Prateek (2012-05-22)
    The architectures of deployed anonymity systems such as that of the Tor network suffer from the problems of (a) limited scalability, (b) reliance on a few central points of trust, and (c) trust issues due to Sybil attack. ...

    application/pdf

    application/pdfPDF (2MB)
  • Rana, Shehla (2014-05-30)
    With advancement in communication technologies, the design of efficient and lightweight reliability protocols seems like an achievable goal. However, strategies for attacking and compromising communication reliability have ...

    application/pdf

    application/pdfPDF (2MB)