Search for dissertations about: "Access protocols"
Showing result 1 - 5 of 152 swedish dissertations containing the words Access protocols.
-
1. Wireless Multi Hop Access Networks and Protocols
Abstract : As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. READ MORE
-
2. Extended certificate management system : design and protocols
Abstract : This thesis presents an Extended Certificate ManagementSystem (ECMS), a possible solution for a global certificationinfrastructure. The system is based on a combined trust modelthat interconnects different types of security domains, fromindividual users, small organisations to arbitrarily complexorganisations. READ MORE
-
3. Human factors and wireless network applications : more bits and better bits
Abstract : I avhandlingen beskrivs ett hypotetiskt system som kan användas av mobila användare, bland andra taxichaufförer, som exempelvis vill följa en viktig fotbollsmatch. Flera faktorer ställer till problem: Ibland står bilen still och föraren har inget annat att tänka på än matchen. READ MORE
-
4. Design and analysis with observational data : Protocols and modeling with the aim of causal inference
Abstract : This thesis consists of six papers that study the design and analysis with observational data.There is a growing interest in using real-world evidence (RWE) for regulatory purposes. The belief is that observational data can make drug developmentmore efficient and speed up patient access to new drugs. READ MORE
-
5. State-based Channel Access for a Network of Control Systems
Abstract : Wireless networked control systems use shared wireless links to communicate between sensors and controllers, and require a channel access policy to arbitrate access to the links. Existing multiple access protocols perform this role in an agnostic manner, by remaining insular to the applications that run over the network. READ MORE