• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 849
  • 122
  • 69
  • 56
  • 35
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 1374
  • 1374
  • 492
  • 461
  • 376
  • 308
  • 291
  • 289
  • 241
  • 213
  • 192
  • 191
  • 176
  • 171
  • 154
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

UDP/TCP/IP packet processing using a superscalar microprocessor

Huang, Tsai Chi 12 1900 (has links)
No description available.
12

The extension and hardware implementation of the comprehensive integrated security system concept

Morrissey, Joseph Patrick January 1995 (has links)
The current strategy to computer networking is to increase the accessibility that legitimate users have to their respective systems and to distribute functionality. This creates a more efficient working environment, users may work from home, organisations can make better use of their computing power. Unfortunately, a side effect of opening up computer systems and placing them on potentially global networks is that they face increased threats from uncontrolled access points, and from eavesdroppers listening to the data communicated between systems. Along with these increased threats the traditional ones such as disgruntled employees, malicious software, and accidental damage must still be countered. A comprehensive integrated security system ( CISS ) has been developed to provide security within the Open Systems Interconnection (OSI) and Open Distributed Processing (ODP) environments. The research described in this thesis investigates alternative methods for its implementation and its optimisation through partial implementation within hardware and software and the investigation of mechanismsto improve its security. A new deployment strategy for CISS is described where functionality is divided amongst computing platforms of increasing capability within a security domain. Definitions are given of a: local security unit, that provides terminal security; local security servers that serve the local security units and domain management centres that provide security service coordination within a domain. New hardware that provides RSA and DES functionality capable of being connected to Sun microsystems is detailed. The board can be used as a basic building block of CISS, providing fast cryptographic facilities, or in isolation for discrete cryptographic services. Software written for UNIX in C/C++ is described, which provides optimised security mechanisms on computer systems that do not have SBus connectivity. A new identification/authentication mechanism is investigated that can be added to existing systems with the potential for extension into a real time supervision scenario. The mechanism uses keystroke analysis through the application of neural networks and genetic algorithms and has produced very encouraging results. Finally, a new conceptual model for intrusion detection capable of dealing with real time and historical evaluation is discussed, which further enhances the CISS concept.
13

Multi-level low energy adaptive clustering hierarchy (ML-LEACH) : a routing solution for periodic data sensing in large-area wireless sensor network

Huang, Bo January 2007 (has links)
Thesis (M.S.)--University of Hawaii at Manoa, 2007. / Includes bibliographical references (leaves 66-67). / viii, 67 leaves, bound ill. (some col.) 29 cm
14

Protocol design for dynamic Delaunay triangulation

Lee, Dong-young, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2008. / Vita. Includes bibliographical references.
15

Stochastic modeling and performance analysis of differentiated service architecture in the Internet /

Zhuang, Shixin. January 2002 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002. / Includes bibliographical references (leaves 67-69). Also available in electronic version. Access restricted to campus users.
16

Information technology and innovation in international tourism Implications for the Caribbean tourist industry /

Poon, Auliana. January 1987 (has links)
Thesis (Ph. D.)--University of Sussex, England, 1987.
17

Analysis of the enzymatic network

Mummaneni, Avanthi. January 2005 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2005. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (January 22, 2007) Includes bibliographical references.
18

Routing in delay tolerant networks /

Jain, Sushant, January 2005 (has links)
Thesis (Ph. D.)--University of Washington, 2005. / Vita. Includes bibliographical references (leaves 141-147).
19

Enhancing the IKE preshared key authentication method

Bani-Hani, Raed M., January 2006 (has links)
Thesis (Ph. D.) University of Missouri-Columbia, 2006. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 31, 2007) Includes bibliographical references.
20

Selfish routing

Roughgarden, Tim. January 2002 (has links) (PDF)
Thesis (Ph.D.)--Cornell University, 2002. / Adviser: Eva Tardos. Includes bibliographical references.

Page generated in 0.0481 seconds