Spelling suggestions: "subject:"[een] COMPUTER NETWORK"" "subject:"[enn] COMPUTER NETWORK""
501 |
IPAM : a web-based IP/DNS management system /Samiuddin, Asim. January 2004 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2004. / Typescript. Includes bibliographical references (leaves 68-69). Also available on the Internet.
|
502 |
IPAM a web-based IP/DNS management system /Samiuddin, Asim. January 2004 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2004. / Typescript. Includes bibliographical references (leaves 68-69). Also available on the Internet.
|
503 |
Investigating the viability of a framework for small scale, easily deployable and extensible hotspot management systems /Thinyane, Mamello P. January 1900 (has links)
Thesis (M. Sc. (Computer Science))--Rhodes University, 2006.
|
504 |
Extending the reach of personal area networks by transporting Bluetooth communications over IP networks /Mackie, David Sean. January 2006 (has links)
Thesis (M.Sc. (Computer Science)) - Rhodes University, 2007.
|
505 |
Seamless handover between CDMA2000 and 802.11 WLAN using mSCTP : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Engineering in Electrical and Computer Engineering, Department of Electrical and Computer Engineering, University of Canterbury, Christchurch, New Zealand /Deng, Feng, January 1900 (has links)
Thesis (M.E.)--University of Canterbury, 2006. / Typescript (photocopy). "December 2006." Includes bibliographical references (p. 83-86). Also available via the World Wide Web.
|
506 |
Combining Geospatial and Temporal OntologiesJoshi, Kripa January 2007 (has links) (PDF)
No description available.
|
507 |
Characterisation of end-to-end performance for web-based file server respositoriesMascarenhas da Veiga Alves, Manoel Eduardo. January 2001 (has links) (PDF)
Bibliography: leaves 128-135. Investigates the behaviour of TCP bulk file transfer application sessions in a broadband access environment. Introduces some concepts for evaluating network behaviour: a path instability parameter for analyzing different TCP connections; a minimum RTT delay and a minimum typical path for estimating path characteristics between a client and application servers.
|
508 |
Prototyping a peer-to-peer session initiation protocol user agentTsietsi, Mosiuoa Jeremia 10 March 2008 (has links)
The Session Initiation Protocol (SIP) has in recent years become a popular protocol for the exchange of text, voice and video over IP networks. This thesis proposes the use of a class of structured peer to peer protocols - commonly known as Distributed Hash Tables (DHTs) - to provide a SIP overlay with services such as end-point location management and message relay, in the absence of traditional, centralised resources such as SIP proxies and registrars. A peer-to-peer layer named OverCord, which allows the interaction with any specific DHT protocol via the use of appropriate plug-ins, was designed, implemented and tested. This layer was then incorporated into a SIP user agent distributed by NIST (National Institute of Standards and Technology, USA). The modified user agent is capable of reliably establishing text, audio and video communication with similarly modified agents (peers) as well as conventional, centralized SIP overlays.
|
509 |
The role of e-commerce in five-star hotels in the Cape Town MetropoleBanoobhai-Anwar, Ilhaam January 2016 (has links)
Thesis (MTech (Tourism and Hospitality Management))--Cape Peninsula University of Technology, 2016. / Electronic commerce, popularly referred to as e-commerce, is the latest catchphrase surrounding the Internet and its many functions. In the past, the Internet was solely used for information seeking, but the 21st century has brought a new global economy to the fore – one that is conducted online. Tourism is seen as a driver of economic growth, contributing both to the Gross Domestic Product (GDP) of South Africa (SA) and creating jobs in the hospitality sector. E-commerce does not only provide a platform for business to be conducted online but also an opportunity for consumers to interact directly with industry. Many studies have been done previously about the perceived benefits of e-commerce in the retail sector, yet none in Cape Town and at five-star hotels in particular. It is well known that holidaymakers conduct an online search prior to booking accommodation; some of those potential guests in turn choose to finalise their bookings online. The purpose of the study was to investigate the role of e-commerce in five-star hotels in the Cape Town Metropole. The main objective of this study was to define what e-commerce is for five-star hotels in the Cape Town Metropole and determine if the hotels are using e-commerce as a booking method. Online questionnaires were used to gather primary data and a literature review was presented as secondary data. The findings of this study showed that all the hotels surveyed use online bookings and half of the respondents believe Online Travel Agents (OTAs) generate more revenue than traditional methods of room reservation. When asked to rank methods of room’s reservations, there was a slight difference between telephone bookings and e-commerce as number one. This could mean that while electronic methods are popular, they have not completely replaced traditional methods. The researcher recommends that five-star hotel managers train the rooms’ division staff to respond to negative reviews on social media, as this was one of the findings. The hotels should also learn how to effectively use their social media presence to increase room sales.
|
510 |
Policy Viewer : ferramenta para visualização de politicas de segurança em grafos / Policy Viewer: a tool for security policy visualization using graphsKropiwiec, Diogo Ditzel 23 March 2005 (has links)
Orientador: Paulo Licio de Geus / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-04T19:10:45Z (GMT). No. of bitstreams: 1
Kropiwiec_DiogoDitzel_M.pdf: 1443116 bytes, checksum: e21c7e873f831958ffc9ce27db574054 (MD5)
Previous issue date: 2005 / Resumo: A Internet trouxe grandes benefícios às organizações e usuários de computadores, porém causou também uma maior exposição dos sistemas computacionais interligados em rede. Inúmeros têm sido os esforços para conter o crescente aumento dos ataques que ocorrem no mundo todo, dentre os quais inclui-se o desenvolvimento de sistemas operacionais mais seguros. Entretanto, a adoção desses sistemas ainda é incipiente, devido a várias dificul-dades envolvidas no processo, dentre as quais destaca-se a complexidade de configuração e gerenciamento de políticas de segurança. Nesta dissertação, são apresentados os aspectos estudados durante o desenvolvimento do mestrado, que permitiram a identificação dos problemas atuais associados a segu-rança de sistemas operacionais e políticas de segurança. Isso resultou no projeto e imple-mentação do Policy Viewer, uma ferramenta de visualização de políticas de segurança. Sua finalidade é auxiliar o administrador de políticas na compreensão, visualização e verificação das políticas de segurança especificadas para o sistema operacional. Utilizando as características apresentadas no projeto, foi desenvolvida uma imple-mentação parcial da ferramenta contendo um subconjunto das funcionalidades previstas, sobre o qual foram elaborados exemplos para demonstrar sua utilidade no auxilio da configuração de políticas e na identificação de problemas da política especificada / Abstract: The Internet brought great benefits to organizations and computer users, but has also caused a larger exposure of the computing systems connected to the network. Countless efforts are being made to contain the increasingly higher leveI of attacks that happen ali over the world, among which stands the development of safer operating systems. Un-fortunately, the adoption of these systems is still incipient, because of several obstacles involved in the processo One of them is the complexity of configuring and managing security policies.This dissertation shows aspects of operating system security and security policies stu-died during the Masters program, leading to the identification of current problems asso-ciated with them. This resulted in the project and implementation of Policy Viewer, a tool for the visualization of security policies. Its purpose is to aid the policy administrator in the comprehension, visualization and validation of operating systems security policies. The tool has been partialiy implemented with a subset of the intended functions, using the features presented in the project. Also, examples are shown to demonstrate its utility toward aiding in the process of policy configuration and in the identification of possible problems of such policies / Mestrado / Mestre em Ciência da Computação
|
Page generated in 0.0649 seconds