• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1531
  • 192
  • 128
  • 104
  • 19
  • 18
  • 9
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 3
  • Tagged with
  • 2198
  • 2198
  • 850
  • 456
  • 442
  • 283
  • 276
  • 249
  • 241
  • 221
  • 214
  • 202
  • 201
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Time-critical modeling and rendering: geometry-based and image-based approaches. / CUHK electronic theses & dissertations collection

January 1998 (has links)
by Tien-Tsin Wong. / Thesis (Ph.D.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (p. 129-137). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Mode of access: World Wide Web. / Abstracts in English and Chinese.
182

Viewpoint dependent imaging : an interactive stereoscopic display

Fisher, Scott Stevens January 1982 (has links)
Thesis (M.S.V.S.)--Massachusetts Institute of Technology, Dept. of Architecture, 1982. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ROTCH. / Bibliography: leaves 71-76. / by Scott Stevens Fisher. / M.S.V.S.
183

A dynamic, distributive and heterogeneous authorization policy management framework. / CUHK electronic theses & dissertations collection

January 2007 (has links)
Grid computing enables computers on different networks to share their resources in an organized way. Authorized users can deploy the resources as if they were in the same organization. This resource sharing environment is called a Virtual Organization (VOs). To enable an open Grid to support resource sharing between multiple heterogeneous VOs, an authorization policy management framework is required to support authorization for VOs using heterogeneous authorization systems. The challenges include dynamic Grid memberships, VO trust relationships, and heterogeneous authorization systems. / To solve these problems in a loose-coupling way, we propose a dynamic, distributive and heterogeneous authorization policy management framework. The framework is called Dynamic Policy Management Framework (DPMF). DPMF groups VOs of the same authorization systems to form a virtual cluster. Authorization policy management is divided into inter-cluster heterogeneous policy management, and intra-cluster homogeneous policy management. Inside a virtual cluster, the workloads of policy management can be distributed among the VOs according to their trust relationships. The Conflict Analysis with Partial Information (CAPI) mechanism is developed to make authorization decisions in open environments without complete policy information. A Heterogeneous Policy Management mechanism is developed for DPMF to support inter-cluster heterogeneous policy management. / Traditional authorization policy management frameworks work well in authorization for a single VO where the participating hosts agree to follow a global authorization system. However, they are not capable of authorization policy management for multiple VOs which deploys heterogeneous authorization systems. / Yu, Chiu Man. / "April 2007." / Adviser: Ng Kam Wing. / Source: Dissertation Abstracts International, Volume: 69-01, Section: B, page: 0447. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (p. 200-206). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
184

Virtual path traffic management of cross-path switch. / CUHK electronic theses & dissertations collection

January 1997 (has links)
by Cheuk-hung Lam. / Thesis (Ph.D.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (p. 120-[129]). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Mode of access: World Wide Web.
185

Transaction replication in mobile environments.

January 1996 (has links)
by Lau Wai Kwong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1996. / Includes bibliographical references (leaves 99-102). / Abstract --- p.ii / Acknowledgements --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Limitations of the Mobile Computing Environments --- p.2 / Chapter 1.2 --- Applications of Transaction Replication in Mobile Environments --- p.5 / Chapter 1.3 --- Motivation for Transaction Replication in Mobile Environments --- p.5 / Chapter 1.4 --- Major Simulation Results --- p.6 / Chapter 1.5 --- Roadmap to the Thesis --- p.7 / Chapter 2 --- Previous and Related Research --- p.8 / Chapter 2.1 --- File Systems --- p.8 / Chapter 2.1.1 --- Management of Replicated Files --- p.8 / Chapter 2.1.2 --- Disconnected Operations --- p.10 / Chapter 2.2 --- Database Management --- p.12 / Chapter 2.2.1 --- Data Replication Schemes --- p.12 / Chapter 2.2.2 --- Cache Invalidation and Query Processing --- p.15 / Chapter 2.2.3 --- Transaction Management in Mobile Environments --- p.17 / Chapter 3 --- System Model and Assumptions --- p.21 / Chapter 3.1 --- System Architecture --- p.21 / Chapter 3.2 --- Transaction and Data Model --- p.23 / Chapter 3.3 --- One-copy Serializability --- p.25 / Chapter 3.4 --- Assumptions --- p.27 / Chapter 4 --- Transaction Replication in a Mobile Environment --- p.29 / Chapter 4.1 --- Read-only Public Transactions --- p.30 / Chapter 4.1.1 --- Data Broadcasting --- p.31 / Chapter 4.1.2 --- Cache Update --- p.33 / Chapter 4.1.3 --- Cache Miss --- p.36 / Chapter 4.1.4 --- Execution of Read-only Public Transactions --- p.37 / Chapter 4.2 --- R/W Public Transactions --- p.39 / Chapter 4.3 --- Correctness Argument --- p.41 / Chapter 4.3.1 --- Correctness Proof --- p.43 / Chapter 4.4 --- Extension to Support Partition Failures --- p.47 / Chapter 5 --- Design and Implementation of the Simulation --- p.49 / Chapter 5.1 --- CSIM Language --- p.49 / Chapter 5.2 --- Simulation Components --- p.50 / Chapter 5.2.1 --- Fixed Network --- p.50 / Chapter 5.2.2 --- Mobile Host --- p.50 / Chapter 5.2.3 --- Wireless Channel --- p.51 / Chapter 5.2.4 --- Database and Transactions --- p.52 / Chapter 5.3 --- A Lock-based Scheme --- p.53 / Chapter 5.4 --- Graphing ...........、 --- p.54 / Chapter 6 --- Results and Analysis --- p.55 / Chapter 6.1 --- Results Dissection --- p.55 / Chapter 6.2 --- Performance of the Scheme --- p.56 / Chapter 6.2.1 --- Parameters Setting --- p.56 / Chapter 6.2.2 --- Experiments and Results --- p.59 / Chapter 6.3 --- Comparison with the Lock-based Scheme --- p.78 / Chapter 6.3.1 --- Parameters Setting --- p.79 / Chapter 6.3.2 --- Experiments and Results --- p.80 / Chapter 7 --- Conclusions and Future Work --- p.93 / Chapter 7.1 --- Conclusions --- p.93 / Chapter 7.2 --- Future Work --- p.94 / Chapter A --- Implementation Details --- p.96 / Bibliography --- p.99
186

Digital transparency applied to interactive mapping

Weitzman, Louis Murray January 1978 (has links)
Thesis. 1978. M.Arch.A.S.--Massachusetts Institute of Technology. Dept. of Architecture. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ROTCH. / Bibliography: p. 81-84. / by Louis Weitzman. / M.Arch.A.S.
187

A middleware framework for secure mobile grid services.

January 2008 (has links)
Wong, Sze Wing. / Thesis submitted in: October 2007. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 176-180). / Abstracts in English and Chinese. / Abstract --- p.i / 論文摘要 --- p.iii / Acknowledgements --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Contributions of this thesis --- p.3 / Chapter 1.2 --- Thesis structure --- p.4 / Chapter 2 --- Background --- p.6 / Chapter 2.1 --- Web Services --- p.6 / Chapter 2.2 --- Grid Computing --- p.8 / Chapter 2.2.1 --- Open Grid Services Architecture (OGSA) --- p.9 / Chapter 2.2.2 --- Grid Services --- p.9 / Chapter 2.3 --- Globus Toolkit --- p.10 / Chapter 2.3.1 --- Components of Globus Toolkit 4 --- p.11 / Chapter 2.3.2 --- Grid Security Infrastructure (GSI) --- p.13 / Chapter 2.4 --- Mobile Agent --- p.13 / Chapter 2.4.1 --- Foundation for Intelligent Physical Agents (FIPA) --- p.14 / Chapter 2.5 --- Java Agent Development Framework (JADE) --- p.15 / Chapter 2.5.1 --- JADE-S --- p.17 / Chapter 3 --- Research Issues in Mobile Grid Services --- p.18 / Chapter 3.1 --- Mobile Grid Services --- p.18 / Chapter 3.2 --- Service Migration --- p.20 / Chapter 3.2.1 --- Using Mobile Agent with Weak Mobility --- p.20 / Chapter 3.2.2 --- Using Mobile Agent with Strong Mobility --- p.21 / Chapter 3.2.3 --- Using Snapshots --- p.22 / Chapter 3.2.4 --- Summary --- p.23 / Chapter 3.3 --- Service Sharing and Discovery --- p.24 / Chapter 3.3.1 --- Centralized Model --- p.24 / Chapter 3.3.2 --- Division into clusters --- p.25 / Chapter 3.3.3 --- Using Web Services Protocols --- p.26 / Chapter 3.3.4 --- Summary --- p.27 / Chapter 3.4 --- Security --- p.28 / Chapter 3.4.1 --- Resource control and accounting --- p.28 / Chapter 3.4.2 --- Using delegation document --- p.30 / Chapter 3.4.3 --- Summary --- p.31 / Chapter 4 --- Mobile Grid Service Framework --- p.32 / Chapter 4.1 --- Proposed Framework Overview --- p.32 / Chapter 4.1.1 --- Service Migration --- p.33 / Chapter 4.1.2 --- Service Sharing and Discovery --- p.34 / Chapter 4.1.3 --- Security --- p.34 / Chapter 4.2 --- Overall architecture --- p.35 / Chapter 4.3 --- Components of Mobile Grid Services --- p.36 / Chapter 4.3.1 --- Agent Manager --- p.37 / Chapter 4.3.2 --- Task Agent --- p.38 / Chapter 4.3.3 --- Monitor Agent --- p.39 / Chapter 4.4 --- Resource Information Service --- p.40 / Chapter 4.5 --- Scenario of Mobile Grid Service Execution --- p.41 / Chapter 5 --- MGSAPI --- p.43 / Chapter 5.1 --- API design --- p.43 / Chapter 5.2 --- API Implementation --- p.45 / Chapter 5.2.1 --- Overview --- p.45 / Chapter 5.2.2 --- Agent Manager Class --- p.46 / Chapter 5.2.3 --- Task Agent Templates --- p.52 / Chapter 5.2.4 --- Configurable Monitor Agent --- p.57 / Chapter 5.2.5 --- Resource Information Service --- p.61 / Chapter 5.2.6 --- Example Application --- p.66 / Chapter 6 --- Security Support for Mobile Grid Services --- p.68 / Chapter 6.1 --- Overview --- p.68 / Chapter 6.2 --- Authentication and Authorization --- p.70 / Chapter 6.3 --- Message Integrity and Confidentiality --- p.72 / Chapter 6.4 --- Permissions on Agents --- p.74 / Chapter 6.5 --- Security facilities in MGS API --- p.76 / Chapter 6.5.1 --- Major modifications for MGS components --- p.77 / Chapter 6.5.2 --- MGS Security Libraries --- p.79 / Chapter 6.5.3 --- MGS Security Configuration --- p.81 / Chapter 7 --- Agent Protection for Mobile Grid Services --- p.83 / Chapter 7.1 --- Overview --- p.83 / Chapter 7.2 --- Major modifications --- p.86 / Chapter 7.2.1 --- Exempting checking for executions on home host --- p.86 / Chapter 7.2.2 --- New definition of stage --- p.87 / Chapter 7.2.3 --- Extra operations in Task Agent and Agent Manager --- p.88 / Chapter 7.2.4 --- Handling of attack --- p.88 / Chapter 7.3 --- Implementation details --- p.91 / Chapter 7.3.1 --- Agent Manager --- p.91 / Chapter 7.3.2 --- Task Agent --- p.97 / Chapter 7.3.3 --- Monitor Agent --- p.101 / Chapter 7.3.4 --- Checker --- p.102 / Chapter 7.4 --- Discussions --- p.108 / Chapter 7.4.1 --- Against modification of code and data --- p.108 / Chapter 7.4.2 --- Against masquerade --- p.108 / Chapter 7.4.3 --- Against fake information in trace --- p.109 / Chapter 7.4.4 --- Against escape from re-execution --- p.109 / Chapter 7.4.5 --- Against collaboration of different hosts --- p.109 / Chapter 7.4.6 --- Detection of malicious host --- p.110 / Chapter 7.4.7 --- Weaknesses --- p.110 / Chapter 8 --- Performance Evaluation --- p.111 / Chapter 8.1 --- Experimental Setup --- p.111 / Chapter 8.2 --- MGS Performance --- p.117 / Chapter 8.2.1 --- Experiment details --- p.112 / Chapter 8.2.2 --- Experiment results --- p.113 / Chapter 8.2.3 --- Discussions --- p.116 / Chapter 8.3 --- MGS Overheads --- p.117 / Chapter 8.3.1 --- Experiment details --- p.117 / Chapter 8.3.2 --- Experiment results --- p.119 / Chapter 8.3.3 --- Discussions --- p.123 / Chapter 8.4 --- Agent Protection Overheads --- p.124 / Chapter 8.4.1 --- Experiment details --- p.124 / Chapter 8.4.2 --- Experiment results --- p.125 / Chapter 8.4.3 --- Discussions --- p.128 / Chapter 9 --- Conclusion and Future Works --- p.130 / Appendix A Administrator Guide for MGS API --- p.132 / Chapter A.l --- Installation of MGS API --- p.132 / Chapter A.1.1 --- Installation of pre-requisites --- p.132 / Chapter A.1.2 --- Installation of MGS API library --- p.135 / Chapter A.2 --- Setup of MGS platform --- p.135 / Chapter A.2.1 --- Setup of JADE platform --- p.135 / Chapter A.2.2 --- Setup of Globus containers --- p.136 / Appendix B Developer Guide for MGS API --- p.137 / Chapter B.1 --- Steps of developing a Mobile Grid Service --- p.137 / Chapter B.1.1 --- Design Mobile Grid Service --- p.137 / Chapter B.1.2 --- Define WSDL --- p.138 / Chapter B.1.3 --- Implement the service --- p.138 / Chapter B.1.4 --- Configure deployment in WSDD --- p.138 / Chapter B.1.5 --- Compile and deploy the service --- p.139 / Chapter B.2 --- Mobile Grid Service Implementation --- p.140 / Chapter B.2.1 --- Implement Task Agent --- p.140 / Chapter B.2.2 --- Implement Monitor Agent (optional) --- p.143 / Chapter B.2.3 --- Implement Agent Manager --- p.144 / Chapter B.3 --- Convert tool --- p.146 / Chapter B.4 --- Service configuration --- p.147 / Chapter B.4.1 --- TaskSetting object --- p.147 / Chapter B.4.2 --- MonitorSetting object --- p.147 / Chapter B.4.3 --- MGS Configuration file --- p.148 / Chapter B.4.4 --- Configuration for Resource Information Service --- p.149 / Chapter B.4.5 --- Globus-side security configuration of the service --- p.151 / Chapter B.5 --- MGS Configuration Helper --- p.151 / Chapter B.5.1 --- “Main Container´ح Panel --- p.152 / Chapter B.5.2 --- “Container´ح Panel --- p.154 / Chapter B.5.3 --- “Service´ح Panel --- p.156 / Chapter B.6 --- Interface details --- p.158 / Chapter B.6.1 --- Package mgs.manager --- p.158 / Chapter B.6.2 --- Package mgs.monitor --- p.165 / Chapter B.6.3 --- Package mgs.task --- p.167 / Chapter B.6.4 --- Package mgs.ftsFramework --- p.174 / Bibliography --- p.176 / Publications --- p.181
188

Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device / Implementering och utvärdering av ACE-ramverket

Johansson, Jacob January 2019 (has links)
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. These devices are usually constrained to be as cheap and primitive asthe task allows. Most of the time, they are only used to send collected data which only re-quires a one way secure channel. However, in order to apply updates or manage the deviceremotely, the communication has to be secured both ways. There are multiple suggestionson how a two way secure channel can be established while still operating on a constraineddevice. Each security specializes in its own area e.g privacy, scalability, or simplicity. Thispaper will describe how to implement the ACE-DTLS framework and analyze the perfor-mance with respect to energy consumption and security. While ACE-DTLS is quite simpleto implement without having to understand the complex math of a key exchange, it comeswith the cost of a high overhead in order to establish a secure two way connection. It mightnot be the best suited framework for small amount of data transfers available.
189

Integration of Orbital Control in the Avionic Test-Bench Simulators for EagleEye : Evolution of the EagleEye functionality

Wikman, Kasper January 2019 (has links)
In the space industry a lot of efforts is put towards verification and validationof the different parts of the spacecraft. This is a costly process and cause initial friction when trying to introduce new technology within the field. One of the demanding systems to validate and test is the on-board software. To makethe process of evaluation and testing of new technologies easier, the EuropeanSpace Agency has put effort towards creating an end-to-end avionic test bench containing four different simulators. In this test bench a fictional mission called EagleEye was constructed. EagleEye is a representative low-cost & low-powerEarth observation mission to create a fictive environment to perform system tests. As of 2018 the mission still lacked the functionality of orbital maintenance. However, during the autumn of 2018 the system had the orbital control modeintroduced to the Functional Engineering Simulator in the MATLAB Simulink environment.This was one process for the integration of the orbital control mode, thesystem still had three additional simulator environments requiring the implementation: Functional Validation Test-Bench, Software Validation Facility andReal-Time Test-Bench. This thesis covers the implementation within the first two simulators mentioned. The work was carried out during the spring of 2019 and showed that the simulators were updated successfully and verified. Development of the simulator will continue as there are still things to be done.
190

Automatic design of batch processing systems

Dwyer, Barry, 1938- January 1999 (has links)
Bibliography: p. 281-289. Electronic publication; Full text available in PDF format; abstract in HTML format. Electronic reproduction.[Australia] :Australian Digital Theses Program,2001.

Page generated in 0.0432 seconds