• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1963
  • 183
  • 182
  • 147
  • 36
  • 25
  • 25
  • 25
  • 25
  • 25
  • 24
  • 16
  • 11
  • 9
  • 7
  • Tagged with
  • 2877
  • 2877
  • 750
  • 637
  • 506
  • 499
  • 393
  • 336
  • 314
  • 300
  • 299
  • 289
  • 288
  • 277
  • 276
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1031

Performance metrics, configuration strategies and traffic identification for group network application.

January 2008 (has links)
Fu, Zhengjia. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (p. 64-70 ). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Design for group network communication --- p.6 / Chapter 2.1 --- Performance metrics of network Voice Conference: GMOS --- p.7 / Chapter 2.2 --- Conference Leader Selection strategies --- p.11 / Chapter 2.3 --- Experiment Description --- p.14 / Chapter 2.4 --- Data analysis and results --- p.16 / Chapter 2.5 --- Applications of Proposals to Voice Conference --- p.25 / Chapter 3 --- P2P Application Identification --- p.27 / Chapter 3.1 --- Periodic Group Communication Patterns --- p.28 / Chapter 3.1.1 --- Terminology for Behavioral Patterns --- p.29 / Chapter 3.1.2 --- Pattern 1: Gossip of Buffer Maps --- p.30 / Chapter 3.1.3 --- Pattern 2: Content flow control --- p.31 / Chapter 3.1.4 --- Pattern 3: Synchronized Link Activation and Deactivation --- p.32 / Chapter 3.2 --- Identification Based on behavioral signatures --- p.33 / Chapter 3.2.1 --- Algorithm Overview --- p.34 / Chapter 3.2.2 --- Sequence Generation (SG1): Time Series for the Gossip Pattern --- p.36 / Chapter 3.2.3 --- Transform Time-domain Sequence to Frequency-domain Sequence --- p.36 / Chapter 3.2.4 --- Sequence Generation (SG2): Time Series for Content Flow Control Pattern --- p.40 / Chapter 3.2.5 --- Sequence Generation (SG3): Time Series for Synchronized Start and Finish of Flows --- p.41 / Chapter 3.2.6 --- Analyzer step --- p.47 / Chapter 3.3 --- Behavioral signatures of popular P2P applications --- p.47 / Chapter 3.4 --- Experiment Results --- p.49 / Chapter 3.5 --- Discussion --- p.52 / Chapter 4 --- Related Work --- p.58 / Chapter 5 --- Conclusion --- p.62 / Bibliography --- p.64
1032

An adaptive approach on the carrier sensing range of CSMA/CA multi-hop wireless networks.

January 2008 (has links)
Ruan, Sichao. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 62-65). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Multihop Ad Hoc Wireless Networks --- p.1 / Chapter 1.1.1 --- Introduction to Multihop Ad Hoc Networks --- p.2 / Chapter 1.1.2 --- Scalability of Ad Hoc Wireless Networks --- p.3 / Chapter 1.2 --- Hidden Terminal Problem --- p.3 / Chapter 1.3 --- Exposed Terminal Problem --- p.5 / Chapter 1.4 --- Overview of the Thesis --- p.6 / Chapter 2 --- Background --- p.8 / Chapter 2.1 --- MAC Protocols for Wireless Networks --- p.8 / Chapter 2.1.1 --- Aloha --- p.8 / Chapter 2.1.2 --- CSMA/CA --- p.9 / Chapter 2.1.3 --- IEEE 802.11 DCF Standard --- p.10 / Chapter 2.2 --- Related Work --- p.12 / Chapter 2.2.1 --- Schemes for Hidden Node Problem --- p.12 / Chapter 2.2.2 --- Schemes for Exposed Node Problem --- p.13 / Chapter 2.3 --- Tradeoff between Hidden and Exposed Nodes --- p.14 / Chapter 2.4 --- The Effect of Carrier Sensing Range --- p.17 / Chapter 3 --- Analysis on Carrier Sensing Range --- p.18 / Chapter 3.1 --- Analysis Model --- p.18 / Chapter 3.1.1 --- Terminal Configurations --- p.18 / Chapter 3.1.2 --- Timing/Packet Parameters --- p.19 / Chapter 3.1.3 --- Protocol Approximation --- p.20 / Chapter 3.1.4 --- Throughput Measurement --- p.21 / Chapter 3.2 --- Derivation of Throughput --- p.21 / Chapter 3.2.1 --- Channel Modeling --- p.22 / Chapter 3.2.2 --- Actual Transmission Rate --- p.24 / Chapter 3.2.3 --- Case One --- p.24 / Chapter 3.2.4 --- Case Two --- p.26 / Chapter 3.2.5 --- Mathematical Form of Throughput --- p.28 / Chapter 3.2.6 --- Analysis Results --- p.30 / Chapter 3.3 --- Implications --- p.31 / Chapter 3.3.1 --- Value of Sensing Range in CSMA/CA --- p.31 / Chapter 3.3.2 --- Need for New MAC Protocols --- p.32 / Chapter 4 --- MAC Protocols by Congestion Control --- p.34 / Chapter 4.1 --- Motivations and Principles --- p.34 / Chapter 4.1.1 --- Balancing Hidden and Exposed Nodes --- p.35 / Chapter 4.1.2 --- Controlling Carrier Sensing Range --- p.36 / Chapter 4.1.3 --- Non-homogenous Sensing Range --- p.36 / Chapter 4.2 --- Algorithm Descriptions --- p.38 / Chapter 4.2.1 --- Core Concept --- p.38 / Chapter 4.2.2 --- LDMI Control Scheme --- p.40 / Chapter 4.2.3 --- Tahoe Control Scheme --- p.41 / Chapter 5 --- Simulation Analysis --- p.44 / Chapter 5.1 --- Simulation Configurations --- p.44 / Chapter 5.1.1 --- Geometric Burst Traffic Model --- p.45 / Chapter 5.1.2 --- Network Topology --- p.46 / Chapter 5.1.3 --- Simulation Parameters --- p.47 / Chapter 5.2 --- Throughput Comparisons --- p.48 / Chapter 5.3 --- Fairness Comparisons --- p.50 / Chapter 5.3.1 --- Situation of Unfairness --- p.50 / Chapter 5.3.2 --- Fairness Measurement --- p.52 / Chapter 5.4 --- Convergence Comparisons --- p.54 / Chapter 5.5 --- Summary of Performance Comparison --- p.55 / Chapter 6 --- Conclusions --- p.56 / Chapter A --- Categories of CSMA/CA --- p.58 / Chapter A.1 --- 1-persistent CSMA/CA --- p.58 / Chapter A.2 --- non-persistent CSMA/CA --- p.58 / Chapter A.3 --- p-persistent CSMA/CA --- p.59 / Chapter B --- Backoff Schemes --- p.60 / Chapter B.1 --- Constant Window Backoff Scheme --- p.60 / Chapter B.2 --- Geometric Backoff Scheme --- p.60 / Chapter B.3 --- Binary Exponential Backoff Scheme --- p.61 / Bibliography --- p.62
1033

On modeling clustering indexes of BT-like systems. / On modeling clustering indexes of BitTorrent-like systems

January 2009 (has links)
Li, Qiuhui. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. / Includes bibliographical references (leaves 46-47). / Abstract also in Chinese. / Abstract --- p.i / Acknowledgement --- p.ii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- An overview of the BitTorrent protocol --- p.3 / Chapter 2 --- Problem Formulation --- p.7 / Chapter 2.1 --- Type-based Peer Selection Algorithm --- p.7 / Chapter 2.2 --- Clustering Index --- p.9 / Chapter 3 --- Model Formulation --- p.11 / Chapter 3.1 --- Markovian Model --- p.12 / Chapter 3.2 --- Transition Matrix --- p.14 / Chapter 3.2.1 --- Search Process --- p.16 / Chapter 3.2.2 --- Match Process --- p.18 / Chapter 3.2.3 --- Cut Process --- p.19 / Chapter 3.3 --- Open System Model --- p.21 / Chapter 4 --- Numerical Results and Observations --- p.24 / Chapter 4.1 --- Clustering Index --- p.24 / Chapter 4.2 --- Upload Utilization --- p.26 / Chapter 4.3 --- Download Rate --- p.28 / Chapter 4.4 --- Open System --- p.30 / Chapter 5 --- Performance Evaluation --- p.32 / Chapter 5.1 --- Model Verification --- p.34 / Chapter 5.2 --- Control the Clustering Index --- p.36 / Chapter 6 --- Related Works --- p.40 / Chapter 7 --- Conclusions --- p.44 / Bibliography --- p.46
1034

Multicast protection and energy efficient traffic grooming in optical wavelength routing networks.

January 2010 (has links)
Zhang, Shuqiang. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (p. 74-80). / Abstracts in English and Chinese. / Abstract --- p.i / 摘要 --- p.iv / Acknowledgements --- p.v / Table of Contents --- p.vi / Chapter Chapter 1 --- Background --- p.1 / Chapter 1.1 --- Routing and Wavelength Assignment --- p.1 / Chapter 1.2 --- Survivability in Optical Networks --- p.3 / Chapter 1.3 --- Optical Multicasting --- p.4 / Chapter 1.3.1 --- Routing and Wavelength Assignment of Optical Multicast --- p.5 / Chapter 1.3.2 --- Current Research Topics about Optical Multicast --- p.8 / Chapter 1.4 --- Traffic Grooming --- p.10 / Chapter 1.4.1 --- Static Traffic Grooming --- p.11 / Chapter 1.4.2 --- Dynamic Traffic Grooming --- p.13 / Chapter 1.5 --- Contributions --- p.15 / Chapter 1.5.1 --- Multicast Protection with Scheduled Traffic Model --- p.15 / Chapter 1.5.2 --- Energy Efficient Time-Aware Traffic Grooming --- p.16 / Chapter 1.6 --- Organization of Thesis --- p.18 / Chapter Chapter 2 --- Multicast Protection in WDM Optical Network with Scheduled Traffic --- p.19 / Chapter 2.1 --- Introduction --- p.19 / Chapter 2.2 --- Multicast Protection under FSTM --- p.22 / Chapter 2.3 --- Illustrative Examples --- p.28 / Chapter 2.4 --- Two-Step Optimization under SSTM --- p.37 / Chapter 2.5 --- Summary --- p.40 / Chapter Chapter 3 --- Energy Efficient Time-Aware Traffic Grooming in Wavelength Routing Networks --- p.41 / Chapter 3.1 --- Introduction --- p.41 / Chapter 3.2 --- Energy consumption model --- p.43 / Chapter 3.3 --- Static Traffic Grooming with Time awareness --- p.44 / Chapter 3.3.1 --- Scheduled Traffic Model for Traffic Grooming --- p.44 / Chapter 3.3.2 --- ILP Formulation --- p.44 / Chapter 3.3.3 --- Illustrative Numerical Example --- p.48 / Chapter 3.4 --- Dynamic Traffic Grooming with Time Awareness --- p.49 / Chapter 3.4.1 --- Time-Aware Traffic Grooming (TATG) --- p.51 / Chapter 3.5 --- Simulation Results of Dynamic Traffic Grooming --- p.54 / Chapter 3.5.1 --- 24-node USNET: --- p.55 / Chapter 3.5.2 --- 15-node Pacific Bell Network: --- p.59 / Chapter 3.5.3 --- 14-node NSFNET: --- p.63 / Chapter 3.5.4 --- Alternative Configuration of Simulation Parameters: --- p.67 / Chapter 3.6 --- Summary --- p.71 / Chapter Chapter 4 --- Conclusions and Future Work --- p.72 / Chapter 4.1 --- Conclusions --- p.72 / Chapter 4.2 --- Future Work --- p.73 / Bibliography --- p.74 / Publications during M.Phil Study --- p.80
1035

Modeling and analysis of P2P streaming.

January 2008 (has links)
Zhou, Yipeng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 64-66). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Contribution --- p.2 / Chapter 1.3 --- Organization --- p.4 / Chapter 2 --- Related Work --- p.5 / Chapter 2.1 --- Work of Streaming --- p.5 / Chapter 2.2 --- Work of P2P VoD --- p.6 / Chapter 3 --- Basic Model of Synchronized Case --- p.8 / Chapter 4 --- Model of Chunk Selection Strategies --- p.13 / Chapter 4.1 --- Chunk Selection Strategies --- p.13 / Chapter 4.1.1 --- Greedy Strategy --- p.14 / Chapter 4.1.2 --- Rarest First Strategy --- p.15 / Chapter 4.1.3 --- "Buffer Size, Peer Population and Continuity" --- p.16 / Chapter 4.1.4 --- Mixed Strategy --- p.17 / Chapter 4.2 --- Some Conclusion and Extension --- p.19 / Chapter 4.3 --- Metrics --- p.20 / Chapter 4.3.1 --- Continuity --- p.20 / Chapter 4.3.2 --- Start-up Latency --- p.20 / Chapter 5 --- Experiment and Application --- p.22 / Chapter 5.1 --- Numerical Examples and Analysis --- p.22 / Chapter 5.2 --- Sensitivity study --- p.30 / Chapter 5.2.1 --- Discrete Model with Factor --- p.30 / Chapter 5.2.2 --- Validate Discrete Model with Factor --- p.31 / Chapter 5.2.3 --- Server Use Pull Strategy --- p.31 / Chapter 5.2.4 --- Vary Subset Size Touched by Server --- p.32 / Chapter 5.3 --- Application to Real-world Protocols --- p.32 / Chapter 6 --- Model of Unsynchronized Case --- p.34 / Chapter 6.1 --- The model for unsynchronized playback --- p.34 / Chapter 6.1.1 --- Overlap maximization problem --- p.37 / Chapter 6.1.2 --- Properties of the synchronized cluster --- p.38 / Chapter 6.2 --- Analysis of playback continuity --- p.40 / Chapter 6.2.1 --- Peers with different buffer sizes --- p.41 / Chapter 6.2.2 --- Analysis of two clusters with a lag --- p.44 / Chapter 7 --- Performance Evaluation of Unsynchronized System --- p.48 / Chapter 7.1 --- Performance Evaluation --- p.48 / Chapter 8 --- conclusion --- p.54 / Chapter 8.1 --- Conclusion --- p.54 / Chapter A --- Equation Derivation --- p.56 / Bibliography --- p.64
1036

Cooperative routing in wireless ad hoc networks.

January 2007 (has links)
Cheung, Man Hon. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (leaves 89-94). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Rayleigh Fading Channels --- p.1 / Chapter 1.2 --- Ultra-Wideband (UWB) Communications --- p.2 / Chapter 1.2.1 --- Definition --- p.2 / Chapter 1.2.2 --- Characteristics --- p.3 / Chapter 1.2.3 --- UWB Signals --- p.4 / Chapter 1.2.4 --- Applications --- p.5 / Chapter 1.3 --- Cooperative Communications --- p.7 / Chapter 1.4 --- Outline of Thesis --- p.7 / Chapter 2 --- Background Study --- p.9 / Chapter 2.1 --- Interference-Aware Routing --- p.9 / Chapter 2.2 --- Routing in UWB Wireless Networks --- p.11 / Chapter 2.3 --- Cooperative Communications and Routing --- p.12 / Chapter 3 --- Cooperative Routing in Rayleigh Fading Channel --- p.15 / Chapter 3.1 --- System Model --- p.16 / Chapter 3.1.1 --- Transmitted Signal --- p.16 / Chapter 3.1.2 --- Received Signal and Maximal-Ratio Combining (MRC) --- p.16 / Chapter 3.1.3 --- Probability of Outage --- p.18 / Chapter 3.2 --- Cooperation Criteria and Power Distribution --- p.21 / Chapter 3.2.1 --- Optimal Power Distribution Ratio --- p.21 / Chapter 3.2.2 --- Near-Optimal Power Distribution Ratio β´ة --- p.21 / Chapter 3.2.3 --- Cooperation or Not? --- p.23 / Chapter 3.3 --- Performance Analysis and Evaluation --- p.26 / Chapter 3.3.1 --- 1D Poisson Random Network --- p.26 / Chapter 3.3.2 --- 2D Grid Network --- p.28 / Chapter 3.4 --- Cooperative Routing Algorithm --- p.32 / Chapter 3.4.1 --- Cooperative Routing Algorithm --- p.33 / Chapter 3.4.2 --- 2D Random Network --- p.35 / Chapter 4 --- UWB System Model and BER Expression --- p.37 / Chapter 4.1 --- Transmit Signal --- p.37 / Chapter 4.2 --- Channel Model --- p.39 / Chapter 4.3 --- Received Signal --- p.39 / Chapter 4.4 --- Rake Receiver with Maximal-Ratio Combining (MRC) --- p.41 / Chapter 4.5 --- BER in the presence of AWGN & MUI --- p.46 / Chapter 4.6 --- Rake Receivers --- p.47 / Chapter 4.7 --- Comparison of Simple Routing Algorithms in ID Network --- p.49 / Chapter 5 --- Interference-Aware Routing in UWB Wireless Networks --- p.57 / Chapter 5.1 --- Problem Formulation --- p.57 / Chapter 5.2 --- Optimal Interference-Aware Routing --- p.58 / Chapter 5.2.1 --- Link Cost --- p.58 / Chapter 5.2.2 --- Per-Hop BER Requirement and Scaling Effect --- p.59 / Chapter 5.2.3 --- Optimal Interference-Aware Routing --- p.61 / Chapter 5.3 --- Performance Evaluation --- p.64 / Chapter 6 --- Cooperative Routing in UWB Wireless Networks --- p.69 / Chapter 6.1 --- Two-Node Cooperative Communication --- p.69 / Chapter 6.1.1 --- Received Signal for Non-Cooperative Communication --- p.69 / Chapter 6.1.2 --- Received Signal for Two-Node Cooperative Communication --- p.70 / Chapter 6.1.3 --- Probability of Error --- p.71 / Chapter 6.2 --- Problem Formulation --- p.75 / Chapter 6.3 --- Cooperative Routing Algorithm --- p.77 / Chapter 6.4 --- Performance Evaluation --- p.80 / Chapter 7 --- Conclusion and Future Work --- p.85 / Chapter 7.1 --- Conclusion --- p.85 / Chapter 7.2 --- Future Work --- p.86 / Chapter 7.2.1 --- Distributed Algorithm --- p.87 / Chapter 7.2.2 --- Performance Analysis in Random Networks --- p.87 / Chapter 7.2.3 --- Cross-Layer Optimization --- p.87 / Chapter 7.2.4 --- Game Theory --- p.87 / Chapter 7.2.5 --- Other Variations in Cooperative Schemes --- p.88 / Bibliography --- p.89
1037

Media access control for MIMO ad hoc network.

January 2007 (has links)
Ke, Bingwen. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (p. 52-54). / Abstracts in Chinese and English. / Abstract --- p.3 / Acknowledgement --- p.5 / Content --- p.6 / Table of Figures --- p.8 / Chapter Chapter 1 --- Introduction --- p.9 / Chapter 1.1 --- Motivations and Contributions --- p.9 / Chapter 1.2 --- Organization of the Thesis --- p.11 / Chapter Chapter 2 --- Background --- p.12 / Chapter 2.1 --- Multiple-Input-Multiple-Output (MIMO) System --- p.12 / Chapter 2.1.1 --- Basic MIMO Structure --- p.12 / Chapter 2.1.2 --- Multiple User Detection (MUD) in MIMO Networks --- p.14 / Chapter 2.2 --- IEEE 802.11 --- p.16 / Chapter 2.2.1 --- CSMA/CA in 802.11 --- p.16 / Chapter 2.2.2 --- CSMA/CA(k) in 802.1 In --- p.18 / Chapter 2.2.3 --- Co-channel Transmission in MIMO WLAN --- p.19 / Chapter Chapter 3 --- Channel Correlation in MIMO Ad Hoc Networks --- p.20 / Chapter 3.1 --- Introduction of Channel Correlation --- p.20 / Chapter 3.2 --- Channel Correlation Threshold --- p.25 / Chapter Chapter 4 --- MAC with SINR Threshold --- p.28 / Chapter Chapter 5 --- Performance Evaluation of MWST in Fully-Connected Networks --- p.33 / Chapter Chapter 6 --- MAC with SINR Threshold (MWST) in Partially-Connected Networks --- p.38 / Chapter 6.1 --- Hidden Link Problem in Partially-Connected Networks --- p.38 / Chapter Chapter 7 --- Performance Evaluation in Partially-Connected Networks --- p.42 / Chapter 7.1 --- Fairness Issues in CSMA/CA(k) --- p.42 / Chapter 7.2 --- Fairness Performance of MWST --- p.45 / Conclusion --- p.50 / References --- p.52
1038

On timeslots scheduling algorithms of wireless ad hoc network.

January 2008 (has links)
Chau, Wai Shing. / Thesis submitted in: October 2007. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 64-66). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.ii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Ad hoc network --- p.1 / Chapter 1.2 --- Outline of the thesis --- p.3 / Chapter 2 --- Background Study --- p.4 / Chapter 2.1 --- Multiple Access Control (MAC) --- p.4 / Chapter 2.1.1 --- Time Division Multiple Access (TDMA) --- p.5 / Chapter 2.1.2 --- Spatial TDMA (STDMA) --- p.5 / Chapter 2.2 --- Interference Models --- p.6 / Chapter 2.2.1 --- Primary and Secondary Interferences --- p.6 / Chapter 2.2.2 --- Interference-based Model --- p.7 / Chapter 2.2.3 --- Graph-based Model --- p.7 / Chapter 2.3 --- Scheduling in Graph-based Model --- p.8 / Chapter 2.3.1 --- Conflict Graph --- p.9 / Chapter 3 --- Scheduling Algorithms in Ring Networks --- p.11 / Chapter 3.1 --- Problem Formulation --- p.12 / Chapter 3.2 --- Regular Sequences --- p.14 / Chapter 3.3 --- Scheduling in Ring Networks with Even-number of Edges --- p.22 / Chapter 3.4 --- Scheduling in Ring Networks with an Odd-number of Edges --- p.26 / Chapter 3.4.1 --- Scheduling by Reducing a Ring Network with an Odd-number of Edges into a Ring- Network with an Even-number of Edges --- p.28 / Chapter 3.4.2 --- Scheduling by Shifting the Regular Sequences --- p.32 / Chapter 3.5 --- Discussion --- p.42 / Chapter 3.6 --- Conclusion --- p.42 / Chapter 4 --- Distributed Scheduling Algorithm for Ad Hoc Network --- p.43 / Chapter 4.1 --- Problem Formulation --- p.44 / Chapter 4.2 --- Distributed Scheduling Heuristic Algorithm --- p.44 / Chapter 4.2.1 --- Weight functions --- p.44 / Chapter 4.2.2 --- Main Algorithm --- p.46 / Chapter 4.3 --- Centralized algorithm on a chain network --- p.49 / Chapter 4.4 --- Performance of the Algorithm on Chain Network --- p.50 / Chapter 4.4.1 --- Comparison 1 --- p.51 / Chapter 4.4.2 --- Comparsion 2 --- p.52 / Chapter 4.4.3 --- Comparsion 3 --- p.53 / Chapter 4.5 --- Performance of the Algorithm on Random Conflict graph --- p.55 / Chapter 4.6 --- Discussion --- p.57 / Chapter 4.7 --- Special Graphs --- p.58 / Chapter 4.8 --- Conclusion --- p.61 / Chapter 5 --- Conclusion --- p.62 / Bibliography --- p.64
1039

Peer-to-peer replication to improve file availability.

January 2007 (has links)
Ye, Chong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (leaves 61-63). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Classification of P2P systems --- p.1 / Chapter 1.2 --- Replication in P2P systems --- p.3 / Chapter 1.3 --- Related work --- p.7 / Chapter 1.4 --- Organization --- p.10 / Chapter 1.5 --- Publications derived from this work --- p.11 / Chapter 2 --- P2P Replication System --- p.12 / Chapter 2.1 --- Peers --- p.13 / Chapter 2.2 --- Erasure code replication --- p.13 / Chapter 2.3 --- Estimation of file availability --- p.14 / Chapter 2.4 --- Problem formulation --- p.15 / Chapter 2.5 --- Performance metrics --- p.17 / Chapter 3 --- Decentralized Decisions --- p.19 / Chapter 3.1 --- Writable peer set --- p.20 / Chapter 3.2 --- Stretch factor estimation --- p.21 / Chapter 3.3 --- Locking phase --- p.22 / Chapter 4 --- Equal Weight Replication --- p.23 / Chapter 4.1 --- The decentralized replication algorithms --- p.23 / Chapter 4.1.1 --- Random algorithm --- p.23 / Chapter 4.1.2 --- Group partition algorithm --- p.25 / Chapter 4.1.3 --- High Available First (HAF) algorithm --- p.27 / Chapter 4.2 --- Evaluation of algorithms --- p.29 / Chapter 4.2.1 --- Simulation setup --- p.29 / Chapter 4.2.2 --- Simulation results --- p.31 / Chapter 4.3 --- Summary --- p.40 / Chapter 4.4 --- Clarification of individual contributions --- p.41 / Chapter 5 --- Replication with Preferences --- p.43 / Chapter 5.1 --- Problem re-defined --- p.44 / Chapter 5.2 --- The Bi-weight model --- p.46 / Chapter 5.3 --- The statistical rounding policy --- p.48 / Chapter 5.4 --- The distributed replication algorithm --- p.49 / Chapter 5.5 --- Evaluation of the algorithm --- p.51 / Chapter 5.5.1 --- Simulation setup --- p.51 / Chapter 5.5.2 --- Simulation results --- p.52 / Chapter 5.6 --- Discussion --- p.56 / Chapter 5.7 --- Summary --- p.57 / Chapter 6 --- Future work --- p.58 / Chapter 7 --- Conclusion --- p.59 / Bibliography --- p.61
1040

Performance analysis of delay tolerant networks under resource constraints and node heterogeneity.

January 2007 (has links)
Ip, Yin Ki. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (leaves 96-102). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Background Study --- p.6 / Chapter 2.1 --- DTN Reference Implementation Model --- p.7 / Chapter 2.2 --- DTN Applications --- p.9 / Chapter 2.3 --- Multiple-copy Routing Strategies --- p.11 / Chapter 2.4 --- Buffer Management Strategies --- p.12 / Chapter 2.5 --- Performance Modeling of Multiple-copy Routing --- p.14 / Chapter 2.6 --- Conclusion on Background Study --- p.18 / Chapter 3 --- DTN with Resource Constraints --- p.20 / Chapter 3.1 --- Introduction --- p.20 / Chapter 3.2 --- Related Work --- p.21 / Chapter 3.3 --- "System Model, Replication, Forwarding and Buffer Management Strategies" --- p.22 / Chapter 3.4 --- Performance Evaluation --- p.29 / Chapter 3.4.1 --- Analysis on single-message-delivery with unlimited network resource --- p.29 / Chapter 3.4.2 --- Simulation study on multi-message-delivery with limited resource constraint --- p.34 / Chapter 3.5 --- Conclusion on DTN with Resource Constraints --- p.39 / Chapter 4 --- Multiple-copy Routing in DTN with Heteroge- neous Node Types --- p.41 / Chapter 4.1 --- Introduction --- p.41 / Chapter 4.2 --- Related Work --- p.44 / Chapter 4.3 --- System Model --- p.44 / Chapter 4.4 --- Performance Modeling --- p.46 / Chapter 4.4.1 --- Continuous Time Markov Chain (CTMC) Model --- p.46 / Chapter 4.4.2 --- Fluid Flow Approximation (FFA) --- p.53 / Chapter 4.5 --- Conclusion on DTN with Node Heterogeneity --- p.73 / Chapter 5 --- Conclusion and Future Work --- p.75 / Chapter A --- Random Direction Mobility Model --- p.78 / Chapter A.1 --- Mean Inter-encounter Interval --- p.79 / Chapter A.2 --- Inter-encounter Interval Distribution --- p.86 / Chapter A.3 --- Concluding Remarks --- p.88 / Chapter B --- Additional Results by Fluid Flow Approximation and Moment Closure Methods --- p.92 / Bibliography --- p.96

Page generated in 0.0428 seconds