• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • Tagged with
  • 7
  • 7
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Lunar: A User-Level Stack Library for Network Emulation

Knestrick, Christopher C. 02 March 2004 (has links)
The primary issue with developing new networking protocols is testing how the protocol will behave when deployed on a large scale; of particular interest is how it will interact with existing protocols. Testing a protocol using a network simulator has drawbacks. First, the protocol must be written for the simulator and then rewritten for actual deployment. Aside from the additional work, this allows for software bugs to be introduced between testing and implementation. More importantly, there are correctness issues. Since both the new and existing protocols must be specially written for the simulator, and not actual real-world implementations, the question remains if the behavior observed and, specifically, the interactions between the protocols are valid. Direct code execution environments solve the correctness problem, but there is the loss of control that a simulator provides. Our solution is to create an environment that allows direct code execution to occur on top of a network simulator. This thesis presents the primary component of that solution: Lunar (Linux User-level Network Architecture), a user-level library that is created from the network stack portion of the Linux operating system. This allows real-world applications to link against a simulator, with Lunar serving as the bridge. For this work, an implementation of Lunar was constructed using the 2.4.3 version of the Linux kernel. Verification testing was performed to demonstrate correct functioning of the library using both TCP (including TCP with loss) and UDP. Performance testing was done to measure the overhead that Lunar adds to a running application. Overhead was measured as the percent increase in the runtime of an application with Lunar as compared to the application running without it, and ranged from approximately 2% (running over 100 Mbps switched Ethernet) to approximately 39% (1 Gbps Myrinet). / Master of Science
2

Srovnání exekučního řízení a soudního řízení o výkon rozhodnutí / A comparison of enforcement proceedings conducted by certified

Pátíková, Tereza January 2012 (has links)
The theme of my thesis is to compare legal regulations of two fundamental institutions used for compulsory fulfilment of obligations. It comprises the execution of a decision pursuant to Part Six of Act No. 99/1963 Coll. Civil Procedure Code, and the execution pursuant to Act No. 120/2001 Coll. On Executors and Execution Proceedings. The purpose of the thesis is to compare the fundamental legislation with emphasis on their differences and investigating the advantages and disadvantages of both procedures. This is a hot issue, particularly with regard to the forthcoming amendments to both institutions. The work focuses on the legal regulation in force, but it also offers a comparison with the amendment mentioned above, which is going through the legislative process in Parliament of the Czech Republic at the time of preparing this thesis. The thesis is divided into eleven chapters. The first chapter gives an introduction to the problems of both proceedings and presents the fundamental legal regulation and their mutual relationship. The next two chapters deal with the position of an executor in execution processes and the role of a court in the execution of both decisions and executions. Chapters four to ten deal with the individual phases in the two proceedings. It is especially the alteration to...
3

Comparing performance between react native and natively developed smartphone applications in swift : A comparative analysis and evaluation of the React Native framework

Bilberg, Dennis January 2018 (has links)
In today's society, smartphones are so widely established that corporations have even changed their cooperate culture when it comes to bringing your own personal device to work. Sales graphs prove that smartphones are more established today than ever before, which creates pressure for companies big, as small to extend and provide their services from the pocket of the user in the form of a smartphone mobile application. This paper focuses on the development of smartphone applications. Looking into the native development way for iOS and the code fragmentation that characterizes the long and costly development in order to provide the application on the big mobile operating systems by evaluating the cross-platform solution React Native that bypasses the fragmentation. 
 The experiment presents the collected data and its solutions, with an evaluation of the React Native framework. Finally, thoughts and future work to further extend the category is presented.
4

Simulácia dátových sietí s využitím priameho vykonávania kódu / Data network simulation using direct code execution

Trávníček, Michal January 2013 (has links)
Purpose of this master thesis was to explain simulation of real network, point to the imperfection during these simulations and try to find out technologies and solutions that could improve credibility of simulation. For this purpose, network simulator ns-3 has been chosen which supports direct code execution together with Quagga software suite. Master thesis describes internet protocol IPv4, UDP protocol, basics of routing and detailed explanation of OSPF routing protocol. Focus in this thesis is also on general description of simulation, its kinds and detail explanation of discrete simulation that is used by ns-3 simulator. Next chapter explains theory of ns-3 simulator, its development, conceptual overview and objects. Direct code execution and Quagga that both help improve credibility of simulation, are described in last chapter of theoretical part of thesis. In practical part of thesis is explained how to install and configure all three implemantaions of ns-3 simulator on Ubuntu, linux distribution. On the basis of obtained knowledge, the simulation model has been designed, also there has been given detailed explanation of how to create new model of simulation and how to analyze its results for all implementation.
5

Securing Trigger-Action Platforms With WebAssembly / Säkra trigger-aktion-plattformar med WebAssembly

Salim, Djiar January 2022 (has links)
The number of internet-connected devices and online services is increasing in the everyday lives of people. These devices and services solve independent tasks when used separately. However, they can solve complex tasks when used together. Trigger-action platforms (TAPs) allow users to create applications that connect their devices and services. The applications wait for a condition to be true in a device or service (trigger), and perform an operation in another device or service (action). JavaScript-driven TAPs allow users to add JavaScript code that is executed before the action. Currently, JavaScript-driven TAPs execute this code in the same JavaScript runtime for different applications. The problem is that they use unsafe isolation techniques that fail to secure code across applications. Thus, malicious applications can compromise other applications to leak their private data or control their behavior. Motivated to secure TAPs, we investigate isolation techniques on TAPs. The goal of this work is to propose isolation with WebAssembly, a recent language that is praised for its safe isolation. In line with the proposal, we prototype a WebAssembly-driven TAP. We also evaluate WebAssembly in terms of security, usability, and performance. For security, we perform a qualitative analysis of the security of current isolation techniques and WebAssembly. For usability, we implement and evaluate a set of applications on our novel platform. For performance, we conduct benchmarks on different isolation techniques including WebAssembly. The findings show that WebAssembly provides better isolation of code across applications than current isolation techniques. Our evaluation of usability and performance indicates that WebAssembly is also a practical and efficient solution. Furthermore, the performance results demonstrate that current JavaScript isolation techniques have significant performance issues that WebAssembly does not have. We conclude that WebAssembly can protect code across applications with isolation and it can be used in combination with other security measures to secure TAPs. / Antalet internetanslutna enheter och onlinetjänster ökar i det vardagliga livet. Dessa enheter och tjänster används för deras avsedda ändamål men i en kombination av varandra kan de användas för mer komplexa ändamål. Trigger-aktion-plattformar (TAP:ar) möjliggör för sina användare att skapa applikationer som sammankopplar deras enheter och tjänster. Applikationerna väntar på att ett visst villkor uppfylls på en enhet eller tjänst (trigger), och sedan utför den en handling på en annan enhet eller tjänst (aktion). JavaScript-drivna TAP:ar tillåter sina användare att skriva JavaScript-kod som exekveras före aktionen. Nuvarande JavaScript-drivna TAP:ar exekverar kod från olika applikationer i samma JavaScript-körtid. Problemet är att de använder osäkra isoleringsstrategier och därför misslyckas de med att säkra kod mellan applikationerna. Skadliga applikationer kan därmed angripa andra applikationer för att läcka deras privata data eller för att kontrollera dem. Vi undersöker isoleringsstrategier i TAP:ar med avsikt att säkra dem. Målet med detta arbete är att föreslå isolering med WebAssembly; ett nytt språk berömt för sin säkra isolering. I linje med vårt mål skapar vi en prototyp av en WebAssembly-driven TAP. Vi utvärderar även WebAssembly med avseende på säkerhet, användarbarhet och prestanda. För det förstnämnda utför vi en kvalitativ analys av säkerheten i nuvarande isoleringsstrategier och WebAssembly. För användarbarheten implementerar och evaluerar vi en uppsättning av applikationer på vår nya plattform. För prestanda utför vi flera tester på olika isoleringsstrategier inklusive WebAssembly. Resultaten visar att WebAssembly erbjuder bättre isolering för kod mellan applikationer än nuvarande isoleringsstrategier. Evalueringen av användarbarhet och prestanda påvisar dessutom att WebAssembly är en praktisk lösning med hög prestanda. Prestandaresultaten demonstrerar även att nuvarande isoleringsstrategier i JavaScript har prestandaproblem som WebAssembly inte har. Slutsatsen är att WebAssembly kan säkra kod genom att isolera applikationer och att det kan användas tillsammans med andra säkerhetsåtgärder för att säkra TAP:ar.
6

Obchod a investice do nemovitostí postižených exekucí v České republice / Business and Investments into a Distrained Real Estate in Czech republic

Procházka, Pavel January 2012 (has links)
Tato diplomová práce analyzuje právní základy a užití občanského zákoníku, majetkových zákonů, občanského soudního řádu a exekuční řádu v obchodu s nemovitostmi. Skrze případové studie se snaží poukázat na kritická místa a proveditelnost jednotlivých investic do exekucí zasažených či jinak právně znehodnocených nemovitostí. Závěrečná část hledá standardizované postupy, které nachází optimální mix rizika a profitability.
7

TCP FTAT (Fast Transmit Adaptive Transmission): A New End-To- End Congestion Control Algorithm

Afifi, Mohammed Ahmed Melegy Mohammed 06 November 2014 (has links)
No description available.

Page generated in 0.1451 seconds