• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 189
  • 18
  • 17
  • 13
  • 6
  • 1
  • 1
  • Tagged with
  • 266
  • 266
  • 266
  • 165
  • 165
  • 100
  • 88
  • 71
  • 63
  • 58
  • 46
  • 43
  • 41
  • 38
  • 31
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Modeling and analysis of stochastic self-similar processes and TCP/IP congestion control in high-speed computer communication networks /

Alazemi, Hamed M. K. January 2000 (has links)
Thesis (Ph. D.)--University of Washington, 2000. / Vita. Includes bibliographical references (leaves 111-119).
82

Novel die-to-die coaxial interconnect system for use in System-in-Package applications

McIntosh, Christopher Michael. January 2009 (has links) (PDF)
Thesis (MS)--Montana State University--Bozeman, 2009. / Typescript. Chairperson, Graduate Committee: Brock LaMeres. Includes bibliographical references (leaves 44-47).
83

Spectrally-efficient protocols for wireless relay networks /

Tannious, Ramy M., January 2008 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 93-99)
84

Development of RF front end prototype compliant with the 802.11a standard for wireless applications

Papageorgiou, Nikolaos A. 01 December 2003 (has links)
No description available.
85

Multi initiator connected dominating set construction for mobile ad hoc networks

Kim, Kyoung Min, Sun, Min-Te, January 2008 (has links)
Thesis--Auburn University, 2008. / Abstract. Vita. Includes bibliographical references (p. 45-48).
86

API development for persistent data sessions support

Pailom, Chayutra 03 1900 (has links)
Approved for public release, distribution is unlimited / This thesis studies and discusses the development of the API, called the persistency API, for supporting the persistent data sessions. Without persistent session support, network applications often need to be restarted from the beginning when intermittent physical connection loss happens. Application programmers can use the persistency API to achieve the service continuity. The persistency API provides the interface that allows a program to continue retrieve data from the point the connection is lost after the physical connection is restored. The focus of this thesis is to develop a generalized persistency API that supports various types of applications. This thesis studies the persistent session support for two types of transport protocols, TCP and UDP, which are used by major network applications. An application that performs text file and video file transfer is implemented to demonstrate the persistent data transfer sessions for TCP and UDP, respectively. The study shows that the proposed APIs can support the data transfer continuity in the reconnection process. / Captain, Royal Thai Army
87

Portable TCP/IP server design

Jolliffe, Robert Mark 25 August 2009 (has links)
There are a number of known architectural patterns for TCP/IP server design. I present a survey of design choices based on some of the most common of these patterns. I have demonstrated, with working code samples, that most of these architectural patterns are readily portable between UNIX and Windows NT platforms without necessarily incurring significant performance penalties. / Computing / M. Sc. (Computer Science)
88

Vertical handoff in heterogeneous wireless networks with mSCTP

Tsang, Cheuk-kan, Ken., 曾卓勤. January 2008 (has links)
published_or_final_version / Computer Science / Doctoral / Doctor of Philosophy
89

Techniques and countermeasures of TCP/IP OS fingerprinting on Linux Systems

Stopforth, Riaan. January 2007 (has links)
Port scanning is the first activity an attacker pursues when attempting to compromise a target system on a network. The aim is to gather information that will result in identifying one or more vulnerabilities in that system. For example, network ports that are open can reveal which applications and services are running on the system. How a port responds when probed with data can reveal which protocol the port utilises and can also reveal which implementation of that protocol is being employed. One of the most valuable pieces of information to be gained via scanning and probing techniques is the operating system that is installed on the target. This technique is called operating system fingerprinting. The purpose of this research is to alert computer users of the dangers of port scanning, probing, and operating system fingerprinting by exposing these techniques and advising the users on which preventative countermeasures to take against them. Analysis is performed on the Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Protocol (IPv4 and IPv6), and the Internet Control Message Protocol (ICMPv4 and ICMPv6). All the software used in this project is free and open source. The operating system used for testing is Linux (2.4 and 2.6 kernels). Scanning, probing, and detection techniques are investigated in the context of the Network Mapper and Xprobe2 tools. / Thesis (M.Sc. - Computer)-University of KwaZulu-Natal, Durban, 2007.
90

IPSec-based dynamic security services for the MYSEA environment / IPSec-based dynamic security services for the Monterey Security Architecture environment

Horn, John F. 06 1900 (has links)
It is recognized that security services in information-processing systems require access to finite resources in the execution of their duties. In response to the changing threats faced by a system and/or the availability of system resources, it is desired that the system be able to adjust its operational security policies automatically while continuing to function under an acceptable global security policy. This work involves the analysis and integration of a dynamic security service (DSS)-enabled IPsec implementation into a form ready for installation into the MYSEA environment. The feasibility of dynamic security services is demonstrated with support for secrecy and/or integrity protection of MLS server-to-end-user communication via a Trusted Path Extension. This is accomplished through the modulation of the IPsec security associations to adapt to operational needs. The result of this research is beneficial to Homeland Security, the Department of Defense, and the intelligence community by enabling remote distributed computing clients to operate in a secure manner that remains flexible to adapt to changing requirements of protection on the network and the availability of resources on terminating hosts. Furthermore, these methods can aid the realization of high-assurance edge-client connectivity in the creation and extension of the Global Information Grid (GIG).

Page generated in 0.3569 seconds