Spelling suggestions: "subject:"computer betworks"" "subject:"computer conetworks""
21 |
Service replication strategy in service overlay networks.January 2004 (has links)
Liu Yunkai. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 43-45). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Background --- p.4 / Chapter 2.1 --- Notations --- p.4 / Chapter 2.2 --- Service Overlay Network Architecture --- p.5 / Chapter 2.3 --- The SON Cost Model --- p.5 / Chapter 2.4 --- Bandwidth Provisioning Problem --- p.7 / Chapter 2.5 --- Traffic Variation and QoS Violation Penalty --- p.8 / Chapter 3 --- Service Replication Model --- p.12 / Chapter 3.1 --- One-to-One Service Model --- p.13 / Chapter 3.2 --- Service Delivery Tree Model --- p.16 / Chapter 3.2.1 --- Problem Formulation --- p.17 / Chapter 3.2.2 --- Distributed Evaluation of SDT --- p.20 / Chapter 3.2.3 --- Approximation --- p.22 / Chapter 4 --- Service Replication Algorithms --- p.24 / Chapter 4.1 --- Centralized Service Replication Algorithm --- p.24 / Chapter 4.1.1 --- Preprocessing Phase --- p.24 / Chapter 4.1.2 --- Searching Phase --- p.26 / Chapter 4.2 --- Distributed Service Replication Algorithm --- p.27 / Chapter 4.3 --- Improved Distributed Algorithm --- p.28 / Chapter 5 --- Performance Evaluations --- p.32 / Chapter 5.1 --- Experiment 1: Algorithm Illustration --- p.32 / Chapter 5.2 --- Experiment 2: Performance Comparison --- p.34 / Chapter 5.3 --- Experiment 3: Scalability Analysis --- p.36 / Chapter 5.3.1 --- Experiment 3A --- p.36 / Chapter 5.3.2 --- Experiment 3B --- p.37 / Chapter 5.3.3 --- Experiment 3C --- p.38 / Chapter 5.4 --- Experiment 4: Multiple replications --- p.39 / Chapter 6 --- Related Work --- p.41 / Chapter 7 --- Conclusion --- p.42 / Bibliography --- p.45
|
22 |
Design and analysis problems in active service networks.January 2006 (has links)
Xiao Lurong. / Thesis submitted in: June 2005. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves [74]-76). / Abstracts in English and Chinese. / ABSTRACT --- p.I / 摘要 --- p.III / ACKNOWLEDGMENTS --- p.IV / CONTENT --- p.V / LIST OF FIGURES --- p.VII / LIST OF TABLES --- p.IX 1 / Chapter CHAPTER 1 --- INTRODUCTION / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Related Works --- p.3 / Chapter 1.3 --- Active Service Network --- p.12 / Chapter 1.4 --- Motivations and Contributions --- p.13 / Chapter 1.5 --- Outline --- p.14 / Chapter CHAPTER 2 --- ACTIVE SERVICE NETWORKS (ASN) ARCHITECTURE --- p.16 / Chapter 2.1 --- Internet Architecture --- p.16 / Chapter 2.2 --- ASN Enterprise Model --- p.19 / Chapter 2.3 --- ASN network Architecture --- p.20 / Chapter 2.4 --- ASN System Architecture --- p.24 / Chapter 2.5 --- Summary --- p.26 / Chapter CHAPTER 3 --- ASN VS. CLIENT SERVER APPROACH --- p.27 / Chapter 3.1 --- Application Scenario --- p.21 / Chapter 3.2 --- Application Models --- p.28 / Chapter 3.3 --- Analytical Models --- p.29 / Chapter 3.4 --- Performance Results --- p.34 / Chapter 3.5 --- Chapter Summary --- p.37 / Chapter CHAPTER 4 --- DESIGN PROBLEMS --- p.38 / Chapter 4.1 --- Problem Definitions --- p.38 / Chapter 4.2 --- Related works --- p.40 / Chapter 4.3 --- Problem Formulation --- p.43 / Chapter 4.4 --- Heuristic Algorithms --- p.49 / Chapter 4.5 --- Simulation Results --- p.51 / Chapter 4.6 --- Chapter Summary --- p.57 / Chapter CHAPTER 5 --- PERFORMANCE EVALUATION --- p.58 / Chapter 5.1 --- Simulation Model --- p.58 / Chapter 5.2 --- Blocking Performance --- p.60 / Chapter 5.3 --- Advanced Capabilities --- p.64 / Chapter 5.4 --- Chapter Summary --- p.69 / Chapter CHAPTER 6 --- CONCLUSION --- p.71 / Chapter 6.1 --- Contributions --- p.71 / Chapter 6.2 --- Future works --- p.72 / REFERENCES --- p.74
|
23 |
Interaction of overlay networks: properties and control.January 2006 (has links)
Jiang Wenjie. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 89-96). / Abstracts in English and Chinese. / Acknowledgement --- p.iii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Challenges --- p.2 / Chapter 1.3 --- Our Contribution --- p.4 / Chapter 1.4 --- Structure of the thesis --- p.5 / Chapter 2 --- Background Study --- p.7 / Chapter 2.1 --- An Introduction to Overlay Networks --- p.8 / Chapter 2.1.1 --- What is an Overlay Network? --- p.8 / Chapter 2.1.2 --- Benefits of Overlay Networks --- p.13 / Chapter 2.2 --- Taxonomy of Overlay Networks --- p.16 / Chapter 2.2.1 --- Routing Overlay Networks --- p.16 / Chapter 2.2.2 --- Content Delivery Networks (CDNs) --- p.25 / Chapter 2.2.3 --- Security Overlay Networks --- p.28 / Chapter 3 --- Mathematical Models for Overlay Routing --- p.32 / Chapter 3.1 --- Formulation of Routing in Overlay Networks --- p.32 / Chapter 3.2 --- Optimal Overlay Routing Policy --- p.34 / Chapter 3.3 --- Illustration of Overlay Routing Policy --- p.37 / Chapter 4 --- Overlay Routing Game --- p.40 / Chapter 4.1 --- Strategic Nash Routing Game --- p.40 / Chapter 4.2 --- Stable Property of Overlay Optimal Routing --- p.43 / Chapter 4.3 --- Routing Game in Other Forms --- p.44 / Chapter 5 --- Comparison of Routing Strategies: A Spectrum of Efficiency --- p.46 / Chapter 5.1 --- Global Optimal Routing --- p.47 / Chapter 5.2 --- Selfish User Routing --- p.49 / Chapter 5.3 --- Optimal Overlay Routing --- p.51 / Chapter 5.4 --- Performance Comparison --- p.54 / Chapter 6 --- Simulations on Routing Game --- p.56 / Chapter 6.1 --- Fluid Level Simulation --- p.56 / Chapter 6.2 --- Packet Level Simulation --- p.59 / Chapter 7 --- Understanding Various Issues & Implications of Overlay Interaction --- p.65 / Chapter 7.1 --- Sub-optimality of Nash Equilibrium --- p.66 / Chapter 7.2 --- Slow convergence to Nash equilibrium --- p.67 / Chapter 7.3 --- Fairness Paradox --- p.68 / Chapter 8 --- Overlay Pricing --- p.71 / Chapter 8.1 --- Pricing mechanism to improve end-to-end delay --- p.71 / Chapter 8.1.1 --- Fluid-level Simulation --- p.74 / Chapter 8.1.2 --- Packet-level Simulation --- p.77 / Chapter 8.2 --- Pricing mechanism to improve fairness --- p.77 / Chapter 9 --- Related Work --- p.83 / Chapter 10 --- Conclusion --- p.86 / Chapter 10.1 --- Summary of the Contribution --- p.86 / Chapter 10.2 --- Future Directions --- p.87 / Bibliography --- p.89 / Chapter A --- Proof of Existence of Nash Equilibrium --- p.97
|
24 |
Host/CC and CC/CC asynchronous control line driver in the MIMICS networkRehme, Erwin Lynn January 2010 (has links)
Typescript, etc. / Digitized by Kansas Correctional Industries
|
25 |
Intrusion detection and response model for mobile ad hoc networks /Alampalayam P., Sathish Kumar. January 2007 (has links) (PDF)
Thesis (Ph. D.)--University of Louisville, 2007. / Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (leaves 163-170). Also in PDF.
|
26 |
Utilization and control of a packet switching multi-access channelSaadat, Farivar January 1977 (has links)
No description available.
|
27 |
Security analysis of a cyber-physical systemTang, Han, January 2007 (has links) (PDF)
Thesis (M.S.)--University of Missouri--Rolla, 2007. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed November 30, 2007) Includes bibliographical references (p. 55-57).
|
28 |
Intrusion detection and response model for mobile ad hoc networksAlampalayam, Sathish Kumar. January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed December 14, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 163-170).
|
29 |
Simulation-based analysis and evaluation of tactical multi-hop radio networksSmith, Howard D. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2009. / Thesis Advisor(s): Gibson, John H. ; Singh, Gurminder. "March 2009." Description based on title screen as viewed on April 24, 2009. Author(s) subject terms: Radio Networks, Multi-hop Networks, Computer Networks, Tactical Radio Networks, Software-Based Network Simulation, Network Analysis, SINCGARS, EPLRS, Cooperative Diversity, JCSS. Includes bibliographical references (p. 105-106). Also available in print.
|
30 |
Using network application behavior to predict performanceMa, Chunling. January 2008 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: network performance, prediction, measurements, network metrics. Includes bibliographical references (leaves 116-117).
|
Page generated in 0.0874 seconds