• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 472
  • 85
  • 80
  • 20
  • 10
  • 7
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 832
  • 832
  • 186
  • 173
  • 161
  • 124
  • 121
  • 119
  • 117
  • 101
  • 95
  • 94
  • 83
  • 83
  • 79
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

VLSI parallel processing architectures

Spray, Andrew J. C. January 1990 (has links)
No description available.
32

Single sign-on solution for MYSEA services

Bui, Sonia. 09 1900 (has links)
The Monterey Security Architecture (MYSEA) is a trusted distributed environment enforcing multilevel security policies. To provide a scaleable architecture, a federation of MYSEA servers handles service requests. However, the introduction of multiple servers creates security and usability problems associated with multiple user logins. A single sign-on solution for the MYSEA server federation is needed. After user authenticates once to a single MYSEA server, the user's credentials are used to sign on to the other MYSEA servers. The goal of this thesis is to create a high-level design and specification of a single sign-on framework for MYSEA. This has entailed a review and comparison of existing single sign-on architectures and solutions, a study of the current MYSEA design, the development of a new architecture for single sign-on, an analysis of single signon threats within a MYSEA context, a derivation of single sign-on objectives in MYSEA, leading up to the security requirements for single sign-on in MYSEA. Security and functionality are the main driving factors in the design. Others factors include performance, reliability, and the feasibility of integration into the existing MYSEA MLS network. These results will serve as a basis for a detailed design and future development of sign-on in MYSEA.
33

A need for systems architecture approach for next generation mine warfare capability

Hibbert, Kirk R. 09 1900 (has links)
When operating in a sea borne environment, sea mines can prevent U.S. Navy vessels from meeting operational objectives. Sea mines have the potential of damaging, or destroying ships at sea. The U.S. Navy conducts mine warfare (MIW) operations to meet this threat. Although effective against mining, our countermining operations are currently employing 1960â s technology in an attempt to keep pace with new Concepts of Operations (CONOPS). Todayâ s legacy MIW processes currently employed by the warfighter, although capable of countering the mining threat, are a reactive process that is slow to engage and employ assets that are cumbersome to operate. With the advent of new technologies, a transformation of MIW capability is on the horizon and has the potential of influencing how the U.S. Navy maintains maritime dominance in the openoceans and littoral environments. The influence that technologies bring to MIW includes multi-spectral sensors, laser imagery, compact modular systems, unmanned and semi-autonomous weapons, as well as new communications architecture and tactics. Although these technical innovations present a level of capability superior to the existing legacy systems, developmental barriers and the lack of an overarching systems architecture will hinder or prevent these systems from being effectively integrated into tomorrowâ s CONOPS.
34

Fitting an information security architecture to an enterprise architecture

19 May 2009 (has links)
M.Phil. (Computer Science) / Despite the efforts at international and national level, security continues to pose challenging problems. Firstly, attacks on information systems are increasingly motivated by profit rather than by the desire to create disruption for its own sake. Data are illegally mined, increasingly without the user’s knowledge, while the number of variants (and the rate of evolution) of malicious software (malware) is increasing rapidly. Spam is a good example of this evolution. It is becoming a vehicle for viruses and fraudulent and criminal activities, such as spyware, phishing and other forms of malware. Its widespread distribution increasingly relies on botnets, i.e. compromised servers and PCs used as relays without the knowledge of their owners. The increasing deployment of mobile devices (including 3G mobile phones, portable videogames, etc.) and mobile-based network services will pose new challenges, as IP-based services develop rapidly. These could eventually prove to be a more common route for attacks than personal computers since the latter already deploy a significant level of security. Indeed, all new forms of communication platforms and information systems inevitably provide new windows of opportunity for malicious attacks. In order to successfully tackle the problems described above, a strategic approach to information security is required, rather than the implementation of ad hoc solutions and controls. The strategic approach requires the development of an Information Security Architecture. To be effective, an Information Security Architecture that is developed must be aligned with the organisation’s Enterprise Architecture and must be able to incorporate security into each domain of the Enterprise Architecture. This mini dissertation evaluates two current Information Security Architecture models and frameworks to find an Information Security Architecture that aligns with Eskom’s Enterprise Architecture.
35

A microarchitecture study of the counterflow pipeline principle

Janik, Kenneth J. 27 February 1998 (has links)
The counterflow pipeline concept was originated by Sproull et. al.[1] to demonstrate the concept of asynchronous circuits. The basic premise is that a simple architecture with only local communication and control and a simple regular structure will result in increased performance. This thesis attempts to analyze the performance of the basic counterflow pipeline architecture, find the bottlenecks associated with this implementation, and attempt to illustrate the improvements that we have made in overcoming these bottlenecks. From this research, three distinct microarchitectures have been developed, ranging from a synchronous version of the counterflow design suggested by Sproull to an all new structure which supports aggressive speculation, no instruction stalling and ultimately intrinsic multi-threading. To support high-level simulation of various architectures a Java based simulation environment has been developed which was used to explore the various design trade-offs and evaluate the resulting performance of each of the architectures. / Graduation date: 1998
36

Formal verification of an advanced pipelined machine /

Sawada, Jun, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 1103-1112). Available also in a digital version from Dissertation Abstracts.
37

High speed CORDIC processor designs : algorithms, architectures, and applications /

Kwak, Jae-hyuck, January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 107-114). Available also in a digital version from Dissertation Abstracts.
38

Reference architecture representation environment (RARE) systematic derivation and evaluation of domain-specific, implementation-independent software architectures /

Graser, Thomas Jeffrey, January 2001 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2001. / Vita. Includes bibliographical references. Available also from UMI/Dissertation Abstracts International.
39

CORDIC-based high-speed direct digital frequency synthesis

Kang, Chang Yong, Swartzlander, Earl E. January 2003 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Supervisor: Earl E. Swartzlander, Jr. Vita. Includes bibliographical references. Also available from UMI.
40

Extended data cache prefetching using a reference prediction table /

Kim, Donglok. January 1997 (has links)
Thesis (Ph. D.)--University of Washington, 1997. / Vita. Includes bibliographical references (leaves [76]-77).

Page generated in 0.0672 seconds