Spelling suggestions: "subject:"computer network - protocols"" "subject:"coomputer network - protocols""
11 |
Solutions for ubiquitous information services : multiple protocols and scalable serversClark, R. J. (Russell J.) January 1995 (has links)
No description available.
|
12 |
Realizations of efficient collective communication in multidimensional processor arraysSuh, Young-Joo 12 1900 (has links)
No description available.
|
13 |
An Algorithmic approach to constructing protocol convertersPeyravian, Mohammad 12 1900 (has links)
No description available.
|
14 |
UDP/TCP/IP packet processing using a superscalar microprocessorHuang, Tsai Chi 12 1900 (has links)
No description available.
|
15 |
Protocol design for dynamic Delaunay triangulationLee, Dong-young, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2008. / Vita. Includes bibliographical references.
|
16 |
Efficient transaction processing in broadcast-based asymmetric communication environmentsHuang, Yan. January 2001 (has links)
Thesis (Ph. D.)--University of Florida, 2001. / Title from title page of source document. Document formatted into pages; contains xvi, 186 p.; also contains graphics. Includes vita. Includes bibliographical references.
|
17 |
Fast and scalable Internet service scheme for static and dynamic web data contentsLim, Jaeyong. January 2003 (has links)
Thesis (Ph. D.)--University of Florida, 2003. / Title from title page of source document. Includes vita. Includes bibliographical references.
|
18 |
Protocols for convergence and load-balancing in inter-domain routing /Musunuri, Ravi. January 2006 (has links)
Thesis (Ph.D.) -- University of Texas at Dallas, 2006. / Includes vita. Includes bibliographical references (leaves 94-98)
|
19 |
A new methodology for OSI conformance testing based on trace analysisWvong, Russil January 1990 (has links)
This thesis discusses the problems of the conventional ISO 9646 methodology for OSI conformance testing, and proposes a new methodology based on trace analysis. In the proposed methodology, a trace analyzer is used to determine whether the observed behavior of the implementation under test is valid or invalid. This simplifies test cases dramatically, since they now need only specify the expected behavior of the IUT; unexpected behavior is checked by the trace analyzer. Test suites become correspondingly smaller. Because of this reduction in size and complexity, errors in test suites can be found and corrected far more easily. As a result, the reliability and the usefulness of the conformance testing process are greatly enhanced.
In order to apply the proposed methodology, trace analyzers are needed. Existing trace analyzers are examined, and found to be unsuitable for OSI conformance testing. A family of new trace analysis algorithms is presented and proved.
To verify the feasibility of the proposed methodology, and to demonstrate
its benefits, it is applied to a particular protocol, the LAPB protocol specified by ISO 7776. The design and implementation of a trace analyzer
for LAPB are described. The conventional ISO 8882-2 test suite for LAPB, when rewritten to specify only the expected behavior of the IUT, is found to be more than an order of magnitude smaller. / Science, Faculty of / Computer Science, Department of / Graduate
|
20 |
Implementation of the Cambridge ring protocols on the sun workstationChan, Linda January 1985 (has links)
As Local Area Networks gain momentum in recent Computer Science research,
implementation is generally characterized by various factors such as efficiency, reliability, error recovery, and synchronism; however, how well the above issues can be achieved is heavily dependent on the facilities available in an implementation environment.
Due to the recent popularity of message passing and concurrent processes, the UNIX 4.2bsd operating system with its interprocess communication facility is chosen to be the implementation environment for the Cambridge Ring's Basic Block and Byte Stream Protocols. Basic Block Protocol, implemented as a device driver in the system kernel, is the lowest level protocol which provides an unreliable datagram service, while the Byte Stream Protocol, implemented using multi-concurrent processes in the user space, provides a reliable, full-duplex virtual circuit service based on the service provided by the Basic Block Protocol.
This thesis describes the protocol implementation on a 68000 based SUN workstation, and discusses results learnt from the experiment. The multi-concurrent processes approach is found to work adequately well for a small number of clients, but incur high overhead when the number of clients is large. / Science, Faculty of / Computer Science, Department of / Graduate
|
Page generated in 0.0756 seconds