• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 425
  • 45
  • 34
  • 26
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 573
  • 573
  • 573
  • 272
  • 201
  • 138
  • 132
  • 95
  • 72
  • 54
  • 53
  • 51
  • 48
  • 48
  • 47
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
311

Pipeline rings and integrated services rings.

January 1989 (has links)
Wong, Po-Choi. / Summary in Chinese. / Thesis (Ph.D.)--Chinese University of Hong Kong, 1989. / Bibliography: leaves 156-164.
312

Real-time multicast with scalable reliability.

January 1998 (has links)
by Patrick C.K. Wu. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 57-[59]). / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Research Objectives --- p.2 / Chapter 1.2 --- Organization of the Thesis --- p.2 / Chapter 2 --- Background --- p.4 / Chapter 2.1 --- Reliable Multicasting --- p.4 / Chapter 2.2 --- Related Work --- p.5 / Chapter 2.2.1 --- RMTP --- p.5 / Chapter 2.2.2 --- RMP --- p.6 / Chapter 2.2.3 --- RAMP --- p.7 / Chapter 2.3 --- Multicast with Scalable Reliability (MSR) --- p.8 / Chapter 3 --- Traffic Shaping in MSR --- p.10 / Chapter 3.1 --- Single Queue System --- p.11 / Chapter 3.2 --- Scaling factor α --- p.12 / Chapter 4 --- Retransmission Scheme in MSR --- p.15 / Chapter 4.1 --- Packet Loss Detection and Requests for Retransmission at the Receivers --- p.17 / Chapter 4.2 --- Retransmission at the Sender --- p.19 / Chapter 4.3 --- Dynamic Adjustment of Retransmission Timeout Value --- p.22 / Chapter 4.4 --- Scaling Reliability using Transmit-Display Window --- p.29 / Chapter 5 --- NACK Implosion Prevention --- p.31 / Chapter 5.1 --- Electing a Representative Receiver --- p.32 / Chapter 5.2 --- Determining T --- p.33 / Chapter 5.3 --- Determining β --- p.34 / Chapter 6 --- Performance Study of MSR --- p.38 / Chapter 6.1 --- Performance Study of MSR in Simple Network Topologies --- p.39 / Chapter 6.2 --- Star Topology --- p.40 / Chapter 6.3 --- Tree Topology --- p.44 / Chapter 6.4 --- Exploring the use of MSR Gateway --- p.47 / Chapter 7 --- Conclusion and Future Work --- p.50 / Chapter 7.1 --- Future Work --- p.50 / Chapter 7.2 --- Conclusions --- p.51 / Chapter A --- MSR Packet Formats --- p.52 / Chapter A.1 --- MSR Fixed Header --- p.52 / Chapter A.2 --- MSR Audio Data Header --- p.54 / Chapter A.3 --- MSR NACK Packets --- p.55 / Bibliography --- p.57
313

An end-to-end adaptation algorithm for best effort video delivery over Internet.

January 1998 (has links)
by Walter Chi-Woon Fung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 64-[67]). / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Limitation of Existing Research --- p.3 / Chapter 1.3 --- Contributions of This Thesis --- p.3 / Chapter 1.4 --- Organization of the Thesis --- p.4 / Chapter 2 --- Related Work --- p.5 / Chapter 2.1 --- Ongoing Efforts For The Support of Real Time Applications on the Internet - RTP --- p.5 / Chapter 2.2 --- Using the Algorithm on top of RTP --- p.7 / Chapter 3 --- An Adaptive Video Retrieval Algorithm --- p.9 / Chapter 3.1 --- Lossless Environment --- p.9 / Chapter 3.1.1 --- Adapting the Request Rate to the Available Bandwidth --- p.12 / Chapter 3.2 --- Lossy Environment --- p.17 / Chapter 3.2.1 --- Adapting Ar in Lossy Environment --- p.20 / Chapter 3.3 --- Adjusting the Window Size --- p.24 / Chapter 3.4 --- Measurement Issues --- p.27 / Chapter 3.5 --- Mapping between Data Rate and Frame Rate --- p.28 / Chapter 4 --- Rate Measurement --- p.30 / Chapter 4.1 --- Arrival Rate Estimation --- p.30 / Chapter 4.2 --- Loss Rate Estimation --- p.32 / Chapter 5 --- Frame Skipping and Stuffing --- p.37 / Chapter 5.1 --- MPEG-1 Video Stream Basics --- p.37 / Chapter 5.2 --- Frame Skipping --- p.38 / Chapter 5.3 --- Frame Stuffing In Lossy Environment --- p.40 / Chapter 6 --- Experiment Result and Analysis --- p.43 / Chapter 6.1 --- Experiment --- p.43 / Chapter 6.2 --- Analysis --- p.54 / Chapter 6.2.1 --- Interacting With Streams With No Rate Control --- p.56 / Chapter 6.2.2 --- Multiple Streams Running The Algorithm --- p.58 / Chapter 6.2.3 --- Calculation of p --- p.59 / Chapter 7 --- Conclusions --- p.61 / Bibliography --- p.64
314

Selective Flooding for Better QoS Routing

Kannan, Gangadharan 10 May 2000 (has links)
Quality-of-service (QoS) requirements for the timely delivery of real-time multimedia raise new challenges for the networking world. A key component of QoS is QoS routing which allows the selection of network routes with sufficient resources for requested QoS parameters. Several techniques have been proposed in the literature to compute QoS routes, most of which require dynamic update of link-state information across the Internet. Given the growing size of the Internet, it is becoming increasingly difficult to gather up-to-date state information in a dynamic environment. We propose a new technique to compute QoS routes on the Internet in a fast and efficient manner without any need for dynamic updates. Our method, known as Selective Flooding, checks the state of the links on a set of pre-computed routes from the source to the destination in parallel and based on this information computes the best route and then reserves resources. We implemented Selective Flooding on a QoS routing simulator and evaluated the performance of Selective Flooding compared to source routing for a variety of network parameters. We find Selective Flooding consistently outperforms source routing in terms of call-blocking rate and outperforms source routing in terms of network overhead for some network conditions. The contributions of this thesis include the design of a new QoS routing algorithm, Selective Flooding, extensive evaluation of Selective Flooding under a variety of network conditions and a working simulation model for future research.
315

Improving Content Delivery and Service Discovery in Networks

Srinivasan, Suman Ramkumar January 2016 (has links)
Production and consumption of multimedia content on the Internet is rising, fueled by the demand for content from services such as YouTube, Netflix and Facebook video. The Internet is shifting from host-based to content-centric networking. At the same time, users are shifting away from a homogeneous desktop computing environment to using a heterogeneous mix of devices, such as smartphones, tablets and thin clients, all of which allow users to consume data on the move using wireless and cellular data networks. The popularity of these new class of devices has, in turn, increased demand for multimedia content by mobile users. The emergence of rich Internet applications and the widespread adoption and use of High Definition (HD) video has also placed higher pressure on the service providers and the core Internet backbone, forcing service providers to respond to increased bandwidth use in such networks. In my thesis, I aim to provide clarity and insight into the usage of core networking protocols and multimedia consumption on both mobile and wireless networks, as well as the network core. I also present research prototypes for potential solutions to some of the problems caused by the increased multimedia consumption on the Internet.
316

Performance and control of CSMA wireless networks. / CUHK electronic theses & dissertations collection

January 2010 (has links)
Motivated by the fact that the contention graph associated with ICN is a Markov random field (MRF) with respect to the probability distribution of its system states, and that the belief propagation algorithm (BP) is an efficient way to solve "inference" problems in graphical models such as MRF, we study how to apply BP algorithms to the analysis and control of CSMA wireless networks. We investigate three applications: (1) computation of link throughputs given link access intensities; (2) computation of link access intensities required to meet target link throughputs; and (3) optimization of network utility via the control of link access intensities. We show that BP solves the three problems with exact results in tree networks and has manageable computation errors in a network with loopy contention graph. In particular, we show how a generalized version of BP, GBP, can be designed to solve the three problems above with higher accuracy. Importantly, we show how the BP and GBP algorithms can be implemented in a distributed manner, making them useful in practical CSMA network operation. / The above studies focus on computation and control of "equilibrium" link throughputs. Besides throughputs, an important performance measure in CSMA networks is the propensity for starvation. In this thesis, we show that links in CSMA wireless networks are particularly susceptible to "temporal" starvation. Specifically, certain links may have good equilibrium throughputs, yet they can still receive no throughput for extended periods from time to time. We develop a "trap theory" to analyze temporal throughput fluctuations. The trap theory serves two functions. First, it allows us to derive new mathematical results that shed light on the transient behavior of CSMA networks. Second, we can develop automated analytical tools for computing the "degrees of starvation" for CSMA networks to aid network design. We believe that the ability to identify and characterize temporal starvation as established in this thesis will serve as an important first step toward the design of effective remedies for it. / This thesis investigates the performance and control of CSMA wireless networks. To this end, an analytical model of CSMA wireless networks that captures the essence of their operation is important. We propose an Ideal CSMA Network (ICN) model to characterize the dynamic of the interactions and dependency of links in CSMA wireless networks. This model allows us to address various issues related to performance and control of CSMA networks. / We show that the throughput distributions of links in ICN can be computed from a continuous-time Markov chain and are insensitive to the distributions of the transmission time (packet duration) and the backoff countdown time in the CSMA MAC protocol given the ratio of their means rho, referred to as the access intensity. An outcome of the ICN model is a Back-of-the-Envelope (BoE) approximate computation method that allows us to bypass complicated stochastic analysis to compute link throughputs in many network configurations quickly. The BoE computation method emerges from ICN in the limit rho → infinity. Our results indicate that BoE is a good approximation technique for modest-size networks such as those typically seen in 802.11 deployments. Beyond serving as the foundation for BoE, the theoretical framework of ICN is also a foundation for understanding and optimization of large CSMA networks. / Kai, Caihong. / Adviser: Soung Chang Liew. / Source: Dissertation Abstracts International, Volume: 73-03, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (leaves 180-183). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
317

Protocol sequences for the collision channel without feedback. / CUHK electronic theses & dissertations collection

January 2010 (has links)
At last, we focus on the detection problem in the protocol sequence design. The objective is to construct user-detectable sequences that allow any active user be detected by the receiver via some algorithm within some bounded delay if and only if it has become active. / First of all, in order to minimize variation of throughput due to delay offsets, we investigate protocol sequences whose pairwise Hamming cross-correlation is a constant for all possible relative offsets. It can be viewed as a generalization of completely shift-invariant sequences, which can achieve the zero-variation in throughput over a slot-synchronized channel. / Provided that the number of active users is smaller than the number of potential users, strongly conflict-avoiding codes are introduced with the non-blocking property in the asynchronous channel. It can be viewed as an extension of completely irrepressible sequences. / The second one is a non-blocking property which ensures that each active user can successfully transmit information at least once in its each active period. With the assumption that all potential users may be active simultaneously, user-irrepressible sequences and completely irrepressible sequences are studied respectively for different level of synchronization, to support the non-blocking property. / This thesis is based on Massey's model on collision channels without feedback, in which collided packets are considered unrecoverable. A collision occurs if two or more packets are partially or totally overlapped. Each potential user is assigned a deterministic zero-one pattern, called the protocol sequence, and sends a packet if and only if it is active and the value of the sequence is equal to one. Due to lack of feedback, the beginning of the protocol sequences cannot be synchronized and variation in relative offsets is inevitable. It further yields variation in throughput. / We study the design of protocol sequences from three different perspectives. / Zhang, Yijin. / Adviser: Wing Shing Wong. / Source: Dissertation Abstracts International, Volume: 73-03, Section: B, page: . / Thesis (Ph.D.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (leaves 1116). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
318

Improving routing performance of underwater wireless sensor networks

Ayaz, Beenish January 2016 (has links)
In this research work we propose a 3D node deployment strategy by carefully considering the unique characteristics of underwater acoustic communication as well as 3D dynamic nature of UWSN. This strategy targets 3D UWSN and not only improves the routing protocol performance significantly in terms of end to end delay and energy consumption but also provides reliability in data transmission. This strategy has been developed step by step from a single line of vertical communication to an effective 3D node deployment for UWSN. Several simulation experiments were carried out after adding different features to the final design to observe their impact on the overall routing performance. Finally, it is verified that this design strategy improves the routing performance, provides reliability to the network and increases network lifetime. Furthermore, we compared our results to the random node deployment in 3D, which is commonly used for analysing the performance of UWSN routing protocols. The comparison results verified our effective deployment design and showed that it provides almost 150% less end-to-end delay and almost 25% less energy consumption to the random deployment. It also revealed that by increasing the data traffic, our 3D node deployment strategy has no loss of data due to several back-up paths available, which is in contrast to random node deployment, where the packet loss occurs by increasing the data traffic. Improving the routing performance by carefully analysing the impact of 3D node deployment strategy and ensuring full sensing, transmission and back-up coverage in a highly unpredictable underwater environment, is a novel approach. Embedding this strategy with any networking protocol will improve its performance significantly.
319

A high speed fault-tolerant multimedia network and connectionless gateway for ATM networks.

January 1997 (has links)
by Patrick Lam Sze Fan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (leaves 163-[170]). / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Fault-tolerant CUM LAUDE NET --- p.7 / Chapter 2.1 --- Overview of CUM LAUDE NET --- p.7 / Chapter 2.2 --- Network architecture of CUM LAUDE NET --- p.8 / Chapter 2.3 --- Design of Router-node --- p.10 / Chapter 2.3.1 --- Architecture of the Router-node --- p.10 / Chapter 2.3.2 --- Buffers Arrangement of the Router-node --- p.12 / Chapter 2.3.3 --- Buffer transmission policies --- p.13 / Chapter 2.4 --- Protocols of CUM LAUDE NET --- p.14 / Chapter 2.5 --- Frame Format of CUM LAUDE NET --- p.15 / Chapter 2.6 --- Fault-tolerant (FT) and Auto-healing (AH) algorithms --- p.16 / Chapter 2.6.1 --- Overview of the algorithms --- p.16 / Chapter 2.6.2 --- Network Failure Scenarios --- p.18 / Chapter 2.6.3 --- Design and Implementation of the Fault Tolerant Algorithm --- p.19 / Chapter 2.6.4 --- Design and Implementation of the Auto Healing Algorithm --- p.26 / Chapter 2.6.5 --- Network Management Signals and Restoration Times --- p.27 / Chapter 2.6.6 --- Comparison of fault-tolerance features of other networks with the CUM LAUDE NET --- p.31 / Chapter 2.7 --- Chapter Summary --- p.31 / Chapter 3 --- Overview of the Asynchronous Transfer Mode (ATM) --- p.33 / Chapter 3.1 --- Introduction --- p.33 / Chapter 3.2 --- ATM Network Interfaces --- p.34 / Chapter 3.3 --- ATM Virtual Connections --- p.35 / Chapter 3.4 --- ATM Cell Format --- p.36 / Chapter 3.5 --- ATM Address Formats --- p.36 / Chapter 3.6 --- ATM Protocol Reference Model --- p.38 / Chapter 3.6.1 --- The ATM Layer --- p.39 / Chapter 3.6.2 --- The ATM Adaptation Layer --- p.39 / Chapter 3.7 --- ATM Signalling --- p.44 / Chapter 3.7.1 --- ATM Signalling Messages and Call Setup Procedures --- p.45 / Chapter 3.8 --- Interim Local Management Interface (ILMI) --- p.47 / Chapter 4 --- Issues of Connectionless Gateway --- p.49 / Chapter 4.1 --- Introduction --- p.49 / Chapter 4.2 --- The Issues --- p.50 / Chapter 4.3 --- ATM Internetworking --- p.51 / Chapter 4.3.1 --- LAN Emulation --- p.52 / Chapter 4.3.2 --- IP over ATM --- p.53 / Chapter 4.3.3 --- Comparing IP over ATM and LAN Emulation --- p.59 / Chapter 4.4 --- Connection Management --- p.61 / Chapter 4.4.1 --- The Indirect Approach --- p.62 / Chapter 4.4.2 --- The Direct Approach --- p.63 / Chapter 4.4.3 --- Comparing the two approaches --- p.64 / Chapter 4.5 --- Protocol Conversion --- p.65 / Chapter 4.5.1 --- Selection of Protocol Converter --- p.68 / Chapter 4.6 --- Packet Forwarding Modes --- p.68 / Chapter 4.7 --- Bandwidth Assignment --- p.70 / Chapter 4.7.1 --- Bandwidth Reservation --- p.71 / Chapter 4.7.2 --- Fast Bandwidth Reservation --- p.72 / Chapter 4.7.3 --- Bandwidth Advertising --- p.72 / Chapter 4.7.4 --- Bandwidth Advertising with Cell Drop Detection --- p.73 / Chapter 4.7.5 --- Bandwidth Allocation on Source Demand --- p.73 / Chapter 4.7.6 --- The Common Problems --- p.74 / Chapter 5 --- Design and Implementation of the Connectionless Gateway --- p.77 / Chapter 5.1 --- Introduction --- p.77 / Chapter 5.1.1 --- Functions Definition of Connectionless Gateway --- p.79 / Chapter 5.2 --- Hardware Architecture of the Connectionless Gateway --- p.79 / Chapter 5.2.1 --- Imposed Limitations --- p.82 / Chapter 5.3 --- Software Architecture of the Connectionless Gateway --- p.83 / Chapter 5.3.1 --- TCP/IP Internals --- p.84 / Chapter 5.3.2 --- ATM on Linux --- p.85 / Chapter 5.4 --- Network Architecture --- p.88 / Chapter 5.4.1 --- IP Addresses Assignment --- p.90 / Chapter 5.5 --- Internal Structure of Connectionless Gateway --- p.90 / Chapter 5.5.1 --- Protocol Stacks of the Gateway --- p.90 / Chapter 5.5.2 --- Gateway Operation by Example --- p.93 / Chapter 5.5.3 --- Routing Table Maintenance --- p.97 / Chapter 5.6 --- Additional Features --- p.105 / Chapter 5.6.1 --- Priority Output Queues System --- p.105 / Chapter 5.6.2 --- Gateway Performance Monitor --- p.112 / Chapter 5.7 --- Setup an Operational ATM LAN --- p.117 / Chapter 5.7.1 --- SVC Connections --- p.117 / Chapter 5.7.2 --- PVC Connections --- p.119 / Chapter 5.8 --- Application of the Connectionless Gateway --- p.120 / Chapter 6 --- Performance Measurement of the Connectionless Gateway --- p.121 / Chapter 6.1 --- Introduction --- p.121 / Chapter 6.2 --- Experimental Setup --- p.121 / Chapter 6.3 --- Measurement Tools of the Experiments --- p.123 / Chapter 6.4 --- Descriptions of the Experiments --- p.124 / Chapter 6.4.1 --- Log Files --- p.125 / Chapter 6.5 --- UDP Control Rate Test --- p.126 / Chapter 6.5.1 --- Results and analysis of the UDP Control Rate Test --- p.127 / Chapter 6.6 --- UDP Maximum Rate Test --- p.138 / Chapter 6.6.1 --- Results and analysis of the UDP Maximum Rate Test --- p.138 / Chapter 6.7 --- TCP Maximum Rate Test --- p.140 / Chapter 6.7.1 --- Results and analysis of the TCP Maximum Rate Test --- p.140 / Chapter 6.8 --- Request/Response Test --- p.144 / Chapter 6.8.1 --- Results and analysis of the Request/Response Test --- p.144 / Chapter 6.9 --- Priority Queue System Verification Test --- p.149 / Chapter 6.9.1 --- Results and analysis of the Priority Queue System Verifi- cation Test --- p.150 / Chapter 6.10 --- Other Observations --- p.153 / Chapter 6.11 --- Solutions to Improve the Performance --- p.154 / Chapter 6.12 --- Future Development --- p.157 / Chapter 7 --- Conclusion --- p.158 / Bibliography --- p.163 / A List of Publications --- p.171
320

An adaptive communication mechanism for heterogeneous distributed environments using XML and servlets.

January 2001 (has links)
Cheung Wing Hang. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 107-112). / Abstracts in English and Chinese. / Abstract --- p.ii / Abstract in Chinese --- p.iv / Acknowledgments --- p.v / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Firewall Issue in Distributed Systems --- p.2 / Chapter 1.2 --- Heterogeneous Communication Protocols --- p.4 / Chapter 1.3 --- Translator for Converting Interface Definition to Flexible XML --- p.8 / Chapter 1.4 --- An Implementation of a Scalable Mediator Query System --- p.9 / Chapter 1.5 --- Our Contributions --- p.9 / Chapter 1.6 --- Outline of This Thesis --- p.10 / Chapter 2 --- Related Work and Technologies --- p.12 / Chapter 2.1 --- Overview of XML Technology --- p.12 / Chapter 2.1.1 --- XML Basic Syntax --- p.13 / Chapter 2.1.2 --- DTD: The Grammar Book --- p.15 / Chapter 2.1.3 --- Representing Complex Data Structures --- p.17 / Chapter 2.2 --- Overview of Java Servlet Technology --- p.18 / Chapter 2.3 --- Overview of Simple Object Access Protocol --- p.20 / Chapter 2.4 --- Overview of XML-RPC --- p.21 / Chapter 2.5 --- Overview of XIOP --- p.22 / Chapter 3 --- Using XML and Servlets to Support CORBA Calls --- p.24 / Chapter 3.1 --- Objective --- p.24 / Chapter 3.2 --- General Concept of Our Mechanism --- p.25 / Chapter 3.2.1 --- At Client Side --- p.27 / Chapter 3.2.2 --- At Server Side --- p.28 / Chapter 3.3 --- Data in Transmission --- p.30 / Chapter 3.3.1 --- Using XML --- p.30 / Chapter 3.3.2 --- Format of Messages in Transmission --- p.30 / Chapter 3.4 --- Supporting Callbacks in CORBA Systems --- p.33 / Chapter 3.4.1 --- What is callback? --- p.33 / Chapter 3.4.2 --- Enhancement to Allow Callbacks --- p.34 / Chapter 3.5 --- Achieving Transparency with Add-on Components --- p.37 / Chapter 4 --- A Translator to Convert CORBA IDL to XML --- p.39 / Chapter 4.1 --- Introduction to CORBA IDL --- p.39 / Chapter 4.2 --- Mapping from IDL to XML --- p.40 / Chapter 4.2.1 --- IDL Basic Data Types --- p.41 / Chapter 4.2.2 --- IDL Complex Data Types --- p.42 / Chapter 4.2.3 --- IDL Interface --- p.48 / Chapter 4.2.4 --- Attributes --- p.48 / Chapter 4.2.5 --- Operations (Methods) --- p.49 / Chapter 4.2.6 --- Exceptions --- p.50 / Chapter 4.2.7 --- Inheritance --- p.51 / Chapter 4.2.8 --- IDL Modules --- p.52 / Chapter 4.2.9 --- A Sample Conversion --- p.52 / Chapter 4.3 --- Making a Request or Response --- p.53 / Chapter 4.4 --- Code Generation for Add-on Components --- p.54 / Chapter 4.4.1 --- Generation of Shadow Objects --- p.54 / Chapter 4.4.2 --- Generation of Servlet Components --- p.55 / Chapter 5 --- Communication in Heterogeneous Distributed Environments --- p.58 / Chapter 5.1 --- Objective --- p.58 / Chapter 5.2 --- General Concept --- p.60 / Chapter 5.3 --- Case Study 1 - Distributed Common Object Model --- p.61 / Chapter 5.3.1 --- Brief Overview of Programming in DCOM --- p.61 / Chapter 5.3.2 --- Mapping the Two Different Interface Definitions --- p.63 / Chapter 5.3.3 --- Sample Architecture of Communicating Between DCOM and CORBA --- p.66 / Chapter 5.4 --- Case Study 2 - Java Remote Methods Invocation --- p.67 / Chapter 5.4.1 --- Brief Overview of Programming in Java RMI --- p.67 / Chapter 5.4.2 --- Mapping the Two Different Interface Definitions --- p.69 / Chapter 5.4.3 --- Sample Architecture of Communicating Between JavaRMI and CORBA --- p.71 / Chapter 5.5 --- Be Generic: Binding with the WEB --- p.72 / Chapter 6 --- Building a Scalable Mediator-based Query System --- p.74 / Chapter 6.1 --- Objectives --- p.74 / Chapter 6.2 --- Introduction to Our Mediator-based Query System --- p.76 / Chapter 6.2.1 --- What is mediator? --- p.76 / Chapter 6.2.2 --- The Architecture of our Mediator Query System --- p.77 / Chapter 6.2.3 --- The IDL Design of the Mediator System --- p.79 / Chapter 6.2.4 --- Components in the Query Mediator System --- p.80 / Chapter 6.3 --- Helping the Mediator System to Expand Across the Firewalls --- p.83 / Chapter 6.3.1 --- Implementation --- p.83 / Chapter 6.3.2 --- Across Heterogeneous Systems with DTD --- p.87 / Chapter 6.4 --- Adding the Callback Feature to the Mediator System --- p.89 / Chapter 6.5 --- Connecting our CORBA System with Other Environments --- p.90 / Chapter 6.5.1 --- Our Query System in DCOM --- p.91 / Chapter 6.5.2 --- Our Query System in Java RMI --- p.92 / Chapter 6.5.3 --- Binding Heterogeneous Systems --- p.93 / Chapter 7 --- Evaluation --- p.95 / Chapter 7.1 --- Performance Statistics --- p.95 / Chapter 7.1.1 --- Overhead in other methods --- p.97 / Chapter 7.2 --- Means for Enhancement --- p.98 / Chapter 7.2.1 --- Connection Performance of HTTP --- p.98 / Chapter 7.2.2 --- Transmission Data Compression --- p.99 / Chapter 7.2.3 --- Security Concern --- p.99 / Chapter 7.3 --- Advantages of Using Our Mechanism --- p.101 / Chapter 7.4 --- Disadvantages of Using Our Mechanism --- p.102 / Chapter 8 --- Conclusion --- p.104

Page generated in 0.0858 seconds