• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1933
  • 183
  • 182
  • 147
  • 36
  • 25
  • 25
  • 25
  • 25
  • 25
  • 24
  • 16
  • 11
  • 9
  • 7
  • Tagged with
  • 2846
  • 2846
  • 735
  • 635
  • 505
  • 494
  • 388
  • 331
  • 310
  • 297
  • 296
  • 289
  • 286
  • 276
  • 275
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Network application detection techniques

Bharadia, Ketan R. January 2001 (has links)
No description available.
102

Avoca: An environment for programming with protocols.

O'Malley, Sean William. January 1990 (has links)
This dissertation addresses three fundamental problems with the network software as it is currently designed and implemented: the poor performance of high modular (or layered) protocols, network software's inability to keep up with the rapid changes in the networking technology and applications demands, and the inordinate amount of time it takes to produce new network protocols. These problems are solved through the use of a new platform for the implementation and execution of network protocols, a new methodology for the design of network protocols and a new network architecture a new network architecture. Avoca is the result of taking a coordinated approach to network software design, implementation, and standardization and consists of three parts: the Avoca platform, the Avoca methodology and the Avoca Network Architecture. The Avoca platform is a small operating systems kernel designed from scratch to implement network protocols efficiently. The Avoca methodology (or Meta-Protocol) is set of rules governing the design and implementation of network protocols implemented on the Avoca platform. The Avoca Network Architecture is a novel architecture explicitly designed to support the rapidly changing networking environment. Using Avoca highly layered network software can be implemented efficiently. Avoca proves that modularity is not inherently slow. Avoca supports the encapsulation, underspecification, composition and reuse of protocols will demonstrated. Avoca shows that network software is amenable to the use of software engineering techniques to improve the protocol implementation process. Finally, Avoca demonstrates that a network architecture flexible enough to support a rapidly changing networking environment is possible.
103

A FRAMEWORK FOR THE ANALYSIS OF AUTOMATED INTER-ORGANIZATIONAL INFORMATION SHARING SYSTEMS.

BARRETT, STEPHANIE STOCK. January 1983 (has links)
With the proliferation of computer networking technologies and improved systems development practice, organizationally-based information systems are beginning to include automated information interchange that transcends organizational boundaries. The scope of interorganizational systems ranges from the simple exchange of standardized messages to the integration of separate organizationally-based hardware and software components. The dissertation considers the characteristics of Automated Information Sharing Systems (IS*s) with a view toward developing classification schema and predicting issues of relevance to organizations and society arising from IS* development and evolution. Development of IS*s may be examined from a variety of perspectives including participation incentives and objectives as well as structural, growth and technical characteristics. Each of these is investigated by the analysis of actual case studies representing current and prototype IS* implementations. The output of the initial investigatory process is a set of representative taxonomies which may be used to classify and categorize IS*s. The primary taxonomic scheme, participation levels, represents categorization of IS*s on two bases: operational/technical characteristics and strategic utilization potentialities. Application taxonomies, interchange objective and interchange type, are also developed to provide a foundation for assessing the underlying characteristics of interchange prior to determining appropriate IS* application features. In this way, the thesis presents fundamental concepts for continuing research into the development and potential impact of IS*s.
104

A general purpose parallel computer

Rushton, A. J. January 1987 (has links)
No description available.
105

Enhancing the accuracy and efficiency of network performance measurement

Ward, Michael John January 1997 (has links)
No description available.
106

Real-time communication between virtual environments over the Internet

Shang, Huiping January 2003 (has links)
No description available.
107

A semiotic approach to ad-hoc networked environments

Hawizy, Lezan January 2007 (has links)
The aim of the work in this thesis is to develop a new approach of interacting with adhoc networked environments. These are networks where devices connect on demand with no underlying network infrastructure. The intention of this work is to develop these environments so that devices and services on these networks can publish their services, query for other services and connect with each other when required. The devices need to be able to perform these actions without prior knowledge of each other, therefore a theory of communication, semiotics, is presented. Ad-hoc networks provide an appropriate test-bed for this application of semiotics as they allow services to `know' about each other and communicate with one another. By using semiotics, we aim to create a representation of communication that allows a system to communicate within the networked environment and ask for services and connections as well as interact with users and provide. This way a user can demand something from the surrounding environment and the elements within this environment can communicate with each other to provide the service the user required. To create an effective model for this representation, various research areas will be discussed such as smart environments, natural language processing, multicast environments and human computer interaction. Principles will be used from all these areas to implement an approach of interacting with smart environments. Different types of smart environments, such as as smart homes and m-commerce environments, will be used to observe how di erent contexts a ect communication. A prototype system was realised for proof of concept and evaluated by subjects. This work highlighted the feasibility of this approach and opened a new area worthwhile of further research.
108

Multiparty agents on a multiservice network

Shrimpton, David Harold January 1992 (has links)
No description available.
109

An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises

Sherman, Michael A. 09 1900 (has links)
Approved for public release; distribution is unlimited / An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises. / Major, United States Marine Corps
110

Simultaneous connection management and protection in a distributed multilevel security environment

Sears, Joseph D. 09 1900 (has links)
Approved for public release; distribution is unlimited / The Naval Postgraduate School Center for Information Systems Security Studies and Research (CISR) is designing and developing a distributed multilevel secure (MLS) network known as the Monterey Security Architecture (MYSEA). MYSEA will permit the delivery of unmodified commercial off the shelf productivity software applications and data from a large number of single-level network domains (e.g., NIPRNET, SIPRNET, JWICS) to a trusted distributed operating environment that enforces MLS policies. The analysis and development of a communications framework necessary to support connections between multiple MLS servers and a set of high assurance network appliances supporting simultaneous access to multiple single level networks and their concurrent connection management is required to fulfill the goal of MYSEA. To enable this functionality, modifications to the existing MYSEA server, the development of a new high assurance communications security device - the Trusted Channel Module (TCM), and the implementation of a trusted channel between the MYSEA server and the TCM is required. This document specifies a framework for incorporating the high level design of the TCM, several trusted daemons and databases, plus the incorporation of a trusted channel protocol into MYSEA to enable a distributed MLS environment. / Lieutenant, United States Navy

Page generated in 0.0737 seconds