• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2027
  • 398
  • 227
  • 61
  • 54
  • 41
  • 41
  • 41
  • 41
  • 41
  • 39
  • 22
  • 21
  • 18
  • 17
  • Tagged with
  • 5245
  • 3423
  • 3222
  • 2429
  • 1312
  • 790
  • 612
  • 583
  • 535
  • 495
  • 464
  • 426
  • 397
  • 382
  • 347
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Heterogeneous market behaviour : demand-based sources of strategic advantage with application to the mainframe computer business

Geruson, Richard J. January 1988 (has links)
No description available.
132

Visual monitoring of glaucoma

Lee, Simon January 1991 (has links)
No description available.
133

Software elliptic curve cryptography

Khabbazian, Majid. 10 April 2008 (has links)
No description available.
134

A firewall training program based on CyberCIEGE

Tan, Nai Kwan 12 1900 (has links)
Firewalls represent an essential tool in networking environments. They are commonly used as an intermediate system to protect an internal network from external networks. It can be destructive to an organization if its sensitive information falls into wrong hands or becomes corrupted. The vulnerability becomes greater if an organization actively uses the Internet. Firewalls play an important role as a first line of defense for the protection of sensitive information and personnel need to understand the proper use of firewall technology and the fundamentals of the packet filtering concepts. Through â hands-onâ activities, trainees can experience different types of network attacks and can learn how firewalls can mitigate them. The goal of this project was to identify the potential capabilities of CyberCIEGE, a simulation created as an interactive educational tool, to help re-enforce packet filtering concepts through the use of computer gaming techniques. This thesis resulted in refinements to the CyberCIEGE.
135

An Investigation of numerical techniques for the fourier matching method acoustic scattering model

Henigin, Matthew K. 09 1900 (has links)
The effects of extended precision computing and other numerical techniques are evaluated for the Fourier matching method (FMM) acoustic scattering model, initially developed by Assistant Professor D. Benjamin Reeder, CDR/USN (NPS), and Professor Timothy K. Stanton (MIT/WHOI). Theory on acoustic scattering, reverberation, scattering models, conformal mapping, scatterer boundary conditions, floating point arithmetic, computational error, and extended precision computing is presented as a foundation for research development. The paper presents an assessment of the effects of numerical techniques on model output with the initial expectation of obtaining a more accurate, converged solution at higher frequencies, higher modal combinations, and greater eccentricities of scatterer shape. Comparisons to results from Reeder and Stanton (2004) demonstrate effects of executed techniques. Analysis includes an evaluation of the relationship between variable precision settings and computational time, gains in the useful frequency regime of the FMM, and numerical analysis benefits. Demonstrated techniques confirm that increased precision has a positive effect on model performance. The utility of other numerical techniques is discussed, and limitations of current computer systems and other shortfalls are illustrated. A feasibility assessment for Navy use of the FMM and recommendations for further improvements to the FMM are included.
136

A prototype implementation of a time interval file protection system in Linux

Chiang, Ken H. 09 1900 (has links)
Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents can be protected appropriately and the period of access to them controlled; and cryptographic keys configured to automatically expire and be unusable beyond a specific time. This thesis implements a prototype of the Time Interval Access Control (TIAC) model in the context of a protected file system for the popular open-source Linux operating system. The Linux Security Module framework is used for the implementation, which includes temporal attributes associated both with the files and the users. The implementation includes modifications to the file system as well as low-level information access constructs. As part of the design process, testing and performance analysis were conducted. Since the temporal access control mechanism is built into the kernel rather than the application, bypassing the mechanism becomes more difficult. Kernel level implementation also affords the same policy enforcement functionality to different applications, thus reducing human errors in their development. This thesis is relevant to the research on dynamic security services for information protection envisioned by the DoD Global Information Grid (GIG).
137

A secure alert system

Chew, Heng Hui. 12 1900 (has links)
The integrated mobile alert system (IMAS) is a mobile device messaging system that provides a means for people to stay connected and receive information in a modality that is constantly available to them. It was developed and built into a proof-of-concept (PoC) system at the Naval Postgraduate School (NPS) from commercial off the shelf (COTS) products. Like other systems, this system suffers from vulnerabilities because of bugs. These bugs come from (1) COTS products, (2) design of the system and (3) developed processes/applications. The study will review the design of IMAS, its processes and the COTS products. The focus of the study is to review these components and identify potential vulnerabilities. Furthermore, it will explain how these vulnerabilities may be exploited by probable threats. It will recommend solutions that can correct or prevent vulnerabilities. Lastly, the thesis will propose other measures that would make the system more secure.
138

The performance and compatibility of thin client computing with fleet operations

Landry, Kenneth J. 06 1900 (has links)
This research will explorethe feasibility of replacing traditional networked desktop personal computers (PC) with a thin client/server-based computing (TCSBC) architecture. After becoming nearly extinct in the early 1990s, thin clients are emerging on the forefront of technology with numerous bandwidth improvements and cost reduction benefits. The results show that TCSBC could provide a practical and financially sound solution in meeting the Navy's need to reduce costs and propagate the latest technology to all personnel. This solution may not meet the requirements of all naval commands. A thorough performance analysis should be conducted of the applications employed and the overall expenditures prior to implementation. / US Navy (USN) author.
139

Attitudes of Faculty Members in Rajamangala Institute of Technology, Thailand, Toward the Implementation of Computers

Cheamnakarin, Pornpimon 05 1900 (has links)
This study explored the attitudes and perceptions of faculty members in Rajamangala Institute of Technology (RIT), Thailand. The purpose of this study was to (a) determine which demographic variables are associated with faculty members attitudes toward the implementation of computers in higher education in Thailand, and (b) determine perceptions among faculty members toward barriers to the widespread use of computers.
140

Some Novice methods for Software Protection with Obfuscation

Aravalli, SaiKrishna 15 December 2006 (has links)
Previously software is distributed to the users by using devices like CD.S and floppies and in the form of bytes. Due to the high usage of internet and in order to perform the tasks rapidly without wasting time on depending physical devices, software is supplied through internet in the form of source code itself. Since source code is available to the end users there is a possibility of changing the source code by malicious users in order to gain their personnel benefits which automatically leads to malfunctioning of the software. The method proposed in this thesis is based on the concept of using hardware to protect the software. We will obfuscate the relation between variables and statements in the software programs so that the attacker can not find the direct relation between them. The method combines software security with code obfuscation techniques, uses the concepts of cryptography like hashing functions and random number generators.

Page generated in 0.1051 seconds