• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 70
  • 11
  • 9
  • 7
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 139
  • 139
  • 32
  • 31
  • 26
  • 24
  • 21
  • 19
  • 17
  • 16
  • 16
  • 15
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Congestion control mechanisms for scalable bandwidth sharing

Gevros, Panagiotis January 2001 (has links)
No description available.
2

Evaluation of UML tools using an end-to-end application

Thomas, Shibi Mary 29 March 2006 (has links)
Master of Science in Engineering - Engineering / Any software project goes through the different stages of a Software Development Life Cycle (SDLC). Like any other commercial product, software has a design stage but this stage is unique and critical to software due to its soft nature. A system that is given careful thought at the design phase results in a correct and complete system and adheres to software design principle. The “Unified Modelling Language” (UML) is a standard modelling language for object-oriented systems. Many tools are currently available to support the design and implementation of software. Generating skeletal code from a design brings down the implementation time considerably. This research report presents a list of criteria against which one can compare different UML tools, and puts forward a rating system where decisions can be made on them. It presents a comparison between four UML tools: ArgoUML, Rational Rose, Together Control Centre, and MasterCraft. An end-to-end application was developed on each of these tools as part of the evaluation process. During the design phase a detailed design was done using the ICONIX process. The different features of an ideal UML tool is analysed and used to evaluate the four selected tools. Of the four tools, Rational Rose, Together Control Centre, MasterCraft are offthe-shelf modelling softwares whereas ArgoUML is an open source modelling software. From the evaluation it is observed that Together Control Centre attains a high score with Rational Rose following just behind. MasterCraft comes third. Argo UML has the least score but it has the advantage of being an open source software.
3

Přístupy k transformaci popisu procesů do BPEL / Approaches to transformation of process description to BPEL

Císař, Daniel January 2009 (has links)
In this work, I dealt with the field of Business Process Managent and Service Oriented Architecture. First I tried a comprehensive conceptual view of both through the definition of important principles. In BPM as a disciline I identified "life-cycle" as the most important principle for process optimization tools. For service-oriented architecture, I had to reduce the view to important principles related to composition of services. An important starting point in my work are the definitions of processes and services and their roles in BPM systems. It is a simplified view that helps connect modeled processes to Web services. Web services and orchestration is the most popular and most common usage of the service-oriented architecture. Composition is another important building block of SOA and is the basis for more realistic goals of SOA, such as greater enterprise agility, more efficient utilization of resources in the enterprise, etc. BPM discipline combines multiple elements and as it is typicaly multidisciplinary it combines process management and optimization through tools. These tools historically perform their roles well, but companies are now in a very competitive linked environment and must to behave differently. In my work I have stated firstly why would these areas could be beneficial to each other. The next part focused, what is the relationship with the life-cycle process for BPM and how it fits into the life-cycle services in SOA. Finally, I analyzed the current state mapping of BPMN, the most common notation for expressing processes in BPM, to BPEL. BPEL describes a process, but it is expressed as a programmatic sequential process, which is also executed in digital form. At work I have examined the role of the new version of the BPMN notation 2.0.
4

Proactive serving decreases user delay exponentially / CUHK electronic theses & dissertations collection

January 2014 (has links)
In online service systems, delay experienced by a user from the service request to the service completion is one of the most critical performance metrics. To improve user delay experience, in this thesis, we investigate a novel aspect of system design: proactive serving, where the system can predict future user request arrivals and allocate its capacity to serve these upcoming requests proactively. This approach is complementary to the conventional capacity boosting mechanism and is motivated by recent industrial and academic advances. In particular, we investigate the fundamentals of proactive serving from a queuing theory perspective. / First, most importantly, we show that under proactive serving the average user delay decreases exponentially (in the prediction window size) for a wide range of queuing models. Furthermore, the delay reduction is robust against prediction errors. We also show that both the variance of user delay and the tail of user delay decrease exponentially under proactive serving, which are also important user delay experience metrics. / We then show that proactive serving is more effective in decreasing user delay than capacity boosting in light workload regime. In particular, the average user delay decays inverse-proportionally in system capacity, but exponentially in the prediction window size in proactive serving. / Finally we demonstrate how to leverage proactive serving in system design from a optimization point of view, e.g., how many resources are dedicated to proactive serving. The results provide useful engineering insights to system designers. / Our trace-driven simulation results demonstrate the practical power of proactive serving: for example, under the YouTube data trace of 1000 different videos, the average user delay can be decreased by 50% when the system predicts 100 seconds ahead. Our results provide useful insights for proactive serving and justify its increasing applications in practical systems. / 對於在線服務系統,由於系統服務造成的用戶延遲是衡量系統性能的重要指標。提高用戶的延遲體驗的傳統方法是提高系統中服務器的性能。在本論文中,我們研究一種新穎的叫做“前瞻性服務”的方法用來提高用戶的延遲體驗。前瞻性服務是指系統在預測用戶需求的基礎上,在用戶產生需求之前,系統已經將服務送到用戶手中。前瞻性服務是傳統方法的有力補充。我們從排隊論的角度研究前瞻性服務對用戶的延遲的提高。 / 首先,對於多种排隊系統,我們證明前瞻性服務能夠指數性降低用戶的平均延遲。而且前瞻性服務對於用戶需求預測的誤差具有魯棒性。我們同時也證明了前瞻性服務能夠指數性降低用戶的延遲方差和尾概率。 / 然後,我們證明前瞻性服務在系统低负载时比傳統方法在降低用戶的平均延遲上更加有效。前瞻性服務能夠指數性降低用戶的平均延遲。而通過提高系統服務器性能,只能反比例降低用戶的平均延遲。 / 最後,我們從優化的角度分析怎樣在系統設計中利用前瞻性服務,給系統設計者提供有用的建議。 / 我們基於實際數據的仿真結果驗證了前瞻性服務在實際系統的作用。例如,基於Youtube數據的仿真表明,如果系統能提前一百秒預測用戶的需求,那麼前瞻性服務能夠降低一半的用戶延遲。 / Zhang, Shaoquan. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2014. / Includes bibliographical references (leaves 103-108). / Abstracts also in Chinese. / Title from PDF title page (viewed on 02, December, 2016). / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only.
5

On secure messaging

Cohn-Gordon, Katriel January 2018 (has links)
What formal guarantees should a secure messaging application provide? Do the most widely-used protocols provide them? Can we do better? In this thesis we answer these questions and with them give a formal study of modern secure messaging protocols, which encrypt the personal messages of billions of users. We give definitions and analyses of two protocols: one existing (Signal) and one new (ART). For Signal, we begin by extending and generalising classic computational models, in order to apply them to its complex ratcheting key derivations. With a threat model in mind we also define a security property, capturing strong secrecy and authentication guarantees including a new one which we call "post-compromise security". We instantiate Signal as a protocol in our model, stating its security theorem and sketching a computational reduction. Signal only supports encrypting messages between two devices, and so most implementers have built custom protocols on top of it to support group conversations. These protocols usually provide weaker security guarantees, and in particular usually do not have post-compromise security. We propose a new protocol called ART, whose goal is to bring Signal's strong security properties to conversations with multiple users and devices. We give a design rationale and a precise definition of ART, and again generalise existing computational models in order to formally specify its security properties and sketch a security reduction. ART has enjoyed widespread interest from industry, and we aim to turn it into an open standard for secure messaging. To that end, we have brought it to the IETF and formed a working group called Messaging Layer Security, with representatives from academia as well as Facebook, Google, Twitter, Wire, Cisco and more. Through MLS, we hope to bring ART's strong guarantees to practical implementations across industry. After concluding our analyses we pause for a moment, and start looking towards the future. We argue that for complex protocols like Signal and ART we are reaching the limits of computational methods, and that the future for their analysis lies with symbolic verification tools. To that end we return to the symbolic model and give a number of case studies, in each one showing how a traditional limitation of symbolic models can in fact be seen as a modelling artefact.
6

Accident Report System for VANET Environment

Liao, Jin-Ying 14 July 2012 (has links)
none
7

GNN-based End-to-end Delay Prediction in Software Defined Networking

Ge, Zhun 12 August 2022 (has links)
Nowadays, computer networks have always been complicated deployment for both the scientific and industry groups as they attempt to comprehend and analyze network performance as well as design efficient procedures for their operation. In software-defined networking (SDN), predicting latency (delay) is essential for enhancing performance, power consumption and resource utilization in meeting its significant latency requirements. In this thesis, we present a graph-based formulation of Abilene Network and other topologies and apply a Graph Neural Network (GNN)-based model, Spatial-Temporal Graph Convolutional Network (STGCN), to predict end-to-end packet delay on this formulation. The evaluation uses STGCN to compare with other machine learning methods: Multiple Linear Regression (MLR), Extreme Gradient Boosting (XGBOOST), Random Forest (RF), and Neural Network (NN). Datasets in use include Abilene, 15-node scale-free, 24-node GEANT2, and 50-node networks. Notably, our GNN-based methodology can achieve 97.0%, 95.9%, 96.1%, and 63.1% less root mean square error (RMSE) in the most complex network situation than the baseline predictor, MLR, XGBOOST and RF, respectively. All the experiments show that STGCN has good prediction performance with small and stable prediction errors. This thesis illustrates the feasibility and benefits of a GNN approach in predicting end-to-end delay in software-defined networks.
8

Modeling End-to-End Annealing of Intermediate Filaments

Pritchard, Adaleigh Elizabeth 18 September 2014 (has links)
No description available.
9

SOFTWARE TEST AUTOMATION : Implementation of End-to-End testing in web application

Björkman, Maria January 2024 (has links)
Today’s software applications are often scattered in many layers, suchas connected to cloud services or third-party solutions. This makes itimportant to ensure that a software application works as intended ina real-world setting, especially when changes are made to the codebase. End-to-End (E2E) tests are made to ensure the software has theexpected behavior from an end-user’s viewpoint. Automation of thesoftware testing process is often implemented since it has the potentialto be more time-efficient than manually inspecting the behavior of thesoftware application. This thesis describes the work of implementing automated E2E tests foran e-learning application. The first step in the project was to identifywhich automated testing tool would best suit the criteria laid out for theproject. The criteria were that the testing tool needed to have supportfor testing in the Chrome browser, support for using JavaScript as theprogramming language, and to be open-source and possible to be usedfree of charge. A literature review and a comparison of the most popu-lar E2E testing tools yielded the result that Playwright was best suitedas the automated testing tool because it has good documentation and isspecifically a tool for implementing End-to-End tests. After that, a testsuite consisting of 11 test cases was implemented in Playwright. Thetest cases were evaluated and improved in an iterative process con-cerning robustness and performance. This project supports previousobservations that automation of the test process is time-consuming inthe initial stage. This thesis concluded that Playwright is a suitable tool to use withinE2E testing, with a low learning curve. Furthermore, it concluded thatthe robustness of the tests is an important factor for the tests to be use-ful in the testing process. Tests that unexpectedly fail on occasion needto be properly investigated. It would be important to have a proper testenvironment where test data can be reset, so all the desired user flowscan get a test case. Developers and testers benefit from working closelytogether. The collaborative company can take the findings from this re-search for future reference, in case they decide to update the company’scurrent testing process.
10

Utveckling av ett krypterat meddelandesystem

Pettersson, David January 2018 (has links)
Idag finns det en uppsjö av meddelandeapplikationer och det kommer nya nästan varje dag. Dock finns det inte lika många meddelandeapplikationer där både klientapplikationen och serverapplikationen är öppen källkod och kan köras på egna privata servrar. Dessa meddelandeapplikationer är bra på att lösa problemet att många, upp till flera miljoner personer ska kunna kommunicera med varandra. Dock finns det ett mindre användarfall med ett mindre meddelandesystem som består av enbart ett meddelandeflöde, där alla meddelanden är synliga för alla enheter. Detta mindre användarfall gör att mindre metadata behövs. Användningsområden för ett sådant meddelandesystem kan vara bl.a. att få notifikationer från servrar eller att skriva anteckningar. Meddelandeflödet synkroniseras mellan alla enheter. Målet med detta arbete är att skapa ett End-to-End krypterat meddelandesystem som uppfyller autentisering, dataintegritet och sekretess. Forskning har granskats gällande svagheter i vissa krypteringstekniker, dessa svagheter har tagits i åtanke vid skapandet av meddelandesystemet. Syftet varför detta meddelandesystem behöver skapas är därför att något befintligt system som uppfyller vissa viktiga krav för att upprätthålla den personliga integriteten saknas. En prototyp har skapats som består av en serverapplikation och en grafisk datorapplikation. Meddelanden som skickas i meddelandesystemet är End-to-End krypterade. Kommunikation mellan klienter och server är även den krypterad och autentiserad. / Today there exists many messaging applications and new ones are released almost daily. However, there are not as many messaging applications where both the client application and the server application are open source and can be self hosted. These messaging applications are good at solving the problem that many, up to several million people can communicate with each other. However, there is a smaller more focused use case with a messaging system consisting of only one message flow, where all messages are visible to all devices. This smaller use case means that less metadata is required. Uses for such a messaging system may be to receive notifications from servers or to take personal notes. The message system is synchronized between all devices. The goal of this project is to create an End-to-End encrypted messaging system that provides authentication, data integrity and confidentiality. Research has been investigated regarding weaknesses in some encryption techniques, these weaknesses have been taken into account when creating the messaging system. The purpose why this messaging system needs to be created is because an existing system that meets certain essential requirements for maintaining maximum personal integrity is missing. A prototype has been created that consists of a server application and a graphical computer application. Messages sent in the messaging system are End-to-End encrypted. Communication between clients and the server is also encrypted and authenticated.

Page generated in 0.0324 seconds