• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 7
  • 7
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A predictive real time architecture for multi-user, distributed, virtual reality

Roberts, David J. January 1996 (has links)
No description available.
2

Networks, complexity and internet regulation scale-free law

Guadamuz, Andres January 2013 (has links)
This book, then, starts with a general statement: that regulators should try, wherever possible, to use the physical methodological tools presently available in order to draft better legislation. While such an assertion may be applied to the law in general, this work will concentrate on the much narrower area of Internet regulation and the science of complex networks The Internet is the subject of this book not only because it is my main area of research, but also because –without over-emphasising the importance of the Internet to everyday life– one cannot deny that the growth and popularisation of the global communications network has had a tremendous impact on the way in which we interact with one another. The Internet is, however, just one of many interactive networks. One way of looking at the complex and chaotic nature of society is to see it as a collection of different nodes of interaction. Humans are constantly surrounded by networks: the social network, the financial network, the transport network, the telecommunications network and even the network of our own bodies. Understanding how these systems operate and interact with one another has been the realm of physicists, economists, biologists and mathematicians. Until recently, the study of networks has been mainly theoretical and academic, because it is difficult to gather data about large and complex systems that is sufficiently reliable to support proper empirical application. In recent years, though, the Internet has given researchers the opportunity to study and test the mathematical descriptions of these vast complex systems. The growth rate and structure of cyberspace has allowed researchers to map and test several previously unproven theories about how links and hubs within networks interact with one another. The Web now provides the means with which to test the organisational structures, architecture and growth of networks, and even permits some limited prediction about their behaviour, strengths and vulnerabilities. The main objective of this book is first and foremost to serve as an introduction to the wider legal audience to some of the theories of complexity and networks. The second objective is more ambitious. By looking at the application of complexity theory and network science in various areas of Internet regulation, it is hoped that there will be enough evidence to postulate a theory of Internet regulation based on network science. To achieve these two goals, Chapter 2 will look in detail at the science of complex networks to set the stage for the legal and regulatory arguments to follow. With the increase in reliability of the descriptive (and sometimes predictive) nature of network science, a logical next step for legal scholars is to look at the legal implications of the characteristics of networks. Chapter 3 highlights the efforts of academics and practitioners who have started to find potential uses for network science tools. Chapter 4 takes this idea further, and explores how network theory can shape Internet regulation. The following chapters will analyse the potential for application of the tools described in the previous chapters, applying complexity theory to specific areas of study related to Internet Law. Chapter 5 deals with the subject of copyright in the digital world. Chapter 6 explores the issue of peer-production and user-generated content using network science as an analytical framework. Chapter 7 finishes the evidence section of the work by studying the impact of network architecture in the field of cybercrime, and asks whether the existing architecture hinders or assists efforts to tackle those problems. It is clear that these are very disparate areas of study. It is not the intention of this book to be overreaching in its scope, although I am mindful that it covers a lot of ground and attempts to study and describe some disciplines that fall outside of my intellectual comfort zone. While the focus of the work is the Internet, its applications may extend beyond mere electronic bits. Without trying to be over-ambitious, it is my strong belief that legal scholarship has been neglectful in that it has been slow to respond to the wealth of research into complexity. That is not to say that there has been no legal research on the topic, but it would seem that lawyers, legislators and policy-makers are reluctant to consider technical solutions to legal problems. It is hoped then that this work will serve as a stepping stone that will lead to new interest in some of the theories that I describe.
3

Patterns in network security: an analysis of architectural complexity in securing recursive inter-network architecture networks

Small, Jeremiah January 2012 (has links)
Recursive Inter-Network Architecture (RINA) networks have a shorter protocol stack than the current architecture (the Internet) and rely instead upon separation of mech- anism from policy and recursive deployment to achieve large scale networks. Due to this smaller protocol stack, fewer networking mechanisms, security or otherwise, should be needed to secure RINA networks. This thesis examines the security proto- cols included in the Internet Protocol Suite that are commonly deployed on existing networks and shows that because of the design principles of the current architecture, these protocols are forced to include many redundant non-security mechanisms and that as a consequence, RINA networks can deliver the same security services with substantially less complexity.
4

The Research of Factors that affects Land Information Diffusion

LIN, CHUNG-HSIEN 20 August 2003 (has links)
Abstract In order to cut down the management expense, the government must initiatively reduce the contact hours with people. Owing to the declination of people¡¦s daily time available and the decrease of expecting counter services, it is demanded that the services provided by the government be more timesaving and convenient. People's accepting degree on network and computerized government, an invisible customer services, is therefore elevated. In response to Territory Bureau's computerization exercise, the Ministry of Interior has founded a group, "management and research group for Territory Bureau's computer network", to work on the program since 1980. The prevalence of mobile communication and the application of in-time internet network these years have led to establishment of Territory Bureau's computerized system and led to transformation of the Bureau's exercise from manpower to computer network service. It is already a trend to deal work via Internet. It is urgent that government promotes computerization to the Bureau of Territory to make it more flexible and agile in order to provide people with more integral, convenient and versatile services. This study, from the users' viewpoint, explores the factors that influence the implement of Territory Bureau's computer network. The purpose is to understand the factors that influence the users and to provide further information for future expansion of the Bureau's program. Since the Territory Bureau's computer-network system is an innovative technology, the study of people's attitude and acceptation toward such technology is innovative as well. "Technology acceptance model" is the theoretical background in this study that explains users' behavioral intention in adopting the Territory Bureau's network information. By applying the theory of "diffusion of innovation", the influences of "relative advantage", "compatibility" and "complexity" for using the above system is investigated and discussed. Statistical questionnaires' survey is adopted in this study. The results show that the more "positive attitude" people have, the more "behavioral intention" they have in utilizing Territory Bureau's Internet information. The following factors are found to affect people's "positive attitude": more "relative advantage", "compatibility" and "complexity" people know about; more "perceived usefulness" and "perceived ease of use" people realize toward Territory Bureau's internet informatio
5

New quality of service routing algorithms based on local state information : the development and performance evaluation of new bandwidth-constrained and delay-constrained quality of service routing algorithms based on localized routing strategies

Aldosari, Fahd M. January 2011 (has links)
The exponential growth of Internet applications has created new challenges for the control and administration of large-scale networks, which consist of heterogeneous elements under dynamically changing traffic conditions. These emerging applications need guaranteed service levels, beyond those supported by best-effort networks, to deliver the intended services to the end user. Several models have been proposed for a Quality of Service (QoS) framework that can provide the means to transport these services. It is desirable to find efficient routing strategies that can meet the strict routing requirements of these applications. QoS routing is considered as one of the major components of the QoS framework in communication networks. In QoS routing, paths are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of traffic. Several QoS routing schemes have been proposed that differ in the way they gather information about the network state and the way they select paths based on this information. The biggest downside of current QoS routing schemes is the frequent maintenance and distribution of global state information across the network, which imposes huge communication and processing overheads. Consequently, scalability is a major issue in designing efficient QoS routing algorithms, due to the high costs of the associated overheads. Moreover, inaccuracy and staleness of global state information is another problem that is caused by relatively long update intervals, which can significantly deteriorate routing performance. Localized QoS routing, where source nodes take routing decisions based solely on statistics collected locally, was proposed relatively recently as a viable alternative to global QoS routing. It has shown promising results in achieving good routing performance, while at the same time eliminating many scalability related problems. In localized QoS routing each source-destination pair needs to determine a set of candidate paths from which a path will be selected to route incoming flows. The goal of this thesis is to enhance the scalability of QoS routing by investigating and developing new models and algorithms based on the localized QoS routing approach. For this thesis, we have extensively studied the localized QoS routing approach and demonstrated that it can achieve a higher routing performance with lower overheads than global QoS routing schemes. Existing localized routing algorithms, Proportional Sticky Routing (PSR) and Credit-Based Routing (CBR), use the blocking probability of candidate paths as the criterion for selecting routing paths based on either flow proportions or a crediting mechanism, respectively. Routing based on the blocking probability of candidate paths may not always reflect the most accurate state of the network. This has motivated the search for alternative localized routing algorithms and to this end we have made the following contributions. First, three localized bandwidth-constrained QoS routing algorithms have been proposed, two are based on a source routing strategy and the third is based on a distributed routing strategy. All algorithms utilize the quality of links rather than the quality of paths in order to make routing decisions. Second, a dynamic precautionary mechanism was used with the proposed algorithms to prevent candidate paths from reaching critical quality levels. Third, a localized delay-constrained QoS routing algorithm was proposed to provide routing with an end-to-end delay guarantee. We compared the performance of the proposed localized QoS routing algorithms with other localized and global QoS routing algorithms under different network topologies and different traffic conditions. Simulation results show that the proposed algorithms outperform the other algorithms in terms of routing performance, resource balancing and have superior computational complexity and scalability features.
6

Regionų interneto tinklo infrastruktūros patikimumo tyrimai / Investigation of the regional internet network infrastructure dependability

Rainys, Rytis 06 January 2012 (has links)
Disertacijoje nagrinėjama interneto tinklo infrastruktūros patikimumo problematika, analizei naudojant tinklo topologijos tyrimus, grafų teorijos taikymą ir tinklo modeliavimą. Tyrimų objektas, interneto tinklo infrastruktūra, kurios pagrindą sudaro autonominės sistemos ir tarptinklinių sujungimų linijos. Nuo stabilios interneto tinklo veiklos priklauso informacijos pasiekiamumas, elektroninė komercija, nutolusių objektų valdymas ir t. t. Pagrindinis disertacijos tikslas – sukurti metodikas ir algoritmus, skirtus interneto tinklo infrastruktūros analizei bei veiklos patikimumo kontrolei. Tyrimų taikymo sritis – interneto tinklo veiklos tęstinumo priežiūra ir reguliavimas. Darbe sprendžiami šie pagrindiniai uždaviniai: interneto tinklo topologijos analizės modelio ir priemonių sudarymas; interneto junglumo tyrimas siekiant identifikuoti kritinius elementus, kurių pažeidimai susiję su tinklo funkcionalumo praradimu; kritinių interneto tinklo elementų stebėsenos modelio sudarymas; eksperimentiniai kibernetinių atakų simuliacijos bandymai; bei interneto tinklo infrastruktūros patikimo stiprinimo parinkimas. Disertaciją sudaro įvadas, 5 skyriai, rezultatų apibendrinimas, naudotos literatūros ir autoriaus publikacijų disertacijos tema sąrašai bei priedai. / The dissertation investigates the issues of dependability of the Internet network infrastructure that were studied by using the network topology analysis, graph theory and network modelling. The object of the study is the Internet network infrastructure, based on autonomous systems and interconnecting lines. Stable functioning of the Internet network determines the availability of information, electronic commerce, control of remote objects, etc. The main objective is to develop the methodologies and algorithms for analysing the Internet network infrastructure and controlling the reliability of functioning. The scope of application of the study is the supervision and regulation of continuity of the Internet. The following main tasks are solved: development of the topological scheme of the Internet network, selection of models and tools for analysis; the Internet network connectivity analysis for the purpose of identification of the critical network elements, whose violations would result in loss of connectivity of the network; as well as development of the model for monitoring of the critical elements of the Internet network and cyber-attacks simulation experiments. The scientific work consists of the general characteristic of the dissertation, 5 chapters, conclusions, list of literature, list of publications and annexes.
7

Investigation of the regional internet network infrastructure dependability / Regionų interneto tinklo infrastruktūros patikimumo tyrimai

Rainys, Rytis 06 January 2012 (has links)
The dissertation investigates the issues of dependability of the Internet network infrastructure that were studied by using the network topology analysis, graph theory and network modelling. The object of the study is the Internet network infrastructure, based on autonomous systems and interconnecting lines. Stable functioning of the Internet network determines the availability of information, electronic commerce, control of remote objects, etc. The main objective is to develop the methodologies and algorithms for analysing the Internet network infrastructure and controlling the reliability of functioning. The scope of application of the study is the supervision and regulation of continuity of the Internet. The following main tasks are solved: development of the topological scheme of the Internet network, selection of models and tools for analysis; the Internet network connectivity analysis for the purpose of identification of the critical network elements, whose violations would result in loss of connectivity of the network; as well as development of the model for monitoring of the critical elements of the Internet network and cyber-attacks simulation experiments. The scientific work consists of the general characteristic of the dissertation, 5 chapters, conclusions, list of literature, list of publications and annexes. / Disertacijoje nagrinėjama interneto tinklo infrastruktūros patikimumo problematika, analizei naudojant tinklo topologijos tyrimus, grafų teorijos taikymą ir tinklo modeliavimą. Tyrimų objektas, interneto tinklo infrastruktūra, kurios pagrindą sudaro autonominės sistemos ir tarptinklinių sujungimų linijos. Nuo stabilios interneto tinklo veiklos priklauso informacijos pasiekiamumas, elektroninė komercija, nutolusių objektų valdymas ir t. t. Pagrindinis disertacijos tikslas – sukurti metodikas ir algoritmus, skirtus interneto tinklo infrastruktūros analizei bei veiklos patikimumo kontrolei. Tyrimų taikymo sritis – interneto tinklo veiklos tęstinumo priežiūra ir reguliavimas. Darbe sprendžiami šie pagrindiniai uždaviniai: interneto tinklo topologijos analizės modelio ir priemonių sudarymas; interneto junglumo tyrimas siekiant identifikuoti kritinius elementus, kurių pažeidimai susiję su tinklo funkcionalumo praradimu; kritinių interneto tinklo elementų stebėsenos modelio sudarymas; eksperimentiniai kibernetinių atakų simuliacijos bandymai; bei interneto tinklo infrastruktūros patikimo stiprinimo parinkimas. Disertaciją sudaro įvadas, 5 skyriai, rezultatų apibendrinimas, naudotos literatūros ir autoriaus publikacijų disertacijos tema sąrašai bei priedai.

Page generated in 0.0841 seconds