• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 198
  • 18
  • 18
  • 15
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 298
  • 298
  • 277
  • 168
  • 168
  • 103
  • 90
  • 77
  • 66
  • 64
  • 48
  • 46
  • 44
  • 38
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Secure Instant Messaging : the Jabber protocol

Almanei, Saleh 03 June 2003 (has links)
Instant Messaging (IM) has grown rapidly among network users. It has even become a very important tool for the industry around the world. It is used in scheduling meetings, exchanging business information and clients information, and so on. Instant Messaging has been developed by private sectors or providers such as America Online Instant Messenger (AIM), MSN, and Yahoo; however, in 1998 a new protocol has seen the light as an open source Instant Messaging protocol and had the name of Jabber and thanks to Jeremie Miller the founder of the Jabber protocol. The project gathered wide public attention when it was discussed on the popular developer discussion website Slashdot in January 1999. In May 2000, the core Jabber protocols were released as open source reference server and it have not been changed to this day. Jabber uses client-server architecture, not a direct peer-to-peer architecture as some other messaging systems do. It is actually an Extensible Markup Language (XML) messaging protocol. It relies on XML document format in every aspect of the communication. [1] Jabber Protocol have gone a long way to be one of the most attractive protocol because of its open source and extensibility. Anyone can build or extend the jabber protocol functionality without actually modifying the core protocol and still maintain interoperability with other IM clients such as Yahoo and MSN. Moreover, as the usage of Jabber Instant Messaging technology increases, the need for information protection in the Jabber messaging medium also increases. This thesis will explore the Jabber protocol and the ability to secure a Jabber based communication over the network using third party cryptographic libraries. / Graduation date: 2003
12

TCP-Carson a loss-event based adaptive AIMD algorithm for long-lived flows.

Kannan, Hariharan. January 2002 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: Loss; TFRC; AIMD; TCP. Includes bibliographical references (p. 147-155).
13

Secure wireless handoff /

Nafarrete, Romelo B. Valverde, Lionel J. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003. / Thesis advisor(s): George W. Dinolt, Gurminder Singh. Includes bibliographical references (p. 75-78). Also available online.
14

A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols

Williams, James Pate, January 2005 (has links) (PDF)
Thesis (Ph.D.)--Auburn University, 2005. / Abstract. Vita. Includes bibliographic references (ℓ. 98-99)
15

Enhanced mechanisms for explicit congestion notification in TCP/IP networks /

Akujobi, Frank January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2003. / Includes bibliographical references (p. 90-92). Also available in electronic format on the Internet.
16

Hybrid token-CDMA MAC protocol for wireless networks /

Liu, Yi-Sheng. January 2009 (has links)
Thesis (Ph.D.)-University of KwaZulu-Natal, Durban, 2009. / Full text also available online. Scroll down for electronic link.
17

Network tomography based on flow level measurements

Arifler, Dogu. Evans, Brian L. De Veciana, Gustavo A., January 2004 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2004. / Supervisors: Brian L. Evans and Gustavo de Veciana. Vita. Includes bibliographical references.
18

Reliable content delivery using persistent data sessions in a highly mobile environment

Pantoleon, Periklis K. 03 1900 (has links)
Approved for public release; distribution is unlimited / Special Forces are crucial in specific military operations. They usually operate in hostile territory where communications are difficult to establish and preserve, since the operations are often carried out in a remote environment and the communications need to be highly mobile. The delivery of information about the geographical parameters of the area can be crucial for the completion of their mission. But in that highly mobile environment, the connectivity of the established wireless networks (LANs) can be unstable and intermittently unavailable. Existing content transfer protocols are not adaptive to volatile network connectivity. If a physical connection is lost, any information or part of a file already retrieved is discarded and the same information must be retransmitted again after the reestablishment of the lost session. The intention of this Thesis is to develop a protocol in the application layer that preserves the already transmitted part of the file, and when the session is reestablished, the information server can continue sending the rest of the file to the requesting host. Further, if the same content is available from another server through a better route, the new server should be able to continue to serve the content, starting from where the session with the previous server ended. / Lieutenant, Hellenic Navy
19

API development for persistent data sessions support /

Pailom, Chayutra. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Su Wen, Arijit Das. Includes bibliographical references (p. 149 p.). Also available online.
20

Transparent TCP-to-SCTP translation shim layer

Bickhart, Ryan W. January 2005 (has links)
Thesis (M.S.)--University of Delaware, 2005. / Principal faculty adviser: Paul D. Amer, Dept. of Computer & Information Sciences. Includes bibliographical references.

Page generated in 0.0438 seconds