Spelling suggestions: "subject:"bnetwork computers"" "subject:"conetwork computers""
1 |
Resource dimensioning in a mixed traffic environmentRoon, Selwin Jakobus Emiel. January 2004 (has links)
Thesis (M.Eng.)(Electronic)--University of Pretoria, 2004. / Title from opening screen (viewed March 20, 2006). Summaries in English and Afrikaans. Includes bibliographical references.
|
2 |
The performance and compatibility of thin client computing with fleet operationsLandry, Kenneth J. 06 1900 (has links)
This research will explorethe feasibility of replacing traditional networked desktop personal computers (PC) with a thin client/server-based computing (TCSBC) architecture. After becoming nearly extinct in the early 1990s, thin clients are emerging on the forefront of technology with numerous bandwidth improvements and cost reduction benefits. The results show that TCSBC could provide a practical and financially sound solution in meeting the Navy's need to reduce costs and propagate the latest technology to all personnel. This solution may not meet the requirements of all naval commands. A thorough performance analysis should be conducted of the applications employed and the overall expenditures prior to implementation. / US Navy (USN) author.
|
3 |
A methodology for calibrating forensic ready, low layer network devices /Endicott-Popovsky, Barbara. January 1900 (has links)
Thesis (Ph. D., Computer Science)--University of Idaho, June 2007. / Major professor: Deborah A. Frincke. Includes bibliographical references. Also available online (PDF file) by subscription or by purchasing the individual file.
|
4 |
An investigation into the viability of deploying thin client technology to support effective learning in a disadvantaged, rural high school settingNdwe, Tembalethu Jama January 2002 (has links)
Computer Based Training offers many attractive learning opportunities for high school pupils. Its deployment in economically depressed and educationally marginalized rural schools is extremely uncommon due to the high technology skills and costs involved in its deployment and ongoing maintenance. This thesis puts forward thin client technology as a potential solution to the needs of education environments of this kind. A functional business case is developed and evaluated in this thesis, based upon a requirements analysis of media delivery in learning, and upon formal cost/performance models and a deployment field trial. Because of the economic constraints of the envisaged deployment area in rural education, an industrial field trial is used, and the aspects of this trial that can be carried over to the rural school situation have been used to assess performance and cost indicators. Our study finds that thin client technology could be deployed and maintained more cost effectively than conventional fat client solutions in rural schools, that it is capable of supporting the learning elements needed in this deployment area, and that it is able to deliver the predominantly text based applications currently being used in schools. However, we find that technological improvements are needed before future multimediaintensive applications can be adequately supported.
|
5 |
Security architecture methodology for large net-centric systemsUmeh, Njideka Adaku, January 2007 (has links) (PDF)
Thesis (M.S.)--University of Missouri--Rolla, 2007. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
|
6 |
Comparisons of attacks on honeypots with those on real networksDuong, Binh T. 03 1900 (has links)
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyber-attacks and attacker behavior. When implemented as part of a security posture, honeypots also protect real networks by acting as a decoy, deliberately confusing potential attackers as to the real data. The objective of this research is to compare attack patterns against a honeypot to those against a real network, the network of the Naval Postgraduate School. Collection of suspicious-event data required the implementation and setup of a honeypot, in addition to the installation and use of an intrusion-detection system. A statistical analysis was conducted across suspicious-event data recorded from a honeypot and from a real network. Metrics used in our study were applied to the alerts generated from Snort 2.4.3, an open-source intrusion detection system. Results showed differences between the honeypot and the real network data which need further experiments to understand. Both the honeypot and the real network data showed much variability at the start of the experiment period and then a decrease in the number of alerts in the later period of the experiment. We conclude that after the initial probing and reconnaissance is complete, the vulnerabilities of the network are learned and therefore fewer alerts occur; but more specific signatures are then aimed at exploiting the network.
|
7 |
Virtual thin client a scalable service discovery approach for pervasive computing /Coons, Samuel W., January 2001 (has links) (PDF)
Thesis (M.E.)--University of Florida, 2001. / Title from first page of PDF file. Document formatted into pages; contains xi, 68 p.; also contains graphics. Vita. Includes bibliographical references (p. 66-67).
|
8 |
A network metadata infrastructure for locating network devices /Alexander, David. January 2004 (has links)
Thesis (M.S.)--Ohio University, March, 2004. / Includes bibliographical references (p. 57-58).
|
9 |
Comparisons of attacks on honeypots with those on real networksDuong, Binh T. January 2006 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2006. / Thesis Advisor(s): Neil C. Rowe. "March 2006." Includes bibliographical references (p. 55-56). Also available online.
|
10 |
A network metadata infrastructure for locating network devicesAlexander, David. January 2004 (has links)
Thesis (M.S.)--Ohio University, March, 2004. / Title from PDF t.p. Includes bibliographical references (p. 57-58)
|
Page generated in 0.0682 seconds