• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1106
  • 379
  • 210
  • 133
  • 95
  • 75
  • 37
  • 19
  • 18
  • 18
  • 15
  • 15
  • 15
  • 15
  • 12
  • Tagged with
  • 2453
  • 610
  • 607
  • 376
  • 324
  • 321
  • 267
  • 257
  • 252
  • 234
  • 226
  • 216
  • 210
  • 204
  • 185
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

Zabezpečený transportní protokol monitorovacích systémů / Secure Transport Protocol for System Monitoring

Halfar, Patrik January 2010 (has links)
This paper deals with NetFlow protocol and analysis of its properties. There is focused on confidentiality and reliability of the data's transfer. All of the solution observe requirements for lower resources of devices, and impossibility of changes in the exporter except defined parameters.
252

Návrh zero-knowledge protokolů / Design of Zero-Knowledge Protocols

Šafář, Jan January 2010 (has links)
Thesis introduces automated methods of protocol design and their usability for zero knowledge protocol design or protocols, where ZK protocols are used as subprotocols. Especially composition method is described more in depth. Thesis shows also a sample implementation of this method.
253

Specifikační jazyky a nástroje pro analýzu a verifikaci bezpečnostních protokolů / Specification Languages and Tools for Analysis and Verification of Security Protocols

Ptáček, Michal Unknown Date (has links)
This diploma thesis is focused on the analysis of security tools, which are commonly used for automatic verification of security protocols mainly. These security protocols are used for creation of private communication channells in insecured networks. Security will never be perfect, so finding of weaknesses in security protocols is always necessary and we need to improve these protocols. In this diploma thesis I have focused on looking for various verification tools on Internet. Subsequently, I have described each tool in this thesis, in way that each reader can easily find out, which tool is for him useful and which is not. I have summarized main benefits and drawbacks of each tool at the end of his description.
254

FACTORS AFFECTING AERODYNAMIC MEASUREMENT IN PEDIATRIC AIRWAY PATHOLOGIES

McCarthy, Meghan K. 20 April 2007 (has links)
No description available.
255

A MODIFIED WIRELESS TOKEN RING PROTOCOL TO PREVENT DATA COLLISON IN WIRELESS TRAFFIC SENSORS

BHATIA, AKASH 03 April 2006 (has links)
No description available.
256

Adaptive polling for SNMP protocol

Teng, Un Tung 01 January 1999 (has links)
No description available.
257

API development for persistent data sessions support

Pailom, Chayutra 03 1900 (has links)
Approved for public release, distribution is unlimited / This thesis studies and discusses the development of the API, called the persistency API, for supporting the persistent data sessions. Without persistent session support, network applications often need to be restarted from the beginning when intermittent physical connection loss happens. Application programmers can use the persistency API to achieve the service continuity. The persistency API provides the interface that allows a program to continue retrieve data from the point the connection is lost after the physical connection is restored. The focus of this thesis is to develop a generalized persistency API that supports various types of applications. This thesis studies the persistent session support for two types of transport protocols, TCP and UDP, which are used by major network applications. An application that performs text file and video file transfer is implemented to demonstrate the persistent data transfer sessions for TCP and UDP, respectively. The study shows that the proposed APIs can support the data transfer continuity in the reconnection process. / Captain, Royal Thai Army
258

Architecture de communication générique pour un système de bus du commerce électronique

Tagmouti, Siham January 2003 (has links)
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
259

Congestion Control for Streaming Media

Chung, Jae Won 18 August 2005 (has links)
"The Internet has assumed the role of the underlying communication network for applications such as file transfer, electronic mail, Web browsing and multimedia streaming. Multimedia streaming, in particular, is growing with the growth in power and connectivity of today's computers. These Internet applications have a variety of network service requirements and traffic characteristics, which presents new challenges to the single best-effort service of today's Internet. TCP, the de facto Internet transport protocol, has been successful in satisfying the needs of traditional Internet applications, but fails to satisfy the increasingly popular delay sensitive multimedia applications. Streaming applications often use UDP without a proper congestion avoidance mechanisms, threatening the well-being of the Internet. This dissertation presents an IP router traffic management mechanism, referred to as Crimson, that can be seamlessly deployed in the current Internet to protect well-behaving traffic from misbehaving traffic and support Quality of Service (QoS) requirements of delay sensitive multimedia applications as well as traditional Internet applications. In addition, as a means to enhance Internet support for multimedia streaming, this dissertation report presents design and evaluation of a TCP-Friendly and streaming-friendly transport protocol called the Multimedia Transport Protocol (MTP). Through a simulation study this report shows the Crimson network efficiently handles network congestion and minimizes queuing delay while providing affordable fairness protection from misbehaving flows over a wide range of traffic conditions. In addition, our results show that MTP offers streaming performance comparable to that provided by UDP, while doing so under a TCP-Friendly rate."
260

Policy based network management of legacy network elements in next generation networks for voice services

Naidoo, Vaughn January 2002 (has links)
Magister Scientiae - MSc / Telecommunication companies, service providers and large companies are now adapting converged multi-service Next Generation Networks (NGNs). Network management is shifting from managing Network Elements (NE) to managing services. This paradigm shift coincides with the rapid development of Quality of Service (QoS) protocols for IP networks. NEs and services are managed with Policy Based Network Management (PBNM) which is most concerned with managing services that require QoS using the Common Open Policy Service (COPS) Protocol. These services include Voice over IP (VoIP), video conferencing and video streaming. It follows that legacy NEs without support for QoS need to be replaced and/or excluded from the network. However, since most of these services run over IP, and legacy NEs easily supports IP, it may be unnecessary to throw away legacy NEs if it can be made to fit within a PBNM approach. Our approach enables an existing PBNM system to include legacy NEs in its management paradigm. The Proxy-Policy Enforcement Point (P-PEP) and Queuing Policy Enforcement Point (Q-PEP) can enforce some degree of traffic shaping on a gateway to the legacy portion of the network. The P-PEP utilises firewall techniques using the common legacy and contemporary NE management protocol Simple Network Management Protocol (SNMP) while the Q-PEP uses queuing techniques in the form Class Based Queuing (CBQ) and Random Early Discard (RED) for traffic control. / South Africa

Page generated in 0.0305 seconds