• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 306
  • 291
  • 118
  • 94
  • 51
  • 50
  • 37
  • 22
  • 19
  • 10
  • 9
  • 7
  • 5
  • 5
  • 4
  • Tagged with
  • 1118
  • 305
  • 294
  • 219
  • 156
  • 149
  • 127
  • 125
  • 124
  • 120
  • 115
  • 112
  • 104
  • 103
  • 100
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
491

Performance evaluation of multithreading in a Diameter Credit Control Application

Åkesson, Gustav, Rantzow, Pontus January 2010 (has links)
Moore's law states that the amount of computational power available at a given cost doubles every 18 months and indeed, for the past 20 years there has been a tremendous development in microprocessors. However, for the last few years, Moore's law has been subject for debate, since to manage heat issues, processor manufacturers have begun favoring multicore processors, which means parallel computation has become necessary to fully utilize the hardware. This also means that software has to be written with multiprocessing in mind to take full advantage of the hardware, and writing parallel software introduces a whole new set of problems. For the last couple of years, the demands on telecommunication systems have increased and to manage the increasing demands, multiprocessor servers have become a necessity. Applications must fully utilize the hardware and such an application is the Diameter Credit Control Application (DCCA). The DCCA uses the Diameter networking protocol and the DCCA's purpose is to provide a framework for real-time charging. This could, for instance, be to grant or deny a user's request of a specific network activity and to account for the eventual use of that network resource. This thesis investigates whether it is possible to develop a Diameter Credit Control Application that achieves linear scaling and the eventual pitfalls that exist when developing a scalable DCCA server. The assumption is based on the observation that the DCCA server's connections have little to nothing in common (i.e. little or no synchronization), and introducing more processors should therefore give linear scaling. To investigate whether a DCCA server's performance scales linearly, a prototype has been developed. Along with the development of the prototype, constant performance analysis was conducted to see what affected performance and server scalability in a multiprocessor DCCA environment. As the results show, quite a few factors besides synchronization and independent connections affected scalability of the DCCA prototype. The results show that the DCCA prototype did not always achieve linear scaling. However, even if it was not linear, certain design decisions gave considerable performance increase when more processors were introduced.
492

Säkerhets lösning för elektronisk faktura / Security solution for electronic invoice

Andrén, Åse Larsen, Mantzakanis, Tove, Blom, Maria January 2002 (has links)
We have chosen to look closer at the area of security for electronic invoices. The purpose of this inquest is to provide our case study with a security analysis of three suggestions and a recommendation of the best solution, according to our test. The three solutions are ISDN via a third party, X.25 via Internet bank and Mail server. The company in our case study is in this report referred to as X, has a strong market position and a large clientele and therefore we were interested in analysing and improving X?s electronic invoice system. X was in the position of testing an electronic invoicing system towards a selective group of business customers. The major problem with the system was the security issue regarding transferring the file.
493

Riskanalys inom intrångsäkerhet på webbplatser / Risk analyzis in web site intrusion security

Gustafsson, Alexander January 2004 (has links)
Attacker och intrång på webbservrar är idag vanligt förekommande. Webben gör det lätt för hackare, knäckare och andra inkräktare att hitta sårbara servrar, och det finns gott om tips att hämta för den som vill lära sig hur man gör intrång. Det finns ett flertal olika intrångsmetoder som utnyttjar olika typer av svagheter i datorsystemen. Denna uppsats inriktar sig på svagheter i webbplatsernas serverskriptsystem, dess skriptkod och konfiguration. Syftet är att undersöka huruvida intrång kan göras med endast en webbläsare via webbplatsens offentliga webbsidor. Genom att kombinera tre olika metoder - litteraturundersökning, en enkät och ett experiment - undersöker uppsatsen hur serverskriptintrång fungerar. Den analyserar ett urval vanliga misstag webbprogrammerare kan göra, till exempel att inte kontrollera inkommande data, eller att använda lättgissade variabelnamn och databastabellnamn. Några olika typer av intrång analyseras, som till exempel SQL-injektion. Förebyggande åtgärder tas även upp med ett antal konkreta exempel. Uppsatsens slutsats är att på webbplatser med svaga serverskriptsystem kan inkräktare göra intrång via webbplatsens egna publika webbsidor, med endast en vanlig webbläsare som hjälpmedel. I uppsatsens avslutande del diskuteras även några orsaker till varför det produceras ogenomtänkt skriptkod, till exempel beroende på att programmeringskurser i allmänhet inte tycks lära ut säker programmering i tillräcklig utsträckning.
494

Mitteilungen des URZ 1/2/1996

Riedel, Ursula, Richter, Frank, Huebner, Uwe, Wunderlich, Jan, Trapp, Holger, Clauss , Matthias, Baensch, Karsten, Plichta, Christa, Riedel, Wolfgang, Dippmann , D., Winkler, Jürgen 20 August 1996 (has links)
Neuer WWW-Server Metacomputing - neue Aufgabenverteilung im Netz Harvest Secure Shell Nutzung der WS-Pools SW-Umgebung Parsytec URZ auf der CeBit Software-News Dienste des URZ - Ueberblick
495

Mitteilungen des URZ 3/2008

Clauß, Matthias, Riedel, Wolfgang, Heide, Gerd, Trapp, Holger, Riedel, Ursula 03 September 2008 (has links)
Informationen des Universitätsrechenzentrums
496

Mitteilungen des URZ 4/2010

Schier, Thomas, Riedel, Wolfgang 10 December 2010 (has links) (PDF)
Informationen für URZ-Nutzer, in dieser Ausgabe speziell zum Ausbau des Campusnetzes und zur Nutzung der Ausbildungspools.
497

Are ORMs the end of stored procedures?

Houssein, Hatem January 2017 (has links)
Stored procedures are used as the current database logic for SAAB’s data model of the fighter aircraft JAS-39 Gripen electrical schemas. Since the database model was developed in 2000, a research and tests needed to be carried out to decide on whether updating the database to today's technology is applicable. Therefore, Object-Relational Mapping (ORM) is to be researched, tested and compared to stored procedures using test-driven development (TDD)concerning an important factor, that Stored procedures are well-known for, which is querying performance of the database. Moreover, how maintainability and flexibility [1] can affect decision between Stored procedures or migrating to ORM based on our subjective experience. NHibernate and Entity Framework are the two ORM solutions considered sinceSAAB uses C# in this project. The process of this project is run using scrum of the agile software development to maintain an iterative progress throughout the project timeline. In this paper, the process and methodology are covered in details and also the comparison with the test results. These results eventually lead us to the answer that ORM is not a suitable technology, and stored procedures still dominate the querying performance for SAAB’scurrent database.
498

Evaluating Stream Protocol for a Data Stream Center

Mohammadnezhad, Mahdi January 2016 (has links)
Linnaeus University is aiming at implementing a Data Stream Centre to provide streaming of accumulated data from the websites’ newspapers and articles in order to help its scientists of University to have faster and easier access to the mentioned data. This mentioned project consists of multiple parts and the part we are responsible to research about is first nominating some text streaming protocols based on the criteria that are important for Linnaeus University and then evaluating them. Those protocols are responsible to transfer text stream from the robots (that read articles from the websites) to the data stream center and from them to the scientists. Some KPIs (Key Performance Indicators) are defined and the protocols are evaluated based on those KPIs. In this study we address evaluation of network streaming protocol by starting to read about the protocol’s specifications and nominating four protocols including TCP, HTTP1.1, Server-Sent Events and Websocket. Then, fake robot and server are implemented by each protocol to simulate the functionality of real robots, servers and scientists in LNU data stream center project. Later, the evaluation is done in the mentioned simulated environment using RawCAP, Wireshark and Message Analyzer. The results of this study indicated that the best suited protocols for transferring text stream data from robot to data stream center and from data stream center to scientist are TCP and Server-Sent Events, respectively. In the concluding part, other protocols are also suggested in the order of priority.
499

Design av databassystem för testresultat från Tor-systemet / Design of database system for test results from the Tor system

Öberg, Tomas January 2004 (has links)
This master’s thesis was performed at PartnerTech AB in Åtvidaberg. It addresses the problem of managing test results obtained from testing electronics manufactured by PartnerTech. PartnerTech has developed a test system, called Tor, which performs tests on manufactured boards and stores the test results in files. The Tor system consists of both hardware and software part, where the software runs on an ordinary PC with MS DOS/Windows 2000. The effects on the existing Tor system that this thesis implies are minimal. This work focuses on a way of storing the produced test files in a database. In this work a data model has been developed, implemented, and evaluated together with a system that imports test files into the database and a graphical user interface that allows a user to easily search and browse the stored test results. It is also possible to print test reports from the Tor system. For implementing the database system Microsoft SQL Server 2000 was chosen as database server and an XML based data format was chosen to import and export data to and from the database. Two alternative graphical user interface applications were developed and compared - one server based on Microsoft IIS and one client based in Microsoft Access. For advanced data manipulation certain parts of the system were developed in Microsoft Excel.
500

Säkerhetsutvärdering certifikatserver i stället för aktiva kort / Security evaluation certificate server instead of smartcard

Jensen, Jonas January 2005 (has links)
Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware. The method uses a server that stores all cryptographic keys for the user centrally to achieve stronger security. This report is based on a previous report which tested to implement this solution, in this report I will question the security of this system. I will then give an architecture proposal where this method is used to authenticate and allow cryptographic recourses for the user. The conclusions you can get from this report is that the possibilities with comparable ease increase the security without investing in new hardware. But the solution will not be comparable by a ``smart card solution''in security levels. That means that the method described in this thesis is suitable for organizations that either do not need that strong security as smart card give or want a good solution without being forced to use some external hardware.

Page generated in 0.0469 seconds