• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 992
  • 126
  • 85
  • 63
  • 37
  • 26
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 5
  • 4
  • Tagged with
  • 1555
  • 1555
  • 584
  • 562
  • 425
  • 309
  • 307
  • 290
  • 275
  • 239
  • 207
  • 194
  • 192
  • 178
  • 171
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Predicting catastrophic BGP routing instablities /

Nguyen, Lien K. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Geoffrey Xie. Includes bibliographical references (p. 155-156). Also available online.
22

Test design for computer network protocols

Sarikaya, Behcet. January 1984 (has links)
Communication protocol testing can be done with a test architecture consisting of remote Tester and local Responder processes. By ignoring interaction primitive parameters and additional state variables, it is possible to adapt test sequence generation techniques for finite state machines (FSM) to generate sequences for protocols specified as incomplete finite state machines. / For real protocols, tests can be designed based on the formal specification of the protocol which uses an extended FSM model in specifying the transition types. The transition types are transformed into a simpler form called normal form transitions which can be modelled by a control and a data flow graph. Furthermore, the data flow graph is partitioned to obtain disjoint blocks representing the different functions of the protocol. Tests are designed by considering parameter variations of the input primitives of each data flow function and determining the expected outputs. This methodology gives complete test coverage of all data flow functions and tests for unspecified cases can be designed using the control and data flow graphs. The methodology is applied to two real protocols: Transport protocols Classes 0 and 2.
23

Symmetry breaking on networks of processes

Styer, Eugene Fred January 1989 (has links)
No description available.
24

Solutions for ubiquitous information services : multiple protocols and scalable servers

Clark, R. J. (Russell J.) January 1995 (has links)
No description available.
25

Realizations of efficient collective communication in multidimensional processor arrays

Suh, Young-Joo 12 1900 (has links)
No description available.
26

An Algorithmic approach to constructing protocol converters

Peyravian, Mohammad 12 1900 (has links)
No description available.
27

UDP/TCP/IP packet processing using a superscalar microprocessor

Huang, Tsai Chi 12 1900 (has links)
No description available.
28

The extension and hardware implementation of the comprehensive integrated security system concept

Morrissey, Joseph Patrick January 1995 (has links)
The current strategy to computer networking is to increase the accessibility that legitimate users have to their respective systems and to distribute functionality. This creates a more efficient working environment, users may work from home, organisations can make better use of their computing power. Unfortunately, a side effect of opening up computer systems and placing them on potentially global networks is that they face increased threats from uncontrolled access points, and from eavesdroppers listening to the data communicated between systems. Along with these increased threats the traditional ones such as disgruntled employees, malicious software, and accidental damage must still be countered. A comprehensive integrated security system ( CISS ) has been developed to provide security within the Open Systems Interconnection (OSI) and Open Distributed Processing (ODP) environments. The research described in this thesis investigates alternative methods for its implementation and its optimisation through partial implementation within hardware and software and the investigation of mechanismsto improve its security. A new deployment strategy for CISS is described where functionality is divided amongst computing platforms of increasing capability within a security domain. Definitions are given of a: local security unit, that provides terminal security; local security servers that serve the local security units and domain management centres that provide security service coordination within a domain. New hardware that provides RSA and DES functionality capable of being connected to Sun microsystems is detailed. The board can be used as a basic building block of CISS, providing fast cryptographic facilities, or in isolation for discrete cryptographic services. Software written for UNIX in C/C++ is described, which provides optimised security mechanisms on computer systems that do not have SBus connectivity. A new identification/authentication mechanism is investigated that can be added to existing systems with the potential for extension into a real time supervision scenario. The mechanism uses keystroke analysis through the application of neural networks and genetic algorithms and has produced very encouraging results. Finally, a new conceptual model for intrusion detection capable of dealing with real time and historical evaluation is discussed, which further enhances the CISS concept.
29

Multi-level low energy adaptive clustering hierarchy (ML-LEACH) : a routing solution for periodic data sensing in large-area wireless sensor network

Huang, Bo January 2007 (has links)
Thesis (M.S.)--University of Hawaii at Manoa, 2007. / Includes bibliographical references (leaves 66-67). / viii, 67 leaves, bound ill. (some col.) 29 cm
30

An indirection architecture for the Internet /

Gold, Richard, January 2005 (has links)
Diss. Uppsala : Uppsala universitet, 2005.

Page generated in 0.0786 seconds