1 |
The spatial development of the Internet /Crum, Shannon L., January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 229-240). Available also in a digital version from Dissertation Abstracts.
|
2 |
Standard network diagramming language and corresponding meta-modelWaldring, Ségio Jim. January 2009 (has links) (PDF)
Thesis (M.S.)--Georgia Southern University, 2009. / "A thesis submitted to the Graduate Faculty of Georgia Southern University in partial fulfillment of the requirements for the degree Master of Science." Directed by Vladan Jovanovic. ETD. Includes bibliographical references (p. 31-34) and appendix.
|
3 |
A middleware framework for secure mobile grid services.January 2008 (has links)
Wong, Sze Wing. / Thesis submitted in: October 2007. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 176-180). / Abstracts in English and Chinese. / Abstract --- p.i / 論文摘要 --- p.iii / Acknowledgements --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Contributions of this thesis --- p.3 / Chapter 1.2 --- Thesis structure --- p.4 / Chapter 2 --- Background --- p.6 / Chapter 2.1 --- Web Services --- p.6 / Chapter 2.2 --- Grid Computing --- p.8 / Chapter 2.2.1 --- Open Grid Services Architecture (OGSA) --- p.9 / Chapter 2.2.2 --- Grid Services --- p.9 / Chapter 2.3 --- Globus Toolkit --- p.10 / Chapter 2.3.1 --- Components of Globus Toolkit 4 --- p.11 / Chapter 2.3.2 --- Grid Security Infrastructure (GSI) --- p.13 / Chapter 2.4 --- Mobile Agent --- p.13 / Chapter 2.4.1 --- Foundation for Intelligent Physical Agents (FIPA) --- p.14 / Chapter 2.5 --- Java Agent Development Framework (JADE) --- p.15 / Chapter 2.5.1 --- JADE-S --- p.17 / Chapter 3 --- Research Issues in Mobile Grid Services --- p.18 / Chapter 3.1 --- Mobile Grid Services --- p.18 / Chapter 3.2 --- Service Migration --- p.20 / Chapter 3.2.1 --- Using Mobile Agent with Weak Mobility --- p.20 / Chapter 3.2.2 --- Using Mobile Agent with Strong Mobility --- p.21 / Chapter 3.2.3 --- Using Snapshots --- p.22 / Chapter 3.2.4 --- Summary --- p.23 / Chapter 3.3 --- Service Sharing and Discovery --- p.24 / Chapter 3.3.1 --- Centralized Model --- p.24 / Chapter 3.3.2 --- Division into clusters --- p.25 / Chapter 3.3.3 --- Using Web Services Protocols --- p.26 / Chapter 3.3.4 --- Summary --- p.27 / Chapter 3.4 --- Security --- p.28 / Chapter 3.4.1 --- Resource control and accounting --- p.28 / Chapter 3.4.2 --- Using delegation document --- p.30 / Chapter 3.4.3 --- Summary --- p.31 / Chapter 4 --- Mobile Grid Service Framework --- p.32 / Chapter 4.1 --- Proposed Framework Overview --- p.32 / Chapter 4.1.1 --- Service Migration --- p.33 / Chapter 4.1.2 --- Service Sharing and Discovery --- p.34 / Chapter 4.1.3 --- Security --- p.34 / Chapter 4.2 --- Overall architecture --- p.35 / Chapter 4.3 --- Components of Mobile Grid Services --- p.36 / Chapter 4.3.1 --- Agent Manager --- p.37 / Chapter 4.3.2 --- Task Agent --- p.38 / Chapter 4.3.3 --- Monitor Agent --- p.39 / Chapter 4.4 --- Resource Information Service --- p.40 / Chapter 4.5 --- Scenario of Mobile Grid Service Execution --- p.41 / Chapter 5 --- MGSAPI --- p.43 / Chapter 5.1 --- API design --- p.43 / Chapter 5.2 --- API Implementation --- p.45 / Chapter 5.2.1 --- Overview --- p.45 / Chapter 5.2.2 --- Agent Manager Class --- p.46 / Chapter 5.2.3 --- Task Agent Templates --- p.52 / Chapter 5.2.4 --- Configurable Monitor Agent --- p.57 / Chapter 5.2.5 --- Resource Information Service --- p.61 / Chapter 5.2.6 --- Example Application --- p.66 / Chapter 6 --- Security Support for Mobile Grid Services --- p.68 / Chapter 6.1 --- Overview --- p.68 / Chapter 6.2 --- Authentication and Authorization --- p.70 / Chapter 6.3 --- Message Integrity and Confidentiality --- p.72 / Chapter 6.4 --- Permissions on Agents --- p.74 / Chapter 6.5 --- Security facilities in MGS API --- p.76 / Chapter 6.5.1 --- Major modifications for MGS components --- p.77 / Chapter 6.5.2 --- MGS Security Libraries --- p.79 / Chapter 6.5.3 --- MGS Security Configuration --- p.81 / Chapter 7 --- Agent Protection for Mobile Grid Services --- p.83 / Chapter 7.1 --- Overview --- p.83 / Chapter 7.2 --- Major modifications --- p.86 / Chapter 7.2.1 --- Exempting checking for executions on home host --- p.86 / Chapter 7.2.2 --- New definition of stage --- p.87 / Chapter 7.2.3 --- Extra operations in Task Agent and Agent Manager --- p.88 / Chapter 7.2.4 --- Handling of attack --- p.88 / Chapter 7.3 --- Implementation details --- p.91 / Chapter 7.3.1 --- Agent Manager --- p.91 / Chapter 7.3.2 --- Task Agent --- p.97 / Chapter 7.3.3 --- Monitor Agent --- p.101 / Chapter 7.3.4 --- Checker --- p.102 / Chapter 7.4 --- Discussions --- p.108 / Chapter 7.4.1 --- Against modification of code and data --- p.108 / Chapter 7.4.2 --- Against masquerade --- p.108 / Chapter 7.4.3 --- Against fake information in trace --- p.109 / Chapter 7.4.4 --- Against escape from re-execution --- p.109 / Chapter 7.4.5 --- Against collaboration of different hosts --- p.109 / Chapter 7.4.6 --- Detection of malicious host --- p.110 / Chapter 7.4.7 --- Weaknesses --- p.110 / Chapter 8 --- Performance Evaluation --- p.111 / Chapter 8.1 --- Experimental Setup --- p.111 / Chapter 8.2 --- MGS Performance --- p.117 / Chapter 8.2.1 --- Experiment details --- p.112 / Chapter 8.2.2 --- Experiment results --- p.113 / Chapter 8.2.3 --- Discussions --- p.116 / Chapter 8.3 --- MGS Overheads --- p.117 / Chapter 8.3.1 --- Experiment details --- p.117 / Chapter 8.3.2 --- Experiment results --- p.119 / Chapter 8.3.3 --- Discussions --- p.123 / Chapter 8.4 --- Agent Protection Overheads --- p.124 / Chapter 8.4.1 --- Experiment details --- p.124 / Chapter 8.4.2 --- Experiment results --- p.125 / Chapter 8.4.3 --- Discussions --- p.128 / Chapter 9 --- Conclusion and Future Works --- p.130 / Appendix A Administrator Guide for MGS API --- p.132 / Chapter A.l --- Installation of MGS API --- p.132 / Chapter A.1.1 --- Installation of pre-requisites --- p.132 / Chapter A.1.2 --- Installation of MGS API library --- p.135 / Chapter A.2 --- Setup of MGS platform --- p.135 / Chapter A.2.1 --- Setup of JADE platform --- p.135 / Chapter A.2.2 --- Setup of Globus containers --- p.136 / Appendix B Developer Guide for MGS API --- p.137 / Chapter B.1 --- Steps of developing a Mobile Grid Service --- p.137 / Chapter B.1.1 --- Design Mobile Grid Service --- p.137 / Chapter B.1.2 --- Define WSDL --- p.138 / Chapter B.1.3 --- Implement the service --- p.138 / Chapter B.1.4 --- Configure deployment in WSDD --- p.138 / Chapter B.1.5 --- Compile and deploy the service --- p.139 / Chapter B.2 --- Mobile Grid Service Implementation --- p.140 / Chapter B.2.1 --- Implement Task Agent --- p.140 / Chapter B.2.2 --- Implement Monitor Agent (optional) --- p.143 / Chapter B.2.3 --- Implement Agent Manager --- p.144 / Chapter B.3 --- Convert tool --- p.146 / Chapter B.4 --- Service configuration --- p.147 / Chapter B.4.1 --- TaskSetting object --- p.147 / Chapter B.4.2 --- MonitorSetting object --- p.147 / Chapter B.4.3 --- MGS Configuration file --- p.148 / Chapter B.4.4 --- Configuration for Resource Information Service --- p.149 / Chapter B.4.5 --- Globus-side security configuration of the service --- p.151 / Chapter B.5 --- MGS Configuration Helper --- p.151 / Chapter B.5.1 --- “Main Container´ح Panel --- p.152 / Chapter B.5.2 --- “Container´ح Panel --- p.154 / Chapter B.5.3 --- “Service´ح Panel --- p.156 / Chapter B.6 --- Interface details --- p.158 / Chapter B.6.1 --- Package mgs.manager --- p.158 / Chapter B.6.2 --- Package mgs.monitor --- p.165 / Chapter B.6.3 --- Package mgs.task --- p.167 / Chapter B.6.4 --- Package mgs.ftsFramework --- p.174 / Bibliography --- p.176 / Publications --- p.181
|
4 |
Phenomenological inquiry into the experience of web project managers.Sarker, Pradipta K, mikewood@deakin.edu.au January 2003 (has links)
The advent of the Internet and the World Wide Web has been instrumental in bringing about the growth in the implementation of web-based information systems (WBIS). Such systems are designed with the aim of improving productivity, data accuracy, and the reduction of paperwork and administrative overheads. Moreover, unlike their conventional non-web-based predecessors, the WBIS are commonly aimed at users who are casual and untrained, geographically distributed and non-homogenous. The dissemination of WBIS necessitates additional infrastructure support in the form of a security system, workflow and transaction management, and web administration.
WBIS are commonly developed using an evolutionary approach, whereby the version of the application, acquired from the vendor, is first deployed as a pilot, in order to gather feedback from the target users before the evolutionary cycles commence. While a number of web development methodologies have been proposed by existing research, there is a dearth of empirical evidence that elucidates the experiences of project initiators in pursuing the evolution of web services, a process that undoubtedly involves dealing with stakeholder issues.
This research project presents a phenomenological investigation of the experiences of project managers with the implementation of web-based employee service systems (ESS), a domain that has witnessed a sharp growth in Australia in recent times. However, the project managers rich, multidimensional account of their experiences with the implementation of ESS revealed the social obstacles and fragility of intra-organizational relationships that demanded a cautious and tactful approach. Thus, the study provides a socio-organizational perspective to web projects in contrast to the functionalist paradigm of current web development methodologies. The research also confirms that consideration of the concerns of stakeholders by project managers is crucial to the successive cycles of ESS evolution. Project managers address stakeholder concerns by pursuing actions that are aimed at encouraging ESS usage, but at the same time, such actions can have consequences necessitating subsequent iterations of system enhancement and improvement. Finally, the research also discovered that despite the different socio-political climate prevalent in various organizations, in which ESS are being implemented, the experiences of project managers in dealing with stakeholder concerns can be captured and independently confirmed in terms of their perceived relevance and usefulness in problem-solving within the application domain.
|
5 |
Internet-scale information monitoring a continual query approach /Tang, Wei. January 2003 (has links) (PDF)
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2004. / Thomas E. Potok, Committee Member; Calton Pu, Committee Member; Edward Omiecinski, Committee Member; Leo Mark, Committee Member; Constantinos Dovrolis, Committee Member; Ling Liu, Committee Chair. Includes bibliography.
|
6 |
Formal specification and verification of the internet open trading protocol using Coloured Petri Nets /Ouyang, Chun Unknown Date (has links)
Thesis (PhDComputerSystemsEng)--University of South Australia, 2004.
|
7 |
Enhancing hyperlink structure for improving Web performance.Vargas Martin, Miguel, January 1900 (has links)
Thesis (Ph.D.) - Carleton University, 2003. / Includes bibliographical references (p. 134-141). Also available in electronic format on the Internet.
|
8 |
Design and implemetation of internet mail servers with embedded data compressionNand, Alka 01 January 1997 (has links)
No description available.
|
9 |
A framework for improving internet end-to-end performance and availability using multi-path overlay networksBui, Vinh, Information Technology & Electrical Engineering, Australian Defence Force Academy, UNSW January 2008 (has links)
Application-layer overlay networks have recently emerged as a promising platform to deploy additional services over the Internet. A virtual network of overlay nodes can be used to regulate traffic flows of an underlay network, without modifying the underlay network infrastructure. As a result, an opportunity to redeem the inefficiency of IP routing and to improve end-to-end performance of the Internet has arisen, by routing traffic over multiple overlay paths. However, to achieve high end-to-end performance over the Internet by means of overlay networks, a number of challenging issues, including limited knowledge of the underlay network characteristics, fluctuations of overlay path performance, and interactions between overlay and the underlay traffic must be addressed. This thesis provides solutions to some of these issues, by proposing a framework to construct a multi-path overlay architecture for improving Internet end-to-end performance and availability. The framework is formed by posing a series of questions, including i) how to model and forecast overlay path performance characteristics; ii) how to route traffic optimally over multiple overlay paths; and iii) how to place overlay nodes to maximally leverage the Internet resource redundancy, while minimizing the deployment cost. To answer those research questions, analytical and experimental studies have been conducted. As a result, i) a loss model and a hybrid forecasting technique are proposed to capture, and subsequently predict end-to-end loss/delay behaviors; with this predictive capability, overlay agents can, for example, select overlay paths that potentially offer good performance and reliability; ii) to take full advantage of the predictive capability and the availability of multiple paths, a Markov Decision Process based multi-path traffic controller is developed, which can route traffic simultaneously over multiple overlay paths to optimize some performance measures, e.g. average loss rate and latency. As there can be multiple overlay controllers, competing for common resources by making selfish decisions, which could jeopardize performance of the networks, game theory is applied here to turn the competition into cooperation; as a consequence, the network performance is improved; iii) furthermore, to facilitate the deployment of the multi-path overlay architecture, a multi-objective genetic-based algorithm is introduced to place overlay nodes to attain a high level of overlay path diversity, while minimizing the number of overlay nodes to be deployed, and thus reducing the deployment cost. The findings of this thesis indicate that the use of multiple overlay paths can substantially improve end-to-end performance. They uncover the potential of multi-path application-layer overlay networks as an architecture for achieving high end-to-end performance and availability over the Internet.
|
10 |
Algorithmic Aspects of the InternetSaberi, Amin 12 July 2004 (has links)
The goal of this thesis is to use and advance the techniques developed in the field of exact and approximation algorithms for many of the problems arising in the context of the Internet. We will formalize the method of dual fitting and the idea of factor-revealing LP. We use this combination to design and analyze two greedy algorithms for the metric uncapacitated facility location problem. Their approximation factors are 1.861 and 1.61 respectively. We also provide the first polynomial time algorithm for the linear version of a market equilibrium model defined by Irving Fisher in 1891. Our algorithm is modeled after Kuhn's primal-dual algorithm for bipartite matching. We also study the connectivity properties of the Internet graph and its impact on its structure. In particular, we consider the model of growth with preferential attachment for modeling the graph of the Internet and prove that under some reasonable assumptions, this graph has a constant conductance.
|
Page generated in 0.1173 seconds