• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 150
  • 20
  • 9
  • 9
  • 3
  • 1
  • 1
  • Tagged with
  • 204
  • 204
  • 194
  • 102
  • 61
  • 34
  • 24
  • 23
  • 23
  • 22
  • 21
  • 20
  • 19
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

The performance of interval routing in general networks /

Tse, Siu-hong, Savio. January 1997 (has links)
Thesis (Ph. D.)--University of Hong Kong, 1997. / Includes bibliographical references (leaf 91-94).
92

A virtualized quality of service packet scheduler accelerator

Chuang, Kangtao Kendall. January 2008 (has links)
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Sudhakar Yalamanchili; Committee Member: Hsien-Hsin Sean Lee; Committee Member: Yorai Wardi. Part of the SMARTech Electronic Thesis and Dissertation Collection.
93

A pipelined, multi-processor architecture for a connectionless server for broadband ISDN.

Omundsen, Daniel (Daniel Simon), Carleton University. Dissertation. Engineering, Electrical. January 1992 (has links)
Thesis (M. Eng.)--Carleton University, 1993. / Also available in electronic format on the Internet.
94

Application development using client-server technology /

Chowdhury, Evan, January 2004 (has links) (PDF)
Thesis (M.S.) in Computer Engineering--University of Maine, 2004. / Includes vita. Includes bibliographical references (leaves 50-51).
95

The optimum communications architecture for deep level gold mining

Miller, Mark Henry Bruce. January 2000 (has links)
Thesis (M.Eng.(Electrical Engineering))--University of Pretoria, 2000. / Includes abstract in English. Includes bibliographical references.
96

Multiple antenna systems in a mobile-to-mobile environment

Kang, Heewon. January 2006 (has links)
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2007. / Gordon L. Stuber, Committee Chair ; Guillermo Goldsztein, Committee Member ; Gregory D. Durgin, Committee Member ; John R, Barry, Committee Member ; Mary Ann Ingram, Committee Member.
97

Application Development Using Client-Server Technology

Chowdhury, Evan January 2004 (has links) (PDF)
No description available.
98

A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION

Unknown Date (has links)
Cloud computing has provided many services to potential consumers, one of these services being the provision of network functions using virtualization. Network Function Virtualization is a new technology that aims to improve the way we consume network services. Legacy networking solutions are different because consumers must buy and install various hardware equipment. In NFV, networks are provided to users as a software as a service (SaaS). Implementing NFV comes with many benefits, including faster module development for network functions, more rapid deployment, enhancement of the network on cloud infrastructures, and lowering the overall cost of having a network system. All these benefits can be achieved in NFV by turning physical network functions into Virtual Network Functions (VNFs). However, since this technology is still a new network paradigm, integrating this virtual environment into a legacy environment or even moving all together into NFV reflects on the complexity of adopting the NFV system. Also, a network service could be composed of several components that are provided by different service providers; this also increases the complexity and heterogeneity of the system. We apply abstract architectural modeling to describe and analyze the NFV architecture. We use architectural patterns to build a flexible NFV architecture to build a Reference Architecture (RA) for NFV that describe the system and how it works. RAs are proven to be a powerful solution to abstract complex systems that lacks semantics. Having an RA for NFV helps us understand the system and how it functions. It also helps us to expose the possible vulnerabilities that may lead to threats toward the system. In the future, this RA could be enhanced into SRA by adding misuse and security patterns for it to cover potential threats and vulnerabilities in the system. Our audiences are system designers, system architects, and security professionals who are interested in building a secure NFV system. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2020. / FAU Electronic Theses and Dissertations Collection
99

Next Generation Cloud Computing Architectures: Performance and Pricing

Mahajan, Kunal January 2021 (has links)
Cloud providers need to optimize the container deployments to efficiently utilize their network, compute and storage resources. In addition, they require an attractive pricing strategy for the compute services like containers, virtual machines, and serverless computing in order to attract users, maximize their profits and achieve a desired utilization of their resources. This thesis aims to tackle the twofold challenge of achieving high performance in container deployments and identifying the pricing for compute services. For performance, the thesis presents a transport-adaptive network architecture (D-TAIL) improving tail latencies. Existing transport protocols such as Homa, pFabric [1, 2] utilize Shortest Remaining Processing Time (SRPT) scheduling policy which is known to have starvation issues for long flows as SRPT prioritizes short flows. D-TAIL addresses this limitation by taking age of the flow in consideration while deciding the priority. D-TAIL shows a maximum reduction of 72%, 29.66% and 28.39% in 99th-percentile FCT for transport protocols like DCTCP, pFabric and Homa respectively. In addition, the thesis also presents a container deployment design utilizing peer-to-peer network and virtual file system with content-addressable storage to address the problem of cold starts in existing container deployment systems. The proposed deployment design increases compute availability, reduces storage requirement and prevents network bottlenecks. For pricing, the thesis studies the tradeoffs between serverless computing (SC) and traditional cloud computing (virtual machine, VM) using realistic cost models, queueing theoretic performance models, and a game theoretic formulation. For customers, we identify their workload distribution between SC and VM to minimize their cost while maintaining a particular performance constraint. For cloud provider, we identify the SC and VM prices to maximize its profit. The main result is the identification and characterization of three optimal operational regimes for both customers and the provider, that leverage either SC or VM only, or both, in a hybrid configuration.
100

A research model to improve understanding of the extent of usage of enterprise resource planning systems in a university

Mudaly, Sherwin 03 October 2014 (has links)
Submitted in fulfillment of the requirements of the Master of Technology Degree in Information Technology, Durban University of Technology Durban, South Africa, 2013. / This study reports on the development of a model for the improvement of understanding the extent of Enterprise Resource Planning system usage at the Durban University of Technology. Previous research revealed that university ERP systems are not fully utilized by end-users, resulting in low usage and institutional inefficiencies. Consequently this leads to stakeholders (particularly students and government) pressurizing universities to improve their efficiency and performance. To address the problem, this study developed a research model by adapting the TAM2 theoretical model with additional IT usage factors of training, management support, perceived behavioural control and technical support. A dataset of 312 full time academics was generated by a survey method. Partial Least Square (PLS) technique was used to determine the predictive power of the developed research model which was then compared to other adoption and usage models to determine its superiority. The model was empirically tested and the findings demonstrated an improvement on the model predictive power as a result of the additional IT usage factors and the interaction effect of gender, age and experience. The predictive power comparison shows that the research model better explained 23% of the variability in ERP system usage compared to the original TAM2 model of 3.6% and the original TPB model of 5.2%. With the exception of management support, the additional IT usage factors of training, technical support and perceived behavioural control were found to have a significant relationship with ERP system usage. The test of gender, experience and age interaction effect revealed that gender and experience moderated the relationship between the independent factors of technical support and management support on the dependent factor of ERP system usage. In addition gender moderated the effect of perceived behavioural control on ERP system usage but not the effect of training which was however moderated by experience. Age did not moderate the relationship between the additional IT usage factors and ERP system usage. Consequently, the Durban University of Technology will have to address these additional IT usage factors and gender and experience interaction effect more precisely in its attempt to improve ERP system usage.

Page generated in 0.0778 seconds