• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1107
  • 379
  • 210
  • 133
  • 95
  • 75
  • 37
  • 19
  • 18
  • 18
  • 15
  • 15
  • 15
  • 15
  • 12
  • Tagged with
  • 2454
  • 610
  • 607
  • 376
  • 324
  • 321
  • 267
  • 257
  • 252
  • 234
  • 226
  • 216
  • 210
  • 204
  • 185
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

AHB On-Chip Bus Protocol Checker

Wang, Chien-chou 12 December 2007 (has links)
Verifying that a hardware module connected to a bus follows the bus protocol correctly is a necessity in a bus-based System-on-Chip (SoC) development. Traditional simulation-based bus protocol monitors can check whether bus signals obey bus protocol or not, but they are non-synthesizable and thus could not identify bugs occurring at run time in real physical environment. We propose a rule-based and synthesizable protocol checker (HPChecker) for AMBA AHB Bus. It contains 73 related bus protocol rules to check bus signal behavior, and two corresponding debugging mechanisms to shorten debugging time. Error reference table can summarize the violation condition of a design under test (DUT); History Memory contains the content of violation signals. These two mechanisms can help designer debugging efficiently. The gate counts of the HPChecker are 43,432 gates and the speed of it is 203 MHz at 0.18Mm technology. Finally, the HPChecker has been integrated into a 3D graphics accelerator and successfully identifies protocol violation in the FPGA prototype. . HPChecker has been successfully licensed to industries in France and Taiwan to assist SoC development.
22

Connectionless Approach to Vehicular Ad Hoc Networks in Metropolitan Environments

Wu, Ming-chang 28 July 2009 (has links)
none
23

Predicting catastrophic BGP routing instablities /

Nguyen, Lien K. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Geoffrey Xie. Includes bibliographical references (p. 155-156). Also available online.
24

Arizona Child Acoustic Database: Task List

Bunton, Kate, Story, Brad January 2014 (has links)
The Arizona Child Acoustic Database consists of longitudinal audio recordings from a group of children over a critical period of growth and development (ages 2-7 years). The goal of this database is to 1) document acoustic changes in speech production that may be related to physical growth 2) inform development of a model of speech production for child talkers. This work was funded by NSF BSC-1145011 awarded to Kate Bunton, Ph.D. and Brad Story, Ph.D, Principal Investigators. This database contains longitudinal audio recordings of 55 American English speaking children between the ages of 2-7 at 3-month intervals. Since children began the study at different ages, some children have fewer recording sessions than others. The database can also be used to provide cross-sectional data for children of a specific age. Please refer to the subject data table for information on specific sessions available here http://arizona.openrepository.com/arizona/handle/10150/316065. All children were recorded using the same protocol; therefore, task numbers are consistent across children and sessions. A calibration tone is included as Record 1 for all sessions. The speech protocol focused on production of English monopthong and diphthong vowels in isolation, sVd, hVd, and monosyllabic real words. In addition, the protocol includes several nonsense vowel-to-vowel transitions. Speakers were prompted either verbally by investigators or by graphical prompts. Details of the protocol with reference to task numbers can be found in the protocol spreadsheet available here http://arizona.openrepository.com/arizona/handle/10150/316065. Details on data recording: All samples were recorded digitally using an AKG SE 300B microphone with a mouth to mic distance of approximately 10 inches. Signals were recorded digitally using a Marantz PMD671, 16 bit PCM (uncompressed) at 44.1KHz. Recordings are made available in .wav format. Individual zip files contain all recordings from a single session.
25

An Empirical Study of a Language - based Security Testing Technique

Aboelfotoh, Muhammad 27 September 2008 (has links)
Application layer protocols have become sophisticated to the level that they have become languages in their own right. Security testing of network applications is indisputably an essential task that must be carried out prior to the release of software to the market. Since factors such as time-to-market constraints limit the scope or depth of the testing performed, it is difficult to carry out exhaustive testing prior to the release of the software. As a consequence, flaws may be left undiscovered by the software vendor, which may be discovered by those of malicious intent. We report the results of an empirical study of testing the Distributed Relational Database Architecture (DRDA®) protocol as implemented by the IBM® DB2® Database for Linux®, Unix®, and Windows® product, using a security testing approach, and a framework which implements that approach, that emerged from the joint work of the Royal Military College of Canada and Queen's University of Kingston. The previous version of the framework was used in the past to test the implementations of several network protocols. Compared to DRDA, these protocols are relatively simple, as they possess a much fewer number of structure types, messages and rules. From our study of the DRDA protocol, several omissions in the framework were uncovered, and were implemented as part of this work. In addition, the framework was automated, a preliminary automated test planner was created and a primitive language was created to provide the ability to describe custom-made test plans. Testing revealed two faults in the DB2 server, one of which was unknown to the vendor, prior to the testing that was carried out as part of this thesis work. / Thesis (Master, Computing) -- Queen's University, 2008-09-26 16:31:32.565
26

Modelling and analysis of communication protocols using numerical Petri nets

Symons, F. J. W. January 1978 (has links)
No description available.
27

Automated Test Framework For The Wireless Protocol Stack Development

He, Qing 21 September 2007 (has links)
Testing plays an important role in the wireless protocol stack development. In order to free the testers out of the shielded chamber, allow both the developers and the testers to use the test systems remotely and maximize the expensive test system usage. An automated test framework is highly demanded. In this thesis, the design of the automated test framework is introduced. There are four main components in the test framework. They are the front end, scheduler, test engine and data storage. The architecture and the protocol among these components are described. Further, the evaluation of the scheduler is conducted based on the queueing theory. Based on the simulation result, a good scheduling algorithm is proposed. Compared with the original scheduling algorithm, the new algorithm improves the performance of the low priority users significantly when the test systems are limited. Moreover, the detail design of the test engine is presented. With the control of the intelligent test engine, the automated test framework has the capability to launch the test cases automatically, catch the commands sent by the test system and manipulate the SUT (System Under Test) without human’s interrupt. It fulfills the objective of automation. The automated test framework has been deployed and is working well.
28

Enhancing the IKE preshared key authentication method

Bani-Hani, Raed M., January 2006 (has links)
Thesis (Ph. D.) University of Missouri-Columbia, 2006. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 31, 2007) Includes bibliographical references.
29

The Internet Protocol (IP) and Global Telecommunications Transformation

McGarty, Terrence January 1999 (has links)
No description available.
30

Evolutionary approaches to adaptive protocol design

Sharples, Nicholas Peter January 2003 (has links)
No description available.

Page generated in 2.3742 seconds