• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 20
  • Tagged with
  • 43
  • 43
  • 43
  • 40
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Aufbau einer Location Based Services Infrastruktur im Wireless Local Area Network des Chemnitzer Kulturkaufhauses "Das Tietz"

Pfüller, Patric 19 November 2009 (has links)
Aufbau einer LBS Infrastruktur im WLAN
2

Design and Implementation of a Federated Social Network / Entwurf und Umsetzung eines Föderierten Sozialen Netzwerks

Maka, Stephan 26 September 2011 (has links) (PDF)
Analysis of Functionality and Data Models of Social Network Services, Proposal of a protocol based on XMPP/Publish-Subscribe, Comparison to OStatus and OneSocialWeb, Discussion of Inbox
3

Address spreading in future Internet supporting both the unlinkability of communication relations and the filtering of non legitimate traffic

Fourcot, Florent 15 January 2016 (has links) (PDF)
The rotation of identifiers is a common security mechanism to protect telecommunication; one example is the frequency hopping in wireless communication, used against interception, radio jamming and interferences. In this thesis, we extend this rotation concept to the Internet. We use the large IPv6 address space to build pseudo-random sequences of IPv6 addresses, known only by senders and receivers. The sequences are used to periodically generate new identifiers, each of them being ephemeral. It provides a new solution to identify a flow of data, packets not following the sequence of addresses will be rejected. We called this technique “address spreading”. Since the attackers cannot guess the next addresses, it is no longer possible to inject packets. The real IPv6 addresses are obfuscated, protecting against targeted attacks and against identification of the computer sending a flow of data. We have not modified the routing part of IPv6 addresses, so the spreading can be easily deployed on the Internet. The “address spreading” needs a synchronization between devices, and it has to take care of latency in the network. Otherwise, the identification will reject the packets (false positive detection). We evaluate this risk with a theoretical estimation of packet loss and by running tests on the Internet. We propose a solution to provide a synchronization between devices. Since the address spreading cannot be deployed without cooperation of end networks, we propose to use ephemeral addresses. Such addresses have a lifetime limited to the communication lifetime between two devices. The ephemeral addresses are based on a cooperation between end devices, they add a tag to each flow of packets, and an intermediate device on the path of the communication, which obfuscates the real address of data flows. The tagging is based on the Flow Label field of IPv6 packets. We propose an evaluation of the current implementations on common operating systems. We fixed on the Linux Kernel behaviours not following the current standards, and bugs on the TCP stack for flow labels. We also provide new features like reading the incoming flow labels and reflecting the flow labels on a socket.
4

Adaptive Knowledge Exchange with Distributed Partial Models@Run.time

Werner, Christopher 11 January 2016 (has links) (PDF)
Die wachsende Anzahl an Robotikanwendungen, in denen mehrere Roboter ein gemeinsames Ziel verfolgen, erfordert eine gesonderte Betrachtung der Interaktion zwischen diesen Robotern mit Bezug auf den damit entstehenden Datenaustausch. Dieser muss hierbei effizient betrieben werden und die Sicherheit des gesamt Systems gewährleisten. Diese Masterarbeit stellt eine Simulationsumgebung vor, welche anhand von Testszenarien und Austauschstrategien Roboterkonstellationen prüft und Messergebnisse ausliefert. Zu Beginn der Arbeit werden drei Datenaustauschverfahren betrachtet und anschließend Publikationen vorgestellt, in denen Datenaustausch betrieben wird und Simulatoren für die Nutzbarkeit der Simulationsumgebung untersucht. Die anschließenden Kapitel behandeln das Konzept und die Implementierung der Testumgebung erläutert, wobei Roboter aus einer Menge von Hardware Komponenten und Zielen beschrieben werden. Der Aufbau des Experiments umfasst die verschiedenen Umgebungen, Testszenarien und Roboterkonfiguration. Der Aufbau beschreibt die Grundlage für die Auswertung der Testergebnisse.
5

Bedarfsgesteuerte Verteilung von Inhaltsobjekten in Rich Media Collaboration Applications

Schuster, Daniel 29 November 2007 (has links) (PDF)
IP-basierte Konferenz- und Kollaborations-Systeme entwickeln sich mehr und mehr in Richtung Rich Media Collaboration, d.h. vereinigen Audio- und Videokonferenzfunktionalität mit Instant Messaging und kollaborativen Funktionen wie Presentation Sharing und Application Sharing. Dabei müssen neben den Live-Medienströmen auch Inhaltsobjekte wie Präsentationsfolien oder Dokumentseiten in Echtzeit innerhalb einer Session verteilt werden. Im Gegensatz zum klassischen 1:n-push-Schema wird dafür in der Arbeit ein Ansatz für wahlfreien Zugriff auf durch die Teilnehmer selbst gehostete Inhaltsobjekte - also n:m-pull-Verteilung - vorgestellt. Dieser Ansatz hat in Anwendungsszenarien mit gleichberechtigten Teilnehmern, wie zum Beispiel virtuellen Meetings von Projektteams, signifikante Performance-Vorteile gegenüber den traditionellen Ansätzen. Mit dem Content Sharing Protocol (CSP) wurde eine Protokoll-Engine bestehend aus neun Mikroprotokollen entwickelt, implementiert und evaluiert. Sie beinhaltet neben der Kernfunktionalität der Inhaltsauslieferung auch Unterstützung für Caching, Prefetching und Datenadaption, sowie dynamische Priorisierung von Datentransfers und Interaktionsunterstützung.
6

VAMPIR: Visualization and Analysis of MPI Resources

Nagel, Wolfgang E., Arnold, Alfred, Weber, Michael, Hoppe, Hans-Christian, Solchenbach, Karl 04 February 2010 (has links) (PDF)
Performance analysis most often is based on the detailed knowledge of program behavior. One option to get this information is tracing. Based on the research tool PARvis, the visualization environment VAMPIR was developed at KFA which now supports the new message passing standard MPI. VAMPIR translates a given trace file into a variety of graphical views, e.g., state diagrams, activity charts, time-line displays, and statistics. Moreover, it supports an animation mode that can help to locate performance bottlenecks, and it provides flexible filter operations to reduce the amount of information displayed. The most interesting part of VAMPIR is the powerful zooming feature that allows to identify problems at any level of detail.
7

Eine generische Dienstarchitektur für das Gesundheitswesen

Pucklitzsch, Thomas 28 July 2010 (has links) (PDF)
Im Gesundheitswesen müssen ganz unterschiedlich strukturierte Einrichtungen bei der Behandlung von Patienten zusammenarbeiten. Die Arbeit stellt Lösungen vor, die eine solche Zusammenarbeit mit Hilfe verteilter Anwendungen auf Basis von Webservices und Peer-to-Peer Technologie unterstützen. Dabei werden vorhandene Strukturen und Beziehungen zwischen diesen Einrichtungen benutzt, um gute Ergebnisse bei der Suche nach Daten und der Steuerung von Abläufen zu erzielen.
8

Towards auto-scaling in the cloud

Yazdanov, Lenar 16 January 2017 (has links) (PDF)
Cloud computing provides an easy access to computing resources. Customers can acquire and release resources any time. However, it is not trivial to determine when and how many resources to allocate. Many applications running in the cloud face workload changes that affect their resource demand. The first thought is to plan capacity either for the average load or for the peak load. In the first case there is less cost incurred, but performance will be affected if the peak load occurs. The second case leads to money wastage, since resources will remain underutilized most of the time. Therefore there is a need for a more sophisticated resource provisioning techniques that can automatically scale the application resources according to workload demand and performance constrains. Large cloud providers such as Amazon, Microsoft, RightScale provide auto-scaling services. However, without the proper configuration and testing such services can do more harm than good. In this work I investigate application specific online resource allocation techniques that allow to dynamically adapt to incoming workload, minimize the cost of virtual resources and meet user-specified performance objectives.
9

Error isolation in distributed systems

Behrens, Diogo 25 May 2016 (has links) (PDF)
In distributed systems, if a hardware fault corrupts the state of a process, this error might propagate as a corrupt message and contaminate other processes in the system, causing severe outages. Recently, state corruptions of this nature have been observed surprisingly often in large computer populations, e.g., in large-scale data centers. Moreover, since the resilience of processors is expected to decline in the near future, the likelihood of state corruptions will increase even further. In this work, we argue that preventing the propagation of state corruption should be a first-class requirement for large-scale fault-tolerant distributed systems. In particular, we propose developers to target error isolation, the property in which each correct process ignores any corrupt message it receives. Typically, a process cannot decide whether a received message is corrupt or not. Therefore, we introduce hardening as a class of principled approaches to implement error isolation in distributed systems. Hardening techniques are (semi-)automatic transformations that enforce that each process appends an evidence of good behavior in the form of error codes to all messages it sends. The techniques “virtualize” state corruptions into more benign failures such as crashes and message omissions: if a faulty process fails to detect its state corruption and abort, then hardening guarantees that any corrupt message the process sends has invalid error codes. Correct processes can then inspect received messages and drop them in case they are corrupt. With this dissertation, we contribute theoretically and practically to the state of the art in fault-tolerant distributed systems. To show that hardening is possible, we design, formalize, and prove correct different hardening techniques that enable existing crash-tolerant designs to handle state corruption with minimal developer intervention. To show that hardening is practical, we implement and evaluate these techniques, analyzing their effect on the system performance and their ability to detect state corruptions in practice.
10

Architecture and Mechanisms of Energy Auto-Tuning

Götz, Sebastian, Wilke, Claas, Cech, Sebastian, Aßmann, Uwe 21 August 2013 (has links) (PDF)
Energy efficiency of IT infrastructures has been a well-discussed research topic for several decades. The resulting approaches include hardware optimizations, resource management in operating systems, network protocols, and many more. The approach the authors present in this chapter is a self-optimization technique for IT infrastructures, which takes hard- and software components as well as users of software applications into account. It is able to ensure minimal energy consumption for a user request along with a set of non-functional requirements (e.g., the refresh rate of a data extraction tool). To optimize the ratio between utility of end users and the cost in terms of energy consumption, the system needs inherent variability leading to differentiated energy profiles and mechanisms to reconfigure the system at runtime. The authors present their approach called Energy Auto-Tuning (EAT) comprised of these mechanisms and an architecture which automatically tunes the energy efficiency of IT systems.

Page generated in 0.0264 seconds