To see the other types of publications on this topic, follow the link: And messaging.

Dissertations / Theses on the topic 'And messaging'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'And messaging.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Johansson, Mattias. "Instant Music & Messaging : Interconnecting music and messaging." Thesis, KTH, Electronic, Computer and Software Systems, ECS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-10260.

Full text
Abstract:

Communication is and has always been important for the human as we aredesigned by evolution to communicate as a way to survive and reproduce. Whatmany people do not think about is that music and communication are very closelyrelated due to the fact that music is a type of communication. In this thesis wehave focused on the field of music and communication to discuss the possibilityof combining these to areas to provide better information technology services.More specifically we have focused on discussing the advantages of combining thecommunication technology of instant messaging with music playback. Our goalsare that it will increase the user experience as well as indirectly help the musicindustry to promote artists and their music as the communicating peers will beable to share information about their music in a more efficient way.

APA, Harvard, Vancouver, ISO, and other styles
2

Andersson, Robert, and Larry Canady. "Multimedia Messaging Service Front End for Supplementary Messaging Services." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129460.

Full text
Abstract:

The standardization forum 3GPP has specified a Multimedia Messaging Service (MMS) standard including an MMS Center (MMSC) that allows users to send and receive messages including e.g. text, images, audio and video. The 3GPP forum has however not standardized any MMSC provided supplementary services in relation to MMS.

The goal of the thesis is to create a Front End (FE) prototype which is capable of supporting a given set of MMSC supplementary messaging services for MMS and to develop and test an MMSC. The set of supplementary messaging services to be supported are auto-reply to an MMS message, auto-forwarding, convert an email to a MMS message, and cloning a MMS message.

The final results for the project are mixed. The prototype was not implemented entirely mainly due to lack of available software and not having access to an operators MMSC, which would be needed to push the supplementary services to mobile phones. However substantial progress was achieved. All of the supplementary messaging services were implemented and made compatible with Mobile Arts existing system. A testing system was also designed capable of processing simulated incoming MMS messages.

APA, Harvard, Vancouver, ISO, and other styles
3

Clarke, Charles A. "Dual carrier steganographic messaging protocols for mobile messaging applications." Thesis, Kingston University, 2016. http://eprints.kingston.ac.uk/37302/.

Full text
Abstract:
Facebook Messenger, ChatSecure, Line, QQ and WhatsApp represent examples of Mobile Messaging Applications (MMAs) that collectively facilitate instant and global communications, in which billions of audio, image, text and video messages are exchanged on a daily basis. Some of these messages are digital assets (messages that have a significant functional, sentimental or monetary value) that may be exposed to confidentiality or exploitation threats, wehn published in MMAs that are subject to such security concerns. Additionally, some MMAs impose message format constraints that prevent users from publishing sudio, image and video digital assets in an encrypted form, thus hampering their attempts to mitigate such concerns. In this thesis, two research contributions are presented, that are designed to establish confidentiality over digital assets that are messaged via MMAs. The first contribution, Dual Carrier Steganographic Messaging (DCSM) protocols, pairs two independent and non-colluding MMAs as communication channels, in which a digital asset is steganographically messaged over one MMA and its stego-key (size, format, access information) over the other. The second contribution, extends a probabilistic Hash-based Least Significant Bit (HLSB) steganography technique through the introduction of hash function arrays, and can be applied to JPG images in the spatial domain. This technique features as an integral component in DCSN schemes. Both research contributions are implemented and evaluated via a prototype application, Conceal[sub]2. JPG HLSB embedding is evaluated in a number of configurations that are applied to cover-images with diverse pixel luminance profiles. Subsequent performance results are measured in terms of embedding overheeads, carrier-image distortion ranges, thresholds and embedding scope. Results conclude that JPG HLSB embedding is most efficient when utilising images with wide variations in pixel luminance, and that a configuration utilising an array of 16 hash functions, delivers the best performance of the array sizes tested. Empirical evaluations of 54 Android MMAs conclude that their use as communication channels in DCSM schemes, is feasible where MMAs maintain image integrity and that the successful act of steganographic messaging over viable MMAs without subsequent corruption of carrier-images, indicates that carrier-images are detected but only observed, or that they are not monitored, or that MMA systems are ineffective at detecting the carrier-images utilised in this research.
APA, Harvard, Vancouver, ISO, and other styles
4

Srinivas, Tejaswi. "Mercury Instant Messaging System: A collaborative instant messaging tool." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2677.

Full text
Abstract:
The purpose of this project is to use Java technology to create an instant messenger application that could be used by any person who has the basic knowledge of working with a graphical user interface. The goal here is to develop an application that provides communication to users running different operating systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Brahneborg, Daniel. "Pipelined Messaging Gateway." Thesis, Umeå universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-102004.

Full text
Abstract:
The SMS gateway EMG uses separate threads for each connection. This requires a large number of locks to avoid data corruption, and causes problems when scaling to thousands of connections. The CPU load goes very high, and the amount of addressable memory per thread becomes low. This report examines an alternative implementation, where each thread instead handles a separate part of the processing. The two architectures are compared based on throughput, resource utilisation, code complexity and more. The results show what while throughput is about the same, the alternative implementation is better at keeping the CPU load within reasonable limits. However, it also requires more advanced data structure and algorithms to be efficient.
APA, Harvard, Vancouver, ISO, and other styles
6

Cohn-Gordon, Katriel. "On secure messaging." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a6da6196-f216-4d57-9035-72903006197c.

Full text
Abstract:
What formal guarantees should a secure messaging application provide? Do the most widely-used protocols provide them? Can we do better? In this thesis we answer these questions and with them give a formal study of modern secure messaging protocols, which encrypt the personal messages of billions of users. We give definitions and analyses of two protocols: one existing (Signal) and one new (ART). For Signal, we begin by extending and generalising classic computational models, in order to apply them to its complex ratcheting key derivations. With a threat model in mind we also define a security property, capturing strong secrecy and authentication guarantees including a new one which we call "post-compromise security". We instantiate Signal as a protocol in our model, stating its security theorem and sketching a computational reduction. Signal only supports encrypting messages between two devices, and so most implementers have built custom protocols on top of it to support group conversations. These protocols usually provide weaker security guarantees, and in particular usually do not have post-compromise security. We propose a new protocol called ART, whose goal is to bring Signal's strong security properties to conversations with multiple users and devices. We give a design rationale and a precise definition of ART, and again generalise existing computational models in order to formally specify its security properties and sketch a security reduction. ART has enjoyed widespread interest from industry, and we aim to turn it into an open standard for secure messaging. To that end, we have brought it to the IETF and formed a working group called Messaging Layer Security, with representatives from academia as well as Facebook, Google, Twitter, Wire, Cisco and more. Through MLS, we hope to bring ART's strong guarantees to practical implementations across industry. After concluding our analyses we pause for a moment, and start looking towards the future. We argue that for complex protocols like Signal and ART we are reaching the limits of computational methods, and that the future for their analysis lies with symbolic verification tools. To that end we return to the symbolic model and give a number of case studies, in each one showing how a traditional limitation of symbolic models can in fact be seen as a modelling artefact.
APA, Harvard, Vancouver, ISO, and other styles
7

McMillan, Josh. "Instant Messaging and Youth." UOIT, 2009. http://hdl.handle.net/10155/49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schildt, Holger. "Sicherheitsaspekte von Instant Messaging." [S.l. : s.n.], 2005. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB12103506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marx, Matthew Talin. "Toward effective conversational messaging." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/29093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jotterand, Arnaud. "Usage control in secure messaging." Zürich : ETH, Swiss Federal Institute of Technology Zurich, Department of Computer Science, 2008. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Robison, Christopher Douglas. "Secure Browser-Based Instant Messaging." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3372.

Full text
Abstract:
Instant messaging is a popular form of communication over the Internet. Statistics show that instant messaging has overtaken email in popularity. Traditionally, instant messaging has consisted of a desktop client communicating with other clients via an instant messaging service provider. However, instant messaging solutions are starting to become available in the web browser–services like Google Talk, Live Messenger and Facebook. Despite the work done by researchers to secure instant messaging networks, little work has been done to secure instant messaging in the browser. We present secure browser-based instant messaging overlays as a means to enable convenient, secure communication in existing browser-based instant messaging interfaces. Additionally, we present a prototype implementation of the secure messaging overlays and the results of two user studies--the first study focusing on user interest in secure chat and the second being a usability study of the prototype.
APA, Harvard, Vancouver, ISO, and other styles
12

Shawcroft, Sara R. "Gender Differences in Text Messaging." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/3965.

Full text
Abstract:
Text messaging is a significant social phenomenon that merits investigation. Communications theories are well suited to this type of research because text messaging serves as both mediated communication and interpersonal communication. This kind of research can also contribute to a deeper understanding of communication differences between genders. The purpose of this study was to ascertain whether there are gender differences in the use of text messaging and, if so, what the differences are. Participants for the study were recruited via convenience sampling. The sample consisted of 27 participants ages 18--35; 14 were female and 13 were male. Data were collected from the participants via the focus group approach. Two of the groups consisted of females, and two of the groups consisted of males. Transcripts of the focus group sessions were analyzed using the constant comparative approach. This approach involves continually sorting through the data, comparing categories, and analyzing the resulting information. Areas of difference between the genders include selecting recipients, gathering information, seeking entertainment (trolling), ending relationships, arguing, seeking privacy and exclusion, using text shorthand and slang, remaining alert, and using text messaging for dating. These findings provide new insight in the areas of text messaging and gender studies.
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, Whay Sing 1967. "Mechanisms for efficient, protected messaging." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/79981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Johansson, Fredrik. "Deniable Messaging Under Strong Surveillance." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231834.

Full text
Abstract:
In today’s society, people are more aware of the need for encryption to keep their private information safe. Therefore chat apps like WhatsApp and Signal are popular since they allow people to talk encrypted over instant messaging. However, normal encryption might not always be enough to keep the data safe. An adversary who can record and keep a transcript of everything a person sends over the Internet, could force the person to reveal the key used for encryption and therefore know what they sent. OTPKX is a protocol that prevents this with the help of deniable encryption, by giving a user the ability to create a fake message and key to show to the adversary. This thesis continues the work to create a protocol that gives deniability against an adversary that can record everything, force both sender and receiver to reveal their keys, and also have access to both devices. The protocol proposed in this thesis uses One Time Pad for encryption and for creating fake keys. A user creates both a real message, a fake message, combines them, and sends them to the receiver. Then both users have access to the fake message and can therefore both create the same fake key. The original key used for encryption is then replaced with the fake key and the fake message is stored on the device. No evidence of the real message or key is stored, and the fake data is the same at the sender and receiver. We find that our protocol is Indistinguishably under Chosen-CiphertextsAttack and provides Integrity of CipherTexts and therefore gives integrity and confidentiality. The protocol also gives users deniability so that they are protected against all attacker models in this thesis. The deniability could fail if an attacker has a keylogger on a users device or if the attacker has access to a device without the user knowing about it. The proof of concept implementation showed that it is possible to implement the protocol and have the same security and deniability at the cost of some performance. The biggest performance cost was replacing the original key with the fake key, which took most of the time when encrypting and decrypting. The total time for sending a message was around 40ms on a new device and around 620ms on an older device, receiving a message also took around 40ms on a new device and around 780ms on an older device. Normal Symmetric encryption takes about 1ms, which is much faster than our implementation. However in practice we do not believe this increase in time to be noticeable.
I dagens samhälle är människor mer medvetna om vikten att använda kryptering för att skydda sin privata information. Därför har chatt-appar som WhatsApp och Signal blivit mer populära eftersom de erbjuder möjligheten att kryptera alla meddelande man skickar. Detta räcker inte alltid dock för att skydda den dataman skickar, en motståndare som har förmågan att spara alla meddelande en användare skickar och som kan tvinga användaren att ge bort nyckeln som använts vid kryptering, då räcker inte alltid normal kryptering. I OTPKX rapporten kom de på ett protokoll som skyddar användaren mot en som motståndare med hjälp av deniable encryption, vilket ger användaren möjligheten att skapa en falsk nyckel vilket gör så att motståndaren ser ett falskt meddelande. Denna rapport bygger vidare på OTPKX protokollet för att skydda användare mot en motståndare som kan spara alla meddelande som skickas, tvinga både skickare och mottagare att ge bort krypteringsnycklarna och har tillgång till bådas enheter. Protokollet i denna rapport använder sig av OTP för kryptering och för att skapa falska nycklar. En användare skapar både ett riktigt och ett falskt meddelande och sätter ihop dem och skickar det tillmottagaren. Då har båda parterna både det riktiga och falskameddelandet och kan därför skapa samma falska nyckel att visamotståndaren. Den orginala krypteringsnyckeln byts ut mot den falska och det falskameddelandet sparas på enheterna. Utifrån resultaten såg vi att våra protokoll ger Indistinguishably under Chosen-CiphertextsAttack och ger Integrity ofCipherTexts, vilket betyder att protokollen ger integritet och konfidentialitet. Protokollen skyddar användare mot motståndaren i rapporten. En användares deniability kan misslyckas om en motståndare skulle installera en key-logger på användarens enhet eller om motståndaren har tillgång till en användares enhet utan att användaren vet om det. Implementationen visade att protokollet går att implementeras och att den fortfarande ger samma säkerhet och deniability i verkligheten på kostnad av prestanda. Att byta ut den orignala nyckeln mot den falska nyckeln var den del som tog mest tid och försämrade prestandan mest.Den totala tiden det tog för att skicka ett meddelande på en ny enhet var ungefär 40ms och tog ungefär 620 på en äldre enhet. Att ta emot ett meddelande tog ungefär 40ms på en ny enhet och ungefär 780ms på en äldre enhet. Normal symmetrisk kryptering tar ungefär 1ms, vilket är mycket snabbare än vår implementation. Men i praktiken så anser vi inte att ökningen i tid för vår implementation är märkbar.
APA, Harvard, Vancouver, ISO, and other styles
15

Vaz, Francisco José Pires. "VNMS: vehicular network messaging system." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/21232.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática
Com conceitos como a internet das coisas a surgir e a tornarem-se cada vez mais populares, criar ligações entre veículos foi apenas um próximo passo lógico, formando assim as redes ad hoc veiculares. Estas redes são um caso particular das redes móveis ad hoc, nas quais os veículos se ligam uns aos outros de uma forma espontânea. Acrescentar aos veículos a capacidade de comunicarem uns com os outros faz surgir uma abundância de possibilidades. Contudo, atualmente já existem diversas aplicações que fazem uso destas redes; no entanto, a maioria destas aplicações estão mais diretamente relacionadas com a ccomunicação entre veículo e não entre utilizadores. Soluções como o REINVENT fornecem a capacidade de expedir mensagens através de uma VANET utilizando smartphones, contudo falta-lhe uma camada lógica capaz de suportar a expedição de mensagens de utilizador para utilizador. A nossa contribuição, o Sistema de Mensagens para Redes Veiculares (VNMS), permite a troca de mensagens entre utilizadores numa VANET. Com a implantação de um quadro de avisos virtual nos nós da VANET, com uma camada de reencaminhamento de mensagens e um naming service, fornece aos utilizadores a capacidade de trocarem mensagens entre si sem a necessidade de informação ou serviços da VANET. Os nós do VNMS atuam como agregadores de mensagens, providenciando repositórios locais de mensagens de utilizadores e reencaminhamento sobre a rede para o utilizador alvo, i.e., o nó ao qual o utilizador está ligado. Na perspetiva do utilizador, este pode usar os serviços do VNMS de uma forma transparente através de uma aplicação Android – foi criada uma aplicação de chat que usa a VANET como prova de conceito.
With concepts like the internet of things currently cropping up and getting more popular, connecting vehicles with each other was just a logical step, originating the vehicular ad-hoc networks (VANETs). VANETs are a particular case of Mobile ad-hoc networks (MANETs) in which vehicles connect with other vehicles in ad-hoc mode and evolving topologies. By enhancing vehicles with the ability to communicate with each other, an abundance of capabilities arises. However, currently most applications using VANETs are focused on the vehicle to vehicle communications, and not on vehicles users, either drivers or passengers. Previous work like REINVENT provided a solution capable of dispatching messages through VANETs using standard smartphones; however, it lacked a logical layer to support user to user logical message brokering. Our contribution, the Vehicular Network Messaging System (VNMS), allows user to user message exchange on VANET. By deploying virtual bulletin boards (VBBs) in VANETs nodes, a layer of message forwarding, and user naming service, it provides users the ability to exchange messages without the explicit need of any VANETs specific information or service. VNMS nodes act as brokers for user messages, providing local user message repositories and VANETs routing to targeted user(s) i.e. its VANET node. From the user perspective, it is possible to use VNMS services transparently using Android mobile application – we implemented a VANETs enabled chat application as proof of concept.
APA, Harvard, Vancouver, ISO, and other styles
16

Seng, I. No. "Instant messaging use among university students." Thesis, University of Macau, 2008. http://umaclib3.umac.mo/record=b1874124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Iaia, Gianluca. "analisi dei protocolli di instant messaging." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/15586/.

Full text
Abstract:
Analisi dei protocolli di instant messaging XMPP e FunXMPP, descrizione del funzionamento, architettura, estensioni e sicurezza relative a tali protocolli. Analisi sulla gestione e inizializzazione di una chiamata vocale tramite il servizio WhatsApp. Analisi delle modifiche apportate al protocollo Signal utilizzato da WhatsApp per l'implementazione della crittografia end-to-end.
APA, Harvard, Vancouver, ISO, and other styles
18

Zhang, Hongwei. "Dependable messaging in wireless sensor networks." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1155607973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Søyland, Andreas. "Instant Messaging til støtte for kunnskapsdeling." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Dashtinejad, Pejman. "Security System for Mobile Messaging Applications." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-167125.

Full text
Abstract:
Instant messaging (IM) applications are one of the most popular applications for smartphones. The IMs have the capability of sending messages or initiating voice calls via Internet which makes it almost cost free for the users to communicate with each other. Unfortunately, like any other type of applications, majority of these applications are vulnerable to malicious attacks and have privacy issues. The motivation for this thesis is the need to identifying security services of an IM application and to design a secure system for any mobile messaging application. This research proposes an E2EE (End-to-End Encryption) approach which provides a secure IM application design which protects its users with better integrity, confidentiality and privacy. To achieve this goal a research is conducted to investigate current security features of popular messaging applications in the mobile market. A list of requirements for good security is generated and based on those requirements an architecture is designed. A demo is also implemented and evaluated.
APA, Harvard, Vancouver, ISO, and other styles
21

Koumpis, Konstantinos. "Automatic voicemail summarisation for mobile messaging." Thesis, University of Sheffield, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.275017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mustonen, B. (Benjamin). "Phishing in email and instant messaging." Bachelor's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201905181856.

Full text
Abstract:
Abstract. Phishing is a constantly evolving threat in the world of information security that affects everyone, no matter if you’re a retail worker or the head of IT in a large organisation. Because of this, this thesis aims to give the reader a good overview of what phishing is, and due to its prevalence in email and instant messaging, focuses on educating the reader on common signs and techniques used in phishing in the aforementioned forms of communication. The chosen research method is literature review, as it is the ideal choice for presenting an overview of a larger subject. As a result of the research, many common phishing signs and techniques in both email and instant messaging are presented. Some of these signs include strange senders, fake domain names and spellings mistakes. With this thesis, anyone looking to improve their understanding about phishing can do so in a way that is easy to understand. Some suggestions for future research are also presented based on this thesis’ shortcomings, namely the lack of studies on phishing in instant messaging.
APA, Harvard, Vancouver, ISO, and other styles
23

Tyagi, Nirvan. "A distributed metadata-private messaging system." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106446.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 61-63).
Private communication over the Internet continues to be a difficult problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are communicating. Scalable systems such as Tor are susceptible to traffic analysis. In contrast, the largest-scale systems with metadata privacy require passing all messages through a single server, which places a hard cap on their scalability. This paper presents Stadium, the first system to protect both messages and metadata while being able to scale its work efficiently across multiple servers. Stadium uses the same differential privacy definition for metadata privacy as Vuvuzela, the currently highest-scale system. However, providing privacy in Stadium is significantly more challenging because distributing users' traffic across servers creates more opportunities for adversaries to observe it. To solve this challenge, Stadium uses a novel verifiable mixnet design. We use a verifiable shuffle scheme that we extend to allow for efficient group verification, and present a verifiable distribution primitive to check message transfers across servers. We show that Stadium can scale to use hundreds of servers, support an order of magnitude more users than Vuvuzela, and cut the costs of operating each server.
by Nirvan Tyagi.
M. Eng.
APA, Harvard, Vancouver, ISO, and other styles
24

Nagaraj, Pratheek (Pratheek B. ). "Multi-party and distributed private messaging." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/105971.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 53-56).
In this thesis, I extend private messaging systems by designing multi-party private messaging models and contribute to the implementation of a distributed private messaging system. Private communication is of increasing interest yet current state-of-the- art adopted solutions are inadequate in providing both scale and privacy. Most current communication methods leak metadata or are susceptible to traffic analysis in spite of end-to-end encryption. Vuvuzela is a foundational private messaging system helps reconcile these two concerns. This project builds on Vuvuzela by introducing three group messaging models. These models tradeoff support for multi-party messaging with network bandwidth and latency. Additionally, this work describes the implementation and evaluation of key aspects of a distributed private messaging system, Stadium. This new system scales to more users while keeping server costs down to promote the adoption of private messaging as a more feasible practice. Keywords. Privacy, Deniability, Messaging, Multi-party, Distributed Systems.
by Pratheek Nagaraj.
M. Eng.
APA, Harvard, Vancouver, ISO, and other styles
25

Tulane, Sarah S. "Social Implications of Adolescent Text Messaging." DigitalCommons@USU, 2012. https://digitalcommons.usu.edu/etd/4619.

Full text
Abstract:
The purpose of this study was to pursue an understanding of social impacts of text messaging on adolescents. Mixed methodologies were used to gain an understanding of the social impacts of text messaging for adolescents. A sample (N = 218) of high school students was used to examine texting behaviors and practices, face-to-face communication preferences, and adolescent opinions about the use of text messaging in common social situations. Texting behaviors and perceptions were related. Adolescents indicated they pretend to text in social situations for various reasons. For some, texting was an avoidance technique of self and others, others pretended to text to maintain a positive appearance in social situations, and for others pretending to text provided a sense of security. Hierarchical multiple regression was used to examine face-to-face communication in relation to texting behaviors and texting perceptions. Overall, texting behaviors and texting perceptions contributed to face-to-face communication. Finally, adolescents explained their perceptions of adult misconceptions of adolescent text messaging. They felt that adults have misconceptions about motivations and practices associated with text messaging, misconceptions concerning message content, and misconceptions about developmental impacts. There were also some participants who felt adults have accurate perceptions of adolescent texting.
APA, Harvard, Vancouver, ISO, and other styles
26

Celly, Bhrigu. "Wireless messaging and project management system." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2215.

Full text
Abstract:
Wireless is an important part of the future and utilizing the wireless technology in project management is a great tool. This project is a messaging system designed using WAP and Java Server pages, as both of them are the technologies of the future. The project puts together a tool to help in project management made with the use of Java Server Pages and MySQL as the backend database. It uses Wireless Markup Language as the basic language for the cellular phones and the hand held wireless devices. The prototype has been modeled on project planning for power plants done by Asea Brown Boveri, Ltd.
APA, Harvard, Vancouver, ISO, and other styles
27

Armold, Adrian D. "XML tactical chat (XTC) extensible messaging and presence protocol for command and control applications." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FArmold.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Don Brutzman, Don McGregor. "September 2006." Includes bibliographical references. Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
28

Scholtz, Katharina. "Towards understanding mobile messaging ecologies : an exploration of the meanings young people attach to instant messaging channels." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/13985.

Full text
Abstract:
Mobile communications have added an ever present layer to our personal communication through which social dynamics can be reconstructed. In youth culture specifically, instant messaging allows young people to achieve limited autonomy, explore peer groups and an evolving sense of self. This dissertation explores a model for understanding how instant messaging facilitates this. Theories of media ecologies provide useful ways of explaining media environments. Nonetheless ecologies are usually conceptualised in relation to mass media rather than networked media and tend to assume that ecologies are situated in a particular physical space. The theory is nonetheless useful in understanding the everyday experience of young people using media. By extending media ecology theory to account for the personal communicative ecologies of instant messaging, this study extends the notion of ecology to account for a sense of digital social space outside the constructs of physical space. Through taking an interactional epistemological stance, qualitative research was conducted. Two focus groups were conducted to explore how instant messaging channels meet the needs of a group of young people from middle class contexts in Cape Town. The resultant discussions are applied to the framework of a 'layered' communicative ecology, taking technology, social and discursive layers into account and establishing the centrality of social space within a new and expanded model of networked messaging ecologies. The central aim of this research is to explore how relevant the application of media ecologies would be to an exploration of digital spaces of communication and practice.
APA, Harvard, Vancouver, ISO, and other styles
29

Borgström, Kristofer. "Multimedia Messaging Service Components for Web 2.0." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91878.

Full text
Abstract:
The purpose of this master’s thesis is to simplify the exchange (in both directions) of multimedia content between mobile phones and network attached web servers. The solution proposed in this report specifically concerns displaying Multimedia Messaging Service (MMS) messages via a web browser connected to a network-attached web server and graphically authoring MMS messages via a web interface. This thesis project is important because it brings multimedia content, in the form of MMS messages, from isolation in the telecommunication world closer to wide availability via the Internet. This transition is very important as the Internet is where media is shared with the world today. This approach brings added value to end users who want to share content generated using their phone on a web site. It also provides added value to operators who want to increase the amount of MMS traffic in their networks. The solution is non-trivial because there are a number of complexities at both ends. This is because the MMS messages that are authored at mobile phones differ between both handset models and manufacturers. Moreover, the format used for MMS (MMS SMIL) is not widely used on the Internet, thus a transformation to an Internet browser supported format must be performed. The thesis examines to what extent this transformation can be completely automatic and how MMS messages can be authored through a web interface. The results show that MMS messages can be successfully transformed to HTML and embedded directly in web pages, thus providing a seamless experience for viewing MMS messages. Depending on the content of the MMS message in question, the current browser and which media player plug-ins are available, the generated HTML will be displayed differently. The results also show that MMS messages can be composed in real time* through a web interface with good results.
Syftet med detta examensarbete är att förenkla utbyte (i båda riktningarna) av multimedia mellan mobiltelefoner och nätverksuppkopplade webbservrar. Lösningen som föreslås i denna rapport behandlar specifikt hur Multimedia Messaging Service (MMS)-meddelanden kan visas i en webbläsare via nätverksuppkopplade webbservrar och hur MMS-meddelanden kan komponeras grafiskt via ett webbinterface. Detta examensarbete är viktigt eftersom det för multimedia, i form av MMS-meddelanden, från isolering i telekommunikationsvärlden närmare en bred tillgänglighet via Internet. Denna övergång är viktig eftersom det är på Internet som multimedia görs tillgängligt för världen i dagens läge. Denna approach förbättrar upplevelsen för användare som vill dela med sig av innehåll genom sin telefon genom en hemsida. Den ökar också möjligheterna för mobiloperatörer att öka MMS-trafiken i sina nätverk. Lösningen är inte trivial eftersom det existerar ett antal komplexiteter i båda ändarna. Detta beror på att MMS-meddelanden som skapas i mobiltelefoner skiljer sig åt mellan såväl tillverkare som modeller. Dessutom används inte MMS-formatet (MMS SMIL) på Internet. Således måste en transformering till ett format som stöds av webbläsare genomföras. Detta examensarbete undersöker i vilken utsträckning denna transformering kan automatiseras helt och även hur MMS-meddelanden kan skapas via ett webbinterface. Resultaten visar att MMS-meddelanden framgångsrikt kan transformeras till HTML och bäddas in på en hemsida på ett sådant sätt att de upplevs som en del av hemsidan. Beroende på vilken typ av media som MMS-meddelandet innehåller, den aktuella webbläsarkonfigurationen och på vilka mediaspelar-plug-ins som finns tillgängliga, måste olika HTML genereras för att innehållet ska visas på ett bra sätt. Resultaten visar också att MMS-meddelanden kan skapas grafiskt, i realtid, direkt genom ett webbinterface med goda resultat.
APA, Harvard, Vancouver, ISO, and other styles
30

Gentner, Susan Gayle. "A Browser-Based Collaborative Multimedia Messaging System." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/63.

Full text
Abstract:
Making a communication tool easier for people to operate can have profound and positive effects on its popularity and on the users themselves. This thesis is about making it easier for people to publish web-based documents that have sound, video and text. Readily available software and hardware are employed in an attempt to achieve the goal of providing a software service that enables users to compose audio-video documents with text.
APA, Harvard, Vancouver, ISO, and other styles
31

Tapp, Thomas L. "Soft decision decoders for mobile messaging systems." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/13416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Rathod, Ashish. "A messaging system to handle semantic dissonance /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/3335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wu, Chengyi. "Realtime routing and messaging in wireless networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ64066.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yale, Robert Nathan. "INSTANT MESSAGING COMMUNICATION: A QUANTITATIVE LINGUISTIC ANALYSIS." Oxford, Ohio : Miami University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=miami1183663224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Burwell, Alan C. "Global Positioning System disaster notification messaging service." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37592.

Full text
Abstract:
Approved for public release; distribution is unlimited
The United States has offered free worldwide position, navigation, and timing (PNT) broadcast data through the Global Positioning System (GPS) since its 1993 initial operations capable declaration, and periodic modernization efforts have been made throughout its 20-year history. A planned modernized L5 safety of life GPS signal, combined with the current GPS-enabled device ubiquity, offers an unprecedented opportunity to embed and broadcast other non-PNT information into GPS signals and reach individuals on a global scale with information in new ways. Adequate additional bandwidth exists in the new L5 safety of life signal to embed notification information for worldwide natural and technological disasters and add a new communication medium for a possible global disaster notification system. This thesis explores the background, requirements, system design and U.S. policy of a disaster-notification enabled GPS L5 safety of life signal.
APA, Harvard, Vancouver, ISO, and other styles
36

Rivera-Cintron, Carlos A. "Wireless instant voice messaging using the Internet." [Florida] : State University System of Florida, 2000. http://etd.fcla.edu/etd/uf/2000/amt2429/thesisBook%5F4%5F26.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2000.
Title from first page of PDF file. Document formatted into pages; contains viii, 262 p.; also contains graphics. Vita. Includes bibliographical references (p. 259-261).
APA, Harvard, Vancouver, ISO, and other styles
37

Davrin, Felix, and Karolin Valaszkai. "Feedback-funktionalitet i instant messaging: en designstudie." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229988.

Full text
Abstract:
Studien undersöker Facebooks instant messaging-applikation Messenger med syfte att lokalisera de komponenter som skapar friktion i kommunikationsflödet mellan sändare och mottagare för att i sin tur undersöka hur dessa kan reduceras för att optimera gränssnittets samtliga funktionaliteter. Tidigare forskning visar att feedback-funktioner som berättar för användaren när meddelanden är lästa och när andra användare är aktiva skapar ett så kallat “social pressure” som gör att mottagaren känner sig pressad till att svara och sändaren är angelägen om att få svar. Tidigare forskning undersöker “lösningar” på detta problem med nya, relativt avancerade funktioner som en utveckling av de redan befintliga feedback-funktionerna. Dessutom visar tidigare studier på att UX-design och användarupplevelsen är viktig för att behålla användare. Vi vill därför med denna studie undersöka hur själva utformningen av applikationen kan minimera de problem som upplevs hos den nuvarande versionen av Messenger, vilket vi anser har saknats i tidigare studier om instant-messaging. Metoden bestod av en enkätundersökning och en fokusgrupp samtliga med regelbundna Messenger-användare. Efter att ha undersökt applikationens gränssnitt ur ett användarperspektiv kom vi fram till ett designförslag som vi lät deltagarna utvärdera under fokusgruppen, tillsammans med andra generella frågor och diskussioner om upplevelsen och applikationens utformning. Resultatet visar på ett antal pain points som identifierades hos användarna. Sedan skapades en low fidelity-prototyp som försöker minimera dessa pain points, bl.a. med en ny flik för ohanterade meddelanden. Prototypen utvärderades av ett antal deltagare där slutsatsen var att denna version var uppskattad.
This study looks into Facebook’s instant messaging-application Messenger with the aim to localize the components causing friction in the communication between sender and receiver, to furthermore investigate how these problems can be reduced and therefore optimize the communication-functionalities of the user interface. Previous studies have shown that the feedback-functions notifying the user when messages have been read and when other users are active create a so-called social pressure, causing the receiver to feel pressured into replying and the sender to feel anxious waiting for a reply. Previous studies examine “solutions” to this problem by introducing new and relatively advanced features as an expansion of the already existing feedback-functions. In addition, previous studies have shown that UX-design and user experience is important to keep users attracted to the application. Therefore, we want to examine how the UX-design of the application can minimize the problems identified by users of the existing version of Messenger, which we believe has been unaccounted for in previous studies regarding instant messaging. Our method consists of a small survey together with a focus group conducted with a small number of media technology-students who are regular users of the Messenger application. After looking at the UX-design of the interface we developed a design proposal which the participants were asked to evaluate during the focus group, together with other general questions and discussion topics about the user experience and the interface of the application. This resulted in three main pain points that were identified by the participants. After this, a low fidelity wireframe was created that aims to minimize these pain points. One of the changes is a new tab for unresolved conversations. The prototype was evaluated by a few participants with the conclusion that the new version was appreciated.
APA, Harvard, Vancouver, ISO, and other styles
38

Lazar, David Ph D. Massachusetts Institute of Technology. "Vuvuzela : scalable private messaging that hides metadata." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103748.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 57-60).
Private messaging over the Internet has proven challenging to implement, because even if message data is encrypted, it is difficult to hide metadata about who is communicating in the face of traffic analysis. Systems that offer strong privacy guarantees, such as Dissent [39], scale to only several thousand clients, because they use techniques with superlinear cost in the number of clients (e.g., each client broadcasts their message to all other clients). On the other hand, scalable systems, such as Tor, do not protect against traffic analysis, making them ineffective in an era of pervasive network monitoring. Vuvuzela is a new scalable messaging system that offers strong privacy guarantees, hiding both message data and metadata. Vuvuzela is secure against adversaries that observe and tamper with all network traffic, and that control all nodes except for one server. Vuvuzela's key insight is to minimize the number of variables observable by an attacker, and to use differential privacy techniques to add noise to all observable variables in a way that provably hides information about which users are communicating. Vuvuzela has a linear cost in the number of clients, and experiments show that it can achieve a throughput of 68,000 messages per second for 1 million users with a 37-second end-to-end latency on commodity servers.
by David Lazar.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
39

Hu, Xuanyi. "Designing Emotional Connections In Instant Messaging Tools." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1522342539008247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Stieglitz, Stefan, Christoph Fuchß, Oliver Hillmann, and Christoph Lattemann. "Mobile learning by using ad hoc messaging network." Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2008/1996/.

Full text
Abstract:
The requirements of modern e-learning techniques change. Aspects such as community interaction, flexibility, pervasive learning and increasing mobility in communication habits become more important. To meet these challenges e-learning platforms must provide support on mobile learning. Most approaches try to adopt centralised and static e-learning mechanisms to mobile devices. However, often technically it is not possible for all kinds of devices to be connected to a central server. Therefore we introduce an application of a mobile e-learning network which operates totally decentralised with the help of an underlying ad hoc network architecture. Furthermore the concept of ad hoc messaging network (AMNET) is used as basis system architecture for our approach to implement a platform for pervasive mobile e-learning.
APA, Harvard, Vancouver, ISO, and other styles
41

Stieglitz, Stefan, Christoph Fuchß, and Christoph Lattemann. "Mobile learning by using ad hoc messaging network." Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2008/1997/.

Full text
Abstract:
The requirements of modern e-learning techniques change. Aspects such as community interaction, flexibility, pervasive learning and increasing mobility in communication habits become more important. To meet thesechallenges e-learning platforms must provide support on mobile learning. Most approaches try to adopt centralized and static elearning mechanisms to mobile devices. However, often technically it is not possible for all kinds of devices to be connected to a central server. Therefore we introduce an application of a mobile e-learning network which operates totally decentralized with the help of an underlying ad hoc network architecture. Furthermore the concept of ad hoc messaging network (AMNET) is used as basis system architecture for our approach to implement a platform for pervasive mobile elearning.
APA, Harvard, Vancouver, ISO, and other styles
42

Adesemowo, A. Kayode. "Affective gesture fast-track feedback instant messaging (AGFIM)." Thesis, University of Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&amp.

Full text
Abstract:
Text communication is often perceived as lacking some components of communication that are essential in sustaining interaction or conversation. This interaction incoherency tends to make text communication plastic. It is traditionally devoid of intonation, pitch, gesture, facial expression and visual or auditory cues. Nevertheless, Instant Messaging (IM), a form of text communication is on the upward uptake both on PCs and on mobile handhelds. There is a need to rubberise this plastic text messaging to improve co-presence for text communications thereby improving synchronous textual discussion, especially on handheld devices.

One element of interaction is gesture, seen as a natural way of conversing. Attaining some level of interaction naturalism requires improving synchronous communication spontaneity, partly achieved by enhancing input mechanisms. To enhance input mechanisms for interactive text-based chat on mobile devices, there is a need to facilitate gesture input. Enhancement is achievable in a number of ways, such as input mechanism redesigning and input offering adaptation. This thesis explores affective gesture mode on interface redesign as an input offering adaptation. This is done without a major physical reconstruction of handheld devices.

This thesis presents a text only IM system built on Session Initiation Protocol (SIP) and SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE). It was developed with a novel user-defined hotkey implemented as a one-click context menu to &ldquo
fast-track&rdquo
text-gestures and emoticons.

A hybrid quantitative and qualitative approach was taken to enable data triangulation. Results from experimental trials show that an Affective Gesture (AG) approach improved IM chat spontaneity/response. Feedback from the user trials affirms that AG hotkey improves chat responsiveness, thus enhancing chat spontaneity.
APA, Harvard, Vancouver, ISO, and other styles
43

Eidlert, Fredrik. "Messaging and positioning in a dynamic TETRA environment." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91498.

Full text
Abstract:
Advanced communication with capabilities such as voice, data, and messaging usually requires an infrastructure with base stations, servers, and etcetera. The TETRA technology offers such communication not only in TMO (infrastructure-based network) but also in DMO where all nodes communicate directly (or via a repeater) with each other. This master’s thesis concerns messaging (specifically short messages) in a dynamic multi link TETRA DMO network. It examines what type of messaging technique to use and how to do path selection. The messages will be clear text, status, and GPS location information. The solution is implemented as a part of the ISIS software (which is developed by Know IT Dataunit). The planned multi link-part of the thesis could not be tested, so there is no implementation or evaluation of this. The evaluation of the implementation concerning sending and reception of messages shows that the proposed solution fulfils the demands for this kind of product. During a four day long test, messages (short text messages and positioning messages) were sent and received while a normal number of voice conversations took place, without packet loss.
Avancerad kommunikation med funktioner såsom röstsamtal, dataöverföring samt meddelandetjänster kräver ofta en infrastruktur med basstationer, servrar etcetera. TETRA-tekniken erbjuder sådan kommunikation, inte bara i TMO (infrastrukturbaserade nätverk), utan även i DMO där alla noder kommunicerar direkt (eller via en repeater) med varandra. Detta examensarbete undersöker hanteringen av meddelanden (framförallt korta meddelanden) i ett dynamiskt multilänkat TETRA nätverk. Det som behandlas är vilken typ av meddelande som bör användas samt hur man väljer väg. De meddelanden som hanteras är klartextmeddelanden, status samt GPS positionsmeddelanden. Den lösning som tagits fram är implementerad som en del i ISIS programvaran (som är utvecklad av Know IT Dataunit). Multilänkdelen kunde inte testas, därför gjordes aldrig någon implementering eller utvärdering. Utvärderingen av implementeringen som hanterar sändning och mottagning av meddelanden visar att den föreslagna lösningen uppfyller de krav man kan ställa på en sådan produkt. Under ett fyra dagar långt test skickades meddelanden (korta textmeddelanden samt positioneringsmeddelanden) medan ett normalt antal röstsamtal pågick, utan någon förlust av paket.
APA, Harvard, Vancouver, ISO, and other styles
44

McVaugh, Nathan Kant. "The Effect of Instant Messaging on Lecture Retention." Thesis, The University of Texas at Austin, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3572872.

Full text
Abstract:

The impact of instant message interruptions via computer on immediate lecture retention for college students was examined. While watching a 24–minute video of a classroom lecture, students received various numbers of related–to–lecture (“Is consistent use of the eye contact method necessary for success?”) versus not–related–to lecture (“Have you ever missed class because you couldn't find parking?”) instant messages in addition to note taking vs. no note taking. Student self–rating for multitasking ability, typical and maximum instant messaging activity, and classroom computer use were also measured. Contrary to cognitive models of information processing that suggest instant messages will disrupt student retention of lecture information, no effects were found for number of interruptions, presence or absence of notes, or relatedness of interruption on lecture retention. Students’ multitasking self–rating was negatively related to lecture retention. The implications of these results for classroom practice and future research are explored.

APA, Harvard, Vancouver, ISO, and other styles
45

Rettaroli, Andrea. "Applicazione di Secure Dynamic Messaging a dispositivi RFID." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21841/.

Full text
Abstract:
In Applicazione di Secure Dynamic Messaging a dispositivi RFID si parla delle tecniche che vengono utilizzate per rendere i Tag, in particolare il NTAG 424 DNA Tag Tamper (NT4H2421Tx), interoperabili e sicuri all'interno di sistemi complessi.
APA, Harvard, Vancouver, ISO, and other styles
46

Blank, Mikael, Jenny Johansson, and Sandra Olsson. "Attityd till användandet av Instant Messaging på företag." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Thomas, Jamar. "Asynchronous instant messaging using service-oriented architectures (aimsoa)." DigitalCommons@Robert W. Woodruff Library, Atlanta University Center, 2005. http://digitalcommons.auctr.edu/dissertations/1251.

Full text
Abstract:
Instant messengers suffer from poor scalability, flexibility, security, and interoperability. This study attempts to solve these problems using the strengths of Service-Oriented Architectures. The key components to achieve these improvements include several Java related technologies such as JAX-RPC, JAXM, SOAP, WSDL, J2EE servlets and Enterprise Java Beans. SOAP provides a universal messaging protocol that heterogeneous parties can understand. JAX-RPC provides synchronous SOAP messaging, as well as a loosely coupled design that allows for a very flexible distributed architecture. JAXM provides asynchronous SOAP messaging. When used together, applications can implement robust instant messaging functionality. Registration, login, and other instant messaging configuration operations can be fulfilled through the use of JAX-RPC while JAXM can be used to fulfill requirements such as send and receive. Servlets and Enterprise Java Beans augment the benefits of Service-Oriented Architectures with the former being extremely scalable, portable, and modular. AIMSOA encapsulates these components to provide an instant messaging architecture solution that will augment the weaknesses of current instant messaging architectures by providing a solution for better scalability, flexibility, and interoperability.
APA, Harvard, Vancouver, ISO, and other styles
48

Abdi, Kelishami Alireza. "Secure Privacy-Friendly Instant Messaging (IM) for Guidepal." Thesis, KTH, Kommunikationsnät, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-160271.

Full text
Abstract:
It is fascinating, and yet often neglected, that a user’s privacy can be invaded notonly by the absence of security measures and mechanisms, but also by improperor inadequate usage of security services and mechanisms. When designingsecure systems, we must consider what services are needed and what is not.The work in this thesis revolves around privacy-friendly instant messaging (IM)systems. In such a system, an inadequate usage of security measures leads tohaving IM servers being able to intercept or gather users’ private conversations.An improper usage of security measures could bring about non-repudiationwhich is desirable when signing contracts, but unwelcome in IM and privateconversations.We will look into requirements of the desired IM system, study the currentstate-of-the-art solutions, deploy an IM server, and briefly extend an existingmodern privacy-friendly IM protocol and an open source mobile application tomeet our security and privacy requirements. This extended IM application iscalled Guidepal-IM and is available as open source1The thesis work is introduced and carried out at Guidepal, a startup companyin Stockholm. It is therefore supervised partly at Guidepal and partly at KTH.Since Guidepal is also looking into possibilities of integrating an IM featureto its current social media apps, our contribution would also briefly extend tostudying the limitations and recommendations for Guidepal’s social media appto help user privacy preservation.
APA, Harvard, Vancouver, ISO, and other styles
49

Tagg, Caroline. "A corpus linguistics study of SMS text messaging." Thesis, University of Birmingham, 2009. http://etheses.bham.ac.uk//id/eprint/253/.

Full text
Abstract:
This thesis reports a study using a corpus of text messages in English (CorTxt) to explore linguistic features which define texting as a language variety. It focuses on how the language of texting, Txt, is shaped by texters actively fulfilling interpersonal goals. The thesis starts with an overview of the literature on texting, which indicates the need for thorough linguistic investigation of Txt based on a large dataset. It then places texting within the tradition of research into the speech-writing continuum, which highlights limitations of focusing on mode at the expense of other user-variables. The thesis also argues the need for inductive investigation alongside the quantitative corpus-based frameworks that dominate the field. A number of studies are then reported which explore the unconventional nature of Txt. Firstly, drawing on the argument that respelling constitutes a meaning-making resource, spelling variants are retrieved using word-frequency lists and categorised according to form and function. Secondly, identification of everyday creativity in CorTxt challenges studies focusing solely on spelling as a creative resource, and suggests that creativity plays an important role in texting because of, rather than despite, physical constraints. Thirdly, word frequency analysis suggests that the distinct order of the most frequent words in CorTxt can be explained with reference to the frequent phrases in which they occur. Finally, application of a spoken grammar model reveals similarities and differences between spoken and texted interaction. The distinct strands of investigation highlight, on the one hand, the extent to which texting differs from speech and, on the other, the role of user agency, awareness and choice in shaping Txt. The argument is made that this can be explained through performativity and, in particular, the observation that texters perform brevity, speech-like informality and group deviance in construing identities through Txt.
APA, Harvard, Vancouver, ISO, and other styles
50

Kuo, Justin H. (Justin Hans) 1980. "An XML messaging protocol for multimodal galaxy applications." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography