Dissertations / Theses on the topic 'ARM protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'ARM protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jonsson, Fredrik. "Arm-P : Almost Reliable Multicast protocol." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-14954.
Full textDistribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource.
Many applications distribute the same information to multiple receivers, but in many cases the same information is sent to a single receiver at a time, thus multiple copies of the same information is sent, thus consuming bandwidth.
What if the information could be broadcasted to all the clients at the same time, similar to a television broadcast. TCP/IP provides some means to do that. For example UDP supports broadcasting; the problem faced when using UDP is that it’s not reliable. There is no guarantee that the information actually reaches the clients.
This Bachelor thesis in Computer Science aims to investigate the problems and solutions of how to achieve reliable distribution of fixed size data sets using a non reliable multicast communication channel, like UDP, in a LAN environment.
The thesis defines a protocol (Almost Reliable Multicast Protocol – Arm-P) that provides maximum scalability for delivery of versioned data sets that are designed to work in a LAN-environment. A proof-of-concept application is implemented for testing purposes.
Engstrand, Johan. "A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation." Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.
Full textŠpanihel, Pavol. "Zabezpečovací modul pro reklamní robot FEKT VUT v Brně." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219649.
Full textZemánek, Petr. "Modulární RGB LED displej s rozhraním Ethernet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220700.
Full textKrůpa, Tomáš. "Univerzální zavaděč pro mikrokontrolér Kinetis K60." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255480.
Full textPérez, María del Carmen Marín. "Benchmarking and applications of a computational photobiology tool for design of novel and highly fluorescent rhodopsin proteins." Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1070289.
Full textNovotný, Jan. "Zpracování signálu UHF RFID čtečky." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221225.
Full textSabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Full textThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Prítel, Pavol. "Implementace protokolu EtherCAT pro procesor ARM." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240937.
Full textSanti, Juliana de 1982. "Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008
Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High Speed TCP (HSTCP), uma variante do TCP para redes com PBA elevado, emprega ajustes mais agressivos permitindo, assim, que a utilização da banda seja escalável. As políticas de Gerenciamento Ativo de Filas ou Active Queue Management (AQM), monitoram o nível de ocupação das filas nos roteadores e notificam o congestionamento incipiente aos emissores TCP através do descarte/marcação de pacotes. O sistema de controle de congestionamento apresenta natureza de retroalimentação, na qual a taxa de transmissão dos nós fontes é ajustada em função do nível de ocupação da fila. Os controladores AQM determinam a probabilidade de descarte/marcação para maximizar a vazão e minimizar perdas, garantindo, assim, a estabilidade do tamanho da fila independentemente das variações das condições da rede. Neste trabalho, define-se a política de gerenciamento ativo de filas HSTCP-H2 para redes com PBA elevado que utilizam o protocolo HSTCP. Para a derivação de HSTCPH2: são utilizadas técnicas de Teoria de Controle Ótimo. A principal característica desta política é considerar o atraso do sistema o que permite melhor utilização dos recursos disponíveis. A estabilidade e os objetivos de desempenho do sistema são expressos e solucionados através de Desigualdades Matriciais Lineares, permitindo que os parâmetros do controlador possam ser calculados através da solução de um problema convexo simples. Diferentes controladores foram derivados considerando-se diferentes objetivos de desempenho, os quais consideram as características de redes com produto banda-atraso elevado. Através de simulações, os desempenhos dos controladores derivados são avaliados e a eficácia do controlador que apresentou o melhor desempenho foi comparado com o desempenho da política de AQM RED. São considerados cenários com enlace gargalo único e com múltiplos gargalos.
Abstract: The efficient utilization of bandwidth in high speed and large delay networks, called high bandwidth-delay product networks (BDP), has become a major challenge. This is due to adjustments of the Transmission Control Protocol (TCP). The High Speed TCP HSTCP): a TCP variant to high BDP networks, employs more aggressive adjustments, allowing scalable bandwidth utilization. The Active Queue Management (AQM) policies monitor the queue length in the routers and notify incipient congestion to TCP source by marking or dropping packets. The congestion control system presents intrinsic feedback nature, where the transmission rates of the sources are adjusted according to the level of congestion inferred by the queue occupancy. The AQM controllers determine the dropping marking probability values to maximize throughput and minimize losses, giving guarantees to stabilize the queue length independent of network conditions. In this work, it is defined HSTCP-H2, an active queue management policy to high BDP networks, which adopt the HSTCP as their transport protocol. Optimal control theory is used to conceive HSTCP-H2. The novelty of the proposed approach lies in consider the delay of the system which allows better use of available resources. Furthermore, in the proposed approach, stability and performance objectives are completely expressed as Linear Matrix Inequalities (LMIs), thus requiring the solution of a single convex problem for the computation of the controller parameters. Different controllers are derived considering different design goals, which take into account the characteristics of the high bandwidth-delay product networks. The performance produced by different optimal controllers was investigated. The efficacy of the controller with the best performance was then compared to the performance of RED policy. The simulation experiments were carried out using topologies with single and multiple bottleneck.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
Skopal, Miroslav. "Univerzální hardwarová platforma podporující operační systém Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218709.
Full textTalkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.
Full textCyr, Geneviève. "Interface configurable pour un processeur ARM basée sur le protocole VCI." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ65560.pdf.
Full textWickramarathna, Thamali Dilusha N. "Modeling and Performance Evaluation of a Delay and Marking Based Congestion Controller." Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_theses/101.
Full textKamran, Mudassar. "Applications of novel imaging protocols and devices in interventional neuroradiology." Thesis, University of Oxford, 2015. http://ora.ox.ac.uk/objects/uuid:ccb2550c-cb28-42f1-bd95-4dcee4ec1ff4.
Full textPEDRAZA, GONZÁLEZ LAURA MILENA. "Blueprinting, implementation, and application of fully automatic protocols for the QM/MM modeling of photo-excited states of rhodopsin variants." Doctoral thesis, Università di Siena, 2021. http://hdl.handle.net/11365/1141640.
Full textHuzioka, Daniel Tetsuo. "Um protocolo ALM baseado em desigualdade triangular para distribuição de conteúdo." reponame:Repositório Institucional da UFPR, 2010. http://hdl.handle.net/1884/24864.
Full textSmith, Sarah C. "Evaluating a Stepped Care Protocol for Postpartum Depression in a Pediatric Primary Care Clinic." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etd/3277.
Full textPfeffer, Mary Graves. "Venture Capital Investment and Protocol Analysis." Thesis, North Texas State University, 1987. https://digital.library.unt.edu/ark:/67531/metadc331014/.
Full textKellams, Ann, Cadey Harrel, Stephanie Omage, Carrie Gregory, and Casey Rosen-Carole. "ABM Clinical Protocol #3: Supplementary Feedings in the Healthy Term Breastfed Neonate, Revised 2017." MARY ANN LIEBERT, INC, 2017. http://hdl.handle.net/10150/626017.
Full textOberdan, Thomas. "Protocols, truth and convention." Amsterdam ; Atlanta, GA : Rodopi, 1993. http://catalogue.bnf.fr/ark:/12148/cb35609110v.
Full textChung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.
Full textKeywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
Negré, Walkmar Silva. "Proposta de protocolos de segurança para a prevenção, a contenção e a neutralização de agente agressor bioativo em incidentes bioterroristas e estudo por docking molecular do fator letal do Bacillus anthracis (Antraz)." Universidade Federal de São Carlos, 2010. https://repositorio.ufscar.br/handle/ufscar/6983.
Full textFor centuries, infectious agents have been used as weapons in armed conflicts. In 1972 the Biological Weapons Convention prohibited the creation and stockpiling of biological weapons. However, some countries continued to research and develop these weapons. Proof of this fact was the crash in 1979 in a military factory in the USSR, where Bacillus anthracis were dispersed. Biotechnology in a globalizing world facilitates and contributes not only to the development of weapons programs of regular armies, but also to terrorist groups. Examples of such this are the contamination by the bacterium Salmonella typhimurium by a religious fanatic group that in 1984 poisoned 751 people in the U.S., and the bacterium Bacillus anthracis spores mailed in the U.S. to several people during 2001 and 2002, immediately after the attacks of September 11th. A biological weapon is of extreme difficult detection by security equipment. Most infectious agents are present in almost every continent, making it easier to obtain. The production is cheap and it is easy to carry, being a small amount enough to reach very large area and thousands of people. It is an invisible weapon, odorless and causes symptoms unknown to most physicians. So, given this background, in this master thesis we attempt to demonstrate the reality of the threat of a biological weapon based on Anthrax as the biological agent used as a weapon of mass destruction. Based on this study, we show the fragility of the state system for dealing with such incidents, and we propose security protocols in order to regulate what should be done in time of crisis, defining its management and streamline the decision-making. Finally, using the technique of molecular docking, we also studied the lethal factor of anthrax, and proposed the compound 1-Phenylsulfonyl-2-propanone (DARXOJ, C9H10O3S) as a good candidate to inhibit its effects.
Há séculos agentes infecciosos são utilizados como armas em conflitos bélicos. Em 1972 a Convenção sobre Armas Biológicas proibiu a criação e armazenamento de armas biológicas. No entanto alguns países continuaram a pesquisa e o desenvolvimento dessas armas. Prova desse fato foi o acidente em 1979 em uma fábrica militar na URSS, onde foram dispersos esporos de Bacillus anthracis. A Biotecnologia no mundo globalizado facilita e contribui não apenas aos programas de desenvolvimento de armas dos exércitos regulares, mas também aos grupos terroristas. Exemplos disso são a intoxicação pela bactéria Salmonella typhimurium por um grupo fanático religioso que em 1984, nos EUA, intoxicou 751 pessoas, e os esporos da bactéria Bacillus anthracis enviados pelo correio para várias pessoas em 2001 e 2002, imediatamente após os atentados de 11 de setembro nos EUA. Uma arma biológica é muito difícil de ser detectada por equipamento de segurança. A maioria dos agentes infecciosos está presente em quase todos os continentes, o que facilita a sua obtenção. A produção é barata e simples de transportar, podendo atingir com pequena quantidade área muito grande e milhares de pessoas. É uma arma invisível, inodora e que provoca sintomas desconhecidos pela maioria dos médicos. Em face desse panorama, neste trabalho procuramos demonstrar a realidade da ameaça de uma arma biológica e elegemos o Antraz como agente biológico utilizado como arma de destruição em massa. Neste estudo, mostramos a fragilidade do sistema estatal para lidar com este tipo de incidente, e propomos protocolos de segurança com o objetivo de regular os procedimentos no momento de crise, definindo o gerenciamento para melhorar e otimizar as tomadas de decisões. Finalmente, por meio do uso da técnica de docking molecular, também estudamos o fator letal do Antraz, e propusemos o composto 1-Fenilsulfonil-2-propanona (DARXOJ, C9H10O3S) como um bom candidato a inibir os seus efeitos.
Castro, Bianca Portes de. "PALMS+: protocolo ALM baseado em desigualdade triangular para distribuição de streaming de vídeo." Universidade Federal de Juiz de Fora (UFJF), 2014. https://repositorio.ufjf.br/jspui/handle/ufjf/4831.
Full textApproved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2017-06-07T11:04:29Z (GMT) No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5)
Made available in DSpace on 2017-06-07T11:04:29Z (GMT). No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5) Previous issue date: 2014-08-25
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Aplicações multimídia são muito populares na internet. Grande parte delas necessita de multicast para escalar. É sabido que multicast em nível de redes não foi implementado como desejado. Protocolos em nível de aplicação são a solução atual. Apesar do sucesso dos protocolos ALM (Application Layer Multicast), a maioria dos protocolos existentes são custosos e acarretam grande sobrecarga de controle à rede. Neste trabalho, apresentamos um novo protocolo de fluxo contínuo baseado em árvore, utilizando a desigualdade triangular entre cada três peers para gerenciamento dinâmico da topologia (o PALMS+). O novo protocolo é simples e com baixa sobrecarga. Mesmo assim, seu desempenho é tão bom quanto o estado da arte. Experimentos realizados na plataforma Oversim (OMNet++) demonstraram que o PALMS+ manteve desempenho tão bom quanto o estado da arte (e.g. protocolo NICE), mesmo quando submetido a alto churn em uma rede heterogênea. De fato, a sobrecarga nos peers do novo protocolo é menor que 10% da sobrecarga gerada pelo NICE. O protocolo PALMS+ entrega os dados em menos de 1,5s. O novo protocolo mostra-se adequado a vídeo ao vivo, escalando mesmo em cenários realistas e com alto churn.
Multimedia applications are very popular on the internet. Many of these applications need multicast to scale. However, network layer multicast has not been implemented in the internet. Application layer multicast (ALM) protocols are a practical alternative. However, despite their popularity, many existing ALM protocols and mechanisms are expensive and bring a large overhead control on the network. In the present work, a new protocol is proposed for content distribution based on tree, using the triangular inequality between every three peers to dynamic topology control (the PALMS+). The new protocol is simple and with low overhead. Nevertheless, its performance as good as the state of the art. Experimental results conducted with the OverSim platform (OMNet++) suggest that PALMS+ improves the performance of a state-of-art implementation of ALM protocol when compared against the NICE protocol. Furthermore, the control message overhead at peers using the PALMS+ protocol is reduced by 10%, when compared with NICE. In the PALMS+ protocol, chunks are delivered up to 1,5s. Results confirm that proposed implementation of PALMS+ is very suitable to real-time video streaming, even when churn is high.
Harrison, Jane. "Indig-curious : what are the challenges for non Aboriginal theatre practitioners in accessing and interpreting Aboriginal themes?" Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/32152/1/Jane_Harrison_Thesis.pdf.
Full textAlkubeily, Mothanna. "Les protocoles multicast applicatif : stabilité et sécurité." Compiègne, 2009. http://www.theses.fr/2009COMP1852.
Full textApplication-Level Multicast (Overlay multicast) has been proposed as an efficient alternative to palliate the lack of deployment of the IP Multicast. However it stili suffer from the tree rearrangement problem in dynamic group sessions. In addition, in the case of secured ALM sessions, the rearrangement process induces the 1-affects-n scalability problem where a unique join/leave event leads to an overall rekeying process in order to guarantee the session confidentiality. In this thesis we first review, compare and classify most of the up to date ALM protocols based on their properties, performances and scalability. We then propose a new technique called Membership Duration Aware Application-Level Multicast (MDA) in order to overcome the rearrangement problem and to improve the stability of the ALM overlay Crees. MDA technique can be applied with all existing ALM protocols to enhance their stability performances. Finally, we propose an efficient key management protocol, called Transition Key Scheme (TKS), which reduces the key management overhead in case of highly dynamic sessions. To do so, TKS uses a unique TEK (Traffic Encryption Key) for the group and a small number of individual transition keys to temporally manage recently joining members
De, Silva Vashista C. "Core-Shell Based Metamaterials: Fabrication Protocol and Optical Properties." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc1062904/.
Full textPierantozzi, Stefano. "Modellazione e comparazione del protocollo TCP in scenari di mobilità." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7440/.
Full textSchwartz, Joseph Howard. "Development and Application of an Assessment Protocol for Watershed Based Biomonitoring." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc279219/.
Full textXu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.
Full textKrishnan, Anupama. "The Multipath Fault-Tolerant Protocol for Routing in Packet-Switched Communication Network." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4199/.
Full textChen, Yan. "Traitement transactionnel dans un environnement OSI." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376126461.
Full textAyeh, Eric. "An investigation into graph isomorphism based zero-knowledge proofs." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12076/.
Full textMadrigal-Bauguss, Jessica A. "The Effect of a Brief Acceptance-Based Protocol on Health Related Relational Framing." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc30488/.
Full textVishwanathan, Roopa. "Exploring Privacy in Location-based Services Using Cryptographic Protocols." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc68060/.
Full textNiare, Tiéma M. "Simplification du protocole de pesées des agneaux en ferme." Grenoble 2 : ANRT, 1986. http://catalogue.bnf.fr/ark:/12148/cb37600039d.
Full textBoukhari, Souha. "Approche unifiée pour le développement et l'intégration de protocole." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376121904.
Full textAsfour, Taghrid. "Protocoles de communication multicast fiables." Paris : École nationale supérieure des télécommunications, 2001. http://catalogue.bnf.fr/ark:/12148/cb388211552.
Full textEads, Julie A. (Julie Anne). "Self-Monitoring of Stressors as an Additive Component to a Stress Management Training Protocol." Thesis, University of North Texas, 1992. https://digital.library.unt.edu/ark:/67531/metadc332845/.
Full textWin, Htoo Aung. "BSM Message and Video Streaming Quality Comparative Analysis Using Wave Short Message Protocol (WSMP)." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538706/.
Full textJones, Nicole A. (Nicole Amy). "Morning and Afternoon Response to Exercise Using Two Test Protocols." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc277988/.
Full textZhou, Yanliang. "Efficient Linear Secure Computation and Symmetric Private Information Retrieval Protocols." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752381/.
Full textZakaria, Mahmoud. "Un protocole générique pour les environnements répartis à objets : GRIP /." Paris : École nationale supérieure des télécommunications, 1998. http://catalogue.bnf.fr/ark:/12148/cb37007399r.
Full textDemerjian, Jacques. "Services d'autorisation et intégration au protocole d'attribution dynamique des adresses /." Paris : École nationale supérieure des télécommunications, 2005. http://catalogue.bnf.fr/ark:/12148/cb39977341q.
Full textGupta, Neeraj Kant. "Modeling and Analysis of Next Generation 9-1-1 Emergency Medical Dispatch Protocols." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc500122/.
Full textChraïbi, Chakib. "Contribution au test de protocoles OSI." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37603984f.
Full textNassif, Nadia Adel. "Especificação formal em SDL e simulação de protocolos que combinam a tecnica de Label-Swapping com o roteamento de camada 3 para o transporte do Ip sobre o ARM." [s.n.], 1999. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260009.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-07-25T16:20:30Z (GMT). No. of bitstreams: 1 Nassif_NadiaAdel_M.pdf: 10953982 bytes, checksum: cacb2be7368db5f807502c09fe7bed13 (MD5) Previous issue date: 1999
Resumo: A tese trata da especificação formal em SDL (Specification and Description Language) e da simulação através do SDT 1 (SDL Design Tool), de um classificador de fluxo X/V usado no IpSwitching e, do LDP (Label Distribution Protocol) do MPLS (MultiProtocol Label Switching), partindo-se das recomendações do IETF (Internet Engineering Task Force). Tanto o IpSwitching como o MPLS são protocolos que utilizam a combinação da técnica de label-swappingcom o roteamento de camada 3, para transportar pacotes de um protocolo de rede sem conexão sobre uma tecnologia de comutação, como o IP sobre o ATM. Com o objetivo de se avaliar a performance do IpSwithing em relação à variação dos parâmetros do classificador de fluxo X/V, que é parte integrante do controlador de um IpSwitch, foram realizadas simulações com diferentes traces de tráfego IP. Em relação ao MPLS é proposto uma especificação única que combina as características dos procedimentos de distribuição de labelcom a máquina de estado do LDP. O objetivo é analisar através de simulações, o comportamento de um LSR (Label Switching Router) em diferentes configurações, diante do recebimento de mensagens LDP e do estabelecimento de LSPs (Label Switched Paths). .. Palavras Chaves: SDL - Specification and Description Language, SDT ¿ SDL Design Tool, Especificação Formal, Simulação, MSC - Message Sequence Cha'rt, IP sobre ATM, IpSwitching, Classificador de Fluxo, MPLS - MultiProtocol Label Switching, LDP ...Observação: O resumo, na íntegra, poderá ser visualizado no texto completo da tese digital
Abstract: The thesis deals with formal specification using SDL (Specification and Description Language) and the simulation using SDT 2 (SDL Design Tool) of the flow classifier X/Y used in IpSwitching, and of the LDP (Label Distribution Protocol) from MPLS (MultiProtocol Label Switching), based on the IETF (Internet Engineering Task Force) recomenda tions. IpSwitching and MPLS are protocols that use the combination of the label-swapping technique with the layer 3 routing, forwarding connectionless traffic over a switching technology like IP over ATM. In order to analize the IpSwitching performance varying the flow classifier X/Y paremeters, which is part of the IpSwitch controller, it was used different IP traffic traces on the simulations. Concerning the MPLS it is proposed a single specification that combines the LDP procedures and LDP state machine. The goal is to verify the LSR (Label Switching Router) behaviour in recieving LDP messages and establishing LSPs (Label Switched Path), using different LSR configurations. ;Key Words: SDL - Specification and Description Language, SDT - SDL Design Tool, Formal Specification, Simulation, MSC - Message Sequence Chart, IP over ATM, IpSwitching, Flow Classifier, MPLS - MultiProtocol Label Switching, LDP - Label Distribution Protocol, label-swapping. ...Note: The complete abstract is available with the full electronic digital thesis or dissertations
Mestrado
Mestre em Engenharia Elétrica
Talbi, Mehdi. "Spécification et vérification automatique des propriétés des protocoles de vote électronique en utilisant la logique ADM." Rennes 1, 2010. http://www.theses.fr/2010REN1S073.
Full textIt is a well known fact that only formal methods can provide a proof that a given system meets its requirements. Their use should be mandatory for critical systems such as electronic voting. In this thesis, we propose the use of the modal and linear ADM logic in order to specify a set of security properties that a voting protocol is required to satisfy : eligibility, non-reusability, accuracy, fairness, anonymity, receipt-freeness, etc. Our goal is to check these properties against a trace-based model where a trace represents a valid run of the protocol. Protocol executions take place in a hostile environment controlled by an active intruder whose deduction power is incremented according to electronic voting cryptographic primitives (blind signature, bit-commitment, homomorphic encryption, zero-knowledge proof, etc. ). Protocol modeling and properties specification are applied to the FOO protocol as a case study. Additionally, we propose to exploit the tableau-based proof system of the ADM logic, in order to develop a tool enabling the automatic verification of security properties against selected traces of the analyzed protocol
Heitz, Layne. "The Validation of a Short-cycle Formative Assessment Observation Protocol for Science and Mathematics Instruction." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407820/.
Full textJoglekar, Sachin P. "Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4414/.
Full text