Dissertations / Theses on the topic 'Jabber (Computer network protocol)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Jabber (Computer network protocol).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.
Full textHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textDukach, Semyon. "SNPP--a Simple Network Payment Protocol." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/12629.
Full textJohnson, Edwin N. (Edwin Neil) 1975. "A protocol for network level caching." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9860.
Full textIncludes bibliographical references (p. 44-45).
by Edwin N. Johnson.
S.B.and M.Eng.
Du, Jingzhe. "Geometric routing protocol in Disruption tolerant network." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27680.
Full textRajagopal, Murali. "Protocol conversion : an algorithmic approach." Diss., Georgia Institute of Technology, 1990. http://hdl.handle.net/1853/13352.
Full textSuh, Kyungjoo. "CRYPTO-AD-HOC network an ad hoc network protocol embedded cryptography /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000164.
Full textTitle from title page of source document. Document formatted into pages; contains x, 80 p.; also contains graphics. Includes vita. Includes bibliographical references.
Pantoleon, Periklis K. "Reliable content delivery using persistent data sessions in a highly mobile environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FPantoleon.pdf.
Full textWhateley, Brendon J. "The influence of protocol choice on network performance." Master's thesis, University of Cape Town, 1995. http://hdl.handle.net/11427/13529.
Full textComputer communication networks are a vital link in providing many of the services that we use daily, and our reliance on these networks is on the increase. The growing use of networks is driving network design towards greater performance. The greater need for network connectivity and increased performance makes the study of network performance constraints important. Networks consist of both hardware and software components. Currently great advances are being made in network hardware, resulting in advances in the available raw network performance. In this thesis, I will show through measurement that it is difficult to harness all the raw performance and to make it available to carry network services. I will also identify some of the factors limiting the full utilization of a high speed network.
Zang, Joanna Q. "Design of a redundancy protocol /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.
Full text龍浩生 and Ho-sang Anthony Loong. "Improvements on system support for network protocol infrastructure development." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1994. http://hub.hku.hk/bib/B31211719.
Full textLoong, Ho-sang Anthony. "Improvements on system support for network protocol infrastructure development /." [Hong Kong : University of Hong Kong], 1994. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13730873.
Full textNguyen, Long G. "Designing a higher layer protocol for small distributed microcontroller systems using the control area network protocol." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1998. https://ro.ecu.edu.au/theses/1603.
Full textDobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Full textThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.
Full textKo, Kai-Chung. "Protocol test sequence generation and analysis using AI techniques." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Hui, Daniel Hang-Yan. "Protocol validation via reachability analysis : an implementation." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24689.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Abbott, Mark Bert. "A language-based approach to protocol implementation." Diss., The University of Arizona, 1993. http://hdl.handle.net/10150/186386.
Full textTobler, Benjamin. "A Structured Approach to Network Security Protocol Implementation." Thesis, University of Cape Town, 2005. http://pubs.cs.uct.ac.za/archive/00000281/.
Full textSavage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.
Full textWan, Ching Leong. "A Protocol decoding accelerator (PDA)." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28727.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Nematbakhsh, Mohammadali. "TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275389.
Full textPelletier, Larry Edward. "Description of a file access protocol for computer networks." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9870.
Full textTong, Darren Pong-Choi. "Implementation of a protocol validation and synthesis system." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/25061.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Carter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)." Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.
Full textPeyravian, Mohammad. "An Algorithmic approach to constructing protocol converters." Diss., Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/13526.
Full textRamasubramaniam, Venkata Lakshmanan. "A framework for reliable multicast protocol." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000599.
Full textSunderam, V. S. "A methodology for the synthesis of network protocol software." Thesis, University of Kent, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.372773.
Full textQian, Xiaolan 1977. "A protocol for a wireless network of mobile devices." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86494.
Full textIncludes bibliographical references (leaf 53).
by Xiaolan Qian.
S.B.and M.Eng.
Brownfield, Michael I. "Energy-efficient Wireless Sensor Network MAC Protocol." Diss., This resource online, 2006. http://scholar.lib.vt.edu/theses/available/etd-04102006-170423/.
Full textPatel, Sameer H. "Design of the Network Multimedia File System protocol : a protocol for remote access of networked multimedia files /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07292009-090502/.
Full textBickhart, Ryan W. "Transparent TCP-to-SCTP translation shim layer." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.44 Mb, 82 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428177.
Full textWu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.
Full textJonsson, Fredrik. "Arm-P : Almost Reliable Multicast protocol." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-14954.
Full textDistribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource.
Many applications distribute the same information to multiple receivers, but in many cases the same information is sent to a single receiver at a time, thus multiple copies of the same information is sent, thus consuming bandwidth.
What if the information could be broadcasted to all the clients at the same time, similar to a television broadcast. TCP/IP provides some means to do that. For example UDP supports broadcasting; the problem faced when using UDP is that it’s not reliable. There is no guarantee that the information actually reaches the clients.
This Bachelor thesis in Computer Science aims to investigate the problems and solutions of how to achieve reliable distribution of fixed size data sets using a non reliable multicast communication channel, like UDP, in a LAN environment.
The thesis defines a protocol (Almost Reliable Multicast Protocol – Arm-P) that provides maximum scalability for delivery of versioned data sets that are designed to work in a LAN-environment. A proof-of-concept application is implemented for testing purposes.
Singh, Ravinder Pal. "Efficient protocol for live Web-based teaching." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000163.
Full textTitle from title page of source document. Document formatted into pages; contains xi, 74 p.; also contains graphics. Includes vita. Includes bibliographical references.
Iyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.
Full textKulkarni, Shrinivas Bhalachandra. "The simulation studies on a behaviour based trust routing protocol for ad hoc networks." Diss., Online access via UMI:, 2006.
Find full textJourjon, Guillaume Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Towards a versatile transport protocol." Awarded by:University of New South Wales. Electrical Engineering & Telecommunications, 2008. http://handle.unsw.edu.au/1959.4/41480.
Full textAhmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.
Find full textKulkarni, Santosh B. Umphress David A. Agrawal Prathima. "Synergy MAC a cooperative MAC protocol /." Auburn, Ala, 2009. http://hdl.handle.net/10415/1609.
Full textSun, Miao M. Eng Massachusetts Institute of Technology. "A syndication-based messaging protocol for the global RFID network." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/46518.
Full textIncludes bibliographical references (p. 89).
This Master of Engineering thesis describes the design and implementation of a syndication based messaging protocol for the global RFID network. The motivation behind the design is to develop a scalable model that can be applied to "Internet of Things" technologies, which are used to encompass the large data volume of physical objects in the world. In striving to achieve this, the underlying publish/subscribe system implementation can be applied to large-scale communication and information networks. The messaging protocol presented is text-based; this approach offers a human-understandable, user-friendly protocol. Similar to RSS version 2.0, the format of the message conforms to existing XML specifications, but also adopts a structure that represents the RFID data organization more clearly. As an example method, Windows Forms applications were created to provide a Graphical User Interface (GUI) component for visualizing the publish/subscribe messaging model. The design implements a lightweight messaging protocol that is both scalable to model large-scale networks and extensible to allow aggregation of content across multiple data sources.
by Miao Sun.
M.Eng.
Wong, Wan-Ching. "SALM : an efficient application-level multicast protocol for dynamic groups /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WONGW.
Full textIncludes bibliographical references (leaves 75-79). Also available in electronic version. Access restricted to campus users.
Chan, Robin Isaac Man-Hang. "An Estelle-C compiler for automatic protocol implementation." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26184.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Zhou, Kaiyu. "Packet loss models of the Transmission Control Protocol." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36873172.
Full textZhou, Kaiyu, and 周開宇. "Packet loss models of the Transmission Control Protocol." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B36873172.
Full textKwon, Taewoo. "Reasoning about Wireless Protocol Behavior." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339529095.
Full textTsietsi, Mosiuoa. "Prototyping a peer-to-peer session initiation protocol user agent /." [S.l. : s.n.], 2008. http://eprints.ru.ac.za/1115/.
Full textPham, Tan Loc. "Micro network protocol and hardware design for distributed data acquisition." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23753.
Full textOn a small scale, the choice of such an integrated system is to avoid as much as possible the complexity and redundancy problems created by wiring single devices. The goal is to make a portable and practical system to interface to other subsystems, while reducing data communication wiring and optimizing data parallel processing. Micro-networking modeling issues are then studied for the implementation of the system and simulation results will be shown to illustrate the performance of the system.
Cox, Spencer L. "User Datagram Protocol with Congestion Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1250.pdf.
Full textGlowacki, Janice R. "A simulation of a message passing protocol for a network of transputers." FIU Digital Commons, 1988. https://digitalcommons.fiu.edu/etd/3830.
Full text