Tesi sul tema "Internet service providers"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Internet service providers".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Richards, Tanya Krystine. "Legal regulations of internet services providers". Thesis, Queensland University of Technology, 2001. https://eprints.qut.edu.au/36871/1/36871_Richards_2001.pdf.
Testo completoFREITAS, MIGUEL DE ANDRADE. "QUALITY OF SERVICE ON INTERNET SERVICE PROVIDERS". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2004. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=5031@1.
Testo completoThe development of Quality of Service (QoS) architectures for the Internet is a problem that has received significative attention recently. The large scale deployment of such architectures has being blocked by several reasons, such as, the dificulty in establishing Service Level Agreements (SLA) of QoS policies between users, Internet Service Providers (ISP) and operators, and the lack of mechanisms on the network to request services with quality guarantees. Despite of not having access to a service that can guarantee certain levels of performance per aplication, the Internet users are getting more and more concerned about the network quality. That can be confirmed by the number of users that are migrating to the broadband Internet access. The ISP´s, specially the broadband ones, must take measurements to manage their resources to satisfy the users´ expectations of quality and stay competitive on the market. In this work, problems have being identified at the processes used by a broadband ISP, the MLS Wireless. With the old system, certain situations could cause the denial of service due the number of simultaneos connections or degradation and increased latency due the lack of fairness to share the network resources. This work suggests some solutions for these deficiencies, implementing and analyzing their effectiveness. To fix the denial of service, we suggest the limitation of resources per user, so that the total capacity won´t be depleted. To have the resources more fairly distributed among the users, a new mechanism of sharing is implemented, based on a discipline named SFQ (Stochastic Fairness Queueing). The results show that those modifications have being effective. The time to access services like WWW and e-mail during congestion periods was drasticaly reduced, in some cases, from about 1 minute to less than 10 seconds.
Cheng, Kai-sing Steve. "Internet service provider industry in Hong Kong /". Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19882002.
Testo completoBeréndique, Betancourt Fernando Javier. "Liability of Internet Service Providers for copyright infringement". Tesis, Universidad de Chile / Universitat Heidelberg (Alemania), 2011. http://www.repositorio.uchile.cl/handle/2250/111849.
Testo completoGrowing and expanding so-called Information Society, the most valuable asset is the intellectual, either in its technological aspect, commercial or authorial. The Information Society has led to controversial issues: one on intellectual property specifically relating to copyright in the network, dealt with different perspectives, different laws and dissimilar trends. Precisely in this research will address the liability of Internet Service Providers (ISP) for unauthorized downloads against copyright. For this study will address the various laws and treaties that have governed the issue, the protection mechanisms and the positions embraced by each country in order to protect the copyright. As you will see there is a single outlet to the problem of unauthorized downloads, will depend on the system hosted by each country, but what if it is conclusive that there is still that all countries in the world to adopt a system of protection for individual good is most valuable as intellectual property.
He, Jiong. "The protection of the communication right concerning Internet Service Provider's infringement under Chinese Copyright Law". Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources. Restricted: no access until June 24, 2012, 2009. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=53331.
Testo completoFlores, Delgadillo Will Johnny. "IT Service Delivery in Nicaraguan Internet Service Providers : analysis and Assessment". Licentiate thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-29560.
Testo completoQC 20110209
Cheng, Kai-sing Steve, e 鄭啓誠. "Internet service provider industry in Hong Kong". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268651.
Testo completoMört, Robert. "Content Based Addressing : The case for multiple Internet service providers". Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-107174.
Testo completoDagens användning av internet ändrar form från dator-till-dator kommunikation till användaretill- innehålls interaktion vilket innebär nya utmaningar för internetleverantörer vilka måste överföra stora mängder upprepade förfrågningar av innehåll via kostsamma länkar mellan internetleverantörer. Lösningar som innehållsdistribuerande nätverk (Content Distribution Network) hjälper idag till men addresserar inte kärnan av problemet. Det här examensarbetet undersöker hur innehållsbaserad addressering kan minimera mängden trafik mellan internetleverantörer genom att cachning, att lagra kopior av innehåll, i internetleverantörers nätverket. I det här examensarbetet implementerade vi CCNx 0.6.0 i en testbädd för att simulera scenarion med nätverk mellan internetleverantörer. Denna testbädd används för att illustrera hur cachning av populärt innehåll kan minimera trafik mellan internetleverantörer samt hur innehållets oberoende av plats även hjälper till med andra problem i nätverket såsom länkfel och stockning. Dessa test visar att CCNx implementationen har stor overhead information på grund av ytterligare, extra headers vilket medför en 16% reducering i prestanda jämfört med överföringar som använder Hypertext Transfer Protocol (HTTP). Vidare visar dessa tester även att kostnaden från trafik mellan internetleverantörer är konstant oberoende av antalet upprepade förfrågningar, på grund av cachning av innehåll i internetleverantörens nätverk. Så snart det finns fler än en begäran för samma innehåll finns det en vinst i att använda CCNx istället för HTTP för överföringar av innehåll.
Avila-Merino, Alfonso S. "Internet service providers, global or local ? : examining Mexico and Spain". Thesis, University of Sussex, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404760.
Testo completoMøinichen, Jørgen. "The Net Neutrality Debate : Analysis of economic implications of net neutrality on internet service providers, content providers and internet users". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27129.
Testo completoLeida, Brett A. (Brett Alan) 1968. "A cost model of Internet service providers : implications for Internet telephony and yield management". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/10052.
Testo completoVanberg, Margit A. "Competition and cooperation among internet service providers a network economic analysis". Baden-Baden Nomos, 2008. http://d-nb.info/991114353/04.
Testo completoFogel, Johan. "IP version 6 in larger city networks and at Internet service providers". Thesis, Mälardalen University, Mälardalen University, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7479.
Testo completoSince the 90ies a bunch of problems and flaws in the old Internet Protocol version four has occurred.The biggest problem is the extinction of addresses which will come soon, soon in the matter of theclassic “wolf is coming” matter, but as in the fairy tale the wolf will finally come. When this will happenis unknown, but not many believes it won’t. Carl-Henrik Swanberg CEO for Ericsson once said that year2020 there will be 50 billion mobile units connected to internet. Considering there is maximum 4 billionaddresses in IPv4 the needs for more addresses will be significant. The solution of this is the version sixof Internet Protocol released in middle of the 90ies. This thesis mentions a lot of the problems with theold version and tries to make a good explanation of the benefits and possibilities that lies within thenew. It also contains a larger amount of information on the protocols that lies within this, like newversion of OSPF, the extensions of BGPv4 called multiprotocol BGP (MP-BGP) and new things likenetwork discovery protocol (NDP). The later chapter is about the planning of an implementation atMälarenergi City Network and the implementation at the internet service provider MDFnet whichnowadays runs IPv6 in their core and office network.
Oliveira, Luciana Pereira. "Future internet architecture to structure and to manage dynamic autonomous systems, internet service providers and customers". Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/1708.
Testo completoConselho Nacional de Desenvolvimento Científico e Tecnológico
Diversos trabalhos na área de redes dinâmicas têm sido propostos na literatura com o objetivo de prover à arquitetura da Internet o suporte à mobilidade. O problema dessas redes instáveis na Internet consiste em oferecer um conjunto de mecanismo, tais como endereçamento, gerenciamento da informação e encaminhamento da informação, que suportem informação e entidade (Sistema Autônomo, Provedor de Serviços na Internet e Clientes) móveis. Nesse contexto, alguns trabalhos para arquitetura da Internet têm proposto uma maneira de separar a localização (atualmente o IP) e o nome identificador, devido ao forte relacionamento entre o IP e o nome. Em geral, eles propõem uma abordagem de roteamento na camada overlay para separar essas informações. Outros trabalhos acreditam que este desacoplamento não é suficiente para solucionar os problemas de mobilidade, desde que a dinamicidade gera muitas mensagens de controle e atualizações do vínculo entre o IP e o nome. Por essa razão, os pesquisadores também têm proposto novos modelos para gerenciar a camada overlay. Uma das contribuições deste trabalho é a proposta de uma solução para arquitetura da Internet denominada Stable Society que adota a abordagem de papéis. Um papel é uma unidade funcional que é utilizada para organizar a comunicação. Um importante diferencial da proposta é que além de desvincular o nome e a localização, ela também oferece soluções para os problemas relacionados a estruturação e manutenção da camada overlay. Além disso, este trabalho define quatro papéis: o mensageiro encaminha os dados dentro da sociedade; o guarda é a entidade mais estável para encaminhar mensagens entre as sociedades; o operário armazena informações; e o líder estrutura e gerencia a rede overlay. Reduzindo o escopo para a implementação desta dissertação de mestrado, o mensageiro e o guarda foram considerados como a camada de rede sem distinção de estabilidade, desde que o fornecimento de um mecanismo de gerenciamento do overlay de roteamento foi o objetivo do trabalho. Portanto, como prova do conceito apresentado pela proposta, os líderes e operários foram implementados, porque eles agem de maneira independente de tecnologia de acesso e são fundamentais para solucionar o problema da instabilidade nos processos de armazenamento e descoberta da informação. Como resultado, um novo algoritmo denominado Stable Society model over Distributes Hash Table (SSDHT) foi proposto. Além disso, este algoritmo foi comparado com outras soluções DHT (Chord). Os resultados mostraram que o SSDHT é um bom algoritmo, principalmente quando se aumenta a instabilidade (carga do tráfego, grau de mobilidade e tamanho da rede). Por exemplo, a taxa de mensagens entregue com sucesso foi acima de 90% quando a carga de tráfego, o grau de mobilidade e o tamanho da rede foram variados
Sääf, Alexander. "Cloud Services for Building the Modern Internet of Things : An Examination of IoT Cloud Service Providers". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162090.
Testo completoChiou, Bo-Yun. "Google takes on China a cross-cultural analysis of internet service design /". Muncie, Ind. : Ball State University, 2009. http://cardinalscholar.bsu.edu/643.
Testo completoDe, Vos Belgraver Cecilia Susan. "The emergence and growth of dial-up internet service providers (ISPs) as a means of access to the internet in South Africa: a case study of M-Web and World Online". Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1007811.
Testo completoO'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties". Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.
Testo completoSookavatana, Pipat Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Service Trading Marketplace Network (STAMP-Net): service discovery and composition for customizable adaptive network". Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2003. http://handle.unsw.edu.au/1959.4/20439.
Testo completoQasim, Muhammad, e Mohammad Asadullah. "The Role of Customer Support Service in Relationship Strengthening : A Case of Swedish Broadband Internet Service Providers". Thesis, Karlstads universitet, Avdelningen för företagsekonomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13637.
Testo completoBoateng, Kwasi. "Bringing new media to Ghanaians : the political economy of Internet deployment /". View abstract, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3203331.
Testo completoSpring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /". Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Testo completoChan, Ka Tat. "Investigation of a company internal workflow for improvement". access abstract and table of contents access full-text, 2006. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b21417568a.pdf.
Testo completoTitle from title screen (viewed on Oct. 5, 2006) "Submitted to Department of Manufacturing Engineering and Engineering Management in partial fulfillment of the requirements for the degree of Master of enterprise technology and management." Includes bibliographical references.
Helmi, Amr Shoukry. "The enforcement of digital copyright in Egypt : the role and liability of internet service providers". Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/12628.
Testo completoFung, Kai-yuen. "Latest development and applications of internet services in Hong Kong : a comparative study to our United States and Singapore counterparts /". Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19877754.
Testo completoLee, Tae Hee Walden Ruth C. "Revisiting internet service providers' immunity from defamation liability a decade after enactment of the Communications Decency Act". Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2006. http://dc.lib.unc.edu/u?/etd,457.
Testo completoTitle from electronic title page (viewed Oct. 10, 2007). "... in partial fulfillment of the requirements for the degree of Master of Arts in the School of Journalism and Mass Communication." Discipline: Journalism and Mass Communication; Department/School: Journalism and Mass Communication, School of.
Yang, Weilai. "Pricing Network Resources for Differentiated Service Networks". Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.
Testo completoGOHARI, MOGHADAM SHERVIN, e THOR ÅHLGREN. "Moving beyond connecting things : What are the factors telecommunication service providers need to consider when developing a Data-as-a-Service offering?" Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279760.
Testo completoInternet of Things och uppkopplade produkter har blivit ett allt vanligare begrepp inom flertalet branscher. Samtidigt har datainsamling blivit en mer central del av alltifrån affärsmodeller till något vanliga konsumenter har i åtanke. En variant av Internet of Things tillhandahålls genom SIM-kort i produkter, som tillhandahålls av operatörer, och funktionerar genom kommunikationsnätverk. Denna studie är en akademisk utredning kring hur dessa operatörer kan utnyttja data genererat från telekommunikations-infrastruktur till en tjänst för nuvarande kunder. Studien är utförd hos en global operatör inom området av SIM-fleet Management/IoT-enablement. Fler och fler industrier går mot att koppla upp produkter för att få information kring alltifrån prestanda, elanvändning hos produkten, geografisk position eller annan information som önskas. Den data som skickas tillhandahålls av kund, vilket operatören inte har någon tillgång till. Dock så genererar kommunikationen i sig data genom kommunikationsnätverket, som operatören samlar in. I och med att mängder av data blir tillgänglig för operatörerna som tillhandahåller infrastrukturen, är syftet med denna rapport att undersöka eventuella hinder och möjligheter att erbjuda kunder ytterligare data som en tjänst i sig. Hur datan ska levereras, kundernas analysbehov och hur nuvarande insikter levereras är några exempel på det studien utreder. Arbetet grundar sig i en litteraturstudie och en kvalitativ empirisk studie. Litteraturstudien ger en bakgrund och teoretisk överblick kring branschens utveckling och litteraturens syn på området. Detta gjordes genom vetenskapliga publikationer samt diverse rapporter från branschorganisationer och intressenter. Den empiriska studien genomfördes genom 6 intervjuer med anställda på en global operatör med lång historisk inom uppkopplade produkter. De två delarna sammanställdes sedan för att jämföra resultatet med den teoretiska bakgrunden. Det visades sig vara mycket i resultat som stämde överens med de teoretiska aspekterna kring utmaningar med att erbjuda Data-as-aService (DaaS). Kundernas olika mognadsgrad i sin uppkoppling visades sig vara en stor utmaning i att standardisera en DaaS, och kundernas analysbehov gick ofta isär på samma premisser. Vidare anses DaaS ha stor påverkan på hur branschen fortsätter utvecklas i framtiden, och konsensus är tjänsten i framtiden kommer bli mer och mer datadriven.
Blanke, Isabel. "Über die Verantwortlichkeit des Internet-Providers : eine Untersuchung anhand des Teledienstegesetzes sowie nach allgemeinen strafrechtlichen Zurechnungskategorien /". Marburg : Görich & Weiershäuser, 2006. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015455684&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Testo completoVilapakkam, Nagarajan Karthik. "What is it that the application of modelling and simulation can contribute towards understanding and managing service quality data for internet service providers (ISP) in Australia?" School of Information Systems and Technology - Faculty of Informatics, 2008. http://ro.uow.edu.au/theses/121.
Testo completoThyagaraj, Arjun, e Krishnakumar Narayanan. "Internet of Things (IoT) adoption in Indian Healthcare Industry-A case study from a hospital". Thesis, Högskolan i Halmstad, Akademin för företagande, innovation och hållbarhet, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45313.
Testo completoHarvesf, Cyrus Mehrabaun. "The design and implementation of a robust, cost-conscious peer-to-peer lookup service". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26559.
Testo completoCommittee Chair: Blough, Douglas; Committee Member: Liu, Ling; Committee Member: Owen, Henry; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudhakar. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Riordan, Jaani. "The liability of internet intermediaries". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:a593f15c-583f-4acf-a743-62ff0eca7bfe.
Testo completoChen, Sheng. "Future development trends of optical transport network infrastructure an infrastructural framework for metropolitan-based optical transport networks : a field test of a Chinese ISP and a case study of a Chinese electrical power company /". Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070822.115714/index.html.
Testo completoŠubr, Zdeněk. "Analýza trhu informačních systémů pro poskytovatele připojení k Internetu". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-163736.
Testo completoForsell, Erik. "Internet Telephony : An Internet Service Provider's Perspective". Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92287.
Testo completoAvsikten med detta examensarbete är att komma med ett förslag till SYSteam Nät AB, en lokal Internetleverantör i Uppsala, om hur de, som en service till sina kunder, kan implementera IP telefoni i sin existerande IT-infrastruktur. Detta betyder att jag behandlar frågeställningen med en Internetleverantörs perspektiv.Tre huvudområden behandlas i examensarbetet: Marknad och Affärsmodell, Teknik och Ekonomi. Som en etablerad lokal leverantör av Internet via bredband är det viktigt för SYSteam Nät AB att både behålla nuvarande kunder och att attrahera nya kunder. En del tror att man skulle kunna åstadkomma detta genom att erbjuda värdehöjande tjänster som IP telefoni. Implementering av IP telefoni, som svarar mot SYSteam Näts krav, kan utföras på olika sätt. Analysen, som leder till ett förslag hur SYSteam Nät skulle kunna implementera IP telefoni, involverar många mångfasetterade frågeställningar av affärs-, teknisk- och ekonomisk natur. Var och en av dessa aspekter behandlas i rapporten.
Rotundo, Rafael Pinheiro. "A fenomenologia da sociedade da informação e a responsabilidade civil à luz da Lei n.12.965/14 – Marco Civil da Internet". Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21381.
Testo completoMade available in DSpace on 2018-08-27T13:02:40Z (GMT). No. of bitstreams: 1 Rafael Pinheiro Rotundo.pdf: 1597987 bytes, checksum: 7b8b65232863955c234a658ad3b688de (MD5) Previous issue date: 2018-02-23
The technological advancement provided by the global computer network has revolutionized human activities, communications have become easier, territorial boundaries between countries do not exist in the virtual world, and trade has been driven on a global scale. In this revolutionary network context, problems of high complexity arise that threaten the safety of users and the system itself. The lack of control and anonymity created a false impression that the internet would be an environment without rules, in which the wrong would not be grieved. In this context, civil liability for damages on the Internet is a subject that the law can’t refrain from dealing with, since its dynamism must be careful to protect and protect any offense that causes imbalance. At a first moment the work will address the characteristics of the information society, how the interpersonal relationships were affected by the digital age, and then to address the technical issues of the Internet, its operation, what services are available, its operators and other agencies. In a second moment, it will be approached to the civil responsibility of its evolution in counterpart to the society of the information, developing its study, as well as the elements that integrate it, with the action or omission, damage and causal link. Therefore its repercussions before entering the legal world of the Internet Civil Law, Law 12.965/2014, its interpretation by the STJ and the treatment of the subject in other countries
O avanço tecnológico proporcionado pela rede mundial de computadores revolucionou as atividades desenvolvidas pelo ser humano; as comunicações tornaram-se mais fáceis, as fronteiras territoriais entre os países desapareceram no mundo virtual e o comércio foi impulsionado em escala global. Neste contexto revolucionário de rede, surgiram problemas de alta complexidade que ameaçam a segurança dos usuários e do próprio sistema. A ausência de controle e o anonimato fizeram crescer uma falsa impressão de que a internet seria um ambiente sem regras, em que o ilícito não seria apenado. Nesse contexto, a responsabilidade civil pelo dano na internet é um tema sobre o qual o Direito não pode se abster, pois seu dinamismo deve ficar atento para proteger e resguardar qualquer ofensa que cause desequilíbrio. Em um primeiro momento a pesquisa abordará as características da sociedade de informação, a maneira como os relacionamentos interpessoais foram afetados pela era digital para, em seguida, abordar as questões técnicas da internet, seu funcionamento, serviços disponíveis, operadores e demais órgãos de atuação. Em um segundo momento será abordada a responsabilidade civil tendo em vista sua evolução em contrapartida à sociedade da informação. Serão estudados os elementos que a integram, a ação ou omissão, o dano e o nexo de causalidade. Por conseguinte, e ao final, suas repercussões ante o ingresso no mundo jurídico da Lei n.12.965/14, conhecida como Marco Civil da Internet, sua interpretação pelo Superior Tribunal de Justiça e o tratamento dedicado ao tema por outros países
Silva, Vítor Manuel de Jesus da. "Service building in dense service provider environments". Doctoral thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/10938.
Testo completoGenericamente falando, os serviços sobre redes têm vindo a afastar-se de um modelo monolítico para um modelo de criação de serviços que permite ou - como é mais frequente - requer a cooperação entre vários Provedores de Serviço. A Internet, que tem vindo a forçar a convergência de serviços, mostra que começa a ser virtualmente impossível a um único operador fornecer qualquer serviço com um mínimo de interesse para os utilizadores. Esta tese foca-se em serviços de transporte (e.g., connectividade) e discute o impacto das fronteira que as ofertas de serviços têm com o negócio. A questão central é a seguinte: o que muda quando o mesmo serviço é oferecido não apenas por um mas por mais do que um Provedor de Serviço. Por um lado, esta tese cobre, em abs tracto, a noção de Provedor se Serviço, como evoluiu e em que sentido está a evoluir, particularmente num contexto de muitos Provedores de Serviço. Os primeiros capítulos desta tese analizam e propõem arquitecturas para cooperação inter-Provedor-de-Serviço e para serviços comuns tais como multimédia. Por outro lado, oferece-se soluções práticas, com as respectivas avaliações, para alguns problemas, que ainda hoje se mantêm em aberto, tais como encaminhamento inter-domínio, Qualidade-de-Serviço, Mobilidade e distribuição de conteúdos, tais como as contribuições relacionadas com o impacto da noção administrativa de Sistemas Autónomos sobre encaminhamento inter-domínio, uma arquitectura de transporte inter-domínio e o problema que levanta da ineficiência que decorre do planeamento não- cooperativo de Redes de Entrega de Conteúdos.
Broadly speaking, service networks have been departing from a monolithic model to a model of service creation that allows or - most often - requires the cooperation between several Service Providers (SP). The Internet, that has been driving and pushing for service convergence, shows that it is becoming virtually impossible for an operator to provide, alone and by itself, a valuable service to end-users. This thesis focuses on transport services (e.g., connectivity) and discusses the impact of the business boundaries on service offerings. The central question is the following: what changes when the same service is delivered, not by one, but by more than one SP? On one hand, this thesis covers, in abstract, the notion of Service Provider, how it has evolved and where it is evolving to, particularly in the context of many SPs. The first chapters of this thesis analyze and propose architectures for inter-SP cooperation and for well-known services such as multimédia communications. On the other hand, it offers practical and evaluated solutions to some problems that are still open, in the area of Inter-domain routing, Quality-of-Service, Mobility and Content Distribution, such as the presented contributions to the impact of independent the administrative notion of Autonomous Systems on inter-domain routing, an inter-domain transport architecture and the raised problem of inefficiency of uncooperatively provisioned Content-Delivery Networks.
Chen, Xin. "Energy efficient wired networking". Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/7966.
Testo completoKnutsen, Morten. "Fighting Botnets in an Internet Service Provider Environment". Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9175.
Testo completoBotnets are compromised hosts under a common command and control infrastructure. These nets have become very popular because of their potential for various malicious activity. They are frequently used for distributed denial-of-service attacks, spamming, spreading malware and privacy invasion. Manually uncovering and responding to such hosts is difficult and costly. In this thesis a technique for uncovering and reporting botnet activity in an internet service provider environment is presented and tested. Using a list of known botnet controllers, an ISP can proactivly warn customers of likely compromised hosts while at the same time mitigate future ill-effects by severing communications between the compromised host and the controller. A prototype system is developed to route traffic destined for controllers to a sinkhole host, then analyse and drop the traffic. After using the system in a live environment at the norwegian reasearch and education network the technique has proven to be a feasable one, and is used in a incident response test-case, warning two big customers of likely compromised hosts. However, there are challenges in tracking down and following up such hosts, especially ``roaming'' hosts such as laptops. The scope of the problem is found to be serious, with the expected number of new hosts found to be about 75 per day. Considering that the list used represents only part of the actual controllers active on the internet, the need for an automated incident response seems clear.
Ko, Li-Hsin, e 柯力心. "Internet Service Providers in Taiwan:1994-1998". Thesis, 1998. http://ndltd.ncl.edu.tw/handle/37106252687057901797.
Testo completo"Interactions between different hierarchies of Internet service providers". Thesis, 2008. http://library.cuhk.edu.hk/record=b6074488.
Testo completoLee Cheuk Man.
"February 2008."
Adviser: John C. S. Lui.
Source: Dissertation Abstracts International, Volume: 69-08, Section: B, page: 4849.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2008.
Includes bibliographical references (p. 104-109).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Chiang, Ko-Chi, e 蔣克齊. "Liability of Internet Service Providers for Trademark Infringement". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/19863928169372210609.
Testo completo世新大學
智慧財產權研究所(含碩專班)
99
Over the last decade, Trademark proprietors filed trademark infringement lawsuit against internet service providers in the United States or in the member state of European Union. They considered that the keyword advertising services or electronic marketplace marketing services which employed proprietors’ trademark would establish actionable trademark infringement. Consequently, internet service providers would face legal exposure of trademark infringement liability. There is still not any trademark infringement lawsuit of internet service providers in Taiwan until this year; however, there would be trademark infringement lawsuit against internet service providers in future. This discussion divided into four parts. In the first part, Chapter Two, author will discuss the function of trademark and two important interests that trademark act protect, including the interest of the consumer and the interest of trademark proprietors, which is also the normative foundation of trademark infringement. Secondly, in the second part, Chapter Three and Four, author will discuss five precedents of the United States and study how circuit judges or commentators to solve this new legal issue? Author will analyze how courts to adapt the prime facie evidence of the direct trademark infringement of the Lanham Act and the indirect trademark infringement tests properly to interpret whether the internet service providers would establish trademark liability by balancing the interest of consumers and trademark proprietors. Thirdly, in the third part, Chapter Five, author will discuss two important legal issues that European Court of justice need to solve when trademark proprietors filed trademark infringement lawsuit against internet service providers in European Union, including analyze how to adapt the statute about trademark infringement of Community Trade Mark Regulation to interpret whether the internet service providers would be considered use the trademark of owner in the course of trade; moreover, whether the internet service providers’ behavior falling with in the scope of Directive on electronic commerce, would be exempted from liability? Finally, in the part four, Chapter Six and Seven, author attempt to study and analyze what legal issues of trademark infringement will happen when trademark owners file trademark infringement lawsuit against internet service providers in Taiwan. And what is the feasible solution of these issues, including how to adapt the element of trademark infringement, including the statutes of use, likelyhood of confusion, infringement liability of Trademark Act and joint and several liability in Civil Act of Taiwan?
ChANG, WEN-YUAN, e 張文源. "Illegal Internet Service Providers and Tele-communication fraud". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/01386959963639434279.
Testo completo國立臺北大學
犯罪學研究所
104
No matter of fraud victims from Taiwan or China, or other countries, it is the help of illegal Type II telecommunication allowing scam clans travel around the world. The main purpose of this study is to develop the feasible counterplots to avert the crimes to be committed and clear up the terror in public toward fraud. It is also expected to provide references for police department and related governmental agencies to establish fraud prevention policies. With review of related investigation cases, latest official data and documents as well as depth interview with insiders that extremely understand the operation of telecommunication fraud and crime (type II telecommunication offender) and outsiders (investigators and NCC administrative auditors) total in 5 persons, the important findings of the study: (1) “fund” is the basic requirement of founding telecommunication scam clan; (2) among the requirements of founding telecommunication scam clan, the most important one is the help of Type II telecommunication enterprises on platform installation and set up telephone control room . Subsequently, they can “gain huge fraud income”. Finally, the study suggests: (1) Executive Yuan organizes the cross-department anti-fraud project team; (2) grant NCC with broad and effective administrative audit authorization and increase the number of administrative audit specialists to carry out audit duties; (3) review the differences of juridical system across the strait and the issue regarding joint fight against crime; (4) promote and establish information exchange platform regarding global fighting and preventing telecommunication fraud through Asia/Pacific Group on Money Laundering(APG), Egmont Group, ARIN-AP, International Association of Chiefs of Police (IACP) social governmental and private international organizations. Aiming at the globalized telecommunication fraud, only the promotion and cooperation of cross strait governments as well as opening the investigation and rapid exchange of international juridical police toward online telecommunication and financial information may effectively suppress and eliminate the crime and create win-win situation.
LIN, PING-I., e 林秉毅. "Liability of Internet Service Providers for User Content". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/39hpjq.
Testo completo國立高雄大學
法律學系碩士班
106
With the development of the Internet, we move into the Web2.0 era. Social networking website like Facebook plays a vital role in the Web2.0 era. In the Web2.0 era, user generated content on the Internet. But sometimes user’s action in cyberspace maybe invaded other’s rights. The person of the right which be stricken isn’t easy to find the infringer, and the victim needs to takes a lot of time and money to claim for removal of damage or compensate for damages. On the contrary, the Internet Service Provider can easily remove the infringement of right on it’s platform. Although the copyright act in Republic of China has standarded the limitations on civil liability for Internet Service Providers, the other laws have not. This article wants to research the law and case of the United States, such as The Communications Decency Act, The Digital Millennium Copyright Act, and Directive on electronic commerce of the European Union, as well as the law and case of the People's Republic of China. Finding and building a set of legal standard related to the limitations on all liability for Internet Service Providers.
Rehbock, Sascha. "Trustworthy clients : extending TNC for integrity checks in web-based environments : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science in Computer Science in the University of Canterbury /". 2008. http://hdl.handle.net/10092/2369.
Testo completoHung, Jen-Feng, e 洪任鋒. "A Study on Network Security Services Selection Models for Internet Service Providers". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/77436647180745419010.
Testo completo世新大學
資訊管理學研究所(含碩專班)
101
With the Tablet PC, smart phones, cloud application services and rapid development of the global Internet and e-commerce applications, the various methods of attack evolving, global enterprise network abnormal flow attack led to the amount of economic and commercial losses, up to tens of millions of dollars a year. Supplier advantages of using the Internet, combined with network security services. The study Internet service provide in the selection of network security services, the decision-making considerations mode, Internet experts and scholars of the relevant decision-making criteria and evaluation factors, and thus defined in the Internet-vendor environment. Internet service provide, the research study, the first analysis through historical documents compiled with experts and scholars explore, define assessment dimensions and factors summarized selection mode structure of bread containing defense capability, cost price, customer service and operational management, and use of the Analytic Hierarchy Process to evaluate the weight values calculated selection model of network security services. Internet service provide in the selection of network security services based on holistic analysis of study results, consideration needs to the stability of the Internet, the future development of technology, crisis management, functional reliability and maintenance costs for priority consideration target. Network security service providers can also take advantage of the research and analysis, statistical data, design services required to comply with Internet service provide of goods. Nor does the ban of this study include marketing strategies, customer Kansai industries combined and the scope of the supply chain considerations.
Huang, Tsan-tang, e 黃燦堂. "Cybercrime Investigation Procedures and Liabilities of Internet Service Providers". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/03409685000063442580.
Testo completo國立高雄第一科技大學
科技法律研究所
98
Internet is one of symbolic technology in this era. People might feel uncomfortable without surfing the web for even just one second, and even some mental diseases like Internet addiction disorder appears. Since those events happened in reality will also happened in the in the virtual world, problems in the real world are also needed to be discussed when those problems are occurred on the Internet. There are two features with the Internet: anonymity, and easy accessibility. These factors make people to express their opinion or take action on certain topic on the Internet that they would not to do in reality. These actions might include committing crimes. Types of cybercrime are various, but the punishment to these crimes might be controversial in some aspects. For example, Sexual transaction is a more controversial crime than other criminal actions on the Internet. Legislators attempt to define those criminal actions which cause people to involve in the sexual transaction and to convict those involved criminals through ambiguous legal concepts and this idea could be illustrated by the Article 29 of Child and Youth Sexual Transaction Prevention Act. The investigation approaches to sexual transaction on the Internet have been changing along with the different methods prosecutors and police officers adopt. The investigation of Internet crime is also a challenge to the constitutional freedom of speech. Conventional legal approaches might not be effective enough to the process of investigation. On the other hand, some practical methods which might be against Constitution during inspection could be controversial as well. Cybercrime happened in a virtual space; conventional methods of investigation are conducted in reality. Without real space and visible weapon for criminal purposes, it would be problematic for prosecutors and police officers to investigate through conventional skills. Moreover, law enforcement might change theories and territories of crime and then collect evident against the standard procedures because of the limitation and the lack of technology skills. These problems will be illustrated in this paper. Internet service providers are crucial to the Internet users. During inspection, provision of users’ personal information and email records or aid of tracking certain users’ communication statues from Internet service providers are essential for investigation. In other words, these service providers need the reform of law systems which enable them provide information legally. To discuss the investigation of cybercrime and the responsibility of Internet service providers is the main topic of this paper.
Wu, Hung-Min, e 吳宏敏. "Stretegic Management and Decision Analysis of Internet Service Providers". Thesis, 1997. http://ndltd.ncl.edu.tw/handle/80910137104420423853.
Testo completo國立交通大學
交通運輸研究所
85
Recently, the number of Internet users has been drastically increasing dueto the popularity of the commercial application of Internet. To meet the need of users, a new service - Internet Service Provider (ISP), whose main service is to provide enterprises and the public to use Internet, is developed. Therefore,realizing the characteristics of Internet users and ISP will help the providers to develop proper operation strategies. This research investigates the characteristics of Internet users and the ISP market through a questionnaire survey. The ISP market is then segmented and the strength/ weakness,opportunities/threats for each segmented market are analyzed.Operation strategies for each market are developed using SWOT analysis. Finally, fuzzy AHPis employed to combine the opinions of specialists, scholars and providers to decide the appropriate operation strategies.The result divides ISP into two types: Type I providers have backbone network framework, and the priority of their operation strategies is to enhance the network technology and functions, emphasize both on localization and internationalization,innovate marketing and cooperatewith competitors,etc.Type II providers do not have backbone network framework,so the priority of their operation strategies is to integrate network services, cooperate with relative businesses, agent selling, and organize trade alliances, etc.
Hung, Chiu-Lin, e 洪萩玲. "Limitations on Copyright Infringement Liability of Internet Service Providers". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/94475337592511192958.
Testo completo