Rozprawy doktorskie na temat „Network architectures”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Network architectures”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Seah, Peng Leong Chung Wai Kong. "Architectures for device aware network /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FSeah.pdf.
Pełny tekst źródłaChung, Wai Kong. "Architectures for device aware network". Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2306.
Pełny tekst źródłaNewton, Todd A., Myron L. Moodie, Ryan J. Thibodeaux i Maria S. Araujo. "Network System Integration: Migrating Legacy Systems into Network-Based Architectures". International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604308.
Pełny tekst źródłaThe direction of future data acquisition systems is rapidly moving toward a network-based architecture. There is a handful of these network-based flight test systems already operating, and the current trend is catching on all over the flight test community. As vendors are churning out a whole new product line for networking capabilities, system engineers are left asking, "What do I do with all of this non-networked, legacy equipment?" Before overhauling an entire test system, one should look for a way to incorporate the legacy system components into the modern network architecture. Finding a way to integrate the two generations of systems can provide substantial savings in both cost and application development time. This paper discusses the advantages of integrating legacy equipment into a network-based architecture with examples from systems where this approach was utilized.
Al-Azez, Zaineb Talib Saeed. "Optimised green IoT network architectures". Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22224/.
Pełny tekst źródłaZheng, Huanyang. "SOCIAL NETWORK ARCHITECTURES AND APPLICATIONS". Diss., Temple University Libraries, 2017. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/470889.
Pełny tekst źródłaPh.D.
Rather than being randomly wired together, the components of complex network systems are recently reported to represent a scale-free architecture, in which the node degree distribution follows power-law. While social networks are scale-free, it is natural to utilize their structural properties in some social network applications. As a result, this dissertation explores social network architectures, and in turn, leverages these architectures to facilitate some influence and information propagation applications. Social network architectures are analyzed in two different aspects. The first aspect focuses on the node degree snowballing effects (i.e., degree growth effects) in social networks, which is based on an age-sensitive preferential attachment model. The impact of the initial links is explored, in terms of accelerating the node degree snowballing effects. The second aspect focuses on Nested Scale-Free Architectures (NSFAs) for social networks. The scale-free architecture is a classic concept, which means that the node degree distribution follows the power-law distribution. `Nested' indicates that the scale-free architecture is preserved when low-degree nodes and their associated connections are iteratively removed. NSFA has a bounded hierarchy. Based on the social network structure, this dissertation explores two influence propagation applications for the Social Influence Maximization Problem (SIMP). The first application is a friend recommendation strategy with the perspective of social influence maximization. For the system provider, the objective is to recommend a fixed number of new friends to a given user, such that the given user can maximize his/her social influence through making new friends. This problem is proved to be NP-hard by reduction from the SIMP. A greedy friend recommendation algorithm with an approximation ratio of $1-e^{-1}$ is proposed. The second application studies the SIMP with the crowd influence, which is NP-hard, monotone, non-submodular, and inapproximable in general graphs. However, since user connections in Online Social Networks (OSNs) are not random, approximations can be obtained by leveraging the structural properties of OSNs. The modularity, denoted by $\Delta$, is proposed to measure to what degree this problem violates the submodularity. Two approximation algorithms are proposed with ratios of $\frac{1}{\Delta+2}$ and $1-e^{-1/(\Delta+1)}$, respectively. Beside the influence propagation applications, this dissertation further explores three different information propagation applications. The first application is a social network quarantine strategy, which can eliminate epidemic outbreaks with minimal isolation costs. This problem is NP-hard. An approximation algorithm with a ratio of 2 is proposed through utilizing the problem properties of feasibility and minimality. The second application is a rating prediction scheme, called DynFluid, based on the fluid dynamics. DynFluid analogizes the rating reference among the users in OSNs to the fluid flow among containers. The third application is an information cascade prediction framework: given the social current cascade and social topology, the number of propagated users at a future time slot is predicted. To reduce prediction time complexities, the spatiotemporal cascade information (a larger size of data) is decomposed to user characteristics (a smaller size of data) for subsequent predictions. All these three applications are based on the social network structure.
Temple University--Theses
Armstrong, James R. "Boolean weightless neural network architectures". Thesis, University of Central Lancashire, 2011. http://clok.uclan.ac.uk/5325/.
Pełny tekst źródłaTham, Kevin Wen Kaye. "Developing security services for network architectures". Queensland University of Technology, 2006. http://eprints.qut.edu.au/16546/.
Pełny tekst źródłaMilosavljevic, Milos. "Integrated wireless-PON access network architectures". Thesis, University of Hertfordshire, 2011. http://hdl.handle.net/2299/6371.
Pełny tekst źródłaCrowley, Patrick. "Design and analysis of architectures for programmable network processing systems /". Thesis, Connect to this title online; UW restricted, 2003. http://hdl.handle.net/1773/6991.
Pełny tekst źródłaPoluri, Pavan Kamal Sudheendra. "Fault Tolerant Network-on-Chip Router Architectures for Multi-Core Architectures". Diss., The University of Arizona, 2014. http://hdl.handle.net/10150/338752.
Pełny tekst źródłaLee, Andrew Sui Tin. "Design of future optical ring network architectures". Thesis, University of Strathclyde, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.415308.
Pełny tekst źródłaPaolino, Carmine. "Large-scale Network Analysis on Distributed Architectures". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1966/.
Pełny tekst źródłaZhang, Yu Ph D. Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science. "Exploring neural network architectures for acoustic modeling". Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/113981.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 121-132).
Deep neural network (DNN)-based acoustic models (AMs) have significantly improved automatic speech recognition (ASR) on many tasks. However, ASR performance still suffers from speaker and environment variability, especially under low-resource, distant microphone, noisy, and reverberant conditions. The goal of this thesis is to explore novel neural architectures that can effectively improve ASR performance. In the first part of the thesis, we present a well-engineered, efficient open-source framework to enable the creation of arbitrary neural networks for speech recognition. We first design essential components to simplify the creation of a neural network with recurrent loops. Next, we propose several algorithms to speed up neural network training based on this framework. We demonstrate the flexibility and scalability of the toolkit across different benchmarks. In the second part of the thesis, we propose several new neural models to reduce ASR word error rates (WERs) using the toolkit we created. First, we formulate a new neural architecture loosely inspired by humans to process low-resource languages. Second, we demonstrate a way to enable very deep neural network models by adding more non-linearities and expressive power while keeping the model optimizable and generalizable. Experimental results demonstrate that our approach outperforms several ASR baselines and model variants, yielding a 10% relative WER gain. Third, we incorporate these techniques into an end-to-end recognition model. We experiment with the Wall Street Journal ASR task and achieve 10.5% WER without any dictionary or language model, an 8.5% absolute improvement over the best published result.
by Yu Zhang.
Ph. D.
Krishnamurthy, Likhita. "Comparative Assessment of Network-Centric Software Architectures". Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/32377.
Pełny tekst źródłaMaster of Science
Duan, Xiao. "DSP-enabled reconfigurable optical network devices and architectures for cloud access networks". Thesis, Bangor University, 2018. https://research.bangor.ac.uk/portal/en/theses/dspenabled-reconfigurable-optical-network-devices-and-architectures-for-cloud-access-networks(68eaa57e-f0af-4c67-b1cf-c32cfd2ee00f).html.
Pełny tekst źródłaVangal, Sriram. "Performance and Energy Efficient Network-on-Chip Architectures". Doctoral thesis, Linköpings universitet, Institutionen för systemteknik, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11439.
Pełny tekst źródłaSuryanarayanan, Deepak. "A Methodology for Study of Network Processing Architectures". NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010720-154055.
Pełny tekst źródłaA new class of processors has recently emerged that encompasses programmable ASICs and microprocessors that can implement adaptive network services. This class of devices is collectively known as Network Processors (NP). NPs leverage the flexibility of software solutions with the high performance of custom hardware. With the development of such sophisticated hardware, there is a need for a holistic methodology that can facilitate study of Network Processors and their performance with different networking applications and traffic conditions. This thesis describes the development of Component Network Simulator (ComNetSim) that is based on such a tech-nique. The simulator demonstrates the implementation of Diffserv applications on a Network Processor architecture and the performance of the system under different network traffic conditions.
Overkamp, Ard Andreas Franciscus. "Discrete event control motivated by layered network architectures". [S.l. : [Groningen] : s.n.] ; [University Library Groningen] [Host], 1996. http://irs.ub.rug.nl/ppn/152809341.
Pełny tekst źródłaGomez, E. Ribes. "Wavelet neural network algorithms and architectures : nonlinear modelling". Thesis, Queen's University Belfast, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.273393.
Pełny tekst źródłaDueser, Michael. "Investigation of advanced optical packet-routed network architectures". Thesis, University College London (University of London), 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401295.
Pełny tekst źródłaAhmed, Aftab. "Enhancement in network architectures for future wireless systems". Thesis, University of York, 2018. http://etheses.whiterose.ac.uk/22080/.
Pełny tekst źródłaTay, Wee Peng. "Decentralized detection in resource-limited sensor network architectures". Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/42910.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaves 201-207).
We consider the problem of decentralized binary detection in a network consisting of a large number of nodes arranged as a tree of bounded height. We show that the error probability decays exponentially fast with the number of nodes under both a Neyman-Pearson criterion and a Bayesian criterion, and provide bounds for the optimal error exponent. Furthermore, we show that under the Neyman-Pearson criterion, the optimal error exponent is often the same as that corresponding to a parallel configuration, implying that a large network can be designed to operate efficiently without significantly affecting the detection performance. We provide sufficient, as well as necessary, conditions for this to happen. For those networks satisfying the sufficient conditions, we propose a simple strategy that nearly achieves the optimal error exponent, and in which all non-leaf nodes need only send 1-bit messages. We also investigate the impact of node failures and unreliable communications on the detection performance. Node failures are modeled by a Galton-Watson branching process, and binary symmetric channels are assumed for the case of unreliable communications. We characterize the asymptotically optimal detection performance, develop simple strategies that nearly achieve the optimal performance, and compare the performance of the two types of networks. Our results suggest that in a large scale sensor network, it is more important to ensure that nodes can communicate reliably with each other(e.g.,by boosting the transmission power) than to ensure that nodes are robust to failures. In the case of networks with unbounded height, we establish the validity of a long-standing conjecture regarding the sub-exponential decay of Bayesian detection error probabilities in a tandem network. We also provide bounds for the error probability, and show that under the additional assumption of bounded Kullback-Leibler divergences, the error probability is (e cnd ), for all d> 1/2, with c c(logn)d being a positive constant. Furthermore, the bound (e), for all d> 1, holds under an additional mild condition on the distributions. This latter bound is shown to be tight. Moreover, for the Neyman-Pearson case, we establish that if the sensors act myopically, the Type II error probabilities also decay at a sub-exponential rate.
(cont.) Finally, we consider the problem of decentralized detection when sensors have access to side-information that affects the statistics of their measurements, and the network has an overall cost constraint. Nodes can decide whether or not to make a measurement and transmit a message to the fusion center("censoring"), and also have a choice of the transmission function. We study the tradeoff in the detection performance with the cost constraint, and also the impact of sensor cooperation and global sharing of side-information. In particular, we show that if the Type I error probability is constrained to be small, then sensor cooperation is not necessary to achieve the optimal Type II error exponent.
by Wee Peng Tay.
Ph.D.
Zoumpoulis, Spyridon Ilias. "Decentralized detection in sensor network architectures with feedback". Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/52775.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 73-74).
We investigate a decentralized detection problem in which a set of sensors transmit a summary of their observations to a fusion center, which then decides which one of two hypotheses is true. The focus is on determining the value of feedback in improving performance in the regime of asymptotically many sensors. We formulate the decentralized detection problem for different network configurations of interest under both the Neyman-Pearson and the Bayesian criteria. In a configuration with feedback, the fusion center would make a preliminary decision which it would pass on back to the local sensors; a related configuration, the daisy chain, is introduced: the first fusion center passes the information from a first set of sensors on to a second set of sensors and a second fusion center. Under the Neyman-Pearson criterion, we provide both an empirical study and theoretical results. The empirical study assumes scalar linear Gaussian binary sensors and analyzes asymptotic performance as the signal-to-noise ratio of the measurements grows higher, to show that the value of feeding the preliminary decision back to decision makers is asymptotically negligible. This motivates two theoretical results: first, in the asymptotic regime (as the number of sensors tends to infinity), the performance of the "daisy chain" matches the performance of a parallel configuration with twice as many sensors as the classical scheme; second, it is optimal (in terms of the exponent of the error probability) to constrain all decision rules at the first and second stage of the "daisy chain" to be equal.
(cont.) Under the Bayesian criterion, three analytical results are shown. First, it is asymptotically optimal to have all sensors of a parallel configuration use the same decision rule under exponentially skewed priors. Second, again in the asymptotic regime, the decision rules at the second stage of the "daisy chain" can be equal without loss of optimality. Finally, the same result is proven for the first stage.
by Spyridon Ilias Zoumpoulis.
M.Eng.
Belinkov, Yonatan. "Neural network architectures for Prepositional Phrase attachment disambiguation". Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/91147.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
25
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 41-44).
This thesis addresses the problem of Prepositional Phrase (PP) attachment disambiguation, a key challenge in syntactic parsing. In natural language sentences, a PP may often be attached to several possible candidates. While humans can usually identify the correct candidate successfully, syntactic parsers are known to have high error rated on this kind of construction. This work explores the use of compositional models of meaning in choosing the correct attachment location. The compositional model is defined using a recursive neural network. Word vector representations are obtained from large amounts of raw text and fed into the neural network. The vectors are first forward propagated up the network in order to create a composite representation, which is used to score all possible candidates. In training, errors are back-propagated down the network such that the composition matrix is updated from the supervised data. Several possible neural architectures are designed and experimentally tested in both English and Arabic data sets. As a comparative system, we offer a learning-to-rank algorithm based on an SVM classifier which has access to a wide range of features. The performance of this system is compared to the compositional models.
by Yonatan Belinkov.
S.M. in Computer Science and Engineering
Djarallah, Nabil Bachir. "Network architectures for inter-carrier QoS-capable services". Rennes 1, 2011. http://www.theses.fr/2011REN1S099.
Pełny tekst źródłaLe challenge pour les opérateurs, aujourd’hui, réside dans la fourniture de services à valeur ajoutée à leurs utilisateurs mais aussi et surtout aux utilisateurs d'autres opérateurs. Ces services traversent plusieurs réseaux et exigent des garanties en termes de Qualité de Service (QoS). Pourtant, les protocoles actuels de routage inter-opérateur présentent encore des limitations en termes de garantie de QoS. La complexité de la mise en place de tels services inter-opérateurs à valeur ajoutée est due à des raisons techniques (par ex. Hétérogénéité des réseaux, passage à l’échelle, confidentialité de la topologie des réseaux de chaque opérateur, dimensionnement des ressources, etc. ), et économiques ou politiques (par ex. Partage des revenus, coopération inter-opérateur). Pour atténuer ces inquiétudes, nous suggérons la création d’alliances d’opérateurs prêts à coopérer. Bien que cela ne réponde pas totalement au challenge évoqué ci-dessus, ces alliances de confiance permettraient de relâcher ces contraintes. Pour accompagner cette démarche et permettre la mise en place de services à valeur ajoutée dépassant les frontières d’un seul opérateur, une réflexion autour des architectures des réseaux de nouvelle génération, des protocoles et des algorithmes associés est indispensable. Dans cette thèse nous présentons différentes architectures permettant le déploiement de tels services, ainsi que des solutions algorithmiques et protocolaires pour la négociation de contrats de services et la vérification de la disponibilité des ressources du réseau traversant plusieurs opérateurs. Nous démontrons que les performances de ces algorithmes sont compétitives par rapport à d’autres travaux
McLaughlin, Kieran Jude. "Advanced search and sort architectures for network processing". Thesis, Queen's University Belfast, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485051.
Pełny tekst źródłaSadat, Mohammad Nazmus. "QoE-Aware Video Communication in Emerging Network Architectures". University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin162766498933367.
Pełny tekst źródłaSezer, Sakir. "An investigation into novel ATM switch architectures". Thesis, Queen's University Belfast, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314143.
Pełny tekst źródłaSarpangala, Kishan. "Semantic Segmentation Using Deep Learning Neural Architectures". University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin157106185092304.
Pełny tekst źródłaWang, Kongxun. "Performance optimization with integrated consideration of routing, flow control, and congestion control in packet-switched networks". Diss., Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/8305.
Pełny tekst źródłaDiana, Gary M. "Internetworking : an analysis and proposal /". Online version of thesis, 1990. http://hdl.handle.net/1850/10605.
Pełny tekst źródłaBecker, Russell W. "A test bed for detection of botnet infections in low data rate tactical networks". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FBecker.pdf.
Pełny tekst źródłaThesis Advisor(s): JMcEachen, John ; Tummala, Murali. "September 2009." Description based on title screen as viewed on November 04, 2009. Author(s) subject terms: Botnet, Tactical Network, BotHunter, Honeynet, Honeypot, Low Data Rate, Network Security Includes bibliographical references (p. 57-59). Also available in print.
Nordström, Erik. "Challenged Networking : An Experimental Study of new Protocols and Architectures". Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9002.
Pełny tekst źródłaNguyen, Thanh Vinh. "Content distribution networks over shared infrastructure a paradigm for future content network deployment /". Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.094632/index.html.
Pełny tekst źródłaChobineh, Amirreza. "Influence of new network architectures and usages on RF human exposure in cellular networks". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT019.
Pełny tekst źródłaIn coming years, there will be a sharp growth in wireless data traffic due to the increasing usage of mobile phones and implementation of IoT technology. Therefore, mobile network operators aim to increase the capacity of their networks, to provide higher data traffic with lower latency, and to support thousands of connections. One of the primary efforts toward these goals is to densify today's cellular Macrocell networks using Small cells to bring more coverage and higher network capacity. Small cell antennas emit lower power than Macrocells and are often deployed at low heights. As a consequence, they are closer to the user and can be implemented massively. The latter can result in an important raise in public concerns. Mobile phones are used on the one hand, for a large variety of data usages that require different amounts of data and throughput and on the other hand for making phone calls. Voice over IP applications such as Skype has become very popular since they provide cheap international voice communication and can be used on mobile devices. Since LTE systems only support packet services, the voice service uses Voice over LTE technology instead of classical circuit-switched voice technology as in GSM and UMTS. The main objective of this thesis is to characterize and analyse the influence of new network architectures and usages on the actual human exposure induced by cellular networks. In this regard, several measurement campaigns were carried out in various cities and environments. Regarding the EMF exposure in heterogeneous networks, results suggest that by implementing Small cells, the global exposure (i.e. exposure induced by mobile phone and base station antenna) reduces due to the fact that by bringing the antenna closer to the user the emitted power by mobile phone and the usage duration reduce owing to power control schemes implemented in cellular network technologies. However, the magnitude of exposure reduction depends on the location of the Small cell with respect to Macrocells. Moreover, to assess the EMF exposure of indoor users induced by Small cells, two statistical models are proposed for the uplink and downlink exposures in an LTE heterogeneous environment based on measurements. The last part of the thesis was devoted to the assessment of the exposure for new types of usages through measurements. Results suggest that the amount of uplink emitted power and the emission time duration by a mobile phone is highly dependent on the usage and network technology. Voice call communications require a continuous and generally low throughput in order to maintain the communication during the call. On the contrary, in data usage, the mobile phone requires higher data and throughput to perform the task as fast as possible. Therefore during a voice call even if the user is using the mobile phone for a relatively long time, the exposure time duration should be lower since the usage does not require high amounts of data. The temporal occupation rate for several types of voice calls for different technologies is assessed through measurements
Ganti, Sudhakar N. M. "Access protocols and network architectures for very high-speed optical fiber local area networks". Thesis, University of Ottawa (Canada), 1993. http://hdl.handle.net/10393/6917.
Pełny tekst źródłaPatel, Kavita Beard Cory. "Alternate optical network architectures SONET or all optical Mesh /". Diss., UMK access, 2004.
Znajdź pełny tekst źródła"A thesis in computer science." Typescript. Advisor: Cory Beard. Vita. Title from "catalog record" of the print edition Description based on contents viewed Feb. 28, 2006. Includes bibliographical references (leaves 117-118). Online version of the print edition.
Al-Daraiseh, Ahmad. "GENETICALLY ENGINEERED ADAPTIVE RESONANCE THEORY (ART) NEURAL NETWORK ARCHITECTURES". Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3171.
Pełny tekst źródłaPh.D.
Department of Electrical and Computer Engineering
Engineering and Computer Science
Computer Engineering
Engel, Jacob. "OFF-CHIP COMMUNICATIONS ARCHITECTURES FOR HIGH THROUGHPUT NETWORK PROCESSORS". Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4112.
Pełny tekst źródłaPh.D.
Department of Electrical and Computer Engineering
Engineering and Computer Science
Computer Engineering
Sammut, Karl M. "Investigations of linear array architectures for neural network support". Thesis, University of Nottingham, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335891.
Pełny tekst źródłaKoh, Jin Hou. "Simulation modeling and analysis of device-aware network architectures". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FKoh.pdf.
Pełny tekst źródłaGao, Meihui. "Models and Methods for Network Function Virtualization (NFV) Architectures". Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0025/document.
Pełny tekst źródłaDue to the exponential growth of service demands, telecommunication networks are populated with a large and increasing variety of proprietary hardware appliances, and this leads to an increase in the cost and the complexity of the network management. To overcome this issue, the NFV paradigm is proposed, which allows dynamically allocating the Virtual Network Functions (VNFs) and therefore obtaining flexible network services provision, thus reducing the capital and operating costs. In this thesis, we focus on the VNF Placement and Routing (VNF-PR) problem, which aims to find the location of the VNFs to allocate optimally resources to serve the demands. From an optimization point of view, the problem can be modeled as the combination of a facility location problem (for the VNF location and server dimensioning) and a network design problem (for the demands routing). Both problems are widely studied in the literature, but their combination represents, to the best of our knowledge, a new challenge. We start working on a realistic VNF-PR problem to understand the impact of different policies on the overall network management cost and performance. To this end, we extend the work in [1] by considering more realistic features and constraints of NFV infrastructures and we propose a linear programming model and a math-heuristic to solve it. In order to better understand the problem structure and its properties, in the second part of our work, we focus on the theoretical study of the problem by extracting a simplified, yet significant variant. We provide results on the computational complexity under different graph topology and capacity cases. Then, we propose two mathematical programming formulations and we test them on a common testbed with more than 100 different test instances under different capacity settings. Finally, we address the scalability issue by proposing ILP-based constructive methods and heuristics to efficiently deal with large size instances (with up to 60 nodes and 1800 demands). We show that our proposed heuristics can efficiently solve medium size instances (with up to 30 nodes and 1000 demands) of challenging capacity cases and provide feasible solutions for large size instances of the most difficult capacity cases, for which the models cannot find any solution even with a significant computational time
Alasadi, Emad Younis. "Enhancing network scalability by introducing mechanisms, architectures and protocols". Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/15874.
Pełny tekst źródłaAncajas, Dean Michael B. "Design of Reliable and Secure Network-On-Chip Architectures". DigitalCommons@USU, 2015. https://digitalcommons.usu.edu/etd/4150.
Pełny tekst źródłaFranovic, Tin. "Cortex inspired network architectures for spatio-temporal information processing". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142453.
Pełny tekst źródłaMummaneni, Avanthi. "Analysis of the enzymatic network". Diss., Columbia, Mo. : University of Missouri-Columbia, 2005. http://hdl.handle.net/10355/4285.
Pełny tekst źródłaThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (January 22, 2007) Includes bibliographical references.
Morley, George David. "Analysis and design of ring-based transport networks". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60329.pdf.
Pełny tekst źródłaMotiwala, Murtaza. "An architecture for network path selection". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43576.
Pełny tekst źródłaShah, Zawar Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Location tracking architectures for wireless VoIP". Publisher:University of New South Wales. Electrical Engineering & Telecommunications, 2009. http://handle.unsw.edu.au/1959.4/43324.
Pełny tekst źródłaLong, Weili. "On the topology design of hose-model VPN networks /". View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LONG.
Pełny tekst źródła