Teses / dissertações sobre o tema "Analysis protocol"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Analysis protocol".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Brachfeld, Lawrence J. "Mobile internet protocol analysis". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.
Texto completo da fonte"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions". Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Texto completo da fonteO'Shea, Nicholas. "Verification and validation of security protocol implementations". Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Texto completo da fonteDobson, Lucas E. "Security analysis of session initiation protocol". Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Texto completo da fonteThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian, e Manjinder Singh. "Web API protocol and security analysis". Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Texto completo da fonteDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jayaswal, Tanu. "Events-induced tourism: a protocol analysis". AUT University, 2010. http://hdl.handle.net/10292/897.
Texto completo da fonteJang, Beakcheol. "Wireless MAC Protocol Design and Analysis". NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.
Texto completo da fonteLu, Chun, e Jian Song. "Protocol Analysis for Networked Acquirement System". International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.
Texto completo da fonteThis paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
Hsu, Yating. "Formal Analysis of Network Protocol Security". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Texto completo da fonteChu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /". The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.
Texto completo da fontePfeffer, Mary Graves. "Venture Capital Investment and Protocol Analysis". Thesis, North Texas State University, 1987. https://digital.library.unt.edu/ark:/67531/metadc331014/.
Texto completo da fonteMajeed, Adnan. "TARMAC timing analysis resilient MAC protocol /". Diss., Online access via UMI:, 2007.
Encontre o texto completo da fonteAhmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol". Ottawa.:, 1999.
Encontre o texto completo da fonteTalkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis". Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.
Texto completo da fonteFiring, Tia Helene. "Analysis of the Transport Layer Security protocol". Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10025.
Texto completo da fonteIn this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these protocols were deemed secure as well. All the security proofs are based on the UC (Universal Composability) security framework.
Hui, Daniel Hang-Yan. "Protocol validation via reachability analysis : an implementation". Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24689.
Texto completo da fonteScience, Faculty of
Computer Science, Department of
Graduate
Hoffmeister, Chris W. "An evaluation methodology for protocol analysis systems". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FHoffmeister.pdf.
Texto completo da fonteThesis Advisor(s): George W. Dinolt, Jonathan Herzog. "March 2007." Includes bibliographical references (p. 237-239). Also available in print.
Khan, Muhammad Rashid. "Performance and route stability analysis of RPL protocol". Thesis, KTH, Reglerteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102884.
Texto completo da fonteBao, Wei. "Modeling, analysis and enhancement of transmission control protocol". Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/36990.
Texto completo da fonteÅhman, Stefan, e Marcus Wallstersson. "EVH2 protocol : Performance analysis and Wireshark dissector development". Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98689.
Texto completo da fonteEVH2 är ett proprietärt applikationslagerprotokoll utvecklat av Aptilo Networks som används i deras mjukvaruprodukt. För närvarande kan EVH2-trafik endast inspekteras med deras egenutvecklade applikation. Denna applikation har inte något stöd för att inspektera annan trafik än EVH2. Eftersom Aptilo kontinuerligt utvecklar detta protokollet är det viktigt att kunna se hur förändringar i protokollet påverkar dess prestanda. Detta examenarbete undersöker möjliga sätt att underlätta användningen och utvecklingen av protokollet. För att kunna inspektera EVH2-trafik tillsammans med trafik från andra protokoll behövs en annan lösning än den nuvarande. Wireshark är en applikation som har stöd för att inspektera flera protokoll samtidigt där protokollpaketen avkodas med dissectors (dissektorer översatt till svenska). I detta examensarbete beskrivs och utvärderas utvecklingen av ett Wireshark dissector plugin för inspektion av EVH2-trafik. Genom att prestandatesta EVH2 kan prestandaskillnader påvisas vid förändringar i protokollet. Detta examensarbete tar fram en plattform för prestandautvärdering genom att introducera en testsvit för prestandatestning. Den utvecklade testsviten användes för att utföra prestandtestning av EVH2.
Kaphuka, Samuel. "The SADC protocol on trade: a critical analysis". Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/19788.
Texto completo da fonteBaker, Robert E. "A study of novice systems analysts' problem solving behaviors using protocol analysis". Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23782.
Texto completo da fonteParel, Ilaria. "Validation and application of a shoulder ambulatory motion analysis protocol". Doctoral thesis, Università degli studi di Trieste, 2013. http://hdl.handle.net/10077/8530.
Texto completo da fonteLe principali attività di ricerca svolte durante il dottorato hanno riguardano la validazione e caratterizzazione dell’applicabilità di un protocollo per l’analisi della cinematica di spalla in ambito clinico (ISEO - INAIL Shoulder and Elbow Outpatient protocol). Lo scopo principale era quello di creare uno strumento che fornisse al personale sanitario informazioni sulla performance motoria dei pazienti, supportando, con informazioni di tipo quantitativo, la valutazione ambulatoriale delle patologie della spalla. E’ possibile suddividere l’attività di ricerca in tre temi principali: caratterizzazione e validazione di ISEO; applicazione di ISEO per valutazioni di tipo clinico; applicazione di ISEO per valutazione di performance motoria in ambito sportivo. Grazie ai processi di validazione e caratterizzazione svolti e alle applicazioni di ISEO, ad oggi il protocollo può essere utilizzato in studi clinici e sportivi riguardanti la cinematica di spalla (coordinazione scapolo-omerale), per i quali la sensibilità dello strumento può essere considerata adatta alle esigenze valutative.
The main research activities carried out during the PhD were related to the validation and characterization of the applicability of a protocol for the analysis of the kinematics of the shoulder in a clinical setting (ISEO - Shoulder and Elbow INAIL Outpatient protocol). The main purpose was to create a tool that provides quantitative information about the motor performance of patients, supporting clinicians for the assessment of ambulatory shoulder disorders. The research activity can be split in three main themes: characterization and validation od ISEO; application of ISEO for clinical assessments; application of ISEO for sport performance assessments. Thanks to the validation and characterization of the protocol and its application in several contests, it can be concluded that ISEO can be used to evaluate the kinematics of the shoulder (in particular the scapulohumeral coordination) in clinical and sport performance studies, for which the sensitivity of the protocol can be considered appropriate.
XXV Ciclo
1983
Giancecchi, Nicola. "Analysis and Implementation of the Messaging Layer Security Protocol". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/18467/.
Texto completo da fonteOruk, Tufan. "Simulation and analysis of a wireless MAC protocol : MACAW /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA320868.
Texto completo da fonteThesis advisor(s): Gilbert M. Lundy. "September 1996." Includes bibliographical references (p. 73). Also available online.
Tipici, H. Alphan. "Specification and analysis of a high speed transport protocol". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA268941.
Texto completo da fonteKo, Kai-Chung. "Protocol test sequence generation and analysis using AI techniques". Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.
Texto completo da fonteScience, Faculty of
Computer Science, Department of
Graduate
Muriithi, Ndiritu. "Radio local area networks : protocol design and performance analysis". Thesis, University of York, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296384.
Texto completo da fonteCarter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)". Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.
Texto completo da fonteAmoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol". Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.
Texto completo da fonteMcLean, Alexander Brown. "Using an Acceptance and Commitment Training Protocol to Decrease Drug Use". Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5375.
Texto completo da fonteAlmquist, Martin Scott. "Formal specification and analysis of a wireless media access protocol". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304483.
Texto completo da fonteHensley, David P. "A formal specification and analysis of the resource reservation protocol". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369656.
Texto completo da fonte"September 1999". Thesis advisor(s): Gilbert M. Lundy. Includes bibliographical references (p. 55). Also available online.
Leong, Ieng Kit. "Formal analysis of Web Services Atomic Transaction protocol using SPIN". Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2099650.
Texto completo da fonteZuniga, Rodriguez Ricardo Francisco. "A comparative analysis of internet protocol telephony in Latin America /". Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32819.
Texto completo da fonteInternet Telephony is one of the most important developments that has resulted from digitization. It raises several legal-regulatory issues at both domestic and international levels.
This thesis analyzes the existing legal-regulatory framework for Internet Telephony in Latin America, and examines its implications and potential developments in the region.
In order to provide a more solid foundation for this analysis, the first chapter provides an overview of the traditional regulatory framework, and describes the technological and economic underpinnings of Internet Telephony.
The second chapter studies the regulatory frameworks for Internet Telephony that have been adopted by Canada, the United States and the European Union. These frameworks could serve as models and provide further guidance to analyze the approaches taken to regulate Internet Telephony in Latin America.
Finally, the third chapter examines the three existing legal-regulatory approaches to Internet Telephony that have been adopted in Latin America and its potential implications.
Charbonneau, Lauren J. "A specification and analysis of the IEEE token bus protocol". Thesis, Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/30633.
Texto completo da fonteIn this thesis a formal description technique, systems of communicating machines, is used to specify and analyze a token bus protocol. A simplified description of the protocol is given, and proofs of certain correctness properties presented. The analysis proves that the protocol is free from deadlocks and non executable transitions, and also that successful message transfer is guaranteed for a network with an arbitrary number of machines. A program written in an object oriented language, C++, demonstrates that the description technique, the specification, and the analysis of the protocol is complete and accurate for a network of three stations. The specification is then extended to allow the transmission of different types of messages, errors in the communication channel, acknowledgements from the receiver, and timeouts.
Khongpun, Somsook. "Composing processes of Thai high school students : a protocol analysis". Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/862270.
Texto completo da fonteDepartment of English
Raiche, Carl A. "A specification and analysis of the IEEE token ring protocol". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/27279.
Texto completo da fonteLiang, Robert, Bruce Kwan e Cedric Florens. "ON THROUGHPUT ANALYSIS OF THE MARS IN-SITU ARQ PROTOCOL". International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/607709.
Texto completo da fonteCombating harsh and unpredictable channel environments is a part of the design of any in-situ communication system (i.e. rover to lander, rover to orbiter, etc.). Channel characteristics can range from simple additive white Gaussian noise (AWGN) channels to more bursty fading channels found in rover to orbiter links (i.e. canyon scenarios and typical orbiter passes around mountain ranges). A combination of forward error correction and automatic repeat request (ARQ) schemes are commonly used to provide a more robust communications link. ARQ enhances the communication link particularly for bursty fading channels. Go-Back-N is a commonly used ARQ scheme and is an option in the newly developed Consultative Committee for Space Data Systems (CCSDS) Proximity-1 Link protocol [7], a data link layer protocol targeted specifically for in-situ applications. Optimization of frame sizes and retransmission persistence of the ARQ scheme require a good analytical model of how the scheme performs over various channel conditions. In this paper, an analytical framework for modeling the COP-1 protocol is presented for both AWGN channels along with bursty fading channels. A Gilbert-Elliot two-state Markov model is used to model a bursty fading channel.
Kulkarni, Upendra M. "Performance analysis of HDLC protocol operating in asynchronous balanced mode". Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/45897.
Texto completo da fonteThe objective of this work is to analyze the performance of HDLC Balanced Class of
Procedures under saturated, full-duplex transmission on error prone links. This thesis
extends work done by Bux et al. [8] by considering errors on both the links. Satellite
links have long propogation delays compared to terrestrial links, and hence, have
longer error recovery times. For such links, errors in acknowledgements have considerable
impact on the throughput. In this analysis, the effect of errors in acknowledgements
is taken in to consideration. An analytical approach is used to derive
performance measures. The concept of "virtual transmission time" introduced by Bux
et al is redefined to accommodate the effect of errors in acknowledgements and
used in the analysis. Resulting throughput calculations show how various parameters,
(e.g. transmission rate, propagation delay, error rate and packet size), interact
and determine the performance.
Master of Science
Li, Pan. "Capacity analysis and cross-layer protocol design in wireless networks". [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024777.
Texto completo da fonteNelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol". Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.
Texto completo da fonteChen, Yunli. "Performance analysis and enhancement of MAC protocol for IEEE 802.11WLANs". Cincinnati, Ohio : University of Cincinnati, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1098856121.
Texto completo da fonteMaagh, Stefan. "Performance analysis of the HARQ dynamic decode-and-forward protocol". Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8849.
Texto completo da fonteD'Silva, Anil J. "An analysis on the fairness aspects of the DQDB protocol". Thesis, Queensland University of Technology, 1993.
Encontre o texto completo da fonteDeng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks". Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.
Texto completo da fonteBasaran, Cuneyt. "Automated network protocol reachability analysis with supertrace algorithm and TESTGEN : automated generation of test sequence for a formal protocol specification". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280788.
Texto completo da fonteOndráček, David. "Databáze specifikací bezpečnostních protokolů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.
Texto completo da fonteRobbins, Bryan Thomas. "Cognitive factors in perspective-based reading (PBR) a protocol analysis study /". Master's thesis, Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-161814.
Texto completo da fonteEdwards, Kim. "Cryptographic protocol specification and analysis using coloured Petri nets and Java". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0006/MQ36026.pdf.
Texto completo da fonte