Дисертації з теми "Internet – Gestion"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Internet – Gestion".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet." Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Повний текст джерелаAbdelnur, Humberto Jorge Festor Olivier. "Gestion de vulnérabilités voix sur IP." S. l. : Nancy 1, 2009. http://www.scd.uhp-nancy.fr/docnum/SCD_T_2009_0005_ABDELNUR.pdf.
Повний текст джерелаFodil, Idir Bahaa. "Architectures de Gestion par Politiques des Services dans les Réseaux d'Accès Internet." Paris 6, 2004. http://www.theses.fr/2004PA066118.
Повний текст джерелаAbdelnur, Humberto Jorge. "Gestion de vulnérabilités voix sur IP." Thesis, Nancy 1, 2009. http://www.theses.fr/2009NAN10005/document.
Повний текст джерелаVoIP networks are in a major deployment phase and are becoming widely accepted due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality. Assuring its security becomes crucial. Among the most dangerous threats to VoIP, failures and bugs in the software implementation will continue rank high on the list of vulnerabilities. This thesis provides three contributions towards improving software security. The first is a VoIP specific security assessment framework integrated with discovery actions, data management and security attacks allowing to perform VoIP specific assessment tests. The second contribution consists in an automated approach able to discriminate message signatures and build flexible and efficient passive fingerprinting systems able to identify the source entity of messages in the network. The third contribution addresses the issue of detecting vulnerabilities using a stateful fuzzer. It provides an automated attack approach capable to track the state context of a target device and we share essential practical experience gathered over a two years period in searching for vulnerabilities in the VoIP space
Boudani, Ali. "Routage multicast : gestion des petits groupes et ingenierie de trafic." Rennes 1, 2004. http://www.theses.fr/2004REN10049.
Повний текст джерелаOuld, Cheik El Mehdi Saadbouh. "Un nouveau mécanisme de gestion de flux temps réel basé sur le paramètre échéance et son intégration dans l' Internet." Paris 13, 2007. http://www.theses.fr/2007PA132004.
Повний текст джерелаKaddah, Rim. "Gestion active de la demande basée sur l'habitat connecté." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0025/document.
Повний текст джерелаThe Internet of Things (IoT) paradigm brings an opportunity for advanced Demand Response (DR) solutions. Indeed, it enables visibility and control on the various appliances that may consume, store or generate energy within a home. In this thesis, we consider solutions having the capability to produce direct control decisions at different granularities based on variables measured at homes. Control schemes are driven by an optimization based on utility functions. These functions are defined based on a generic approach that considers load’s flexibility and the impact of control decisions on users. The proposed approach does not impose any restrictions on the type of controlled appliances nor on the granularity of control decisions. This enables joint control of heterogeneous loads. We consider three types of control architectures, namely centralized, partially distributed and fully distributed solutions. Schemes based on these architectures differ in the distribution of decision making among entities involved in the control and data that is made available to these entities. Numerical analysis shows the trade-offs of proposed solutions from a performance, scalability and complexity perspectives
Saleh, Dalia. "Santé mentale et gestion du stress chez des étudiants à l’université : mise en place et évaluation d’un programme de gestion du stress par internet." Thesis, Paris 10, 2017. http://www.theses.fr/2017PA100024/document.
Повний текст джерелаContext: University students are the most affected by stress, psychological distress and their consequences (physical and mental). They are more vulnerable to mental disorders than the general population and other students because of the many changes and responsibilities that come with studying at the university. On the one hand, this thesis aims to better understand the psychological ill being of university students, and on the other hand, to look at ways to face this problem.Format of the thesis: This thesis is articulated in two axes. The first focuses on the evaluation of mental health, including stress, among a sample of university students (Part I: Mental Health among University Students: Theoretical Perspectives and Empirical Studies). The second focuses on the development and the evaluation of a stress management intervention for these students (Part II: Students Stress Management: Theoretical Perspectives and Empirical Studies). For each, a review of the literature on the concepts studied, as well as a review of empirical studies, was conducted in the form of articles (published or in progress). The purpose of this dissertation is therefore dual and is articulated around ten articles;Conclusion: Despite some limitations, our results constitute new and promising contributions on stress management online for university students. This proposal for an intervention online could be particularly aimed at students who do not consult
Cases, Anne-Sophie. "La réduction du risque dans le contexte de l'achat électronique sur internet." Montpellier 2, 2001. http://www.theses.fr/2001MON20065.
Повний текст джерелаKoussa, Chokri. "Implantation d’un système d’information géographique 3D sur Internet pour la gestion des modèles urbains." Strasbourg, 2011. https://publication-theses.unistra.fr/public/theses_doctorat/2011/KOUSSA_Chokri_2011.pdf.
Повний текст джерелаDue to a lot of reasons, i. E. Continuous progress of computer tools in terms of software and hardware, the development of powerful spatial data acquisition tools, the generalization of spatial data and applications for an extended use, etc. A lot of spatial applications, more and more sophisticated, are carried out either as free or commercial tools. The Geographic Information Systems (GIS) are proving to be major consumers of geo-referenced data. They consists in adequate, or even the most appropriate, tools for using such kind of data. Indeed, they offer various features that focus especially on the management, interrogation and representation of spatial data. The real beginning of GIS generalization was in the 1990s. But then, given the limits of computer tools, GIS were mainly interested in 2D spatial data. While at the late 1990s and during the first decade of the 21st century, GIS developers are oriented to the 3rd dimension for spatial data representation. The concept of 3D GIS then became ubiquitous and a widespread research topic around the world. As the progress of GIS is related mainly to advances in computer technology, Internet has become fastly a very promising way for the online dissemination of GIS applications. Thus, the 2D GIS are now multiple over Internet, while 3D GIS are rare. It is in this context that joins our thesis work. Indeed, the main objective is to develop a 3D GIS prototype accessible via Internet. Because GIS are multidisciplinary tools since they rely on very different concepts and technologies (data modeling, databases, development tools, 3D, etc. ), Our thesis work will focus on the basic concepts of 3D GIS, i. E. Three-dimensional spatial data modeling, spatial databases modeling (BDS, spatial data integration in the BDS), carrying out a reflection on the querying functionality of spatial data, a Web application development to access online all services offered by the GIS, etc. As for the technologies to be used for the development of GIS, our choices were oriented mainly to the free tools. The objective is to study the various technologies implemented and their combination for the establishment of a functional 3D GIS accessible over Internet
MAY, MARTIN. "Evaluation quantitative des nouveaux mecanismes de gestion de la qualite de service dans internet." Nice, 1999. http://www.theses.fr/1999NICE5331.
Повний текст джерелаDabbebi, Oussema. "Gestion des risques dans les infrastructures VoIP." Electronic Thesis or Diss., Université de Lorraine, 2013. http://www.theses.fr/2013LORR0044.
Повний текст джерелаIP telephony has become a new paradigm that permits to establish and transmit voice communications with IP networks. Its deployment has been accelerated by the standardization of dedicated signaling protocols. However, VoIP services are faced to several security issues which are inherited from the IP layer or specific to the service. A large variety of protection mechanisms are available to deal with them. However, IP telephony is a real-time service which requires high network performance. The application of countermeasures may significantly affect such a critical service. Risk management provides new perspectives for this issue. This thesis deals with the application of risk management in VoIP infrastructures. The first axis consists in the automation of the risk management process in VoIP enterprise network. In this context, we have developed a mathematical model for assessing risk, a set of progressive countermeasures to counter attackers and mitigation algorithms that evaluate the risk level and takes the decision to activate a subset of countermeasures. To improve our strategy, we have coupled it with an anomaly detection system based on SVM and a self-configuration mechanism which provides feedback about countermeasure efficiency. The second axis deals with the extension of our adaptive risk strategy to P2PSIP infrastructures. We have implemented a specific risk model and a dedicated set of countermeasures with respect to its peer-to-peer nature. For that, we have identified attack sources and established different threat scenarios. We have analyzed the RELOAD framework and proposed trust mechanisms to address its residual attacks. Finally, the third axis focuses on VoIP services in the cloud where we have proposed a risk strategy and several strategies to deploy and apply countermeasures
Khouaja, Youssef. "Une méthode de contrôle par le réseau appliquée à la gestion hiérarchique de la mobilité IPv6." Rennes 1, 2002. http://www.theses.fr/2002REN10114.
Повний текст джерелаSagar, Samya. "Gestion intelligente de réseaux de capteurs, intégrés à des vêtements sportifs instrumentés." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0129/document.
Повний текст джерелаThe Internet of Things (IoT) integrates sensor networks with the Internet, and paves the way for systems or ecosystems to help people live in both physical and cyber worlds. IoT offers the ubiquity of objects that are able to interact with each other and cooperate with their neighbors to achieve common goals. These objects, called "Smart" (SO), can detect the environment and communicate with other objects. The creation of SO and IoT system involves actors of very diverse expertise. Hence, it becomes essential to have standardized and semantic descriptions to solve the problems related to the interoperability and the semantic heterogeneity between the different available resources on the one hand, and between the different stakeholders designing/manufacturing the SO, on the other hand. Therefore, we have proposed the FSMS semantic and generic framework, which is structured into a set of ontological modules to design/manufacture a given SO. A support methodology for this framework has been equally proposed. It is based on the same ontological modules identified in the semantic component of the FSMS. These ontological modules form the SMS ontology that is proposed and constitutes the corner stone of this thesis. In order to intelligently manage an SO design, we proposed a generic process based on a semantic description of the structural and behavioral components of an SO. This process was thereafeter implemented for Smart Clothing of sports. This Sportswear is intended to be used in different contexts of use, an approach to reconfiguration/adaptation of the operation of the Smart Clothing has been proposed. This one is also based on the modular ontology SMS
Billet, Benjamin. "Système de gestion de flux pour l'Internet des objets intelligents." Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS012V/document.
Повний текст джерелаThe Internet of Things (IoT) is currently characterized by an ever-growing number of networked Things, i.e., devices which have their own identity together with advanced computation and networking capabilities: smartphones, smart watches, smart home appliances, etc. In addition, these Things are being equipped with more and more sensors and actuators that enable them to sense and act on their environment, enabling the physical world to be linked with the virtual world. Specifically, the IoT raises many challenges related to its very large scale and high dynamicity, as well as the great heterogeneity of the data and systems involved (e.g., powerful versus resource-constrained devices, mobile versus fixed devices, continuously-powered versus battery-powered devices, etc.). These challenges require new systems and techniques for developing applications that are able to (i) collect data from the numerous data sources of the IoT and (ii) interact both with the environment using the actuators, and with the users using dedicated GUIs. To this end, we defend the following thesis: given the huge volume of data continuously being produced by sensors (measurements and events), we must consider (i) data streams as the reference data model for the IoT and (ii) continuous processing as the reference computation model for processing these data streams. Moreover, knowing that privacy preservation and energy consumption are increasingly critical concerns, we claim that all the Things should be autonomous and work together in restricted areas as close as possible to the users rather than systematically shifting the computation logic into powerful servers or into the cloud. For this purpose, our main contribution can be summarized as designing and developing a distributed data stream management system for the IoT. In this context, we revisit two fundamental aspects of software engineering and distributed systems: service-oriented architecture and task deployment. We address the problems of (i) accessing data streams through services and (ii) deploying continuous processing tasks automatically, according to the characteristics of both tasks and devices. This research work lead to the development of a middleware layer called Dioptase, designed to run on the Things and abstract them as generic devices that can be dynamically assigned communication, storage and computation tasks according to their available resources. In order to validate the feasability and the relevance of our work, we implemented a prototype of Dioptase and evaluated its performance. In addition, we show that Dioptase is a realistic solution which can work in cooperation with legacy sensor and actuator networks currently deployed in the environment
Tantayakul, Kuljaree. "Mobility Management in New Internet Architectures." Phd thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/23732/1/Tantayakul_Kuljaree.pdf.
Повний текст джерелаRey, Bénédicte. "La privacy à l'ère du numérique : une gestion par les tensions." Paris 5, 2009. http://www.theses.fr/2009PA05H063.
Повний текст джерелаThe massive diffusion of information technology and of the Internet, of the mobile phone and of other communicating technologies produce lots of digital traces which keep the memory of people's acts. Some see in these changes the opportunity to increase security, Customer relationship management or comfort in everyday life. But some other fear the advent of a surveillance society in which privacy would erode. We examine here what privacy in the digital age means, and how the technological changes, but also services and uses changes unhinge the traditional privacy acceptation based on norms. Privacy problems predate the digital era. But somme changes nowadays harden privacy problems and call into question the way these problems are responded to. The wide scope of digital information and its accessibility affects privacy risks, which become difficult to pre-empt. Crises analysis shows that privacy reflexion shall from now on go in for complementary ways that should be easygoing for people to use them
Franklin, de Castro Miguel. "Gestion programmable et adaptative de la qualité de service sur IP." Evry, Institut national des télécommunications, 2004. http://www.theses.fr/2004TELE0003.
Повний текст джерелаKaddah, Rim. "Gestion active de la demande basée sur l'habitat connecté." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0025.
Повний текст джерелаThe Internet of Things (IoT) paradigm brings an opportunity for advanced Demand Response (DR) solutions. Indeed, it enables visibility and control on the various appliances that may consume, store or generate energy within a home. In this thesis, we consider solutions having the capability to produce direct control decisions at different granularities based on variables measured at homes. Control schemes are driven by an optimization based on utility functions. These functions are defined based on a generic approach that considers load’s flexibility and the impact of control decisions on users. The proposed approach does not impose any restrictions on the type of controlled appliances nor on the granularity of control decisions. This enables joint control of heterogeneous loads. We consider three types of control architectures, namely centralized, partially distributed and fully distributed solutions. Schemes based on these architectures differ in the distribution of decision making among entities involved in the control and data that is made available to these entities. Numerical analysis shows the trade-offs of proposed solutions from a performance, scalability and complexity perspectives
DEVEAUX, LAURENT. "La gestion strategique de l'information sur l'internet : essai sur les mecanismes economiques de transactions electroniques." Cachan, Ecole normale supérieure, 2002. http://www.theses.fr/2002DENSA001.
Повний текст джерелаSuri, Kunal. "Modeling the internet of things in configurable process models." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL005.
Повний текст джерелаOn the one hand, a growing number of multi-national organizations have embraced the Process-Aware Information Systems (PAIS) to reap the benefits of using streamlined processes that are based on predefined models, also called as Business Process (BP) models. However, today's dynamic business environment demands flexibility and systematic reuse of BPs, which is provided by the use of Configurable Process Models (CPMs). It avoids the development of processes from scratch, which is both time-consuming and error-prone, and facilitates the sharing of a family of BP variants that can be customized based on concrete business requirements. On the other hand, the adoption of the Internet of Things (IoT) resources in various cross-organizational BPs is also on a rise. However, to attain the desired business value, these IoT resources must be used efficiently. These IoT devices are heterogeneous due to their diverse properties and manufactures (proprietary standards), which leads to issues related to interoperability. Further, being resource-constrained, they need to be allocated (and consumed) keeping in the mind relevant constraints such as energy cost, computation cost, to avoid failures during the time of their consumption in the processes. Thus, it is essential to explicitly model the IoT resource perspective in the BP models during the process design phase. In the literature, various research works in Business Process Management (BPM) domain are usually focused on the control-flow perspective. While there do exist some approaches that focus on the resource perspective, they are typically dedicated to the human resource perspective. Thus, there is limited work on integrating the IoT resource perspective into BPs, without any focus on solving issues related to heterogeneity in IoT domain. Likewise, in the context of CPMs, there is no configuration support to model IoT resource variability at the CPM level. This variability is a result of specific IoT resource features such as Shareability and Replication that is relevant in the context of BPs. In this thesis, we address the aforementioned limitations by proposing an approach to integrate IoT perspective in the BPM domain and to support the development of IoT-Aware CPMs. This work contributes in the following manner: (1) it provides a formal description of the IoT resource perspective and its relationships with the BPM domain using semantic technology and (2) it provides novel concepts to enable configurable IoT resource allocation in CPMs. To validate our approach and to show its feasibility, we do the following: (1) implement proof of concept tools that assist in the development of IoT-aware BPs and IoT-aware CPMs and (2) perform experiments on the process model datasets. The experimentation results show the effectiveness of our approach and affirm its feasibility
Jelger, Christophe. "Gestion des équipements mobiles et communications de groupe dans l'internet nouvelle génération." Université Louis Pasteur (Strasbourg) (1971-2008), 2004. http://www.theses.fr/2004STR13099.
Повний текст джерелаMultimedia communications have become extremely popular in the Internet. Services such that Internet TV and radio are indeed attracting an increasing number of users. The particularity of these applications is that they are based on a group of users and can therefore benefit from the use of multicast communications. In the mean time, wireless networks are being deployed at a very fast pace. Mobile Internet users undoubtedly want to be able to have access to the services that are available in wired networks. In particular, it means that wireless networks must be multicast-capable in order to support group communications. In the first part of this thesis, we have studied different aspects of the combination of mobile users and multicast communications. We have evaluated through extensive simulations the effects of node mobility on multicast communications. We have also proposed a new protocol which aims to support mobile sources in source-rooted multicast trees. This protocol has been evaluated via simulations and it has been shown to outperform other existing solutions. In a second part of this thesis, we have also studied the deployment of multicast communications in hybrid ad hoc networks. A hybrid ad hoc network is an ad hoc network that has at least one node which can act as the gateway to the Internet. Our first objective has been to design a protocol which can be used to automatically assign IPv6 global addresses to the ad hoc nodes. Our proposal is based on the original concept of prefix continuity in an ad hoc network: the protocol creates and maintains sub-networks formed by an adjacent set of mobile nodes. We have evaluated different versions of our proposal with extensive simulations. Our second objective has then been to study the applicability of the prefix continuity concept in multicast communications in ad hoc networks. We have subsequently proposed a multicast routing protocol which creates multicast trees and meshes whose members all share an identical IPv6 network prefix. This architecture is very attractive in the sense that network management, access control, and billing systems can be easily deployed on the ad hoc gateways
Dabbebi, Oussema. "Gestion des Risques dans les Infrastructures VoIP." Phd thesis, Université de Lorraine, 2013. http://tel.archives-ouvertes.fr/tel-00875141.
Повний текст джерелаOrozco, Torrentera Julio Enrique. "Gestion de la qualité de service des flux multimédias dans un Internet à différenciation de services." Rennes 1, 2005. http://www.theses.fr/2005REN10036.
Повний текст джерелаDe, Barros Serra Antonio. "La gestion de la QoS pour les services Internet au niveau de grappes de serveurs Web." Evry, Institut national des télécommunications, 2005. http://www.theses.fr/2005TELE0004.
Повний текст джерелаA significant amount of efforts have been directed toward the support of Quality of Service (QoS) in the network infrastructure. However, deal with juste network QoS problem is not sufficient to guarantee end-to-end QoS. Even there are mechanisms (DiffServ, IntServ, MPLS, etc. ) allowing service differentiation at network level, users are still forced to share in the same way available resources on the server Web side. A possible solution to deal with this problem is to use the network QoS principles (traffic classification, admission control, resources partition, etc) to extend components of Web clusters infrastructures introducing resources management mechanisms allowing guaranties of SLAs (Service Level Agreements) granted to users. Our contribution relies on the use of those principles for design, specification and implementation of a QoS management architecture for Web servers clusters. We propose a flexible, scalable and non intrusive solution that takes into account the heterogeneity of technologies used to implement Web Applications. We also propose an admission control and load balancing mechanism for Web servers clusters, called WS-DSAC (Web Servers – DiffServ Admission Control), that allows user QoS differentiation and effective use of available resources, by dynamically reallocating resources between existent QoS classes and promoting fairness during non critical moments
Ben, Dhia Imen. "Gestion des grandes masses de données dans les graphes réels." Electronic Thesis or Diss., Paris, ENST, 2013. http://www.theses.fr/2013ENST0087.
Повний текст джерелаIn the last few years, we have been witnessing a rapid growth of networks in a wide range of applications such as social networking, bio-informatics, semantic web, road maps, etc. Most of these networks can be naturally modeled as large graphs. Managing, analyzing, and querying such data has become a very important issue, and, has inspired extensive interest within the database community. In this thesis, we address the problem of efficiently answering distance queries in very large graphs. We propose EUQLID, an efficient algorithm to answer distance queries on very large directed graphs. This algorithm exploits some interesting properties that real-world graphs exhibit. It is based on an efficient variant of the seminal 2-hop algorithm. We conducted an extensive set of experiments against state-of-the-art algorithms which show that our approach outperforms existing approaches and that distance queries can be processed within hundreds of milliseconds on very large real-world directed graphs. We also propose an access control model for social networks which can make use of EUQLID to scale on very large graphs. This model allows users to specify fine-grained privacy policies based on their relations with other users in the network. We describe and demonstrate Primates as a prototype which enforces the proposed access control model and allows users to specify their privacy preferences via a graphical user-friendly interface
Ben, Atia Okba. "Plateforme de gestion collaborative sécurisée appliquée aux Réseaux IoT." Electronic Thesis or Diss., Mulhouse, 2024. http://www.theses.fr/2024MULH7114.
Повний текст джерелаFederated Learning (FL) allows clients to collaboratively train a model while preserving data privacy. Despite its benefits, FL is vulnerable to poisoning attacks. This thesis addresses malicious model detection in FL systems for IoT networks. We provide a literature review of recent detection techniques and propose a Secure Layered Adaptation and Behavior framework (FLSecLAB) to fortify the FL system against attacks. FLSecLAB offers customization for evaluating defenses across datasets and metrics. We propose enhanced malicious model detection with dynamic optimal threshold selection, targeting Label-flipping attacks. We present a scalable solution using entropy and an adaptive threshold to detect malicious clients. We explore complex scenarios and propose novel detection against simultaneous Label-flipping and Backdoor attacks. Additionally, we propose an adaptive model for detecting malicious clients, addressing Non-IID data challenges. We evaluate our approaches through various simulation scenarios with different datasets, comparing them to existing approaches. Results demonstrate the effectiveness of our approaches in enhancing various malicious detection performance metrics
Serban, Rares Dabbous Walid. "La gestion dynamique de la qualité de service dans l'Internet." [S.l.] : [s.n.], 2003. http://www.inria.fr/rrrt/tu-0794.html.
Повний текст джерелаSuri, Kunal. "Modeling the internet of things in configurable process models." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL005/document.
Повний текст джерелаOn the one hand, a growing number of multi-national organizations have embraced the Process-Aware Information Systems (PAIS) to reap the benefits of using streamlined processes that are based on predefined models, also called as Business Process (BP) models. However, today's dynamic business environment demands flexibility and systematic reuse of BPs, which is provided by the use of Configurable Process Models (CPMs). It avoids the development of processes from scratch, which is both time-consuming and error-prone, and facilitates the sharing of a family of BP variants that can be customized based on concrete business requirements. On the other hand, the adoption of the Internet of Things (IoT) resources in various cross-organizational BPs is also on a rise. However, to attain the desired business value, these IoT resources must be used efficiently. These IoT devices are heterogeneous due to their diverse properties and manufactures (proprietary standards), which leads to issues related to interoperability. Further, being resource-constrained, they need to be allocated (and consumed) keeping in the mind relevant constraints such as energy cost, computation cost, to avoid failures during the time of their consumption in the processes. Thus, it is essential to explicitly model the IoT resource perspective in the BP models during the process design phase. In the literature, various research works in Business Process Management (BPM) domain are usually focused on the control-flow perspective. While there do exist some approaches that focus on the resource perspective, they are typically dedicated to the human resource perspective. Thus, there is limited work on integrating the IoT resource perspective into BPs, without any focus on solving issues related to heterogeneity in IoT domain. Likewise, in the context of CPMs, there is no configuration support to model IoT resource variability at the CPM level. This variability is a result of specific IoT resource features such as Shareability and Replication that is relevant in the context of BPs. In this thesis, we address the aforementioned limitations by proposing an approach to integrate IoT perspective in the BPM domain and to support the development of IoT-Aware CPMs. This work contributes in the following manner: (1) it provides a formal description of the IoT resource perspective and its relationships with the BPM domain using semantic technology and (2) it provides novel concepts to enable configurable IoT resource allocation in CPMs. To validate our approach and to show its feasibility, we do the following: (1) implement proof of concept tools that assist in the development of IoT-aware BPs and IoT-aware CPMs and (2) perform experiments on the process model datasets. The experimentation results show the effectiveness of our approach and affirm its feasibility
Kexel, Christoph. "La production et la gestion des connaissances dans le marketing des moteurs de recherche : une approche basée sur l'apprentissage par l'action." Nice, 2012. http://www.theses.fr/2012NICE0034.
Повний текст джерелаSince the late 1980s the development of the Internet has empowered customers to choose from an extensive range of products and suppliers and to make purchases more efficient and flexible (Chaffey et al, 2006). In online marketing the potential customer opens a communication channel to the marketer by seeking information with search engines ((Chaffey et al, 2006), (Bogner, 2006)), so that ‘being found’ represents the crucial success factor for today’s organizations. However, modern firms are surprisingly sluggish in appreciating the critical importance of online marketing (Schubring, 2008). This dissertation aims to design a methodology for improvement of marketers’ knowledge and online marketing skills. The dissertation initially develops an action learning based model for conveying the basic concepts necessary for marketing practitioners. This methodology is then applied and evaluated in a controlled higher education environment by also conveying the expertise to a control group in a traditional form. An analysis of the efficacy of the different knowledge-transfer methods is provided in order to identify the optimal learning approach. The data collected on assumed knowledge improvements illustrate that optimal results have indeed been obtained in all subcategories of Internet marketing by the proposed framework. The dissertation concludes that the methodology is indeed able to instill the compulsory know-how in order that practitioners may cope with and make use of the World Wide Web – despite its vagaries. The findings advance business practice by providing a possibility of effective on-the-job training for the key organizational function of online marketing. This may facilitate corporate learning models in a more general context
Kekhia, Walid. "Propositions pour un système de gestion d'objets et de ressources pédagogiques." Versailles-St Quentin en Yvelines, 2003. http://www.theses.fr/2003VERS0025.
Повний текст джерелаIn order to make easier the seeking, the reuse and the sharing of the learning resource, we present an approach of the management of the learning objects by defining a structuring model of the aforesaid objects which describes in UML the triplet (types, properties and relations) and a set of metadata allowing to describe these objects according to a well defined semantics for their research. To validate metadata, the structure of their representation in RDF is defined by a RDF schema. The processes of this model are illustrated by an algorithm of scheduling which is based on the relation of prerequisites by checking that a course presents concepts in accordance with the prerequisites and a student is not registered with a course of which it does not have prerequisites. The interest of this approach is that this structure allows managing the material and human resources necessary to a learning, and, the existence of a RDF schema for the metadata exclude semantic ambiguities
Ben, Dhia Imen. "Gestion des grandes masses de données dans les graphes réels." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0087/document.
Повний текст джерелаIn the last few years, we have been witnessing a rapid growth of networks in a wide range of applications such as social networking, bio-informatics, semantic web, road maps, etc. Most of these networks can be naturally modeled as large graphs. Managing, analyzing, and querying such data has become a very important issue, and, has inspired extensive interest within the database community. In this thesis, we address the problem of efficiently answering distance queries in very large graphs. We propose EUQLID, an efficient algorithm to answer distance queries on very large directed graphs. This algorithm exploits some interesting properties that real-world graphs exhibit. It is based on an efficient variant of the seminal 2-hop algorithm. We conducted an extensive set of experiments against state-of-the-art algorithms which show that our approach outperforms existing approaches and that distance queries can be processed within hundreds of milliseconds on very large real-world directed graphs. We also propose an access control model for social networks which can make use of EUQLID to scale on very large graphs. This model allows users to specify fine-grained privacy policies based on their relations with other users in the network. We describe and demonstrate Primates as a prototype which enforces the proposed access control model and allows users to specify their privacy preferences via a graphical user-friendly interface
Khalil, Ahmad. "Gestion autonome de la qualité de service et de la sécurité dans un environnement Internet des objets." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK068.
Повний текст джерелаNowadays, the Internet of Things (IoT) is becoming important in our daily lives thanks to technological advances. This paradigm aims to improve the quality of human life through automating several tasks. In this context, service level guarantee within IoT environments is a major challenge while considering a massive deployment of IoT applications and services as well as extending their usage to different domains. The IoT service level can be characterized in two parts: Quality of Service (QoS) and security. Moreover, this service level must be managed in an autonomic manner within the IoT environment given the heterogeneity and the size of its infrastructure making it difficult, even impossible, their management in a manual manner by the administrators. In this thesis, we propose a QoS based channel access control mechanism, called QBAIoT (QoS Based Access for IoT environments), to ensure a differentiated processing of existing traffics in the IoT environment. The differentiated processing allows satisfying the requirements of each traffic according to different QoS parameters (i.e., delay, jitter, packet delivery ratio, etc.). Then, QBAIoT is improved and upgraded to integrate self-management capabilities thanks to two important functions of the closed control loop: self-configuration and self-optimization. In addition, to offer a better QoS within the IoT environment, it is necessary to optimize the energy consumption of resources’ constrained components. Thus, we propose an adaptation of QBAIoT allowing to reduce its energy consumption in an autonomic manner while respecting the data accuracy. Our contribution concerning the second part of service level guarantee within an IoT environment, which is security, consists is a mechanism enabling IoT objects access control to IoT gateways, called IoT-MAAC (IoT Multiple Attribute Access Control). This mechanism takes into account different parameters that are specific to IoT environments (i.e., IoT object trust, IoT object identifier, IoT object fingerprint, etc.). Finally, the decision making process regarding IoT object access control is autonomously managed by IoT gateways and aims to meet the requirements of IoT environment in terms of trust
Rodríguez, Herrero Álvaro Antonio. "Análisis de mercado y estrategia de comercialización para una empresa de ventas por internet." Tesis, Universidad de Chile, 2014. http://repositorio.uchile.cl/handle/2250/115501.
Повний текст джерелаLos servicios de administración de ciclos de compra que operan actualmente en el sector minero del cobre ofrecen principalmente soluciones que contemplan cotizaciones y licitaciones que tardan más de lo deseado por los compradores, lo que conlleva importantes costos. Adicionalmente, se observan ineficiencias en la participación de las empresas proveedoras debido a los costos asociados con la preparación y envío de la información para cada una de las licitaciones, y a oportunidades de negocio limitadas a una participación esporádica. Estas son las anomalías que se abordan con la propuesta de desarrollo de E-Port. E-Port es una plataforma web de negocios que conecta a empresas con sus proveedores en este sector industrial, de forma directa y eliminando las tradicionales licitaciones. E-Port permite a los compradores buscar un producto en función de su número de catálogo interno y a los vendedores ofrecer sus productos en este canal de ventas. El objetivo de este trabajo es explorar las oportunidades de negocio para E-Port a través de un estudio de mercado, y elaborar la estrategia de comercialización que permita explotar las brechas de mercado detectadas. En la primera parte se investigan las características del mercado realizando para ello entrevistas personales a diversos proveedores, compradores, ejecutivos, y expertos de la industria, así como también recopilando información disponible en línea en distintos sitios web de interés. En la segunda parte, se desarrolla la propuesta de valor utilizando la herramienta de modelación de negocios Canvas. La tercera parte consiste en la elaboración de la estrategia de comercialización, modelo de ingresos y proyecciones de ventas. Tanto para el estudio de mercado como para el plan estratégico se utilizan los modelos de las 5 fuerzas de Porter y un análisis FODA. Al finalizar la investigación referente al mercado e industria en el que participará E-Port, se concluye que es factible la posibilidad de aplicar el modelo de negocios y crear la empresa para explotarlo. La oportunidad detectada que se busca abordar, la existencia de un importante mercado potencial en cuanto a transacciones y volúmenes transados, además del alto atractivo de la industria en la que participará, asoman como los principales factores que indican que el negocio cuenta con posibilidades reales de éxito. Mayor rapidez y reducción de costos en los procesos de compra de los clientes compradores, así como acceso a nuevos canales de venta para los clientes vendedores son las principales ventajas que cada uno de estos dos segmentos de clientes deberían obtener de la propuesta de valor ofrecida. La estrategia de comercialización, por su parte, se enfoca en llegar a Minera Escondida como primer cliente comprador, con quien se planea desarrollar un plan piloto con una gama acotada de productos y proveedores nacionales e internacionales. La eficiencia operativa, confiabilidad, posicionamiento en niveles superiores de la estructura organizacional de los clientes, gestión de la información, y definición de las fronteras de responsabilidad asoman como los factores críticos de éxito del negocio. La implementación del Plan de Negocios recomendado permitirá generar un VAN esperado de $320 millones de pesos, considerando que este proyecto se evaluó con una tasa de descuento de 30%, esto resulta muy atractivo y por tanto se recomienda su ejecución.
Wazan, Ahmad Samer. "Gestion de la confiance dans les infrastructures à clés publiques." Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1450/.
Повний текст джерелаToday, the Internet has become a universal community, where the openness to diverse application areas, has been accompanied by a natural change in the profile of users. However, in this environment, the maturity of the services and applications is suffering from a problem of trust. The establishment of trust in the Internet requires the intervention of several elements. We refer to these elements by the term: trust chain. In all chains of trust, public key infrastructure (PKI) is a central element. It serves to establish a link between a public key and a physical entity whose certificate signed by a central entity called a certification authority (CA). Thus, PKIs provide means for the management and the distribution of keys and certificates. All elements of the trust chain create a trust management problem. We have dedicated our work, however, to PKIs, and more precisely in trust management of CAs. We have performed the following steps: • We have proposed a formal definition of trust in CAs. • We have defined an architecture that operates a validation service deployed by an entity independent of CAs, and recognized by a community of interest. • We have defined a calculation model that enables us to obtain a score between 0 and 1 representing the quality of a certificate (QoCER). Finally, we have implemented a prototype that demonstrates our ideas. In particular, we have presented how end users can interact with the validation service to make informed decisions about certificates
Nazlioglu, Özge. "Décision de sélection des systèmes d'information : le cas des outils d'e-achats." Grenoble, 2010. http://www.theses.fr/2010CHAML016.
Повний текст джерелаThe objective of this thesis is to explain the decision of the selection of an IT tool, and to examine the influence of this decision on the satisfaction of the client companies. The selection decision results from a formal evaluation based on some criteria. Also, other internal and external forces influence this decision. To study these factors, the case of epurchasing tools is chosen. This choice is justified by the richness and dynamism of this market, the presence of starting new projects, and the heterogeneity of the results obtained. The qualities of the software editor, the tool and the services, as well as the total cost represent the main criteria of selection for the clients of e-purchasing. Besides, the expected advantages and the editor's tactics of influence are the other factors that have an impact on the decision. A content analysis of the web sites of editors is realized, to identify the arguments advanced in the marketing of their offer. Then, a questionnaire is developed, based on the literature review and the results of the exploratory content analysis. It is refined by a card sorting exercise and a pilot questionnaire for the e-purchasing editors. The final questionnaire is administered to the clients of e-purchasing. According to the results of this questionnaire, there is a difference between the opinions of editors and clients on the value of e-purchasing and the important features of tools and editors. Editors use three main tactics to influence the decision of their clients: arguments, demonstration and references. The effectiveness of each depends on the selection criteria favored by customers. Overall, the cost appears to be the main consideration of the e-purchasing clients, followed by the quality of the editor, services and tool. However, the results show that benefits obtained depend primarily on the quality of the tool and services; in particular on the emphasis of the user needs (usability and the user services) and the technical characteristics during the selection. There is a difference between the criteria which is given the most weight in the selection and the criteria that lead to the "realization of advantages", which proves to be a more relevant indicator than the satisfaction, for evaluating a selection decision in an organizational context
Lhajji, Dhiba. "L'évaluation des pratiques du yield management à l'ère d'Internet : cas de l'industrie de l'hôtellerie de chaîne en France." Grenoble 2, 2006. http://www.theses.fr/2006GRE21024.
Повний текст джерелаThis work considers the problems of using applications and its relation to performance. More specifically, the objective of this study is to explore the effects Internet use as a distribution channel on Yield Management (YM) practices, and to evaluate its impact on the perceived performance. A research model was constructed based on three proposals—the YM process influence, Internet use, and organizational factors—and the on the perceptions of hotel performance. A certain number of contingency-dependent variables (type of hotel, environmental features) were also integrated into this model. Our methodology for was highly quantitative, and thus data was collected from a survey which was administered via the Internet. 3- and 4-star chain hotels operating in France were selected. In order to obtain a clearer picture on hotels practicing YM in a more formal manner, a descriptive data analysis using namely typological analysis was carried out. This analysis distinguished between three groups of establishments : hotels using a high level of YM practices, those only moderately using YM practices, and hotels using YM practices on a minor basis. Moreover, the results obtained show the importance of two organizational factors to ensure YM policy success : CEO commitment and user involvement. This success is also conditioned by the use of certain transactional functions (on-line reservations and payments, etc. ) and certain informational functions (information on promotions, information on rates and availability, etc. ). On a theoretical level, this study's contribution is to consider YM under the angle of Information Systems. On a managerial level, this research will make it possible to put at French hoteliers’ disposal a grid of analysis on YM practices in the Internet era
Mombrun, Yann. "Évaluation de l’information disponible sur Internet : Application au renseignement d’origine sources ouvertes." Thesis, Rouen, INSA, 2012. http://www.theses.fr/2012ISAM0011.
Повний текст джерелаIntelligence agencies analyse and assess information open sources manually. Yet it is impossible to process every piece as well. This works aims at assisting operationals to use the Internet to produce intelligence, including deciding whether they can exploit gathered information.We study methods proposed to assessing information, manual or automatic, in a civil or military context. We propose a system dedicated to the exploitation of open sources. It targets collection and analysis phases of the intelligence cycle. Its architecture is open, to ease its adaptability to the procedures of each intelligence service. We describe a prototype implementing a selected set of criteria. We validate the approach by an experiment showing that assisting users eases the assesment of pages avilable on the Internet
Song, Meng. "Vers une gestion et un contrôle de services dynamiques, adaptatifs et avec qualité de services dans les réseaux ambiants." Paris, ENST, 2008. http://www.theses.fr/2008ENST0057.
Повний текст джерелаRecently, much research has focused on the evolution of the future Internet and the evolution of future services. Toward the target of communication by anyone, anywhere and anytime, the emerging Ambient networks encompass several domains of research, including the mobile computing, distributed systems, ubiquitous computing, pervasive computing and Grid computing. However, the lack of support for mobility and continuity of service results in current monolithic applications no longer being adapted to system of Ambient networks. In this dissertation, we propose a new design composition of service which better matches the needs of Ambient networks, and helps us to provide the application service to adapt to Ambient networks in their heterogeneity and dynamic variability of environment. We analyze the lifecycle management for the service composition process, and give a new design for the layered architecture of Ambient networks, each layer is represented by an overlay network. For the service middleware, we propose our special method to manger distributed services, and divided them into different service groups according to their providing functionalities and their QoS feature. So, services in the same group are found to provide the same function and present the same characteristic of QoS. To support the qualified service groups’ management in the service middleware, our solution relies on the P2P network. In fact, two kinds of P2P protocols, including the modified CAN and Chord, are taken into the implementation phase. Our concept is evaluated by the simulation, and the results demonstrate the advantage and the performance presented in our proposition
Phung, Chi Dung. "Enriching the internet control-plane for improved traffic engineering." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS017/document.
Повний текст джерелаOne of the major challenges in the evolution of the Internet architecture is the definition of a protocol architecture that allows to solve the following major issues in Internet routing and traffic forwarding capabilities, (i) keeping a routing state that is manageable with current and forthcoming computing infrastructure – i.e., with few millions of states, (ii) offering a scalable pull architecture in support of data-plane programmability, (iii) offering a scalable forwarding plane able to be regularly optimized with only active flows information, (iv) offering locator/identifier separation for advanced IP mobility, (v) is incrementally deployable, (vi) can enhance the support of over-the-top services. The Locator/Identifier Separation Protocol (LISP) has been identified as one of the rising protocols in this respect. In its current status, it supports the above mentioned requirements at a level that is acceptable for basic networking environments. However, it shows too limited capacities when it comes to take into consideration fault resiliency and capability to react fast to network state updates. These shortcomings can be compensated by enhancing the control-plane architecture, and the routing algorithms therein. In this dissertation, we propose new protocol features and experiment novel control-plane primitives, as well as hybrid distributed-centralized routing state dissemination algorithms, to scale with different network conditions. We first design and build own open source LISP data-plane and control plane node, comparing it with other implementations, showing how our implementation can scale for large networks and reach performances suitable for real deployments. We present how our implementation served to operate all network nodes (data-plane and control-plane nodes) of a large scale experimentation testbed, the LISP-Lab testbed. Then we propose a novel LISP-based solution for VM live migrations across geographically separated datacenters over wide area IP networks. Experimenting it at large scale, we show that with our approach we can easily reach sub-second downtimes upon Internet-wide migration, even for very distant clients. Moreover, we investigate cross-layer network optimization protocols, in particular in relation with the Multipath Transport Control Protocol (MPTCP) to which LISP can deliver path diversity in support of bandwidth increase, confidentiality support and connection reliability, also using LISP traffic engineering network overlays. Despite we could benefit from only few overlay network nodes, we could experimentally evaluate our proposals showing the positive impact by using our solution, the negative impact of long round-trip times on some MPTCP subflows, and the strong correlation between the differential round-trip time among subflows and the throughput performance. Finally, we worked on a framework to improve LISP operation at the Internet scale, by facilitating cooperation between LISP Mapping Systems and introducing more automation in the LISP connectivity service delivery procedure. We believe such optimization could raise awareness among the service providers’ community, yielding new business opportunities related to LISP mapping services and the enforcement of advanced inter-domain traffic engineering policies for the sake of better quality of service guarantees
Delizy, Tristan. "Gestion de la mémoire dynamique pour les systèmes embarqués avec mémoire hétérogène." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI134.
Повний текст джерелаReducing energy consumption is a key challenge to the realisation of the Internet of Things. While emerging memory technologies may offer power reduction and high integration density, they come with major drawbacks such as high latency or limited endurance. As a result, system designers tend to juxtapose several memory technologies on the same chip. We aim to provide the embedded application programmer with a transparent software mechanism to leverage this memory heterogeneity. This work studies the interaction between dynamic memory allocation and memory heterogeneity. We provide cycle accurate simulation of embedded platforms with various memory technologies and we show that different dynamic allocation strategies have a major impact on performance. We demonstrates that interesting performance gains can be achieved even for a low fraction of memory using low latency technology, but only with a clever placement strategy between memory banks. We propose an efficient strategy based on application profiling in our simulator
Derriere, Sébastien. "Gestion de grands catalogues et application de relevés infrarouges à l'étude de la structure galactique." Université Louis Pasteur (Strasbourg) (1971-2008), 2001. http://www.theses.fr/2001STR13112.
Повний текст джерелаGarzone, Guillaume. "Approche de gestion orientée service pour l'Internet des objets (IoT) considérant la Qualité de Service (QoS)." Thesis, Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0027/document.
Повний текст джерелаThe Internet of Things (IoT) is already everywhere today: home automation, connected buildings or smart city, many initiatives and innovations are ongoing and yet to come. The number of connected objects continues to grow to the point that billions of objects are expected in the near future.The approach of this thesis sets up an autonomic management architecture for systems based on connected objects, combining them with other services such as weather services accessible on the Internet. The proposed models enable an autonomous decision making based on the analysis of events and the planning of actions executed automatically. Parameters such as execution time or consumed energy are also considered in order to optimize the choices of actions to be performed and of services used. A concrete prototype was realized in a smart city scenario with connected buses in the investment for future project: S2C2
Montavont, Nicolas. "Gestion optimisée d'interfaces multiples et prise en compte des déplacements rapides sur un terminal IPv6 mobile." Université Louis Pasteur (Strasbourg) (1971-2008), 2004. https://publication-theses.unistra.fr/public/theses_doctorat/2004/MONTAVONT_Nicolas_2004.pdf.
Повний текст джерелаPérez, Gómez Ana Maria. "L'analyse économique du droit d'auteur face au défi d'une gestion collective mondiale des droits en ligne." Nantes, 2012. http://www.theses.fr/2012NANT4017.
Повний текст джерелаSociety is facing the globalization of the culture thanks to the digital revolution. Internet as a no border environment allows its users to access and download a large repertory of protected works through websites at a marginal cost close to zero. As a consequence, cultural industry is suffering great loses and a solution to the problem of multi-territorial licenses granting is a challenge to lawmakers. The first part of the PhD focuses on the law and economic analysis of copyright. We assert that the market for copyright is a monopolistic competition one due to the fact that protected works are public goods and that free riders constitute a negative externality to the market. The second part of the PhD will concentrate in the law and economic analysis of copyright collectives. The PhD aims to propose the basis of a possible solution to the granting of licenses based on the collective administration of rights. This administration leads to a decrease in the administration transaction costs and risks, the production of economies of scale and facilitates enforcement and recovery of royalties. Our proposal is to create an international one stop shop administered by an international organization. Its repertory will be characterized by the implementation of digital measures permitting follow-up and enforcement. Its members will be the states adhering to the international legislative mechanism leading to its implementation. The society will benefit of this one stop shop and particularly collecting societies, authors from countries without collective administration and users of digital copyrighted works worldwide. It will grant multi-territorial and multi-repertory licenses
Benkirane, Nada. "La gestion du trafic dans les réseaux orientés contenus." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2014. http://tel.archives-ouvertes.fr/tel-00987630.
Повний текст джерелаSohrabi, Helia. "Physical internet-enabled hyperconnected distribution assessment." Doctoral thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26986.
Повний текст джерелаThe Physical Internet (PI) is an initiative that identifies several symptoms of logistics systems unsustainability and inefficiency and tackles them by proposing a novel paradigm called Hyperconnected Logistics. Similar to the Digital Internet, which connects thousands of personal and local computer networks, PI will connect the fragmented logistics systems of today. The main purpose is to enhance the performance of logistics systems from economic, environmental and social perspectives. Focusing specifically on the distribution system, this thesis questions the order of magnitude of the performance gain by exploiting the PI-enabled hyperconnected distribution. It is also concerned by the characterization of the hyperconnected distribution planning. To address the first question, an exploratory research approach based on optimization modeling is applied; first, the current and prospective distribution systems are modeled. Then, a set of realistic business samples are created, and their economic and environmental performance by targeting multiple social performances are assessed. A conceptual planning framework is proposed to support the decision making in the hyperconnected distribution system. Based on the results obtained by our investigation, it can be argued that a substantial gain can be achieved by shifting toward Hyperconnected Distribution. It is also revealed that the magnitude of the gain varies by business characteristics and the targeted social performance. Since the Physical Internet is a novel topic, chapter 1 briefly introduces PI and Hyperconnected Logistics. Chapter 2 discusses the research foundations, goal and methodology. It also describes the challenges of conducting this research and highlights the type of contributions aimed for. Chapter 3 presents the optimization models including a core distribution network design modeling approach. Influenced by the characteristics of the current and prospective distribution systems, three distribution system-driven models are developed. Chapter 4 engages with the characterization of the business samples, the modeling and calibration of the parameter that are employed in the models. The exploratory investigation results are presented in Chapter 5. Chapter 6 describes the hyperconnected distribution planning framework. Chapter 7 summarizes the content of the thesis and highlights the main contributions. Moreover, it identifies the research limitations and potential future research avenues.
Marie, Pierrick. "Gestion de bout en bout de la qualité de contexte pour l'internet des objets : le cadriciel QoCIM." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30186/document.
Повний текст джерелаThe objective of the ANR INCOME project is to provide a framework for the development and the deployment of a context manager. A context manager is composed of software entities, which acquire, process, disseminate or deliver context data. These software entities have to be built and deployed over interconnected heterogeneous ICT infrastructures, which include sensor networks, ambient systems, mobile devices, cloud servers and, more generally, the Internet of Things (IoT). Related to this project, the research work presented in this thesis concerns more specifically the end-to-end management of Quality of Context (QoC) within the new generation of context managers that have to be deployed at large and multiple scales over the IoT. Quality of context data refers to criteria like accuracy, freshness, completeness or granularity. As for QoC management, it deals with all the operations that allow, throughout the life cycle of context data, to manage their qualification, but also to impact, according to this quality, on its dissemination and delivery to context-aware applications. Current QoC management solutions are dedicated to particular ambient environments or to specific applications. They are limited in terms of openness, genericity and computationability, properties required by greatly heterogeneous and dynamic IoT-based environments, in which producers and consumers of context data are no more static and highly coupled. Our contribution relies on QoCIM (QoC Information Model), a meta-model dedicated to define, in a uniform and open way, any atomic or composite QoC criterion. Based on QoCIM, some QoC management operations have been identified and specified. These operations allow to associate criteria of QoC, in the form of metadata, with the information of context; to characterize the metrics and units for their valuation; to infer QoC criteria of a higher level of abstraction; or even to express filtering conditions for such criteria or their values. A software tool for editing QoCIM models and a Java API are provided to developers to easily implement the management of any QoC criterion for their software entities that acquire, process, deliver or propagate context data, or their context-sensititive application. The use of this framework was experimented, both at design time and at run time, on a scenario related to urban pollution. Benchmarking was also led and showed that the additional cost brought when considering QoC in context information routing was acceptable. Finally, a solution for self-(re)configuring QoC management operations was also designed and prototyped
Phung, Chi Dung. "Enriching the internet control-plane for improved traffic engineering." Electronic Thesis or Diss., Sorbonne université, 2018. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2018SORUS017.pdf.
Повний текст джерелаOne of the major challenges in the evolution of the Internet architecture is the definition of a protocol architecture that allows to solve the following major issues in Internet routing and traffic forwarding capabilities, (i) keeping a routing state that is manageable with current and forthcoming computing infrastructure – i.e., with few millions of states, (ii) offering a scalable pull architecture in support of data-plane programmability, (iii) offering a scalable forwarding plane able to be regularly optimized with only active flows information, (iv) offering locator/identifier separation for advanced IP mobility, (v) is incrementally deployable, (vi) can enhance the support of over-the-top services. The Locator/Identifier Separation Protocol (LISP) has been identified as one of the rising protocols in this respect. In its current status, it supports the above mentioned requirements at a level that is acceptable for basic networking environments. However, it shows too limited capacities when it comes to take into consideration fault resiliency and capability to react fast to network state updates. These shortcomings can be compensated by enhancing the control-plane architecture, and the routing algorithms therein. In this dissertation, we propose new protocol features and experiment novel control-plane primitives, as well as hybrid distributed-centralized routing state dissemination algorithms, to scale with different network conditions. We first design and build own open source LISP data-plane and control plane node, comparing it with other implementations, showing how our implementation can scale for large networks and reach performances suitable for real deployments. We present how our implementation served to operate all network nodes (data-plane and control-plane nodes) of a large scale experimentation testbed, the LISP-Lab testbed. Then we propose a novel LISP-based solution for VM live migrations across geographically separated datacenters over wide area IP networks. Experimenting it at large scale, we show that with our approach we can easily reach sub-second downtimes upon Internet-wide migration, even for very distant clients. Moreover, we investigate cross-layer network optimization protocols, in particular in relation with the Multipath Transport Control Protocol (MPTCP) to which LISP can deliver path diversity in support of bandwidth increase, confidentiality support and connection reliability, also using LISP traffic engineering network overlays. Despite we could benefit from only few overlay network nodes, we could experimentally evaluate our proposals showing the positive impact by using our solution, the negative impact of long round-trip times on some MPTCP subflows, and the strong correlation between the differential round-trip time among subflows and the throughput performance. Finally, we worked on a framework to improve LISP operation at the Internet scale, by facilitating cooperation between LISP Mapping Systems and introducing more automation in the LISP connectivity service delivery procedure. We believe such optimization could raise awareness among the service providers’ community, yielding new business opportunities related to LISP mapping services and the enforcement of advanced inter-domain traffic engineering policies for the sake of better quality of service guarantees
Benmahamed, Djilali. "Démarche globale de gestion des connaissances en entreprise : de la stratégie au système d'information." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0014.
Повний текст джерела