Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(NETWORK MONITORING COMPUTER SYSTEMS ). Showing records 1 – 30 of 180014 total matches.

[1] [2] [3] [4] [5] … [6001]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Linnaeus University

1. Förderer, Steffen-Marc. Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization.

Degree: Physics and Mathematics, 2012, Linnaeus University

  A proof of concept study into the working of network media capture and visualization through the use of Packet Capture in real-time. An application… (more)

Subjects/Keywords: TCP/IP Monitoring; Network Sniffing; Network Monitoring; Image Reconstruction; Packet Data Reassembly; Real-time Visualization; Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Förderer, S. (2012). Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-18289

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Förderer, Steffen-Marc. “Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization.” 2012. Thesis, Linnaeus University. Accessed March 05, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-18289.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Förderer, Steffen-Marc. “Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization.” 2012. Web. 05 Mar 2021.

Vancouver:

Förderer S. Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization. [Internet] [Thesis]. Linnaeus University; 2012. [cited 2021 Mar 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-18289.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Förderer S. Converting Network Media Data into Human Readable Form : A study on deep packet inspection with with real-time visualization. [Thesis]. Linnaeus University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-18289

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Gad, Ruediger. Event-driven Principles and Complex Event Processing for Self-adaptive Network Analysis and Surveillance Systems.

Degree: 2015, Universidad de Cádiz

 Event-driven approaches and Complex Event Processing (CEP) have the potential to aid in tackling the complex requirements and challenges of monitoring contemporary computer networks. The… (more)

Subjects/Keywords: Computer Networks; Network Monitoring; Network Analysis and Surveillance; Event-driven Architecture; Complex Event Processing; Self-adaptive; Network Traffic; Distributed Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gad, R. (2015). Event-driven Principles and Complex Event Processing for Self-adaptive Network Analysis and Surveillance Systems. (Thesis). Universidad de Cádiz. Retrieved from http://hdl.handle.net/10498/17858

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gad, Ruediger. “Event-driven Principles and Complex Event Processing for Self-adaptive Network Analysis and Surveillance Systems.” 2015. Thesis, Universidad de Cádiz. Accessed March 05, 2021. http://hdl.handle.net/10498/17858.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gad, Ruediger. “Event-driven Principles and Complex Event Processing for Self-adaptive Network Analysis and Surveillance Systems.” 2015. Web. 05 Mar 2021.

Vancouver:

Gad R. Event-driven Principles and Complex Event Processing for Self-adaptive Network Analysis and Surveillance Systems. [Internet] [Thesis]. Universidad de Cádiz; 2015. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10498/17858.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gad R. Event-driven Principles and Complex Event Processing for Self-adaptive Network Analysis and Surveillance Systems. [Thesis]. Universidad de Cádiz; 2015. Available from: http://hdl.handle.net/10498/17858

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

3. Persson, Edvin. Development of a prototype framework for monitoring application events.

Degree: Software and Systems, 2020, Linköping University

  Software rarely comes without maintenance after it is released. There can be bugs not captured in development or performance that might not meet expectations;… (more)

Subjects/Keywords: Software monitoring; monitoring; Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Persson, E. (2020). Development of a prototype framework for monitoring application events. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Persson, Edvin. “Development of a prototype framework for monitoring application events.” 2020. Thesis, Linköping University. Accessed March 05, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Persson, Edvin. “Development of a prototype framework for monitoring application events.” 2020. Web. 05 Mar 2021.

Vancouver:

Persson E. Development of a prototype framework for monitoring application events. [Internet] [Thesis]. Linköping University; 2020. [cited 2021 Mar 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Persson E. Development of a prototype framework for monitoring application events. [Thesis]. Linköping University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

4. Jiang, Miao. Modeling Management Metrics for Monitoring Software Systems.

Degree: 2011, University of Waterloo

 Software systems are growing rapidly in size and complexity, and becoming more and more difficult and expensive to maintain exclusively by human operators. These systems(more)

Subjects/Keywords: Computer systems; System monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, M. (2011). Modeling Management Metrics for Monitoring Software Systems. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6341

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jiang, Miao. “Modeling Management Metrics for Monitoring Software Systems.” 2011. Thesis, University of Waterloo. Accessed March 05, 2021. http://hdl.handle.net/10012/6341.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jiang, Miao. “Modeling Management Metrics for Monitoring Software Systems.” 2011. Web. 05 Mar 2021.

Vancouver:

Jiang M. Modeling Management Metrics for Monitoring Software Systems. [Internet] [Thesis]. University of Waterloo; 2011. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10012/6341.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jiang M. Modeling Management Metrics for Monitoring Software Systems. [Thesis]. University of Waterloo; 2011. Available from: http://hdl.handle.net/10012/6341

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

5. Feng, Cuiying. Concentrated network tomography and bound-based network tomography.

Degree: Department of Computer Science, 2020, University of Victoria

 Modern computer networks pose a great challenge for monitoring the network performance due to their large scale and high complexity. Directly measuring the performance of… (more)

Subjects/Keywords: Computer Network; Communication Network; Network Tomography; Network Performance Inference; Network Performance Monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Feng, C. (2020). Concentrated network tomography and bound-based network tomography. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/12133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Feng, Cuiying. “Concentrated network tomography and bound-based network tomography.” 2020. Thesis, University of Victoria. Accessed March 05, 2021. http://hdl.handle.net/1828/12133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Feng, Cuiying. “Concentrated network tomography and bound-based network tomography.” 2020. Web. 05 Mar 2021.

Vancouver:

Feng C. Concentrated network tomography and bound-based network tomography. [Internet] [Thesis]. University of Victoria; 2020. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/1828/12133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Feng C. Concentrated network tomography and bound-based network tomography. [Thesis]. University of Victoria; 2020. Available from: http://hdl.handle.net/1828/12133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

6. Shahrokhi, Mahdi, S. Energy-saving MAC protocol design for body sensor networks:.

Degree: 2013, Ryerson University

 Remote and online patient monitoring can significantly reduce the cost for the health care system. Body Sensor Network (BSN) plays a key role in real-time… (more)

Subjects/Keywords: Biosensors  – Energy consumption; Biosensors  – Energy consumption – -; Patient monitoring  – Equipment and supplies  – Testing; Patient monitoring  – Equipment and supplies  – Testing – -; Telecommunication in medicine; Telecommunication in medicine – -; Computer network protocols  – Design – Wireless communication systems  – Energy consumption; Computer network protocols  – Design – Wireless communication systems  – Energy consumption – -

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahrokhi, Mahdi, S. (2013). Energy-saving MAC protocol design for body sensor networks:. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A2717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shahrokhi, Mahdi, S. “Energy-saving MAC protocol design for body sensor networks:.” 2013. Thesis, Ryerson University. Accessed March 05, 2021. https://digital.library.ryerson.ca/islandora/object/RULA%3A2717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shahrokhi, Mahdi, S. “Energy-saving MAC protocol design for body sensor networks:.” 2013. Web. 05 Mar 2021.

Vancouver:

Shahrokhi, Mahdi S. Energy-saving MAC protocol design for body sensor networks:. [Internet] [Thesis]. Ryerson University; 2013. [cited 2021 Mar 05]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A2717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shahrokhi, Mahdi S. Energy-saving MAC protocol design for body sensor networks:. [Thesis]. Ryerson University; 2013. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A2717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


The Ohio State University

7. Ramamurthy, Shriram Raghavendra. Network Performance Monitoring.

Degree: MS, Computer Science and Engineering, 2012, The Ohio State University

Network management is the use of tools that pertain to the operation, administration and provisioning of networked systems. Operation is the continuous monitoring of… (more)

Subjects/Keywords: Computer Science; network monitoring; network management; iPhone Development

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramamurthy, S. R. (2012). Network Performance Monitoring. (Masters Thesis). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1339735459

Chicago Manual of Style (16th Edition):

Ramamurthy, Shriram Raghavendra. “Network Performance Monitoring.” 2012. Masters Thesis, The Ohio State University. Accessed March 05, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339735459.

MLA Handbook (7th Edition):

Ramamurthy, Shriram Raghavendra. “Network Performance Monitoring.” 2012. Web. 05 Mar 2021.

Vancouver:

Ramamurthy SR. Network Performance Monitoring. [Internet] [Masters thesis]. The Ohio State University; 2012. [cited 2021 Mar 05]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1339735459.

Council of Science Editors:

Ramamurthy SR. Network Performance Monitoring. [Masters Thesis]. The Ohio State University; 2012. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1339735459

8. Demirci, Mehmet. Facilitating the provision of auxiliary support services for overlay networks.

Degree: PhD, Computer Science, 2013, Georgia Tech

Network virtualization and overlay networks have emerged as powerful tools for improving the flexibility of the Internet. Overlays are used to provide a wide range… (more)

Subjects/Keywords: Network virtualization; Overlay networks; Virtual network embedding; Overlay monitoring; Computer network architectures; Virtual computer systems

…performance monitoring. Overlay network placement for diagnosability An important aspect affecting… …monitoring to overlays so that the cost to the network will be minimized, and use the fair resource… …monitoring and diagnosis. Network virtualization and overlay networks have been utilized for more… …optimization, using the maxmin fairness definition. 2.3 Overlay Monitoring and Diagnosis Network… …9,38,67,82]. Active monitoring offers flexibility through probing the network at a desired… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Demirci, M. (2013). Facilitating the provision of auxiliary support services for overlay networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/49089

Chicago Manual of Style (16th Edition):

Demirci, Mehmet. “Facilitating the provision of auxiliary support services for overlay networks.” 2013. Doctoral Dissertation, Georgia Tech. Accessed March 05, 2021. http://hdl.handle.net/1853/49089.

MLA Handbook (7th Edition):

Demirci, Mehmet. “Facilitating the provision of auxiliary support services for overlay networks.” 2013. Web. 05 Mar 2021.

Vancouver:

Demirci M. Facilitating the provision of auxiliary support services for overlay networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/1853/49089.

Council of Science Editors:

Demirci M. Facilitating the provision of auxiliary support services for overlay networks. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/49089


ETH Zürich

9. Zollinger, Aaron. Networking Unleashed: Geographic Routing and Topology Control in Ad Hoc and Sensor Networks.

Degree: 2005, ETH Zürich

Subjects/Keywords: NETWORK ARCHITECTURES (COMPUTER SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ROUTING (COMPUTER SYSTEMS); NETWORK MONITORING (COMPUTER SYSTEMS); NETZWERKARCHITEKTUREN (COMPUTERSYSTEME); WEGEERMITTLUNG (COMPUTERSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zollinger, A. (2005). Networking Unleashed: Geographic Routing and Topology Control in Ad Hoc and Sensor Networks. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/51309

Chicago Manual of Style (16th Edition):

Zollinger, Aaron. “Networking Unleashed: Geographic Routing and Topology Control in Ad Hoc and Sensor Networks.” 2005. Doctoral Dissertation, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/51309.

MLA Handbook (7th Edition):

Zollinger, Aaron. “Networking Unleashed: Geographic Routing and Topology Control in Ad Hoc and Sensor Networks.” 2005. Web. 05 Mar 2021.

Vancouver:

Zollinger A. Networking Unleashed: Geographic Routing and Topology Control in Ad Hoc and Sensor Networks. [Internet] [Doctoral dissertation]. ETH Zürich; 2005. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/51309.

Council of Science Editors:

Zollinger A. Networking Unleashed: Geographic Routing and Topology Control in Ad Hoc and Sensor Networks. [Doctoral Dissertation]. ETH Zürich; 2005. Available from: http://hdl.handle.net/20.500.11850/51309

10. Papadogiannakis, Antonios. Building efficient network traffic monitoring systems under heavy load.

Degree: 2014, University of Crete (UOC); Πανεπιστήμιο Κρήτης

Network traffic monitoring is the basis for a multitude of systems, such as intrusion detection, network forensics, and traffic classification systems, which support the robust,… (more)

Subjects/Keywords: Εποπτεία δικτύων; Ασφάλεια δικτύων; Συστήματα ανίχνευσης επιθέσεων; Network monitoring; Network security; Intrusion detection systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Papadogiannakis, A. (2014). Building efficient network traffic monitoring systems under heavy load. (Thesis). University of Crete (UOC); Πανεπιστήμιο Κρήτης. Retrieved from http://hdl.handle.net/10442/hedi/34771

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Papadogiannakis, Antonios. “Building efficient network traffic monitoring systems under heavy load.” 2014. Thesis, University of Crete (UOC); Πανεπιστήμιο Κρήτης. Accessed March 05, 2021. http://hdl.handle.net/10442/hedi/34771.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Papadogiannakis, Antonios. “Building efficient network traffic monitoring systems under heavy load.” 2014. Web. 05 Mar 2021.

Vancouver:

Papadogiannakis A. Building efficient network traffic monitoring systems under heavy load. [Internet] [Thesis]. University of Crete (UOC); Πανεπιστήμιο Κρήτης; 2014. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10442/hedi/34771.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Papadogiannakis A. Building efficient network traffic monitoring systems under heavy load. [Thesis]. University of Crete (UOC); Πανεπιστήμιο Κρήτης; 2014. Available from: http://hdl.handle.net/10442/hedi/34771

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

11. Ye, Lisha. DCUDP : a novel UDP for reliable transmission in data center networks.

Degree: 2012, Hong Kong University of Science and Technology

 Recent researchers find out that TCP fails to provide satisfying performance for data center networks in many cases including throughput, fairness and latency requirements since… (more)

Subjects/Keywords: TCP/IP (Computer network protocol) ; Computer network protocols ; Data transmission systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ye, L. (2012). DCUDP : a novel UDP for reliable transmission in data center networks. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-7757 ; https://doi.org/10.14711/thesis-b1198287 ; http://repository.ust.hk/ir/bitstream/1783.1-7757/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ye, Lisha. “DCUDP : a novel UDP for reliable transmission in data center networks.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed March 05, 2021. http://repository.ust.hk/ir/Record/1783.1-7757 ; https://doi.org/10.14711/thesis-b1198287 ; http://repository.ust.hk/ir/bitstream/1783.1-7757/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ye, Lisha. “DCUDP : a novel UDP for reliable transmission in data center networks.” 2012. Web. 05 Mar 2021.

Vancouver:

Ye L. DCUDP : a novel UDP for reliable transmission in data center networks. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2021 Mar 05]. Available from: http://repository.ust.hk/ir/Record/1783.1-7757 ; https://doi.org/10.14711/thesis-b1198287 ; http://repository.ust.hk/ir/bitstream/1783.1-7757/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ye L. DCUDP : a novel UDP for reliable transmission in data center networks. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: http://repository.ust.hk/ir/Record/1783.1-7757 ; https://doi.org/10.14711/thesis-b1198287 ; http://repository.ust.hk/ir/bitstream/1783.1-7757/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Bengtsson, Thom. Portabel nätverksövervakning och prestandatest.

Degree: Computer Science, 2020, Luleå University of Technology

  This work has been done as an assignment from CGI with the ambition to find an opensource program that provides both network monitoring and… (more)

Subjects/Keywords: network; network monitoring; networks; monitoring; snmp; performance test; iperf; netperf; nätverk; nätverksövervakning; övervakning; snmp; prestandatest; iperf; netperf; Communication Systems; Kommunikationssystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bengtsson, T. (2020). Portabel nätverksövervakning och prestandatest. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79495

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bengtsson, Thom. “Portabel nätverksövervakning och prestandatest.” 2020. Thesis, Luleå University of Technology. Accessed March 05, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79495.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bengtsson, Thom. “Portabel nätverksövervakning och prestandatest.” 2020. Web. 05 Mar 2021.

Vancouver:

Bengtsson T. Portabel nätverksövervakning och prestandatest. [Internet] [Thesis]. Luleå University of Technology; 2020. [cited 2021 Mar 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79495.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bengtsson T. Portabel nätverksövervakning och prestandatest. [Thesis]. Luleå University of Technology; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79495

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

13. Kumar, Ajoy. Unifying the conceptual levels of network security through the use of patterns.

Degree: 2014, Florida Atlantic University

Summary: Network architectures are described by the International Standard for Organization (ISO), which contains seven layers. The internet uses four of these layers, of which… (more)

Subjects/Keywords: Computer architecture; Computer network architectures; Computer network protocols; Computer network protocols; Computer networks  – Security measures; Expert systems (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, A. (2014). Unifying the conceptual levels of network security through the use of patterns. (Thesis). Florida Atlantic University. Retrieved from http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kumar, Ajoy. “Unifying the conceptual levels of network security through the use of patterns.” 2014. Thesis, Florida Atlantic University. Accessed March 05, 2021. http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kumar, Ajoy. “Unifying the conceptual levels of network security through the use of patterns.” 2014. Web. 05 Mar 2021.

Vancouver:

Kumar A. Unifying the conceptual levels of network security through the use of patterns. [Internet] [Thesis]. Florida Atlantic University; 2014. [cited 2021 Mar 05]. Available from: http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kumar A. Unifying the conceptual levels of network security through the use of patterns. [Thesis]. Florida Atlantic University; 2014. Available from: http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Washington State University

14. [No author]. Real-World Sensor Network Framework for Long-Term Volcano Monitoring .

Degree: 2011, Washington State University

 Wireless sensor network, composed of tens or hundreds of low-power and resource-constrained devices, has the potential to greatly enhance the understanding of volcanoes by permitting… (more)

Subjects/Keywords: Computer science; Information science; Data Quality; Deployment; High-Fidelity; Network Management; Sensor Network; Volcano Monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2011). Real-World Sensor Network Framework for Long-Term Volcano Monitoring . (Thesis). Washington State University. Retrieved from http://hdl.handle.net/2376/3540

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “Real-World Sensor Network Framework for Long-Term Volcano Monitoring .” 2011. Thesis, Washington State University. Accessed March 05, 2021. http://hdl.handle.net/2376/3540.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “Real-World Sensor Network Framework for Long-Term Volcano Monitoring .” 2011. Web. 05 Mar 2021.

Vancouver:

author] [. Real-World Sensor Network Framework for Long-Term Volcano Monitoring . [Internet] [Thesis]. Washington State University; 2011. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/2376/3540.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. Real-World Sensor Network Framework for Long-Term Volcano Monitoring . [Thesis]. Washington State University; 2011. Available from: http://hdl.handle.net/2376/3540

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

15. Drienko, Peter. Optimalizace dohledového nástroje pro správu sítě VUT: Optimizing Network Tracking Tool for Management of BUT Campus Network.

Degree: 2018, Brno University of Technology

 This master's thesis focuses on optimizing the network tracking tool Zabbix. In the first part this thesis provides an overview of techniques used for monitoring(more)

Subjects/Keywords: Monitorování počítačových sítí; Zabbix; PostgreSQL; Computer network monitoring; Zabbix; PostgreSQL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Drienko, P. (2018). Optimalizace dohledového nástroje pro správu sítě VUT: Optimizing Network Tracking Tool for Management of BUT Campus Network. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54516

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Drienko, Peter. “Optimalizace dohledového nástroje pro správu sítě VUT: Optimizing Network Tracking Tool for Management of BUT Campus Network.” 2018. Thesis, Brno University of Technology. Accessed March 05, 2021. http://hdl.handle.net/11012/54516.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Drienko, Peter. “Optimalizace dohledového nástroje pro správu sítě VUT: Optimizing Network Tracking Tool for Management of BUT Campus Network.” 2018. Web. 05 Mar 2021.

Vancouver:

Drienko P. Optimalizace dohledového nástroje pro správu sítě VUT: Optimizing Network Tracking Tool for Management of BUT Campus Network. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/11012/54516.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Drienko P. Optimalizace dohledového nástroje pro správu sítě VUT: Optimizing Network Tracking Tool for Management of BUT Campus Network. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/54516

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

16. Chen, Wenji. Distributed Data Streaming Algorithms for Network Anomaly Detection.

Degree: 2017, Iowa State University

Network attacks and anomalies such as DDoS attacks, service outages, email spamming are happening everyday, causing various problems for users such as financial loss, inconvenience… (more)

Subjects/Keywords: Data Streaming; Distributed Processing; Network Monitoring; Probabilistic Algorithms; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, W. (2017). Distributed Data Streaming Algorithms for Network Anomaly Detection. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/15278

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Wenji. “Distributed Data Streaming Algorithms for Network Anomaly Detection.” 2017. Thesis, Iowa State University. Accessed March 05, 2021. https://lib.dr.iastate.edu/etd/15278.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Wenji. “Distributed Data Streaming Algorithms for Network Anomaly Detection.” 2017. Web. 05 Mar 2021.

Vancouver:

Chen W. Distributed Data Streaming Algorithms for Network Anomaly Detection. [Internet] [Thesis]. Iowa State University; 2017. [cited 2021 Mar 05]. Available from: https://lib.dr.iastate.edu/etd/15278.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen W. Distributed Data Streaming Algorithms for Network Anomaly Detection. [Thesis]. Iowa State University; 2017. Available from: https://lib.dr.iastate.edu/etd/15278

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

17. Zimmerli, Laurent. Rating autonomous systems.

Degree: 2008, ETH Zürich

Subjects/Keywords: LEISTUNG (COMPUTERSYSTEME); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); PERFORMANCE (COMPUTER SYSTEMS); NETWORK MONITORING (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zimmerli, L. (2008). Rating autonomous systems. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150878

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zimmerli, Laurent. “Rating autonomous systems.” 2008. Thesis, ETH Zürich. Accessed March 05, 2021. http://hdl.handle.net/20.500.11850/150878.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zimmerli, Laurent. “Rating autonomous systems.” 2008. Web. 05 Mar 2021.

Vancouver:

Zimmerli L. Rating autonomous systems. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/20.500.11850/150878.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zimmerli L. Rating autonomous systems. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150878

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

18. Kruger, Angela. Data integrity in a steel manufacturing environment with special reference to Columbus Stainless Steel.

Degree: 2012, University of Johannesburg

M.Comm.

In manufacturing companies where raw material is transformed into an endproduct, data pertaining to that transformation process are transported from the physical machine (workstation)… (more)

Subjects/Keywords: Data transmission systems; Computer network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kruger, A. (2012). Data integrity in a steel manufacturing environment with special reference to Columbus Stainless Steel. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/4506

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kruger, Angela. “Data integrity in a steel manufacturing environment with special reference to Columbus Stainless Steel.” 2012. Thesis, University of Johannesburg. Accessed March 05, 2021. http://hdl.handle.net/10210/4506.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kruger, Angela. “Data integrity in a steel manufacturing environment with special reference to Columbus Stainless Steel.” 2012. Web. 05 Mar 2021.

Vancouver:

Kruger A. Data integrity in a steel manufacturing environment with special reference to Columbus Stainless Steel. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10210/4506.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kruger A. Data integrity in a steel manufacturing environment with special reference to Columbus Stainless Steel. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/4506

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

19. Naidoo, Tyrone. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.

Degree: 2016, University of KwaZulu-Natal

 In recent years, there has been a rapid increase in Internet usage, which has in turn led to a rise in malicious network activity. Network(more)

Subjects/Keywords: Computer engineering.; Network Intrusion Detection Systems (NIDS).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naidoo, T. (2016). Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/14171

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Naidoo, Tyrone. “Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.” 2016. Thesis, University of KwaZulu-Natal. Accessed March 05, 2021. http://hdl.handle.net/10413/14171.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Naidoo, Tyrone. “Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.” 2016. Web. 05 Mar 2021.

Vancouver:

Naidoo T. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. [Internet] [Thesis]. University of KwaZulu-Natal; 2016. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10413/14171.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Naidoo T. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. [Thesis]. University of KwaZulu-Natal; 2016. Available from: http://hdl.handle.net/10413/14171

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oklahoma

20. Hossain, Shohrab. Survivability, Scalability and Security of Mobility Protocols.

Degree: PhD, 2012, University of Oklahoma

architecture that aims at maximizing bandwidth utilization. The analysis presented in this work can help network engineers compare different mobility protocols quantitatively, thereby choose one that is reliable, secure, survivable and scalable. Advisors/Committee Members: Atiquzzaman, Mohammed (advisor).

Subjects/Keywords: Mobile communication systems; Computer network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hossain, S. (2012). Survivability, Scalability and Security of Mobility Protocols. (Doctoral Dissertation). University of Oklahoma. Retrieved from http://hdl.handle.net/11244/320332

Chicago Manual of Style (16th Edition):

Hossain, Shohrab. “Survivability, Scalability and Security of Mobility Protocols.” 2012. Doctoral Dissertation, University of Oklahoma. Accessed March 05, 2021. http://hdl.handle.net/11244/320332.

MLA Handbook (7th Edition):

Hossain, Shohrab. “Survivability, Scalability and Security of Mobility Protocols.” 2012. Web. 05 Mar 2021.

Vancouver:

Hossain S. Survivability, Scalability and Security of Mobility Protocols. [Internet] [Doctoral dissertation]. University of Oklahoma; 2012. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/11244/320332.

Council of Science Editors:

Hossain S. Survivability, Scalability and Security of Mobility Protocols. [Doctoral Dissertation]. University of Oklahoma; 2012. Available from: http://hdl.handle.net/11244/320332


Rutgers University

21. Su, Kai, 1987-. Algorithms and protocols for efficient multicast, transport, and congestion control in wireless networks.

Degree: PhD, Electrical and Computer Engineering, 2016, Rutgers University

 Effective and efficient support for wireless data transfer is an essential requirement for future Internet design, as the number of wireless network users and devices,… (more)

Subjects/Keywords: Wireless communication systems; Computer network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Su, Kai, 1. (2016). Algorithms and protocols for efficient multicast, transport, and congestion control in wireless networks. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/51474/

Chicago Manual of Style (16th Edition):

Su, Kai, 1987-. “Algorithms and protocols for efficient multicast, transport, and congestion control in wireless networks.” 2016. Doctoral Dissertation, Rutgers University. Accessed March 05, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/51474/.

MLA Handbook (7th Edition):

Su, Kai, 1987-. “Algorithms and protocols for efficient multicast, transport, and congestion control in wireless networks.” 2016. Web. 05 Mar 2021.

Vancouver:

Su, Kai 1. Algorithms and protocols for efficient multicast, transport, and congestion control in wireless networks. [Internet] [Doctoral dissertation]. Rutgers University; 2016. [cited 2021 Mar 05]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51474/.

Council of Science Editors:

Su, Kai 1. Algorithms and protocols for efficient multicast, transport, and congestion control in wireless networks. [Doctoral Dissertation]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51474/


Rutgers University

22. Mukherjee, Shreyasee, 1989-. Network protocols for the mobility-centric future internet.

Degree: PhD, Electrical and Computer Engineering, 2019, Rutgers University

 This thesis presents network protocol solutions to support advanced services in the future Internet. The Internet is increasingly becoming mobile with the number of mobile… (more)

Subjects/Keywords: Wireless communication systems; Computer network architectures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mukherjee, Shreyasee, 1. (2019). Network protocols for the mobility-centric future internet. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/60038/

Chicago Manual of Style (16th Edition):

Mukherjee, Shreyasee, 1989-. “Network protocols for the mobility-centric future internet.” 2019. Doctoral Dissertation, Rutgers University. Accessed March 05, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/60038/.

MLA Handbook (7th Edition):

Mukherjee, Shreyasee, 1989-. “Network protocols for the mobility-centric future internet.” 2019. Web. 05 Mar 2021.

Vancouver:

Mukherjee, Shreyasee 1. Network protocols for the mobility-centric future internet. [Internet] [Doctoral dissertation]. Rutgers University; 2019. [cited 2021 Mar 05]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60038/.

Council of Science Editors:

Mukherjee, Shreyasee 1. Network protocols for the mobility-centric future internet. [Doctoral Dissertation]. Rutgers University; 2019. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60038/


Reykjavík University

23. Ólafur Karl Stefánsson 1988-. Vessel monitoring system : map implementation .

Degree: 2019, Reykjavík University

 A vessel monitoring system (VMS) is used by national agencies around the world to detect illegal activities committed by ships and other vessels. A primary… (more)

Subjects/Keywords: Tölvunarfræði; Kerfishönnun; Tölvukerfi; Eftirlit; Computer sciences; System design; Computer systems; Monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

1988-, . K. S. (2019). Vessel monitoring system : map implementation . (Thesis). Reykjavík University. Retrieved from http://hdl.handle.net/1946/34003

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

1988-, Ólafur Karl Stefánsson. “Vessel monitoring system : map implementation .” 2019. Thesis, Reykjavík University. Accessed March 05, 2021. http://hdl.handle.net/1946/34003.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

1988-, Ólafur Karl Stefánsson. “Vessel monitoring system : map implementation .” 2019. Web. 05 Mar 2021.

Vancouver:

1988- KS. Vessel monitoring system : map implementation . [Internet] [Thesis]. Reykjavík University; 2019. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/1946/34003.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

1988- KS. Vessel monitoring system : map implementation . [Thesis]. Reykjavík University; 2019. Available from: http://hdl.handle.net/1946/34003

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Columbia University

24. Srinivasan, Suman Ramkumar. Improving Content Delivery and Service Discovery in Networks.

Degree: 2016, Columbia University

 Production and consumption of multimedia content on the Internet is rising, fueled by the demand for content from services such as YouTube, Netflix and Facebook… (more)

Subjects/Keywords: Multimedia systems – Standards; Computer network protocols; Internet; Multimedia systems; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Srinivasan, S. R. (2016). Improving Content Delivery and Service Discovery in Networks. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/D8Z89CCC

Chicago Manual of Style (16th Edition):

Srinivasan, Suman Ramkumar. “Improving Content Delivery and Service Discovery in Networks.” 2016. Doctoral Dissertation, Columbia University. Accessed March 05, 2021. https://doi.org/10.7916/D8Z89CCC.

MLA Handbook (7th Edition):

Srinivasan, Suman Ramkumar. “Improving Content Delivery and Service Discovery in Networks.” 2016. Web. 05 Mar 2021.

Vancouver:

Srinivasan SR. Improving Content Delivery and Service Discovery in Networks. [Internet] [Doctoral dissertation]. Columbia University; 2016. [cited 2021 Mar 05]. Available from: https://doi.org/10.7916/D8Z89CCC.

Council of Science Editors:

Srinivasan SR. Improving Content Delivery and Service Discovery in Networks. [Doctoral Dissertation]. Columbia University; 2016. Available from: https://doi.org/10.7916/D8Z89CCC


Florida Atlantic University

25. Alwakeel, Ahmed M. A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION.

Degree: 2020, Florida Atlantic University

Cloud computing has provided many services to potential consumers, one of these services being the provision of network functions using virtualization. Network Function Virtualization is… (more)

Subjects/Keywords: Virtual computer systems; Cloud computing; Computer network architectures; Computer networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alwakeel, A. M. (2020). A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION. (Thesis). Florida Atlantic University. Retrieved from http://fau.digital.flvc.org/islandora/object/fau:42585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alwakeel, Ahmed M. “A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION.” 2020. Thesis, Florida Atlantic University. Accessed March 05, 2021. http://fau.digital.flvc.org/islandora/object/fau:42585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alwakeel, Ahmed M. “A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION.” 2020. Web. 05 Mar 2021.

Vancouver:

Alwakeel AM. A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION. [Internet] [Thesis]. Florida Atlantic University; 2020. [cited 2021 Mar 05]. Available from: http://fau.digital.flvc.org/islandora/object/fau:42585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alwakeel AM. A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION. [Thesis]. Florida Atlantic University; 2020. Available from: http://fau.digital.flvc.org/islandora/object/fau:42585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

26. Girondi, Massimo. Efficient traffic monitoring in 5G Core Network.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

5G is an enabler to several new use cases. To support all of them, the network infrastructure must be flexible and it should adapt… (more)

Subjects/Keywords: 5G; Core Network; Network Monitoring; In-band Network Telemetry; Latency measurement; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Girondi, M. (2020). Efficient traffic monitoring in 5G Core Network. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280098

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Girondi, Massimo. “Efficient traffic monitoring in 5G Core Network.” 2020. Thesis, KTH. Accessed March 05, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280098.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Girondi, Massimo. “Efficient traffic monitoring in 5G Core Network.” 2020. Web. 05 Mar 2021.

Vancouver:

Girondi M. Efficient traffic monitoring in 5G Core Network. [Internet] [Thesis]. KTH; 2020. [cited 2021 Mar 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280098.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Girondi M. Efficient traffic monitoring in 5G Core Network. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280098

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of California – Riverside

27. Beyene, Yordanos. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices.

Degree: Computer Science, 2014, University of California – Riverside

 In this dissertation, we attempt to understand and predict the performance of security devices. More specifically, we examine the following types of questions: (a) Given… (more)

Subjects/Keywords: Computer science; Firewalls; Intrusion Prevension Systems; Network Measurements; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beyene, Y. (2014). A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices. (Thesis). University of California – Riverside. Retrieved from http://www.escholarship.org/uc/item/53f463j8

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Beyene, Yordanos. “A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices.” 2014. Thesis, University of California – Riverside. Accessed March 05, 2021. http://www.escholarship.org/uc/item/53f463j8.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Beyene, Yordanos. “A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices.” 2014. Web. 05 Mar 2021.

Vancouver:

Beyene Y. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices. [Internet] [Thesis]. University of California – Riverside; 2014. [cited 2021 Mar 05]. Available from: http://www.escholarship.org/uc/item/53f463j8.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Beyene Y. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices. [Thesis]. University of California – Riverside; 2014. Available from: http://www.escholarship.org/uc/item/53f463j8

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mid Sweden University

28. Wang, Xutao. Chinese Text Classification Based On Deep Learning.

Degree: Information Systems and Technology, 2018, Mid Sweden University

  Text classification has always been a concern in area of natural language processing, especially nowadays the data are getting massive due to the development… (more)

Subjects/Keywords: Text classification; Recurrent neural network; Convolutional neural network; Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, X. (2018). Chinese Text Classification Based On Deep Learning. (Thesis). Mid Sweden University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35322

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Xutao. “Chinese Text Classification Based On Deep Learning.” 2018. Thesis, Mid Sweden University. Accessed March 05, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35322.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Xutao. “Chinese Text Classification Based On Deep Learning.” 2018. Web. 05 Mar 2021.

Vancouver:

Wang X. Chinese Text Classification Based On Deep Learning. [Internet] [Thesis]. Mid Sweden University; 2018. [cited 2021 Mar 05]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35322.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang X. Chinese Text Classification Based On Deep Learning. [Thesis]. Mid Sweden University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35322

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

29. Cilliers, Charl. Remote monitoring and diagnosis for control of EDM parameters.

Degree: 2008, University of Johannesburg

M.Ing.

This thesis presents the concept of remote (Internet) data acquisition and processing for control of EDM parameters. It incorporates aspects of data analysis while… (more)

Subjects/Keywords: Machining automatic control; Machining monitoring; Computer integrated manufacturing systems; Internet; Computer network protocols; Neural networks (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cilliers, C. (2008). Remote monitoring and diagnosis for control of EDM parameters. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/1730

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cilliers, Charl. “Remote monitoring and diagnosis for control of EDM parameters.” 2008. Thesis, University of Johannesburg. Accessed March 05, 2021. http://hdl.handle.net/10210/1730.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cilliers, Charl. “Remote monitoring and diagnosis for control of EDM parameters.” 2008. Web. 05 Mar 2021.

Vancouver:

Cilliers C. Remote monitoring and diagnosis for control of EDM parameters. [Internet] [Thesis]. University of Johannesburg; 2008. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10210/1730.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cilliers C. Remote monitoring and diagnosis for control of EDM parameters. [Thesis]. University of Johannesburg; 2008. Available from: http://hdl.handle.net/10210/1730

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

30. Pearson, Deon Turner. An exploration of the overlap between open source threat intelligence and active internet background radiation.

Degree: Faculty of Science, Computer Science, 2020, Rhodes University

 Organisations and individuals are facing increasing persistent threats on the Internet from worms, port scanners, and malicious software (malware). These threats are constantly evolving as… (more)

Subjects/Keywords: Computer networks  – Security measures; Computer networks  – Monitoring; Malware (Computer software); TCP/IP (Computer network protocol); Open source intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pearson, D. T. (2020). An exploration of the overlap between open source threat intelligence and active internet background radiation. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/103802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pearson, Deon Turner. “An exploration of the overlap between open source threat intelligence and active internet background radiation.” 2020. Thesis, Rhodes University. Accessed March 05, 2021. http://hdl.handle.net/10962/103802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pearson, Deon Turner. “An exploration of the overlap between open source threat intelligence and active internet background radiation.” 2020. Web. 05 Mar 2021.

Vancouver:

Pearson DT. An exploration of the overlap between open source threat intelligence and active internet background radiation. [Internet] [Thesis]. Rhodes University; 2020. [cited 2021 Mar 05]. Available from: http://hdl.handle.net/10962/103802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pearson DT. An exploration of the overlap between open source threat intelligence and active internet background radiation. [Thesis]. Rhodes University; 2020. Available from: http://hdl.handle.net/10962/103802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [6001]

.