To see the other types of publications on this topic, follow the link: Control toolbox (Computer file).

Dissertations / Theses on the topic 'Control toolbox (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 dissertations / theses for your research on the topic 'Control toolbox (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tang, Wai-hung, and 鄧偉雄. "An anonymity scheme for file retrieval systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40887972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mazières, David (David Folkman) 1972. "Security and decentralized control of the SFS global file system." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43610.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (p. 47-53).<br>SFS (secure file system) is a global file system designed to be secure against all active and passive network attacks, provide a single namespace across all machines in the world, and avoid any form of centralized control. Using SFS, any unprivileged user can access any file server in the world securely and with no prior arrangement on the part of system administrators. New file servers are immediately accessible securely by all
APA, Harvard, Vancouver, ISO, and other styles
3

Leung, Ka-ho Andrew. "Localized topology control in wireless peer-to peer file sharing networks." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32048208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leung, Ka-ho Andrew, and 梁嘉浩. "Localized topology control in wireless peer-to peer file sharing networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32048208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Merritt, John W. "Distributed file systems in an authentication system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Faltemier, Timothy Collin. "A groupware interface to a shared file system." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1352.

Full text
Abstract:
Current shared file systems (NFS and SAMBA) are based on the local area network model. To these file systems, performance is the major issue. However, as the Internet grows, so does the distance between users and the Local Area Network. With this increase in distance, the latency increases as well. This creates a problem when multiple users attempt to work in a shared environment. Traditionally, the only way to collaborate over the Internet required the use of locks. These requirements motivated the creation of the State Difference Transformation algorithm that allows users non-blocking and un
APA, Harvard, Vancouver, ISO, and other styles
7

Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.

Full text
Abstract:
Dissertation (Ph.D.) -- Worcester Polytechnic Institute.<br>Keywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
APA, Harvard, Vancouver, ISO, and other styles
8

Perera, Dinesh Sirimal. "Design metrics analysis of the Harris ROCC project." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/935930.

Full text
Abstract:
The Design Metrics Research Team at Ball State University has developed a quality design metric D(G), which consists of an internal design metric Di, and an external design metric De. This thesis discusses applying design metrics to the ROCC-Radar On-line Command Control project received from Harris Corporation. Thus, the main objective of this thesis is to analyze the behavior of D(G), and the primitive components of this metric.Error and change history reports are vital inputs to the validation of design metrics' performance. Since correct identification of types of changes/errors is critica
APA, Harvard, Vancouver, ISO, and other styles
9

Beedu, Atul. "Integrated inventory control to manage blanket orders in a contract manufacturing environment a case study /." Diss., Online access via UMI:, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhargava, Manjari. "Analysis of multiple software releases of AFATDS using design metrics." Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/834502.

Full text
Abstract:
The development of high quality software the first time, greatly depends upon the ability to judge the potential quality of the software early in the life cycle. The Software Engineering Research Center design metrics research team at Ball State University has developed a metrics approach for analyzing software designs. Given a design, these metrics highlight stress points and determine overall design quality.The purpose of this study is to analyze multiple software releases of the Advanced Field Artillery Tactical Data System (AFATDS) using design metrics. The focus is on examining the transf
APA, Harvard, Vancouver, ISO, and other styles
11

LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Allman, Mark. "Improving TCP performance over satellite channels." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177615641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Nain, Philippe. "Application des methodes analytiques a la modelisation des systemes informatiques." Paris 6, 1987. http://www.theses.fr/1987PA066550.

Full text
Abstract:
Cette these est consacree a la modelisation par files d'attente de certains systemes informatiques. Le chapitre i analyse un systeme classique de files d'attente en serre. Les chapitres ii, iii et iv abordent l'analyse de modeles d'allocation d'une ressource unique dans les reseaux de communication (boucle, bus. . . ). Ceci se traduit par la recherche de politiques optimales de service dans une file d'attente multiclasse avec contraintes. Les chapitres v et vi traitent de l'evaluation des performances de deux protocoles de communication multi-acces
APA, Harvard, Vancouver, ISO, and other styles
14

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
APA, Harvard, Vancouver, ISO, and other styles
15

"FADE: secure overlay cloud storage with access control and file assured deletion." 2011. http://library.cuhk.edu.hk/record=b5894616.

Full text
Abstract:
Tang, Yang.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2011.<br>Includes bibliographical references (p. 60-65).<br>Abstracts in English and Chinese.<br>Abstract --- p.i<br>Acknowledgement --- p.iv<br>Chapter 1 --- Introduction --- p.1<br>Chapter 2 --- Policy-based File Assured Deletion --- p.7<br>Chapter 2.1 --- Background --- p.7<br>Chapter 2.2 --- Policy-based Deletion --- p.9<br>Chapter 3 --- Basic Design of FADE --- p.13<br>Chapter 3.1 --- Entities --- p.13<br>Chapter 3.2 --- Deployment --- p.15<br>Chapter 3.3 --- "Security Goals, Threat Models, and Assumptions" --- p.
APA, Harvard, Vancouver, ISO, and other styles
16

"A model for the evaluation of control with reference to a simple path context model in a UNIX environment." Thesis, 2015. http://hdl.handle.net/10210/14471.

Full text
Abstract:
M.Com.<br>Information and the IT systems that support it are important business assets. Their availability, integrity and confidentiality are essential to maintain an organisations competitive edge, cash flow, profitability, company image and compliance with legal requirements. Organisations world-wide are now facing increased security threats from a wide range of sources. Information systems may be the target of a range of serious threats including computer-based fraud, espionage, sabotage, vandalism and other sources of failure or disaster ...
APA, Harvard, Vancouver, ISO, and other styles
17

Pradeepa, B. K. "Performance Modelling Of TCP-Controlled File Transfers In Wireless LANs, And Applications In AP-STA Association." Thesis, 2011. https://etd.iisc.ac.in/handle/2005/2121.

Full text
Abstract:
Our work focuses on performance modelling of TCP-controlled file transfers in infrastructure mode IEEE 802.11 wireless networks, and application of the models in developing association schemes. A comprehensive set of analytical models is used to study the behaviour of TCP-controlled long and short file transfers in IEEE 802.11 WLANs. The results can provide insight into the performance of TCP-controlled traffic in 802.11 WLANs in a variety of different network environments. First, we consider several WLAN stations associated at rates r1, r2, ...,rk with an Access Point. Each station (STA) is d
APA, Harvard, Vancouver, ISO, and other styles
18

Pradeepa, B. K. "Performance Modelling Of TCP-Controlled File Transfers In Wireless LANs, And Applications In AP-STA Association." Thesis, 2011. http://etd.iisc.ernet.in/handle/2005/2121.

Full text
Abstract:
Our work focuses on performance modelling of TCP-controlled file transfers in infrastructure mode IEEE 802.11 wireless networks, and application of the models in developing association schemes. A comprehensive set of analytical models is used to study the behaviour of TCP-controlled long and short file transfers in IEEE 802.11 WLANs. The results can provide insight into the performance of TCP-controlled traffic in 802.11 WLANs in a variety of different network environments. First, we consider several WLAN stations associated at rates r1, r2, ...,rk with an Access Point. Each station (STA) is d
APA, Harvard, Vancouver, ISO, and other styles
19

Booi, Mutshavhani Charlotte. "Quality management systems used by nursing education institution in Gauteng Province." Thesis, 2008. http://hdl.handle.net/10500/2606.

Full text
Abstract:
Quality assurance forms an integral part of education and training programme delivery. The purpose of this research was to determine whether the quality management systems (QMS) used by nursing education institutions in Gauteng are aligned to the SAQA criteria and guidelines for education and training providers. A quantitative, descriptive and exploratory design was followed using a self-administered questionnaire as data gathering instrument. A total of 32 respondents from three selected nursing education institutions completed the questionnaire. The data were analysed by using the Statistic
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!