Dissertations / Theses on the topic 'End-To-End'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'End-To-End.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Li, Jizhizi. "End-to-end Animal Matting." Thesis, University of Sydney, 2020. https://hdl.handle.net/2123/22897.
Full textRangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.
Full textIncludes bibliographical references (leaves 53-54).
by Vinod K. Rangarajan.
S.B.and M.Eng.
Chan, William. "End-to-End Speech Recognition Models." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/723.
Full textLe, BeEm V. "Distributed and end-to-end testing." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLe.pdf.
Full textThesis Advisor: Huynh, Thomas V. Second Reader: Barrera, Raymond. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: distributed, End-to-End, combat systems, C4I Systems, pay-per-test, Goal Programming (GP), Distributed Engineering Plant (DEP), E2E Lab, PMW, PEO C4I, NAVSEA, SPAWAR. Includes bibliographical references (p. 53-54). Also available in print.
Chaudry, Kashif, and Elma Karadza. "End-to-End Application Billing in 3G." Thesis, Linköping University, Department of Science and Technology, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1654.
Full textWe have 3G on the doorstep but nothing seems to attract ordinary people to this technology. To attract the mass market the telecom industry must show something beyond high bit rates. They must show how ordinary people can take advantage of this new technology. This is done by showing the possibilities of the new technology and by demonstrating applications that it will handle. The telecom industry must convince the telecom operators to invest in this technology and the only thing that matters to them is how much revenue they can make by adopting the upcoming technology.
To convince the operators industry must show how the operators can charge for the new types of applications that will be introduced soon. This is the main reason why this Master's Thesis has been conducted. The purpose of this thesis is to provide a demonstration to Ericsson's 3G lab in Katrineholm in the form of an IP application with a billing solution. This thesis describes the migration from 1G to 3G and examines existing and future billing strategies as well.
The IP application is an application that uses progressive streaming in order to stream multimedia content to a PDA connected to a 3G phone. This application is platform independent because it is placed on leading Web servers, Apache and IIS.
The billing application consists of a number of steps. The first step is logging, which is performed by the Web server on which the streaming application is placed. The second step, processing and billing, is performed in the BGw, which is Ericsson's mediation tool, and the SQL server.The third step is displaying the bill, which is done by using ASP to create an active HTML page.
Holmström, Maria. "End-to-end monitoring of mobile services." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1671.
Full textThe growing market of mobile services through SMS, MMS, WAP and soon also for 3G protocols, requires efficient test methods to ensure that the customers get what they are paying for and in a reasonable time. Preferably, these tests should be done automatically and come as close to real conditions as possible. It would be valuable to be able to make tests from end to end, i.e. requesting and receiving the mobile services on a real mobile phone and combine that with a system that controls and evaluates the tests.
This thesis presents a solution to how the part of an end-to-end monitoring system for mobile services that runs on a mobile phone can be designed and implemented. The phone is made to interpret commands from a control process on a remote server and turn them into mobile service requests in a proper format (e.g. SMS or MMS). When it receives the reply from a mobile service provider, it forwards the relevant result information to the control process.
The monitoring system is based on Symbian OS, an operating system developed to suit handheld devices like mobile phones. The current implementation supports tests for SMS and MMS services.
The system is to be used by mobile operators or other providers of mobile services, which want to test and monitor their services.
Lazar, Mihai. "Empirical modeling of end-to-end jitter." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0019/MQ58472.pdf.
Full textBrown, Ian. "End-to-end security in active networks." Thesis, University College London (University of London), 2001. http://discovery.ucl.ac.uk/3882/.
Full textMaaz, Khan. "EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=case1308179859.
Full textZhang, Da. "End to end testing using integrated tools." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1338300180.
Full textKayayurt, Barış Tuğlular Tuğkan. "End-to-end security for mobile devices/." [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000492.pdf.
Full textLowden, Mia Rochelle Ahmed Shawn. "Genesis of end-to-end chromosome fusions." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2227.
Full textTitle from electronic title page (viewed Jun. 26, 2009). "... in partial fulfillment of requirements for the degree of Doctor of Philosophy in the Department of Biology." Discipline: Biology; Department/School: Biology.
Wigington, Curtis Michael. "End-to-End Full-Page Handwriting Recognition." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7099.
Full textGuerrero, Santander Cesar. "End-to-end available bandwidth estimation and monitoring." [Tampa, Fla.] : University of South Florida, 2009. http://digital.lib.usf.edu/?e14.2863.
Full textAgarwala, Sandip. "System Support for End-to-End Performance Management." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16171.
Full textØztarman, Jo Mehmet Sollihagen. "End-to-End Data Protection of SMS Messages." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15075.
Full textJin, Zhiqun, and Shijie Zhu. "END-TO-END TIMING ANALYSIS OF TASK-CHAINS." Thesis, Mälardalens högskola, Inbyggda system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-36694.
Full textZhiqun, Jin, and Zhu Shijie. "End-to-end Timing Analysis of Task-Chains." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-36751.
Full textStrigér, Amanda. "End-to-End Trainable Chatbot for Restaurant Recommendations." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213982.
Full textChatbotar kan användas för att automatisera enkla uppgifter, som att hitta en restaurang och boka ett bord. Att skapa ett sådant konversationssystem kan dock vara svårt, tidskrävande, och kräva mycket domänkunskap. I denna uppsats undersöks om det är möjligt att använda ett neuralt nätverk för att skapa en chatbot som kan lära sig att automatisera en tjänst som hjälper användaren hitta en restaurang och boka ett bord. För att undersöka detta implementerades en så kallad ``sequence-to-sequence''-modell som sedan tränades på domänspecifik dialogdata. Systemets styrkor och svagheter utvärderades och dess förmåga att generera korrekta svar jämfördes med flera andra modeller. Vår relativt enkla modell uppnådde liknande resultat som den mest avancerade av de andra modellerna. Resultaten visar modellens styrkor, men påvisar även signifikanta brister. Dessa brister gör att systemet, i sig självt, inte kan användas för att skapa en chatbot som kan hjälpa en användare att hitta en passande restaurang. Utvärderingen har dock bidragit med en grundlig undersökning av vilka fel som görs, vilket kan underlätta framtida arbete inom området.
Kanuparthy, Partha V. "End-to-end inference of internet performance problems." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45938.
Full textCosta, M. "End-to-end containment of internet worm epidemics." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.598013.
Full textMauthe, Andreas Ulrich. "End-to-end support for multimedia multipeer communications." Thesis, Lancaster University, 1998. http://eprints.lancs.ac.uk/11590/.
Full textAmini, Alexander Andre. "Robust end-to-end learning for autonomous vehicles." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118031.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 59-64).
Deep learning has been successfully applied to "end-to-end" learning of the autonomous driving task, where a deep neural network learns to predict steering control commands from camera data input. While these works support reactionary control, the representation learned is not usable for higher-level decision making required for autonomous navigation. This thesis tackles the problem of learning a representation to predict a continuous control probability distribution, and thus steering control options and bounds for those options, which can be used for autonomous navigation. Each mode in the learned distribution encodes a possible macro-action that the system could execute at that instant, and the covariances of the modes place bounds on safe steering control values. Our approach has the added advantage of being trained solely on unlabeled data collected from inexpensive cameras. In addition to uncertainty estimates computed directly by our model, we add robustness by developing a novel stochastic dropout sampling technique for estimating the inherent confidence of the model's output. We install the relevant processing hardware pipeline on-board a full-scale autonomous vehicle and integrate our learning algorithms for real-time control inference. Finally, we evaluate our models on a challenging dataset containing a wide variety of driving conditions, and show that the algorithms developed as part of this thesis are capable of successfully controlling the vehicle on real roads and even under a parallel autonomy paradigm wherein control is shared between human and robot.
by Alexander Andre Amini.
S.M.
Andersen, David G. (David Godbe) 1975. "Improving end-to-end availability using overlay networks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/30159.
Full textIncludes bibliographical references (p. 139-150).
The end-to-end availability of Internet services is between two and three orders of magnitude worse than other important engineered systems, including the US airline system, the 911 emergency response system, and the US public telephone system. This dissertation explores three systems designed to mask Internet failures, and, through a study of three years of data collected on a 31-site testbed, why these failures happen and how effectively they can be masked. A core aspect of many of the failures that interrupt end-to-end communication is that they fall outside the expected domain of well-behaved network failures. Many traditional techniques cope with link and router failures; as a result, the remaining failures are those caused by software and hardware bugs, misconfiguration, malice, or the inability of current routing systems to cope with persistent congestion.The effects of these failures are exacerbated because Internet services depend upon the proper functioning of many components-wide-area routing, access links, the domain name system, and the servers themselves-and a failure in any of them can prove disastrous to the proper functioning of the service. This dissertation describes three complementary systems to increase Internet availability in the face of such failures. Each system builds upon the idea of an overlay network, a network created dynamically between a group of cooperating Internet hosts. The first two systems, Resilient Overlay Networks (RON) and Multi-homed Overlay Networks (MONET) determine whether the Internet path between two hosts is working on an end-to-end basis. Both systems exploit the considerable redundancy available in the underlying Internet to find failure-disjoint paths between nodes, and forward traffic along a working path. RON is able to avoid 50% of the Internet outages that interrupt communication between a small group of communicating nodes.MONET is more aggressive, combining an overlay network of Web proxies with explicitly engineered redundant links to the Internet to also mask client access link failures. Eighteen months of measurements from a six-site deployment of MONET show that it increases a client's ability to access working Web sites by nearly an order of magnitude. Where RON and MONET combat accidental failures, the Mayday system guards against denial- of-service attacks by surrounding a vulnerable Internet server with a ring of filtering routers. Mayday then uses a set of overlay nodes to act as mediators between the service and its clients, permitting only properly authenticated traffic to reach the server.
by David Godbe Andersen.
Ph.D.
Rodittis, Kathy, and Alan Cooke. "Next Generation End to End Avionics Bus Monitoring." International Foundation for Telemetering, 2013. http://hdl.handle.net/10150/579512.
Full textWith the advent of networked based data acquisition systems comes the opportunity to acquire, transmit and store potentially very large volumes of data. Despite this, and the increased size of the data acquisition networks, the use of tightly integrated hardware, and setup and analysis software enable the FTI engineer to save time and increase productivity. This paper outlines how the use of innovative bus packetizer technology and the close integration of FTI software can simplify this process. The paper describes how packetizer technology is used to acquire data from avionics buses, and how it packages this data in a format that is optimized for network based systems. The paper further describes how software can simplify the process of configuring avionics bus monitors in addition to automating and optimizing the transport of data from various nodes in the acquisition network for transmission to either network recorders or via a telemetry link.
Moodie, Myron L., Maria S. Araujo, Thomas B. Grace, William A. Malatesta, and Ben A. Abbott. "iNET Standards Validation: End-to-End Performance Assessment." International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604282.
Full textThe integrated Network-Enhanced Telemetry (iNET) project has developed standards for network-based telemetry systems. While these standards are based largely on the existing body of commercial networking protocols, the Telemetry Network System (TmNS) has more stringent performance requirements in the areas of latency, throughput, operation over constrained links, and quality of service (QoS) than typical networked applications. A variety of initial evaluations were undertaken to exercise the interfaces of the current standards and determine real-world performance. The core end-to-end performance initial evaluations focus collectively on the movement of telemetry data through the TmNS. These initial evaluations addressed two areas: end-to-end data delivery and parametric data extraction. This paper presents the approach taken by these ongoing efforts and provides initial results. The latest results will be presented at ITC 2010.
del, Castillo Iglesias Daniel. "End-to-end Learning for Singing-Language Identification." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277837.
Full textSång-språkidentifiering (SLID) består av att identifiera språket av de sjung- ade texterna direkt från en viss musikinspelning. Denna uppgift är av sär- skilt intresse för musikströmmande företag som drar nytta av applikationer för musiklokalisering. Däremot, är språk en komplex semantisk kvalitet av musikinspelningar, vilket gör upptäckten och utnyttjandet av dess karakteris- tiska funktioner extremt utmanande. Under de senaste åren har de flesta MIR- forskningsinsatser riktats mot problem som inte är relaterade till språk, och de flesta av framstegen med metoder för språkidentifiering förblir långt ifrån musikaliska applikationer. Detta arbete undersöker SLID-problemet, dess ut- maningar och begränsningar, med syftet att hitta en ny lösning som effektivt ut- nyttjar kraften hos djupa inlärningsarkitekturer och en relativt storskalig privat datasats. Som en del av datasatsförbehandlingen föreslås en ny metod för att identifiera högnivåstrukturen av låtar. Som klassificeringsmodell utbildas och utvärderas ett Temporal Convolutional Network (TCN) på musikinspelningar som hör till sju av de mest framstående språk på den globala musikmarkna- den. Även om resultaten visar mycket lägre prestation med avseende på den nuvarande bästa-möjliga-teknik, realiseras en grundlig diskussion med syftet att utforska begränsningarna för SLID, orsakerna till dålig prestation identi- fieras och den nuvarande kunskapen om SLID problemet utökas. Framtida förbättringar och arbetslinjer a gränsas med avseende att stimulera ytterligare forskning mot denna riktning.
Olsson, Anton, and Felix Rosberg. "Domain Transfer for End-to-end Reinforcement Learning." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43042.
Full textIbrahim, Ahmed Sobhy Elnady. "End-To-End Text Detection Using Deep Learning." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/81277.
Full textPh. D.
Pritchard, Adaleigh Elizabeth. "Modeling End-to-End Annealing of Intermediate Filaments." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397743583.
Full textHo, Sing Wang. "Improving end-to-end Internet performance by detouring." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/10568.
Full textGuerrero, Santander Cesar Dario. "End-to-End Available Bandwidth Estimation and Monitoring." Scholar Commons, 2009. https://scholarcommons.usf.edu/etd/1994.
Full textYin, Ruiqing. "Steps towards end-to-end neural speaker diarization." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLS261/document.
Full textSpeaker diarization is the task of determining "who speaks when" in an audio stream that usually contains an unknown amount of speech from an unknown number of speakers. Speaker diarization systems are usually built as the combination of four main stages. First, non-speech regions such as silence, music, and noise are removed by Voice Activity Detection (VAD). Next, speech regions are split into speaker-homogeneous segments by Speaker Change Detection (SCD), later grouped according to the identity of the speaker thanks to unsupervised clustering approaches. Finally, speech turn boundaries and labels are (optionally) refined with a re-segmentation stage. In this thesis, we propose to address these four stages with neural network approaches. We first formulate both the initial segmentation (voice activity detection and speaker change detection) and the final re-segmentation as a set of sequence labeling problems and then address them with Bidirectional Long Short-Term Memory (Bi-LSTM) networks. In the speech turn clustering stage, we propose to use affinity propagation on top of neural speaker embeddings. Experiments on a broadcast TV dataset show that affinity propagation clustering is more suitable than hierarchical agglomerative clustering when applied to neural speaker embeddings. The LSTM-based segmentation and affinity propagation clustering are also combined and jointly optimized to form a speaker diarization pipeline. Compared to the pipeline with independently optimized modules, the new pipeline brings a significant improvement. In addition, we propose to improve the similarity matrix by bidirectional LSTM and then apply spectral clustering on top of the improved similarity matrix. The proposed system achieves state-of-the-art performance in the CALLHOME telephone conversation dataset. Finally, we formulate sequential clustering as a supervised sequence labeling task and address it with stacked RNNs. To better understand its behavior, the analysis is based on a proposed encoder-decoder architecture. Our proposed systems bring a significant improvement compared with traditional clustering methods on toy examples
Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.
Full textCellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de ned. This does not seem a problem, but this is not true. Along the path across operator network, voice is at risk. It will only be encrypted again, with a di erent key, from the BS to the receiver if the receiver is herself a mobile user. Moreover, voice encryption is not mandatory. The choice whether or not to accept an unprotected communication is up to the network. When adopted, the same encryption algorithm is used for sending SMS messages between mobile telephones and base stations and for encrypting of calls. Unfortunately, vulnerabilities in this encryption systems were already revealed more than 10 years ago and more continue to be discovered. Currently the most popular communication technologies are the GSM and the UMTS. The UMTS is in use as a successor to GSM. Along with mobile phone services, It provides rapid data communication. The security algo- rithms in UMTS di ers from GSM in two important ways: encryption and mutual authentication. Although security standards have been improved, the end- to-end security is not provided... [edited by Author]
IX n.s.
Rathinam, Ramalingam Palanivel Beard Cory. "Using forwarding host to improve end to end network performance." Diss., UMK access, 2006.
Find full text"A thesis in computer science." Typescript. Advisor: Cory Beard. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 9, 2007. Includes bibliographical references (leaves 53-55). Online version of the print edition.
Aurich, Markus. "End-to-end testing per un'applicazione gestionale su web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8369/.
Full textPaxson, Vern. "Measurements and analysis of end-to-end internet dynamics." Berkeley, CA, 1997. http://www.ethbib.ethz.ch/readme/ethz-etext.html.
Full textLunde, Lars, and Audun Wangensteen. "Using SIM for strong end-to-end Application Authentication." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9294.
Full textToday the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to realize. The SIM card used in mobile phones is a tamper resistant device that contains strong authentication mechanisms. It would be very convenient and cost-efficient if Internet services could use authentication methods based on the SIM. This master thesis presents an analysis and a design of a generic authentication system based on SIM, together with a detailed description of an implemented prototype. The proposed system, called the Generic SIM Authentication System (GAS), provides a strong authentication mechanism. The GAS builds upon the existing GSM authentication infrastructure, thus allows re-use of GSM expertise from the mobile operators. New services can easily be supported, such that these can benefit from strong authentication. By gradually implementing more authentication mechanisms (e.g. OTP and PKI) on the SIM, it will be able to support several levels of security. This will result in a generic authentication system satisfying the security needs for nowadays and also for the future. In order to design the GAS, the thesis starts by giving an overview of authentication and relevant technologies, before the requirements to the system, both functional and non-functional, are defined. Then different interaction diagrams, collaboration diagrams and sequence diagrams are presented, and the necessary components and interfaces in the system are outlined. This thesis builds on two student projects finished December 2005, where tentative high-level architectures for utilizing SIM-based authentication were proposed. A Prototype has been developed in Java to demonstrate the GAS, and includes both a client (Supplicant) and a server (Authenticator) part. The communication between the Supplicant and the other components in the authentication system is based on EAP, which is a general authentication protocol supporting multiple authentication methods. When performing the GSM authentication the EAP-SIM protocol is used. The Prototype has been tested end-to-end, i.e. from the SIM to the Telenor GSM HLR/AuC, via IP-based network. Three different services have been developed to demonstrate how easily the SIM authentication can be integrated. The first demo service shows how to integrate the authentication with JSP technology and Apache Tomcat. The second service, MyService, is another example of how the authentication service could be integrated into a web portal using PHP to demonstrate that the Prototype is independent of the service implementation language. MyService also illustrates how the service provider can control the registration of new users and link up with their SIM identity. The last service, GasSpot, shows how to integrate the GAS to authenticate users to a Captive Portal. The access is controlled by the gateway, which is implemented using ChilliSpot. Based on the results of the master thesis, the authors have written the paper A Generic Authentication System based on SIM, which has been submitted and accepted for publication at the ICISP06 Conference in Cap Esterel, Côte dAzur, France, August 26-29, 2006.
Simpson, Charles Robert Jr. "Analysis of Passive End-to-End Network Performance Measurements." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14612.
Full textHamberg, Christer. "GUI driven End to End Regression testing with Selenium." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-68529.
Full textSaleem, Rashid. "Towards an end-to-end multiband OFDM system analysis." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/towards-an-endtoend-multiband-ofdm-system-analysis(e711f32f-1ac6-4b48-8f4e-58309c0482d3).html.
Full textAcar, Guray. "End-to-end resource masnagemeht on geostationary satellite networks." Thesis, Imperial College London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271710.
Full textBismark, David. "End-to-end veriable voting with Prêt à Voter." Thesis, University of Surrey, 2010. http://epubs.surrey.ac.uk/775329/.
Full textChou, Chih-Lun. "Analysis of end-to-end performance of LAN systems." Thesis, Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/30684.
Full textThe analysis of LAN performance is the main objective of this research. LANs can be configured in various ways combining different medium access control mechanisms and different physical layer specifications. Details on these alternatives are specified in IEEE 802.3 through IEEE 802.5. We study th performance of different types of LANs under various configurations of servers and stations. The queueing network model is one of the analytical tools to help investigate the performance characteristics of various LAN configurations. Since the analytical approach based on queueing network models is often too complicated to be practically used, we rely on simulations. Thus our analysis will be based on simulations, and SIMLAN II will be the simulation tool for our work. Our specification of simulation models involves three classes of transactions, and one or two servers. There are 24 simulation results in this thesis. These results, which are arranged in tables and figures, help compare th performance characteristics of various LAN configurations.
Nordin, Alexander Friedrich. "End to end machine learning workflow using automation tools." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119776.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 79-80).
We have developed an open source library named Trane and integrated it with two open source libraries to build an end-to-end machine learning workflow that can facilitate rapid development of machine learning models. The three components of this workflow are Trane, Featuretools and ATM. Trane enumerates tens of prediction problems relevant to any dataset using the meta information about the data. Furthermore, Trane generates training examples required for training machine learning models. Featuretools is an open-source software for automatically generating features from a dataset. Auto Tune Models (ATM), an open source library, performs a high throughput search over modeling options to find the best modeling technique for a problem. We show the capability of these three tools and highlight the open-source development of Trane.
by Alexander Friedrich Nordin.
M. Eng.
Shen, Emily (Emily Huei-Yi). "End-to-end verifiability for optical scan voting systems." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44729.
Full textIncludes bibliographical references (p. 57-59).
End-to-end verifiable voting systems allow voters to verify that their votes are cast as intended, collected as cast, and counted as collected. Essentially, end-to-end voting systems provide voters assurance that each step of the election worked correctly. At the same time, voting systems must protect voter privacy and prevent the possibility of improper voter influence and voter coercion. Several end-to-end voting systems have been proposed, varying in usability and practicality. In this thesis we describe and analyze Scantegrity II, a novel end-to-end verification mechanism for optical scan voting which uses confirmation codes printed on the ballot in invisible ink. The confirmation codes allow voters to create privacy-preserving receipts which voters can check against the bulletin board after the close of the election to ensure that their votes have been collected as cast. Anyone can check that votes have been counted as collected and that the tally is correct. We describe the Scantegrity II system and analyze the integrity and privacy properties it provides.
by Emily Shen.
S.M.
Li, Rui Ph D. Massachusetts Institute of Technology. "End-to-end data reliability in optical flow switching." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68505.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 217-220).
Ever since optical fiber was introduced in the 1970s as a communications medium, optical networking has revolutionized the telecommunications landscape. With sustained exponential increase in bandwidth demand, innovation in optical networking needs to continue to ensure cost-effective communications in the future. Optical flow switching (OFS) has been proposed for future optical networks to serve large transactions in a cost-effective manner, by means of an all-optical data plane employing end-to-end lightpaths. Due to noise added in the transmission and detection processes, the channel has non-zero probability of bit errors that may corrupt the useful data or flows transmitted. In this thesis, we focus on the end-to-end reliable data delivery part of the Transport Layer protocol and propose effective and efficient algorithms to ensure error-free end-to-end communications for OFS. We will analyze the performance of each algorithm and suggest optimal algorithm(s) to minimize the total delay. We propose four classes of OFS protocols, then compare them with the Transport Control Protocol (TCP) over Electronic Packet Switching (EPS) and indicate under what values of the parameters: file size, bit error rate (BER), propagation delay and loading factor is OFS better than EPS. This analysis can serve as important guidelines for practical protocol designs for end-to- end data transfer reliability of OFS.
by Rui Li.
S.M.
Mohib, Hamdullah. "End-to-end 3D video communication over heterogeneous networks." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8293.
Full textGajdár, Matúš. "Nízko-dimenzionální faktorizace pro "End-To-End" řečové systémy." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417297.
Full textJain, Manish. "End-to-end available bandwidth estimation and its applications." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22688.
Full textCommittee Chair: Dovrolis, Constantine; Committee Member: Ammar, Mostafa; Committee Member: Schwan, Karsten; Committee Member: Steenkiste, Peter; Committee Member: Zegura, Ellen.