To see the other types of publications on this topic, follow the link: End-To-End.

Dissertations / Theses on the topic 'End-To-End'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'End-To-End.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Jizhizi. "End-to-end Animal Matting." Thesis, University of Sydney, 2020. https://hdl.handle.net/2123/22897.

Full text
Abstract:
Image matting is a widely studied low-level vision problem that aims to provide a detailed foreground alpha matte from a single image, benefiting a wide range of downstream applications. However, most of the prevalent matting models are requiring extra manual intervention such as trimap or scribble. Besides, the lack of large-scale real-world annotated data has also caused poor generalizability in learned deep models. In this paper, we propose a novel end-to-end matting method called GFM along with a real-world, high-quality, category-wised animal matting dataset called AM-2k to address the ab
APA, Harvard, Vancouver, ISO, and other styles
2

Rangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (leaves 53-54).<br>by Vinod K. Rangarajan.<br>S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
3

Chan, William. "End-to-End Speech Recognition Models." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/723.

Full text
Abstract:
For the past few decades, the bane of Automatic Speech Recognition (ASR) systems have been phonemes and Hidden Markov Models (HMMs). HMMs assume conditional indepen-dence between observations, and the reliance on explicit phonetic representations requires expensive handcrafted pronunciation dictionaries. Learning is often via detached proxy problems, and there especially exists a disconnect between acoustic model performance and actual speech recognition performance. Connectionist Temporal Classification (CTC) character models were recently proposed attempts to solve some of these issues, name
APA, Harvard, Vancouver, ISO, and other styles
4

Le, BeEm V. "Distributed and end-to-end testing." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLe.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering Management)--Naval Postgraduate School, December 2009.<br>Thesis Advisor: Huynh, Thomas V. Second Reader: Barrera, Raymond. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: distributed, End-to-End, combat systems, C4I Systems, pay-per-test, Goal Programming (GP), Distributed Engineering Plant (DEP), E2E Lab, PMW, PEO C4I, NAVSEA, SPAWAR. Includes bibliographical references (p. 53-54). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Chaudry, Kashif, and Elma Karadza. "End-to-End Application Billing in 3G." Thesis, Linköping University, Department of Science and Technology, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1654.

Full text
Abstract:
<p>We have 3G on the doorstep but nothing seems to attract ordinary people to this technology. To attract the mass market the telecom industry must show something beyond high bit rates. They must show how ordinary people can take advantage of this new technology. This is done by showing the possibilities of the new technology and by demonstrating applications that it will handle. The telecom industry must convince the telecom operators to invest in this technology and the only thing that matters to them is how much revenue they can make by adopting the upcoming technology. </p><p>To convince t
APA, Harvard, Vancouver, ISO, and other styles
6

Holmström, Maria. "End-to-end monitoring of mobile services." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1671.

Full text
Abstract:
<p>The growing market of mobile services through SMS, MMS, WAP and soon also for 3G protocols, requires efficient test methods to ensure that the customers get what they are paying for and in a reasonable time. Preferably, these tests should be done automatically and come as close to real conditions as possible. It would be valuable to be able to make tests from end to end, i.e. requesting and receiving the mobile services on a real mobile phone and combine that with a system that controls and evaluates the tests. </p><p>This thesis presents a solution to how the part of an end-to-end monitori
APA, Harvard, Vancouver, ISO, and other styles
7

Lazar, Mihai. "Empirical modeling of end-to-end jitter." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0019/MQ58472.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brown, Ian. "End-to-end security in active networks." Thesis, University College London (University of London), 2001. http://discovery.ucl.ac.uk/3882/.

Full text
Abstract:
Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat mod
APA, Harvard, Vancouver, ISO, and other styles
9

Maaz, Khan. "EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE." Case Western Reserve University School of Graduate Studies / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=case1308179859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Da. "End to end testing using integrated tools." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1338300180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kayayurt, Barış Tuğlular Tuğkan. "End-to-end security for mobile devices/." [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000492.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lowden, Mia Rochelle Ahmed Shawn. "Genesis of end-to-end chromosome fusions." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2227.

Full text
Abstract:
Thesis (Ph. D.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Jun. 26, 2009). "... in partial fulfillment of requirements for the degree of Doctor of Philosophy in the Department of Biology." Discipline: Biology; Department/School: Biology.
APA, Harvard, Vancouver, ISO, and other styles
13

Wigington, Curtis Michael. "End-to-End Full-Page Handwriting Recognition." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7099.

Full text
Abstract:
Despite decades of research, offline handwriting recognition (HWR) of historical documents remains a challenging problem, which if solved could greatly improve the searchability of online cultural heritage archives. Historical documents are plagued with noise, degradation, ink bleed-through, overlapping strokes, variation in slope and slant of the writing, and inconsistent layouts. Often the documents in a collection have been written by thousands of authors, all of whom have significantly different writing styles. In order to better capture the variations in writing styles we introduce a nove
APA, Harvard, Vancouver, ISO, and other styles
14

Guerrero, Santander Cesar. "End-to-end available bandwidth estimation and monitoring." [Tampa, Fla.] : University of South Florida, 2009. http://digital.lib.usf.edu/?e14.2863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Agarwala, Sandip. "System Support for End-to-End Performance Management." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16171.

Full text
Abstract:
This dissertation introduces, implements, and evaluates the novel concept of "Service Paths", which are system-level abstractions that capture and describe the dynamic dependencies between the different components of a distributed enterprise application. Service paths are dynamic because they capture the natural interactions between application services dynamically composed to offer some desired end user functionality. Service paths are distributed because such sets of services run on networked machines in distributed enterprise data centers. Service paths cross multiple levels of abstracti
APA, Harvard, Vancouver, ISO, and other styles
16

Øztarman, Jo Mehmet Sollihagen. "End-to-End Data Protection of SMS Messages." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15075.

Full text
Abstract:
Short Message Service (SMS) has become a very commonly used service. It does not only work as a substitute for voice telephony, but is also used for automated services. Some of these service are related to security issues like SMS banking, or one time passwords, even though SMS messages can be spoofed or eavesdropped.We propose a design where we add security to SMS by making an easily configurable module that utilizes a fast cryptographic scheme called Elliptic Curve Signcryption. To prove our concept, we implement an SMS client for Android smart phones that utilizes our security module and se
APA, Harvard, Vancouver, ISO, and other styles
17

Jin, Zhiqun, and Shijie Zhu. "END-TO-END TIMING ANALYSIS OF TASK-CHAINS." Thesis, Mälardalens högskola, Inbyggda system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-36694.

Full text
Abstract:
Many automotive systems are real-time systems, which means that not only correct operationsbut also appropriate timings are their main requirements. Considering the in uence that end-to-end delay might have on the performance of the systems, the calculation of it is of necessity.Abundant techniques have actually been proposed, and some of them have already been applied intopractical systems. In spite of this, some further work still needs to be done. The target of thisthesis is to evaluate and compare two end-to-end timing analysis methods from dierent aspectssuch as data age, consumption time
APA, Harvard, Vancouver, ISO, and other styles
18

Zhiqun, Jin, and Zhu Shijie. "End-to-end Timing Analysis of Task-Chains." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-36751.

Full text
Abstract:
Many automotive systems are real-time systems, which means that not only correct operationsbut also appropriate timings are their main requirements. Considering the in uence that end-to-end delay might have on the performance of the systems, the calculation of it is of necessity.Abundant techniques have actually been proposed, and some of them have already been applied intopractical systems. In spite of this, some further work still needs to be done. The target of thisthesis is to evaluate and compare two end-to-end timing analysis methods from dierent aspectssuch as data age, consumption time
APA, Harvard, Vancouver, ISO, and other styles
19

Strigér, Amanda. "End-to-End Trainable Chatbot for Restaurant Recommendations." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213982.

Full text
Abstract:
Task-oriented chatbots can be used to automate a specific task, such as finding a restaurant and making a reservation. Implementing such a conversational system can be difficult, requiring domain knowledge and handcrafted rules. The focus of this thesis was to evaluate the possibility of using a neural network-based model to create an end-to-end trainable chatbot that can automate a restaurant reservation service. For this purpose, a sequence-to-sequence model was implemented and trained on dialog data. The strengths and limitations of the system were evaluated and the prediction accuracy of t
APA, Harvard, Vancouver, ISO, and other styles
20

Kanuparthy, Partha V. "End-to-end inference of internet performance problems." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45938.

Full text
Abstract:
Inference, measurement and estimation of network path properties is a fundamental problem in distributed systems and networking. We consider a specific subclass of problems which do not require special support from the hardware or software, deployment of special devices or data from the network. Network inference is a challenging problem since Internet paths can have complex and heterogeneous configurations. Inference enables end users to understand and troubleshoot their connectivity and verify their service agreements; it has policy implications from network neutrality to broadband performa
APA, Harvard, Vancouver, ISO, and other styles
21

Costa, M. "End-to-end containment of internet worm epidemics." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.598013.

Full text
Abstract:
Worms – programs that self-replicate automatically over computer networks – are a serious threat to hosts connected to the Internet. They infect hosts by exploiting software vulnerabilities, and they can use their victims for many malicious activities. Past outbreaks show that worms can spread too fast for humans to respond, hence worm containment must be automatic. We propose Vigilante: a new end-to-end architecture to contain worms automatically. In Vigilante, hosts detect worms by instrumenting vulnerable programs to analyze infection attempts. We introduce <i>dynamic data-flow analysis:</i
APA, Harvard, Vancouver, ISO, and other styles
22

Mauthe, Andreas Ulrich. "End-to-end support for multimedia multipeer communications." Thesis, Lancaster University, 1998. http://eprints.lancs.ac.uk/11590/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Amini, Alexander Andre. "Robust end-to-end learning for autonomous vehicles." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118031.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 59-64).<br>Deep learning has been successfully applied to "end-to-end" learning of the autonomous driving task, where a deep neural network learns to predict steering control commands from camera data input. While these works support reactionary control, the representation learned is not usable for higher-level decision making required for autonomous navigation. This thesis tackles the proble
APA, Harvard, Vancouver, ISO, and other styles
24

Andersen, David G. (David Godbe) 1975. "Improving end-to-end availability using overlay networks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/30159.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2005.<br>Includes bibliographical references (p. 139-150).<br>The end-to-end availability of Internet services is between two and three orders of magnitude worse than other important engineered systems, including the US airline system, the 911 emergency response system, and the US public telephone system. This dissertation explores three systems designed to mask Internet failures, and, through a study of three years of data collected on a 31-site testbed, why these failures ha
APA, Harvard, Vancouver, ISO, and other styles
25

Rodittis, Kathy, and Alan Cooke. "Next Generation End to End Avionics Bus Monitoring." International Foundation for Telemetering, 2013. http://hdl.handle.net/10150/579512.

Full text
Abstract:
ITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NV<br>With the advent of networked based data acquisition systems comes the opportunity to acquire, transmit and store potentially very large volumes of data. Despite this, and the increased size of the data acquisition networks, the use of tightly integrated hardware, and setup and analysis software enable the FTI engineer to save time and increase productivity. This paper outlines how the use of innov
APA, Harvard, Vancouver, ISO, and other styles
26

Moodie, Myron L., Maria S. Araujo, Thomas B. Grace, William A. Malatesta, and Ben A. Abbott. "iNET Standards Validation: End-to-End Performance Assessment." International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604282.

Full text
Abstract:
ITC/USA 2010 Conference Proceedings / The Forty-Sixth Annual International Telemetering Conference and Technical Exhibition / October 25-28, 2010 / Town and Country Resort & Convention Center, San Diego, California<br>The integrated Network-Enhanced Telemetry (iNET) project has developed standards for network-based telemetry systems. While these standards are based largely on the existing body of commercial networking protocols, the Telemetry Network System (TmNS) has more stringent performance requirements in the areas of latency, throughput, operation over constrained links, and quality of s
APA, Harvard, Vancouver, ISO, and other styles
27

del, Castillo Iglesias Daniel. "End-to-end Learning for Singing-Language Identification." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277837.

Full text
Abstract:
Singing-language identification (SLID) consists in identifying the language of the sung lyrics directly from a given music recording. This task is of spe- cial interest to music-streaming businesses who benefit from music localiza- tion applications. However, language is a complex semantic quality of music recordings, making the finding and exploiting of its characteristic features ex- tremely challenging. In recent years, most Music Information Retrieval (MIR) research efforts have been directed to problems that are not related to language, and most of the progress in speech recognition metho
APA, Harvard, Vancouver, ISO, and other styles
28

Olsson, Anton, and Felix Rosberg. "Domain Transfer for End-to-end Reinforcement Learning." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43042.

Full text
Abstract:
In this master thesis project a LiDAR-based, depth image-based and semantic segmentation image-based reinforcement learning agent is investigated and compared forlearning in simulation and performing in real-time. The project utilize the Deep Deterministic Policy Gradient architecture for learning continuous actions and was designed to control a RC car. One of the first project to deploy an agent in a real scenario after training in a similar simulation. The project demonstrated that with a proper reward function and by tuning driving parameters such as restricting steering, maximum velocity,
APA, Harvard, Vancouver, ISO, and other styles
29

Ibrahim, Ahmed Sobhy Elnady. "End-To-End Text Detection Using Deep Learning." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/81277.

Full text
Abstract:
Text detection in the wild is the problem of locating text in images of everyday scenes. It is a challenging problem due to the complexity of everyday scenes. This problem possesses a great importance for many trending applications, such as self-driving cars. Previous research in text detection has been dominated by multi-stage sequential approaches which suffer from many limitations including error propagation from one stage to the next. Another line of work is the use of deep learning techniques. Some of the deep methods used for text detection are box detection models and fully convolutio
APA, Harvard, Vancouver, ISO, and other styles
30

Pritchard, Adaleigh Elizabeth. "Modeling End-to-End Annealing of Intermediate Filaments." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397743583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ho, Sing Wang. "Improving end-to-end Internet performance by detouring." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/10568.

Full text
Abstract:
The Internet provides a best-effort service, which gives a robust fault-tolerant network. However, the performance of the paths found in regular Internet routing is suboptimal. As a result, applications rarely achieve all the benefits that the Internet can provide. The problem is made more difficult because the Internet is formed of competing ISPs which have little incentives to reveal information about the performance of Internet paths. As a result, the Internet is sometimes referred as a ‘black-box’. Detouring uses routing overlay networks to find alternative paths (or detour paths) that can
APA, Harvard, Vancouver, ISO, and other styles
32

Guerrero, Santander Cesar Dario. "End-to-End Available Bandwidth Estimation and Monitoring." Scholar Commons, 2009. https://scholarcommons.usf.edu/etd/1994.

Full text
Abstract:
Available Bandwidth Estimation Techniques and Tools (ABETTs) have recently been envisioned as a supporting mechanism in areas such as compliance of service level agreements, network management, traffic engineering and real-time resource provisioning, flow and congestion control, construction of overlay networks, fast detection of failures and network attacks, and admission control. However, it is unknown whether current ABETTs can run efficiently in any type of network, under different network conditions, and whether they can provide accurate available bandwidth estimates at the timescales nee
APA, Harvard, Vancouver, ISO, and other styles
33

Yin, Ruiqing. "Steps towards end-to-end neural speaker diarization." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLS261/document.

Full text
Abstract:
La tâche de segmentation et de regroupement en locuteurs (speaker diarization) consiste à identifier "qui parle quand" dans un flux audio sans connaissance a priori du nombre de locuteurs ou de leur temps de parole respectifs. Les systèmes de segmentation et de regroupement en locuteurs sont généralement construits en combinant quatre étapes principales. Premièrement, les régions ne contenant pas de parole telles que les silences, la musique et le bruit sont supprimées par la détection d'activité vocale (VAD). Ensuite, les régions de parole sont divisées en segments homogènes en locuteur par d
APA, Harvard, Vancouver, ISO, and other styles
34

Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.

Full text
Abstract:
2009 - 2010<br>Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de
APA, Harvard, Vancouver, ISO, and other styles
35

Rathinam, Ramalingam Palanivel Beard Cory. "Using forwarding host to improve end to end network performance." Diss., UMK access, 2006.

Find full text
Abstract:
Thesis (M.S.)--School of Computing and Engineering. University of Missouri--Kansas City, 2006.<br>"A thesis in computer science." Typescript. Advisor: Cory Beard. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 9, 2007. Includes bibliographical references (leaves 53-55). Online version of the print edition.
APA, Harvard, Vancouver, ISO, and other styles
36

Aurich, Markus. "End-to-end testing per un'applicazione gestionale su web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8369/.

Full text
Abstract:
Nel primo capitolo si analizzeranno alcune basi del software testing e delle applicazioni web che ci permetteranno di introdurre l'end-to-end testing nel secondo capitolo dove se ne analizzeranno il funzionamento tecnico e le sue prospettive. Successivamente, nel terzo capitolo, verrà presentato l'uso dell'end-to-end testing applicandolo ad un caso concreto, il gestionale Buudis, per poi dimostrarne la sua efficacia ed efficienza nell'ultimo capitolo.
APA, Harvard, Vancouver, ISO, and other styles
37

Paxson, Vern. "Measurements and analysis of end-to-end internet dynamics." Berkeley, CA, 1997. http://www.ethbib.ethz.ch/readme/ethz-etext.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lunde, Lars, and Audun Wangensteen. "Using SIM for strong end-to-end Application Authentication." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9294.

Full text
Abstract:
<p>Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to realize. The SIM card used in mobile phones is a tamper resistant device that contains strong authentication mechanisms. It would be very convenient and cost-efficient if Internet services could use authentication methods based on the SIM. This master thesis presents an analysis and a design of a generic authentication system based on SIM, togethe
APA, Harvard, Vancouver, ISO, and other styles
39

Simpson, Charles Robert Jr. "Analysis of Passive End-to-End Network Performance Measurements." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14612.

Full text
Abstract:
NETI@home, a distributed network measurement infrastructure to collect passive end-to-end network measurements from Internet end-hosts was developed and discussed. The data collected by this infrastructure, as well as other datasets, were used to conduct studies on the behavior of the network and network users as well as the security issues affecting the Internet. A flow-based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end-user traffic, was conducted. This comparison showed that a large portion of flows in both datasets were f
APA, Harvard, Vancouver, ISO, and other styles
40

Hamberg, Christer. "GUI driven End to End Regression testing with Selenium." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-68529.

Full text
Abstract:
Digitalization has changed our world and how we interact with different systems. Desktop applications have more and more been integrated with internet, and the web browser has become the Graphical User Interface (GUI) in today’s system solutions. A change that needs to be considered in the automated regression testing process. Using the actual GUI has over time shown to be a complicated task and is therefore often broken out as its own standalone test object. This study looked into time and quality constrains of using the GUI as driver of the regression testing of business requirements in a we
APA, Harvard, Vancouver, ISO, and other styles
41

Saleem, Rashid. "Towards an end-to-end multiband OFDM system analysis." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/towards-an-endtoend-multiband-ofdm-system-analysis(e711f32f-1ac6-4b48-8f4e-58309c0482d3).html.

Full text
Abstract:
Ultra Wideband (UWB) communication has recently drawn considerable attention from academia and industry. This is mainly owing to the ultra high speeds and cognitive features it could offer. The employability of UWB in numerous areas including but not limited to Wireless Personal Area Networks, WPAN's, Body Area Networks, BAN's, radar and medical imaging etc. has opened several avenues of research and development. However, still there is a disagreement on the standardization of UWB. Two contesting radios for UWB are Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) and DS-UWB (Dire
APA, Harvard, Vancouver, ISO, and other styles
42

Acar, Guray. "End-to-end resource masnagemeht on geostationary satellite networks." Thesis, Imperial College London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bismark, David. "End-to-end veriable voting with Prêt à Voter." Thesis, University of Surrey, 2010. http://epubs.surrey.ac.uk/775329/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Chou, Chih-Lun. "Analysis of end-to-end performance of LAN systems." Thesis, Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/30684.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>The analysis of LAN performance is the main objective of this research. LANs can be configured in various ways combining different medium access control mechanisms and different physical layer specifications. Details on these alternatives are specified in IEEE 802.3 through IEEE 802.5. We study th performance of different types of LANs under various configurations of servers and stations. The queueing network model is one of the analytical tools to help investigate the performance characteristics of various LAN configurations. Since the
APA, Harvard, Vancouver, ISO, and other styles
45

Nordin, Alexander Friedrich. "End to end machine learning workflow using automation tools." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119776.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 79-80).<br>We have developed an open source library named Trane and integrated it with two open source libraries to build an end-to-end machine learning workflow that can facilitate rapid development of machine learning models. The three components of this workflow are Trane, Featuretools and ATM. Trane enumerates tens of prediction problems relevant to any dataset using the meta informati
APA, Harvard, Vancouver, ISO, and other styles
46

Shen, Emily (Emily Huei-Yi). "End-to-end verifiability for optical scan voting systems." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44729.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.<br>Includes bibliographical references (p. 57-59).<br>End-to-end verifiable voting systems allow voters to verify that their votes are cast as intended, collected as cast, and counted as collected. Essentially, end-to-end voting systems provide voters assurance that each step of the election worked correctly. At the same time, voting systems must protect voter privacy and prevent the possibility of improper voter influence and voter coercion. Several end-to-end voting systems have
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Rui Ph D. Massachusetts Institute of Technology. "End-to-end data reliability in optical flow switching." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68505.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 217-220).<br>Ever since optical fiber was introduced in the 1970s as a communications medium, optical networking has revolutionized the telecommunications landscape. With sustained exponential increase in bandwidth demand, innovation in optical networking needs to continue to ensure cost-effective communications in the future. Optical flow switching (OFS) has been proposed for future optical network
APA, Harvard, Vancouver, ISO, and other styles
48

Mohib, Hamdullah. "End-to-end 3D video communication over heterogeneous networks." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8293.

Full text
Abstract:
Three-dimensional technology, more commonly referred to as 3D technology, has revolutionised many fields including entertainment, medicine, and communications to name a few. In addition to 3D films, games, and sports channels, 3D perception has made tele-medicine a reality. By the year 2015, 30% of the all HD panels at home will be 3D enabled, predicted by consumer electronics manufacturers. Stereoscopic cameras, a comparatively mature technology compared to other 3D systems, are now being used by ordinary citizens to produce 3D content and share at a click of a button just like they do with t
APA, Harvard, Vancouver, ISO, and other styles
49

Gajdár, Matúš. "Nízko-dimenzionální faktorizace pro "End-To-End" řečové systémy." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417297.

Full text
Abstract:
The project covers automatic speech recognition with neural network training using low-dimensional matrix factorization. We are describing time delay neural networks with factorization (TDNN-F) and without it (TDNN) in Pytorch language. We are comparing the implementation between Pytorch and Kaldi toolkit, where we achieve similar results during experiments with various network architectures. The last chapter describes the impact of a low-dimensional matrix factorization on End-to-End speech recognition systems and also a modification of the system with TDNN(-F) networks. Using specific networ
APA, Harvard, Vancouver, ISO, and other styles
50

Jain, Manish. "End-to-end available bandwidth estimation and its applications." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22688.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Committee Chair: Dovrolis, Constantine; Committee Member: Ammar, Mostafa; Committee Member: Schwan, Karsten; Committee Member: Steenkiste, Peter; Committee Member: Zegura, Ellen.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!