To see the other types of publications on this topic, follow the link: Internet (Computer network) in art.

Dissertations / Theses on the topic 'Internet (Computer network) in art'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet (Computer network) in art.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Sheng. "Future development trends of optical transport network infrastructure an infrastructural framework for metropolitan-based optical transport networks : a field test of a Chinese ISP and a case study of a Chinese electrical power company /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070822.115714/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mainville, Sylvie. "Investigating the Delivery of Therapeutic Recreation Services on the Internet: a Pilot Study Using Leisure Education for the Prevention of Alcohol Abuse." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278246/.

Full text
Abstract:
This pilot study, grounded in social learning theory, demonstrated that leisure education services can be delivered on the Internet. Participants (n=40) successfully accessed the Web page program and responded to instruments and surveys. The treatment group (n=16) effectively completed four leisure education sessions on-line. Confidentiality, privacy, and anonymity issues were controlled. Responses were monitored and feedback provided as to the complexity of the program and comprehension of the participants. The leisure education program had no significant effect on posttest measures of alcohol expectancies and leisure motivations. Mean changes frompretest to posttest may indicate trends. The small n and convenience sample may have introduced many extraneous variables. Professional implications include compliance issues (57% experimental mortality rate), technology-related anxiety, and limited professional competency to work in this environment. Future research which examines the provision of leisure education and other components of therapeutic recreation service on-line is warranted.
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen, Cong Duc. "Creation and distribution of real-time content a case study in provisioning immersive voice communications to networked games /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070110.164837/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Witosurapot, Suntorn, and wsuntorn@fivedots coe psu ac th. "Resolving competition for resources between multimedia and traditional Internet applications." Swinburne University of Technology, 2004. http://adt.lib.swin.edu.au./public/adt-VSWT20050309.123048.

Full text
Abstract:
Although the Internet is the dominant broadband network, it still has a fundamental shortcoming in traffic management that does not properly support efficient use of resources together with differentiated quality of service for mixed traffic types. Even though a number of mechanisms have been proposed under key approaches of resource adaptation, resource reservation, and resource pricing, this problem remains unsolved to date because of its complexity and the way it relates to so many considerations of engineering and economics, and the diverse range of services desired by users. Hence it is considered difficult to devise a perfect mechanism that can universally solve this problem. In this respect, this dissertation contributes to insights into potential combinations and trade-offs of key approaches above in some efficient manner for managing traffic and scarce resources in the Internet. The first part of this work considers the combination of relaxed resource reservation and resource pricing schemes for handling the unfair bandwidth distribution problem in soft-bandwidth guarantee services of the Differentiated Services (DiffServ) Internet. We show that this unfairness problem can be handled using a network-user cooperative approach that addresses both individual user satisfaction and global optimization. We propose to add a mechanism based on price-based feedback signaling to DiffServ-capable routers providing Assured Forwarding (AF) Service so that they can offer per-flow signaling. This still allows them to work at an aggregate traffic level, hence the scalability feature of the DiffServ network can be retained. Our proposed mechanism allows the network to offer reliable service assurances via a distributed optimization algorithm, without introducing special protocols or requiring routers to have access of individual user requirements. Moreover, it can provide incentives for users to cooperate so that optimum performance can be accomplished. This approach has broad applicability and is relevant to all types of assured service classes. The second part of this work considers the combination of a specific resource pricing scheme based on a distributed optimization algorithm and multimedia adaptation schemes. Such a capability has not been available because most utility functions of multimedia applications do not meet the concavity constraints required by optimization algorithm. We proposed to overcome this limitation by redefining user utility functions into equivalent discrete forms and using combinatorial (discrete) optimization so that interfacing the resource-pricing scheme can be done in a normal way. However, to obtain feasible solutions in a scalable manner, an agent is included into the scheme for solving the combinatorial (discrete) optimization on behalf of a small group of users. In return, all users belonging to this group can benefit from social welfare maximization of their utilities over a network resource constraint. The last part of this work considers the combination of relaxed resource reservation and resource pricing schemes to enable a proper charging scheme for adaptive applications in the DiffServ Internet. We provide an optimization formulation of the problems of revenue and social welfare maximization, applied at a service provider (SP) who gives access to the DiffServ Internet. In this scheme, resources are provisioned per QoS-oriented class in a long time scale (service level agreement (SLA) duration), then priced based on user demand in the short time scale. We also show that the proposed charging scheme can provide feedback and incentives for users to use the network resource optimally via the standard packet marking, hence eliminating the need for specific pricing protocol. All of the proposals in this work can be used together, solving these key problems as a coordinated whole, and all use readily available network mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
5

Charles, Joan T. "Teacher-directed student use of the Internet for curricular activities: Profiles of frequent and infrequent use." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3095/.

Full text
Abstract:
The purpose of this study was to develop profiles that described teachers with infrequent and frequent teacher-directed student use of the Internet for curricular purposes. Responses to the teachers' self-reported needs, beliefs, demographics, Internet skill levels, and other information were examined as the basis for the study. The study was descriptive in nature, utilized correlation and causal-comparative methods, and employed a convenience sample. The population consisted of 3,187 public school teachers from Nebraska and four service regions in upstate New York. Data related to the research questions were gathered using an online survey. After minimum access was determined, frequencies, percentages, t tests, and correlations were used to examine the data. Teachers with infrequent (<15 mins. /week) teacher-directed student use of the Internet comprised 63% of the sample. Teachers from elementary and high school levels were almost equally represented in the infrequent use group. The majority of the high school level teachers were assigned to language arts, mathematics or science courses. Teachers in the frequent (>. 90 mins. /week) use group were predominately (75%) high school level, with the majority teaching computer and business subjects. Significant differences were found between the use groups regarding beliefs about the Internet's effect on students and schools and feelings about designing lessons that included the Internet or technology. Within the infrequent use group, significant correlations were found between comparative Internet skill levels and (a) hours of technology-related professional development and (b) willingness to use the Internet for professional development. Further study should be given to the question of how these differences and correlations may affect the amount of teacher-directed student use of the Internet. The profiles developed in this study provide a starting point to assist regional, district, and school-level personnel in assessing local needs and focusing resources on developing strategies to increase teacher-directed student use of the Internet.
APA, Harvard, Vancouver, ISO, and other styles
6

Underwood, Heather, and hjocat@bigpond com. "Who goes there? : demographics, personality and attachment style of those involved in internet affairs." Swinburne University of Technology, 2005. http://adt.lib.swin.edu.au./public/adt-VSWT20051124.091812.

Full text
Abstract:
The overall aim of this thesis was to explore the impact of Internet relationships on regular ongoing relationships from the point of view of those engaged in such relationships. Two studies were conducted. A sample of 75 participants, including 22 females and 53 males who were married or living in defacto relationships and ranging in age from 18 to 75 years completed an anonymous online survey for Study One. Demographic characteristics, frequency and method of communication and relationship satisfaction were investigated. Questions were asked about Internet relationship formation. Respondents were asked to gauge levels of self-disclosure within their regular ongoing relationship and their online relationship. They were also asked about the proximity and physical attractiveness of their online partner. It was found that most respondents communicated daily, were more satisfied with their Internet partner than their regular ongoing partner, considered their Internet partner physically attractive and communicated in a highly intimate manner. The purpose of the second study was to investigate the similarities and differences between the personality characteristics and attachment styles of respondents. Participants in the second study were 133 respondents who were married or living in defacto relationships, including 47 females and 86 males ranging in age from 18 years to 66 years. Respondents completed an anonymous online survey, which included measures of personality (e.g. the International Personality Item Pool, Goldberg, 1999), the Relationship Satisfaction questionnaire (Hendrick, 1988), and the Experiences in Close Relationships Scale (Brennan, Clark, & Shaver, 1998). Respondents were found to be somewhat more agreeable and conscientious, and less narcissistic than previous research had found to be the case for those individuals who engaged in face-to-face infidelity. The preoccupied attachment group was well represented, but was less differentiated from the other attachment groups than was the fearful group, who were mainly female. The personality profile and attachment style of respondents in Study Two was, therefore, found to be different in important ways from that which has been associated with face-to-face infidelity. Findings were discussed in terms of methodological implications, suggestions for future research and also implications for Counselling Psychologists.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.

Full text
Abstract:
Anycast in next generation Internet Protocol is a hot topic in the research of computer networks. It has promising potentials and also many challenges, such as architecture, routing, Quality-of-Service, anycast in ad hoc networks, application-layer anycast, etc. In this thesis, we tackle some important topics among them. The thesis at first presents an introduction about anycast, followed by the related work. Then, as our major contributions, a number of challenging issues are addressed in the following chapters. We tackled the anycast routing problem by proposing a requirement based probing algorithm at application layer for anycast routing. Compared with the existing periodical based probing routing algorithm, the proposed routing algorithm improves the performance in terms of delay. We addressed the reliable service problem by the design of a twin server model for the anycast servers, providing a transparent and reliable service for all anycast queries. We addressed the load balance problem of anycast servers by proposing new job deviation strategies, to provide a similar Quality-of-Service to all clients of anycast servers. We applied the mesh routing methodology in the anycast routing in ad hoc networking environment, which provides a reliable routing service and uses much less network resources. We combined the anycast protocol and the multicast protocol to provide a bidirectional service, and applied the service to Web-based database applications, achieving a better query efficiency and data synchronization. Finally, we proposed a new Internet based service, minicast, as the combination of the anycast and multicast protocols. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. We show that the minicast service consumes less network resources while providing the same services. The last chapter of the thesis presents the conclusions and discusses the future work.
APA, Harvard, Vancouver, ISO, and other styles
8

Banh, Mai. "Quantification, characterisation and impact evaluation of mobile IPv6 hand off times." Australasian Digital Thesis Program, 2007. http://adt.lib.swin.edu.au/public/adt-VSWT20070608.094836/index.html.

Full text
Abstract:
Thesis (MEng) - Swinburne University of Technology, Centre for Advanced Internet Architectures, 2005.
[A thesis submitted in total fulfillment of the requirements of for the degree of ] Masters of Engineering by Research, Centre for Advanced Internet Architectures (CAIA), Faculty of Information and Communication Technologies, Swinburne University of Technology, 2005. Typescript. Bibliography p. 153-159.
APA, Harvard, Vancouver, ISO, and other styles
9

Chiam, Kah Min Michael. "Willingness to buy from internet web sites : a suggested model." University of Western Australia. Graduate School of Management, 2006. http://theses.library.uwa.edu.au/adt-WU2006.0014.

Full text
Abstract:
The number of people shopping on the Internet has grown rapidly in recent years and it has been suggested that the growth rate of Internet transactions now exceeds that of traditional retailing. Despite the significant growth in the use of the Internet for business transactions, there is evidence to suggest that many customers abandon web sites without completing their transactions. It is clearly important to understand why people buy from the Internet and also the way consumers examine websites. There had been limited research undertaken to investigate the relationships between the various antecedents and the willingness to buy in the Internet environment, especially within a single study. The main trust of this research is to examine the antecedents that influence the willingness to buy from the Internet and also how these antecedents influence one another. The antecedents included in this research were brand image (Dodds, Monroe & Grewal, 1991), perceived risk (Sweeney & Soutar, 2001), trust (Lynch & Beck, 2001), affect (Lynch & Beck, 2001), convenience (Szymanski & Hise, 2000), relative price (Sweeney, Soutar & Johnson, 1999), site reputation (Baker, Grewal & Parasuraman, 1994) and web design (Szymanski & Hise, 2000). Some of the antecedents were found to be unsuitable and they were dropped from the study. The empirical results from the final model suggest that perceived value is positively influenced by affect and brand image. Both brand image and affect also positively influence the trust of the website. Willingness to buy from the website is influenced by perceived value and trust of the website.
APA, Harvard, Vancouver, ISO, and other styles
10

Kolan, Prakash. "System and Methods for Detecting Unwanted Voice Calls." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5155/.

Full text
Abstract:
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based IP networks. However, this migration is successful only if the present problems in IP networks are addressed before deploying VoIP infrastructure on a large scale. One of the important issues that the present VoIP networks face is the problem of unwanted calls commonly referred to as SPIT (spam over Internet telephony). Mostly, these SPIT calls are from unknown callers who broadcast unwanted calls. There may be unwanted calls from legitimate and known people too. In this case, the unwantedness depends on social proximity of the communicating parties. For detecting these unwanted calls, I propose a framework that analyzes incoming calls for unwanted behavior. The framework includes a VoIP spam detector (VSD) that analyzes incoming VoIP calls for spam behavior using trust and reputation techniques. The framework also includes a nuisance detector (ND) that proactively infers the nuisance (or reluctance of the end user) to receive incoming calls. This inference is based on past mutual behavior between the calling and the called party (i.e., caller and callee), the callee's presence (mood or state of mind) and tolerance in receiving voice calls from the caller, and the social closeness between the caller and the callee. The VSD and ND learn the behavior of callers over time and estimate the possibility of the call to be unwanted based on predetermined thresholds configured by the callee (or the filter administrators). These threshold values have to be automatically updated for integrating dynamic behavioral changes of the communicating parties. For updating these threshold values, I propose an automatic calibration mechanism using receiver operating characteristics curves (ROC). The VSD and ND use this mechanism for dynamically updating thresholds for optimizing their accuracy of detection. In addition to unwanted calls to the callees in a VoIP network, there can be unwanted traffic coming into a VoIP network that attempts to compromise VoIP network devices. Intelligent hackers can create malicious VoIP traffic for disrupting network activities. Hence, there is a need to frequently monitor the risk levels of critical network infrastructure. Towards realizing this objective, I describe a network level risk management mechanism that prioritizes resources in a VoIP network. The prioritization scheme involves an adaptive re-computation model of risk levels using attack graphs and Bayesian inference techniques. All the above techniques collectively account for a domain-level VoIP security solution.
APA, Harvard, Vancouver, ISO, and other styles
11

Veronin, Michael A. "The Validity of Health Claims on the World Wide Web: A Case Study of the Herbal Remedy Opuntia." Thesis, University of North Texas, 2000. https://digital.library.unt.edu/ark:/67531/metadc2441/.

Full text
Abstract:
The World Wide Web has become a significant source of medical information for the public, but there is concern that much of the information is inaccurate, misleading, and unsupported by scientific evidence. This study analyzes the validity of health claims on the World Wide Web for the herbal Opuntia using an evidence-based approach, and supports the observation that individuals must critically assess health information in this relatively new medium of communication. A systematic search by means of nine search engines and online resources of Web sites relating to herbal remedies was conducted and specific sites providing information on the cactus herbal remedy from the genus Opuntia were retrieved. Validity of therapeutic health claims on the Web sites was checked by comparison with reports in the scientific literature subjected to two established quality assessment rating instruments. 184 Web sites from a variety of sources were retrieved and evaluated, and 98 distinct health claims were identified. 53 scientific reports were retrieved to validate claims. 25 involved human subjects, and 28 involved animal or laboratory models. Only 33 (34%) of the claims were addressed in the scientific literature. For 3% of the claims, evidence from the scientific reports was conflicting or contradictory. Of the scientific reports involving human subjects, none met the predefined criteria for high quality as determined by quality assessment rating instruments. Two-thirds of the claims were unsupported by scientific evidence and were based on folklore, or indirect evidence from related sources. Information on herbal remedies such as Opuntia is well represented on the World Wide Web. Health claims on Web sites were numerous and varied widely in subject matter. The determination of the validity of information about claims made for herbals on the Web would help individuals assess their value in medical treatment. However, the Web is conducive to dubious health information and individuals should exercise caution in accepting health claims unsupported by scientific evidence.
APA, Harvard, Vancouver, ISO, and other styles
12

Spinuzzi, Clay I. (Clay Ian). "Appropriating Language on the Usenet." Thesis, University of North Texas, 1994. https://digital.library.unt.edu/ark:/67531/metadc501079/.

Full text
Abstract:
The Usenet is a global computer conferencing system on which users can affix textual messages under 4500 different categories. It currently has approximately 4,165,000 readers, and these .readers have appropriated language by adapting it to the Usenet's culture and medium. This thesis conceptualizes the Usenet community's appropriation of language, provides insights into how media and media restrictions cause their users to appropriate language, and discusses how future media may further cause users to appropriate language. With the Usenet we have a chance to study a relatively new community bound by relatively new technology, and perhaps we can learn more about the appropriation process by studying the two.
APA, Harvard, Vancouver, ISO, and other styles
13

Tula, Naveen. "An Empirical Study of How Novice Programmers Use the Web." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc849754/.

Full text
Abstract:
Students often use the web as a source of help for problems that they encounter on programming assignments.In this work, we seek to understand how students use the web to search for help on their assignments.We used a mixed methods approach with 344 students who complete a survey and 41 students who participate in a focus group meetings and helped in recording data about their search habits.The survey reveals data about student reported search habits while the focus group uses a web browser plug-in to record actual search patterns.We examine the results collectively and as broken down by class year.Survey results show that at least 2/3 of the students from each class year rely on search engines to locate resources for help with their programming bugs in at least half of their assignments;search habits vary by class year;and the value of different types of resources such as tutorials and forums varies by class year.Focus group results exposes the high frequency web sites used by the students in solving their programming assignments.
APA, Harvard, Vancouver, ISO, and other styles
14

Gomez, Norberto Jr. "The Art of Perl: How a Scripting Language (inter)Activated the World Wide Web." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/472.

Full text
Abstract:
In 1987, computer programmer and linguist Larry Wall authored the general-purpose, high-level, interpreted, dynamic Unix scripting language, Perl. Borrowing features from C and awk, Perl was originally intended as a scripting language for text-processing. However, with the rising popularity of the Internet and the advent of Tim Berners-Lee’s World Wide Web (Web), in the 1990s, Perl soon became the glue-language for the Internet, due in large part to its relationship to the Hypertext Transfer Protocol (HTTP) and the Common Gateway Interface (CGI). Perl was the go-to language for on the fly program writing and coding, gaining accolades from the likes of publisher Tim O’Reilly and hackers alike. Perl became a favorite language of amateur Web users, whom net artist Olia Lialina calls barbarians, or the indigenous. These users authored everything from database scripts to social spaces like chatrooms and bulletin boards. Perl, while largely ignored today, played a fundamental role in facilitating those social spaces and interactions of Web 1.0, or what I refer to as a Perl-net. Thus, Perl informed today’s more ubiquitous digital culture, referred to as Web 2.0, and the social web. This project examines Perl’s origin which is predicated on postmodern theories, such as deconstructionism and multiculturalism. Perl’s formal features are differentiated from those of others, like Java. In order to defend Perl’s status as an inherently cultural online tool, this project also analyzes many instances of cultural artifacts: script programs, chatrooms, code poetry, webpages, and net art. This cultural analysis is guided by the work of contemporary media archaeologists: Lialina and Dragan Espenschied, Erkki Huhtamo and Jussi Parikka. Lastly, the present state of digital culture is analyzed in an effort to re-consider the Perl scripting language as a relevant, critical computer language, capable of aiding in deprogramming the contemporary user.
APA, Harvard, Vancouver, ISO, and other styles
15

Banh, Mai Thi Quynh, and n/a. "Quantification, characterisation and impact evaluation of mobile IPv6 hand off times." Swinburne University of Technology, 2005. http://adt.lib.swin.edu.au./public/adt-VSWT20070608.094836.

Full text
Abstract:
There is a growing range of IP-based data and voice applications using mobile devices (e.g. 3rd , 4th generation mobile phones and PDAs) and new access technologies (e.g. Bluetooth, 802.11, GPRS, ADSL). This growth is driving a desire to support mobility at the IP level � in other words, allowing an IP host to keep on communicating with other hosts while roaming between different IP subnetworks. Mobile IPv6 allows hosts to move their physical and topological attachment points around an IPv6 network while retaining connectivity through a single, well-known Home Address. Although Mobile IPv6 has been the subject of simulation studies, the real-world dynamic behavior of Mobile IPv6 is only gradually being experimentally characterised and analysed. This thesis reviews the use of Mobile IPv6 to support mobility between independent 802.11b-attached IPv6 subnets, and experimentally measures and critically evaluates how long an end to end IP path is disrupted when a Mobile IPv6 node shifts from one subnetwork to another (handoff time). The thesis describes the development of an experimental testbed suitable for gathering real-world Mobile IPv6 handoff data using publicly available, standards compliant implementations of Mobile IPv6. (An open-source Mobile IPv6 stack (the KAME release under FreeBSD) was deployed). The component of handoff time due to 802.11b link layer handoff is measured separately to assess its impact on the overall Mobile IPv6 handoff time. Using Mobile IPv6 handoff results, the likely performance impact of Mobile IPv6 handoff on a common webcam application and a bulk TCP data transfer is also evaluated. The impact of handoff on these applications clearly shows that a default Mobile IPv6 environment would be highly disruptive to real-time and interactive applications during handoff events, even if the underlying link-layer handoff was instantaneous.
APA, Harvard, Vancouver, ISO, and other styles
16

Foglia, Romero Efraín. "Arte en la MediaCity." Doctoral thesis, Universitat de Barcelona, 2013. http://hdl.handle.net/10803/132318.

Full text
Abstract:
Esta investigación doctoral se centra en las prácticas artísticas contemporáneas que tienen lugar en el escenario definido como MediaCity. Debido a su carácter híbrido, la MediaCity es una ciudad contemporánea heredera de grandes avances de la época industrial –como el metro o el ascensor, responsables en gran medida de la forma actual de las ciudades– y receptora de los avances de la era postindustrial, como las redes digitales. Bajo este término se analiza la relación entre los aspectos urbanos y el desarrollo mediático de las ciudades desde distintas disciplinas. El estudio se encuadra en la primera década del siglo XXI, período que se ha caracterizado por la diseminación de las tecnologías digitales portátiles (microprocesadores, teléfonos móviles, etc.), las cuales son en parte, causante de la configuración del concepto MediaCity. La investigación propone un recorrido histórico que ilustra la transformación de la ciudad contemporánea en las últimas décadas, durante las cuales se han ido corporizando sistemas tecno-sociales que reconfiguran la relación de la ciudadanía con la ciudad. A partir de aquí se han identificado casos de estudio de prácticas artísticas que inciden en la problemáticas de este nuevo contexto socio-tecnológico. Los artistas seleccionados trabajan desde diversos prismas de análisis; no obstante, comparten el trabajar en la ciudad, y con ello, sus procesos de comunicación y proximidad a las problemáticas derivadas de estos cambios urbanos.
This doctoral research concentrates on contemporary artistic practices which take place in the scenario designated as MediaCity. This hybrid contemporary city has inherited great advancements of the industrial period –such as the lift–, responsible to a large extent for the current structure of the cities. MediaCity has also received the advancements of the postindustrial era –such as the digital networks–. This term explores the relationship between urban aspects and media development are analysed. This study focuses on the first decade of the twenty-first century, when the dissemination of portable digital technologies is taking place (micro-processors, mobile phones, etc.). To some extent, such technologies have led to the configuration of the concept of MediaCity. The research proposes a historical analysis of the transformation of the contemporary city. In the last decades techno-social systems have gone through a corporatisation process leading to the reconfiguration of the relationship between citizens and city. The analysis revolves around case studies of those artistic practices whose focal point lies on the problematics introduced by this new socio-technological context. The artists selected work from different analytical perspectives, and yet they share the fact that they all work n the city, and therefore their communication processes and their proximity to the problematics derived from urban changes.
APA, Harvard, Vancouver, ISO, and other styles
17

Waelder, Laso Pau. "Selling and collecting art in the network society: Interactions among contemporary art new media and the art market." Doctoral thesis, Universitat Oberta de Catalunya, 2016. http://hdl.handle.net/10803/399029.

Full text
Abstract:
Aquesta tesi explora i analitza les interaccions actuals entre art, nous mitjans i el mercat de l'art, i també les transformacions que es produeixen en el reconeixement de l'art digital, l'estructura del mercat de l'art i els rols de l'espectador i el col·leccionista. La tesi es divideix en tres parts. La primera part analitza les maneres en què l'art de nous mitjans s'ha definit ell mateix com un món de l'art específic, i les polèmiques que exemplifiquen la seva separació del món de l'art contemporani. La segona part analitza les motivacions i les expectatives dels artistes que treballen amb tecnologies emergents, per mitjà d'una enquesta feta per l'autor entre més de cinc-cents artistes de cinquanta països. La tercera part analitza les maneres en què l'art digital ha estat comercialitzat i els canvis recents en el mercat de l'art contemporani a internet.
La presente tesis explora y analiza las interacciones actuales entre arte, nuevos medios y el mercado del arte, así como las transformaciones que se están produciendo en el reconocimiento del arte digital, la estructura del mercado del arte y los roles del espectador y el coleccionista. La tesis se divide en tres partes. La primera parte analiza las formas en que el arte de nuevos medios se ha definido a sí mismo como un mundo del arte específico, y las polémicas que ejemplifican su separación del mundo del arte contemporáneo. La segunda parte analiza las motivaciones y las expectativas de los artistas que trabajan con tecnologías emergentes, por medio de una encuesta realizada por el autor entre más de quinientos artistas de cincuenta países. La tercera parte analiza las maneras en que el arte digital ha sido comercializado y los cambios recientes en el mercado del arte contemporáneo en internet.
The present dissertation explores and analyzes the current interactions among art, new media and the art market, as well as the ongoing transformations in the recognition of digital art, the structure of the market, and the role of the viewer and collector. It is divided into three parts. The first part analyzes the ways in which new media art has defined itself as a distinct art world, as well as the controversies that exemplify its separation from the mainstream contemporary art world. The second part exposes the motivations and expectations of artists working with emerging technologies by means of a survey carried out by the author among more than 500 artists from 50 countries. The third part discusses the ways in which digital art has been commercialized as well as the recent developments in the online contemporary art market.
APA, Harvard, Vancouver, ISO, and other styles
18

Gardner, Tamara Marie. "School web sites: Are they effective at communicating to the public or just the newest trend?" CSUSB ScholarWorks, 1999. https://scholarworks.lib.csusb.edu/etd-project/1647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

George, Stephen J. "Community of Inquiry Meets Critical Discourse Analysis (CDA): A CDA of Asynchronous Computer-Conference Discourse with Seminary Students in India." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc1011816/.

Full text
Abstract:
The purpose of this study was to better understand student learning in asynchronous computer-conference discourse (ASD) for non-native speakers of English in India through the Community of Inquiry (COI) framework. The study looked at ASD from an online course taught in the fall of 2015 to 25 students in a seminary in South India. All but one of the students were non-native speakers of English. The class consisted of 22 men and 3 women. Eight students spoke languages from the Dravidian family of languages (Malayalam, Tamil, Telegu and Kannada). Eight students were from the Northeastern states of Manipur, Nagaland and Tripura, where most languages are from the Sino-Tibetan family. Three students were native speakers of Indo-Aryan languages (Odiya and Assamese). Five students were from Myanmar representing several Sino-Tibetan languages. The COI is a framework used to understand learning in ASD, often used in online learning. To study the ASD of this group, critical discourse analysis (CDA) was used with the COI to capture the unique socio-cultural and linguistic conditions of this group. The study revealed that non-native speakers of English often reach the Exploration phase of learning but rarely show evidence of reaching the Resolution phase. This phenomenon was also observed in native English speakers as reported in the literature. Also, the structure of ASD showed that students took an examination approach to discussion shaped in part by their epistemology. This examination approach shaped how knowledge was constructed. CDA also showed that the discourse acquired an instructor-centered structure in which Resolution and Repair were initiated and finalized by the instructor. The study advances the COI framework by undergirding it with a theory of asynchronous discourse using critical discourse analysis and capturing cognitive, social and teaching presence phenomena for non-native speakers that were not observed through the traditional COI framework. These phenomena were driven by cultural, epistemological, and linguistic forces and require a rethinking of the COI for contexts outside of North America. The study also demonstrates that learning for non-native speakers in ASD is challenged by these very same forces. Therefore, design for online learning should account for these phenomena.
APA, Harvard, Vancouver, ISO, and other styles
20

Yang, Yang. "Network congestion control." Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Zaichen, and 張在琛. "Network-supported internet multicast congestion and error control." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Benson, Karyn. "Leveraging Internet Background Radiation for Opportunistic Network Analysis." Thesis, University of California, San Diego, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10161733.

Full text
Abstract:

In this dissertation, we evaluate the potential of unsolicited Internet traffic, called Internet Background Radiation (IBR), to provide insights into address space usage and network conditions. IBR is primarily collected through darknets, which are blocks of IP addresses dedicated to collecting unsolicited traffic resulting from scans, backscatter, misconfigurations, and bugs. We expect these pervasively sourced components to yield visibility into networks that are hard to measure (e.g., hosts behind firewalls or not appearing in logs) with traditional active and passive techniques. Using the largest collections of IBR available to academic researchers, we test this hypothesis by: (1) identifying the phenomena that induce many hosts to send IBR, (2) characterizing the factors that influence our visibility, including aspects of the traffic itself and measurement infrastructure, and (3) extracting insights from 11 diverse case studies, after excluding obvious cases of sender inauthenticity.

Through IBR, we observe traffic from nearly every country, most ASes with routable prefixes, and millions of /24 blocks. Misconfigurations and bugs, often involving P2P networks, result in the widest coverage in terms of visible networks, though scanning traffic is applicable for in-depth and repeated analysis due to its large volume. We find, notwithstanding the extraordinary popularity of some IP addresses, similar observations using IBR collected in different darknets, and a predictable degradation using smaller darknets. Although the mix of IBR components evolves, our observations are consistent over time.

Our case studies highlight the versatility of IBR and help establish guidelines for when researchers should consider using unsolicited traffic for opportunistic network analysis. Based on our experience, IBR may assist in: corroborating inferences made through other datasets (e.g., DHCP lease durations) supplementing current state-of-the art techniques (e.g., IPv4 address space utilization), exposing weaknesses in other datasets (e.g., missing router interfaces), identifying abused resources (e.g., open resolvers), testing Internet tools by acting as a diverse traffic sample (e.g., uptime heuristics), and reducing the number of required active probes (e.g., path change inferences). In nearly every case study, IBR improves our analysis of an Internet-wide behavior. We expect future studies to reap similar benefits by including IBR.

APA, Harvard, Vancouver, ISO, and other styles
25

Zimmerman, Tekeisha. "Testing the Psychometric Properties of the Online Student Connectedness Survey." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804927/.

Full text
Abstract:
The Online Student Connectedness Survey (OSCS) was introduced to the academic community in 2012 as an instrument designed to measure feelings of connectedness between students participating in online degree and certification programs. The purpose of this study was to examine data from the instrument for initial evidence of validity and reliability and to establish a nomological network between the OSCS and similar instruments utilized in the field. The study utilized sequential exploratory factor analysis- confirmatory factor analysis (EFA-CFA) and correlational analysis to assess results of the data. Students enrolled in online courses at higher education institutions located in the United States served as the sample for this study. Three instruments were used during the study. The OSCS was administered first so that the factor structure could be examined for factor validity. Once confirmed, the Classroom Community Scale (CCS) and the Community of Inquiry Scale (COI) served as the instruments to examine nomological validity through correlational analysis of data.This study provided evidence of factor validity and reliability for data from the OSCS. After the initial EFA-CFA, the four-factor structure held, and 16 of the 25 original items remained for nomological testing. Statistically significant correlations were demonstrated between factors contained in the OSCS, CCS, and COI, providing further evidence of construct validity. These results indicate that for the sample used in this study, the OSCS provides data that are valid and reliable for assessing feelings of connection between participants in online courses at institutions of higher learning.
APA, Harvard, Vancouver, ISO, and other styles
26

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Felczak, Michael. "(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /." Burnaby B.C. : Simon Fraser University, 2005. http://ir.lib.sfu.ca/handle/1892/2132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Ming. "Resource discovery and fair intelligent admission control over scalable Internet /." Electronic version, 2004. http://adt.lib.uts.edu.au/public/adt-NTSM20050314.180037/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Pezaros, D. "Network traffic measurement for the next generation Internet." Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.

Full text
Abstract:
Measurement-based performance evaluation of network traffic is a fundamental prerequisite for the provisioning of managed and controlled services in short timescales, as well as for enabling the accountability of network resources. The steady introduction and deployment of the Internet Protocol Next Generation (IPNG-IPv6) promises a network address space that can accommodate any device capable of generating a digital heart-beat. Under such a ubiquitous communication environment, Internet traffic measurement becomes of particular importance, especially for the assured provisioning of differentiated levels of service quality to the different application flows. The non-identical response of flows to the different types of network-imposed performance degradation and the foreseeable expansion of networked devices raise the need for ubiquitous measurement mechanisms that can be equally applicable to different applications and transports. This thesis introduces a new measurement technique that exploits native features of IPv6 to become an integral part of the Internet's operation, and to provide intrinsic support for performance measurements at the universally-present network layer. IPv6 Extension Headers have been used to carry both the triggers that invoke the measurement activity and the instantaneous measurement indicators in-line with the payload data itself, providing a high level of confidence that the behaviour of the real user traffic flows is observed. The in-line measurements mechanism has been critically compared and contrasted to existing measurement techniques, and its design and a software-based prototype implementation have been documented. The developed system has been used to provisionally evaluate numerous performance properties of a diverse set of application flows, over different-capacity IPv6 experimental configurations. Through experimentation and theoretical argumentation, it has been shown that IPv6-based, in-line measurements can form the basis for accurate and low-overhead performance assessment of network traffic flows in short time-scales, by being dynamically deployed where and when required in a multi-service Internet environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Savage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Etcheverry, Giadrosich Rosario. "La question de la participation dans les arts sonores en réseau : approche généalogique et organologique au regard de la notion de transindividuation." Thesis, Lille 3, 2016. http://www.theses.fr/2016LIL30065.

Full text
Abstract:
Depuis sa démocratisation dans les années 1990, Internet est devenu un milieu technologique et symbolique d’échanges à échelle mondiale dans lequel les individus d’une grande partie de la planète se retrouvent. En effet, permettant à tout un chacun d’y accéder non seulement comme récepteur, mais également comme émetteur et producteur, ce milieu se présente depuis ses origines comme un milieu ouvert à la participation de chacun des utilisateurs. Cette propriété apparaît prometteuse pour des artistes qui depuis les années 1960 sont à la recherche de nouvelles formes à travers lesquelles provoquer la participation d’un public de plus en plus anesthésié par les médias de masse et le rapport de consommation qui lui est associé. À travers cette recherche, nous proposons d’aborder la question de la participation dans les dispositifs d’art sonore en réseau télématique dits participatifs. Terme employé pour qualifier un grand nombre d’activités, la notion de « participation » nous apparaît problématique à une époque où l’hypercontrôle est au coeur d’une société de plus en plus informatisée. Tenter de comprendre les enjeux en termes de participation de ces nouvelles formes apparues avec les réseaux télématiques nécessite de les inscrire auparavant dans un processus plus large qui est celui des transformations organologiques supportant et engendrant le processus d’individuation psychosociale à partir duquel est construite toute sensibilité. Pour cela, le concept de transindividuation proposé par Bernard Stiegler à partir de Gilbert Simondon, mais aussi d’André Leroi-Gourhan, nous paraît fondamental,car il permet d’inscrire la participation au sein d’un circuit qui dépasse les seules actions.Nous proposons ainsi d’étudier ces nouvelles formes d’art sonore en réseau au regard d’une histoire du circuit de la sensibilité musicale à partir de la notion de dispositif. Il s’agit de rediriger l’attention vers une organologie élargie, en étudiant les formes d’organisations spatiales,temporelles et relationnelles des différentes périodes historiques, dans l’objectif de dégager leur fonctionnement en termes de circuit de participation. L’étude de l’organologie propre aux dispositifs d’art sonore en réseau requiert d’un plus grand élargissement qui dépasse largement le cadre de la musicologie, ce qui nous conduit à importer des outils d’étude issus d’autres disciplines scientifiques. C’est en adoptant cette approche généalogique et organologique que les enjeux en termes de participation de ces nouvelles « formes dispositifs » peuvent être ainsi étudiés dans leur complexité
Since its democratization in the 1990s, the Internet has become a technological and symbolic medium for global exchanges in which individuals from a large part of the world find themselves. Indeed, enabling everyone to access not only as receiver, but also as transmitter and producer, this environment presents itself from its origins as an environment open to the participation of each user. This property appears promising for artists who since the 1960s are looking for new forms through which to provoke the participation of a public increasingly anesthetized by the mass media and the relationship of consumption associated with it. Through this research, we propose to address the issue of participation in sound art devices in telematic networks known as participatory. A term used to describe a large number of activities, the notion of "participation" seems problematical to us at a time when hypercontrol is at the heart of an increasingly computerized society. To try to understand the stakes in terms of the participation of these new forms appeared with the telematic networks requires to include them before in a broader process which is that of the organological transformations supporting and generating the process of psychosocial individuation from which all sensitivity is constructed . To do this, the concept of transindividuation proposed by Bernard Stiegler from Gilbert Simondon, but also from André Leroi-Gourhan, seems fundamental to us, because it allows participation in a circuit that goes beyond actions alone. We propose to study these new forms of networked sound art in the light of a history of the circuit of musical sensitivity from the notion of device. It is a question of redirecting attention to an enlarged organology by studying the spatial, temporal and relational forms of the various historical periods, with the aim of identifying their functioning in terms of participation patterns. The study of the organology specific to the devices of sound art in network requires a greater enlargement that goes far beyond the framework of musicology, which leads us to import tools of study coming from other scientific disciplines. It is by adopting this genealogical and organic approach that the stakes in terms of the participation of these new "device forms" can thus be studied in their complexity
APA, Harvard, Vancouver, ISO, and other styles
32

Gold, Richard. "An Indirection Architecture for the Internet." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-6199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cao, Zhiruo. "Network support for adaptive applications." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/8146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Elysee, Pierre Arthur 1967. "Usage profiles : allocation of network capacity to Internet users." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sookavatana, Pipat Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Service Trading Marketplace Network (STAMP-Net): service discovery and composition for customizable adaptive network." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2003. http://handle.unsw.edu.au/1959.4/20439.

Full text
Abstract:
This thesis presents a complete alternative service composition model named Service Trading Marketplace Network (STAMP-Net). The primary concept is to improve overall system scalability and introduce a fair business scheme for customers and providers. STAPM-Net focuses on designing an architecture based on both technical and business aspect. In STAMP-NET, users remain the ability to choose their preference service providers from potential-provider lists, and service providers are able to compete for the requested services that they can handle. For these purposes, STAMP-Net introduce a concept of 'Service Trading Marketplace Mechanism' which facilitates a problem of 'conflict of interest'; 'Indirect Service Discovery' which allows service providers to the learn existing of services being offered by other service providers; and 'Service Subcontract System' which allows service providers to subcontract any missing service to other potential service providers. In addition, this thesis also present monitor techniques, which are used to ensure the quality of services.
APA, Harvard, Vancouver, ISO, and other styles
36

Spring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Barwinski, Mark Andrei. "Taxonomy of spyware and empirical study of network drive-by-downloads." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FBarwinski.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Cynthia E. Irvine, Tim E. Levin. Includes bibliographical references (p. 115-120). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
38

Shen, Wen-Chuan. "Implementing a global anti-dos service based on random overlay network." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0007880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.

Full text
Abstract:
Community networks (in South Africa and Africa) are often serviced by limited bandwidth network backhauls. Relative to the basic needs of the community, this is an expensive ongoing concern. In many cases the Internet connection is shared among multiple sites. Community networks may also have a lack of technical personnel to maintain a network of this nature. Hence, there is a demand for a system which will monitor and manage bandwidth use, as well as network use. The proposed solution for community networks and the focus within this dissertation, is a system of two parts. A Community Access Point (CAP) is located at each site within the community network. This provides the hosts and servers at that site with access to services on the community network and the Internet, it is the site's router. The CAP provides a web based interface (CAPgui) which allows configuration of the device and viewing of simple monitoring statistics. The Access Concentrator (AC) is the default router for the CAPs and the gateway to the Internet. It provides authenticated and encrypted communication between the network sites. The AC performs several monitoring functions, both for the individual sites and for the upstream Internet connection. The AC provides a means for centrally managing and effectively allocating Internet bandwidth by using the web based interface (ACgui). Bandwidth use can be allocated per user, per host and per site. The system is maintainable, extendable and customisable for different network architectures. The system was deployed successfully to two community networks. The Centre of Excellence (CoE) testbed network is a peri-urban network deployment whereas the Siyakhula Living Lab (SLL) network is a rural deployment. The results gathered conclude that the project was successful as the deployed system is more robust and more manageable than the previous systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Ramsay, Lehan. "Amechan : the creation and packaging of identity /." View thesis, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030717.085118/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Alim, M. Abdul. "On the interaction of internet routing protocols." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Full text
Abstract:
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater for the majority of their simulation's requirements. In this work, a system is proposed for the creation of a scalable, dynamic-resolution network simulation framework that provides scalable scope for researchers, using modern technologies and languages. This framework should allow researchers to rapidly develop a broad range of semantically-rich simulations, without the necessity of superor grid-computers or clusters. Design and implementation are discussed and alternative network simulations are compared to the proposed framework. A series of simulations, focusing on malware, is run on an implementation of this framework, and the results are compared to expectations for the outcomes of those simulations. In conclusion, a critical review of the simulator is made, considering any extensions or shortcomings that need to be addressed.
APA, Harvard, Vancouver, ISO, and other styles
43

Shuster, Marc S. (Mark Saul) 1975. "Diffusion of network innovation : implications for adoption of internet services." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46196.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; and, Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (p. 51-53).
by Mark S. Shuster.
B.S.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
44

Baumgartner, Trevor J. Phillips Matthew D. W. "Implementation of a Network Address Translation Mechanism Over IPv6 /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBaumgartner%5fPhillips.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004.
Thesis advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 81-83). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
45

Phillips, Matthew D. W., and Trevor J. Baumgartner. "Implementation of a network address translation mechanism over IPv6." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1607.

Full text
Abstract:
Approved for public release; distribution is unlimited
Network Address Translation (NAT) for IPv4 was developed primarily to curb overcrowding of the Internet due to dwindling global IP addresses; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet. IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing. While IPv6 does not need NAT for connectivity, other NAT features such as address hiding are valuable. There is currently no NAT implementation for IPv6. The focus of this research was the design and development of a NAT implementation for IPv6. This implementation will be used within a multilevel testbed. In addition, the NAT implementation developed here can facilitate the Department of Defense (DoD) transition to IPv6 planned for 2008 by providing services currently not available for IPv6. A working implementation of NAT for IPv6 within the Linux kernel has been produced. The NAT development created here has been tested for support of the protocols of TCP, UDP and ICMP for IPv6.
Ensign, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
46

Kaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.

Full text
Abstract:
The Internet supports a perpetually evolving patchwork of network services and applications. Popular applications include the World Wide Web, online commerce, online banking, email, instant messaging, multimedia streaming, and online video games. Practically all networked applications have a common objective: to directly or indirectly process requests generated by humans. Some users employ automation to establish an unfair advantage over non-automated users. The perceived and substantive damages that automated, adversarial users inflict on an application degrade its enjoyment and usability by legitimate users, and result in reputation and revenue loss for the application's service provider. This dissertation examines three challenges critical to addressing the undesirable automation of networked applications. The first challenge explores individual methods that detect various automated behaviors. Detection methods range from observing unusual network-level request traffic to sensing anomalous client operation at the application-level. Since many detection methods are not individually conclusive, the second challenge investigates how to combine detection methods to accurately identify automated adversaries. The third challenge considers how to leverage the available knowledge to disincentivize adversary automation by nullifying their advantage over legitimate users. The thesis of this dissertation is that: there exist methods to detect automated behaviors with which an application's service provider can identify and then systematically disincentivize automated adversaries. This dissertation evaluates this thesis using research performed on two network applications that have different access to the client software: Web-based services and multiplayer online games.
APA, Harvard, Vancouver, ISO, and other styles
47

Mahajan, Ratul. "Practical and efficient internet routing with competing interests /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kaynar, Kerem. "Developing A Zigbee Wireless Network And Controlling It Through The Internet." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610583/index.pdf.

Full text
Abstract:
The aim of this thesis is to develop a network, whose nodes communicate with the ZigBee wireless network protocol, and control this network with a PC through the Internet. One of the nodes of this network is designed to be master node. The other nodes are slave nodes. The master node can be connected to an Ethernet connected to the Internet. A PC can communicate with the master node via a specific web application over the Internet. The communication between a web server, in which the specific web application is loaded, and the master node is performed using a specific application protocol working over TCP/IP and defined in this thesis. The master node controls the slave nodes of the wireless network formed according to the commands given by the user of a PC over the Internet. The master node contains an implementation of the ZigBee stack along with a suitable application software to communicate with the slave nodes. The master node also contains an implementation of the TCP/IP stack along with a suitable application software to communicate with a web server in which the specific web application is loaded. The slave nodes contain an implementation of the ZigBee stack along with a suitable application software to communicate with the master node. For each type of node, appropriate hardware which is compliant with the software contained by that type of node is used. Each type of node uses microcontroller-based hardware.
APA, Harvard, Vancouver, ISO, and other styles
49

Lim, Jaeyong. "Fast and scalable Internet service scheme for static and dynamic web data contents." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tian, Jun. "A speed adaptive mobile Internet protocol over wireless local area network." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography