Now showing items 828-847 of 1129

    • Sacrificing Efficiency for Quality of Experience: YouTube’s Redundant Traffic Behavior 

      Sieber, Christian; Heegaard, Poul Einar; Hoßfeld, Tobias; Kellerer, Wolfgang (Conference object; Peer reviewed, 2016)
      Internet traffic reports show that YouTube is one of the major sources of data traffic world-wide. Furthermore, the data traffic shifts from mostly fixed landlines to cellular data connections where bandwidth is sparse and ...
    • SCALABILITY AND STABILITY OF IP AND COMPACT ROUTING 

      Ma, Huaiyuan (Doctoral thesis at NTNU;2015:53, Doctoral thesis, 2015)
      Inter-domain routing scalability has always been one of the most challenging issues for the Internet. Recently, it has raised strong concerns again. One reason is the growth of the Internet itself. In particular, the practice ...
    • Scalable Self-Adaptation Control system for simulated transport robots 

      Oplenskedal, Magnus Karste (Master thesis, 2016)
      This master project aimed to explore, research, develop and evaluate the design and creation of control software for simulated autonomous transport robots. A proof of concept were to be created using the Reactive Blocks ...
    • SCORE: Exploiting Global Broadcasts to Create Offline Personal Channels for On-Demand Access 

      Nencioni, Gianfranco; Sastry, Nishanth; Tyson, Gareth; Badrinarayanan, Vijay; Karamshuk, Dmytro; Chandaria, Jigna; Crowcroft, Jon (Journal article; Peer reviewed, 2015)
      The last 5 years have seen a dramatic shift in media distribution. For decades, TV and radio were solely provisioned using push-based broadcast technologies, forcing people to adhere to fixed schedules. The introduction ...
    • SDN in Heterogeneous Mobile Tactical Networks 

      Fagervoll, Håvard Magne (Master thesis, 2017)
      Military operations are increasingly dependent on networks and transferring of data. A heterogeneous mobile tactical network, is a complex network with dynamic characteristics used during military operations. In the field, ...
    • SDN used for policy enforcement in a federated military network. 

      Sørensen, Erik (Master thesis, 2014)
      This thesis looks at how Software-Defined Networking can be used to provide policy enforcement in a federated military network. SDN is a concept in computer networking where the control plane is decoupled from network ...
    • Sea Cage Gateway - A Distributed Sensor Management Network in ActorFrame 

      Askgaard, Jens Martin Breivik (Master thesis, 2006)
      This master thesis has been written in connection with the ongoing Sea Cage Gateway (SCG) project, a project investigating the possibility of remotely administering fish farming facilities. These facilities consist of sea ...
    • Secure and User-Friendly Commissioning and Bootstrapping of Constrained Devices 

      Coppa, Alessandro (Master thesis, 2015)
      The spread of Internet of Things (IoT) systems, based on the introduction of constrained devices into physical objects, has required particular efforts to improve security, privacy and simplicity of such systems. The goal ...
    • Secure and Verifiable Electronic Elections at NTNU 

      Onshus, Bent Kristoffer Rosvold (Master thesis, 2006)
      This thesis describes an electronic voting system based on Damgaa rd, Jurik and Nielsen's generalization of Paillier's probabilistic public key system. A threshold variant of this homomorphic cryptosystem is used to provide ...
    • Secure and Verifiable Electronic Elections at NTNU 

      Onshus, Bent Kristoffer Rosvold (Master thesis, 2006)
      This thesis describes an electronic voting system based on Damg\aa rd, Jurik and Nielsen's generalization of Paillier's probabilistic public key system. A threshold variant of this homomorphic cryptosystem is used to provide ...
    • Secure Context-Aware Mobile SIP User Agent 

      Merha, Bemnet Tesfaye (Master thesis, 2009)
      Context awareness is an important aspect of pervasive and ubiquitous computing. By utilizing contextual information gathered from the environment, applications can adapt to the user s specific situation. In this thesis, ...
    • Secure data aggregation for wireless sensor network 

      Tran-Thi-Thuy, Trang (Master thesis, 2010)
      Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or ...
    • Secure E-Passport Access Methods 

      Karanjit, Prajwalan (Master thesis, 2009)
      The main goal of upgrading passports to an electronic version is making it hard for criminals or anybody to counterfeit or illegally duplicate them. A practical way of doing so is through the use of digital signatures ...
    • Secure Mobile Authentication for Linux Workstation log on 

      Habib, Usman (Master thesis, 2010)
      Password based logon schemes have many security weaknesses. For secure environments smart card and biometric based authentication solutions are available as replacement for standard password based systems. Nevertheless, ...
    • Secure Offsite Backup at CERN 

      Svendsen, Katrine Aam (Master thesis, 2007)
      NORSK: En hendelse som resulterer i tap av data kan være ødeleggende for en organisasjon, og dette gjelder også store forskningsinstitusjoner. Det er derfor viktig å ha en offsite backup løsning, på et område som er ...
    • Secure Termination in Real-World Security Protocols 

      Toreskås, Jonas Lunde (Master thesis, 2016)
      As the Internet was initially invented without any security concerns, a way of secure communication over an untrusted network was nowhere to be found. After years of research, the TLS protocol became this Internet standard ...
    • Securing Cloud Storage Service 

      Zapolskas, Vytautas (Master thesis, 2012)
      Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services becomes increasingly important, because for many ...
    • Securing Information Flow in Loosely-Coupled Systems 

      Zvirblis, Linas (Master thesis, 2011)
      Information-flow control is an important element in computer system security, and there has been significant work done in the field by Denning, Volpano, and others. However, most of the work deals with information-flow ...
    • Securing Near Field Communication 

      Kortvedt, Henning Siitonen (Master thesis, 2009)
      Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling data transfer by keeping two devices close together, about 10 cm maximum. NFC is designed for integration with mobile phones, ...
    • Securing software systems in the health care domain 

      Kosmo, Monika Katrin (Master thesis, 2014)
      Cloud computing is a continuously emerging technology of which new areas of utilization is adopted. Among these, medical sensor networks are increasingly used for purposes like remote monitoring of the health condition of ...