Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Power-Aware Datacenter Networking And Optimization, Qing Yi Mar 2017

Power-Aware Datacenter Networking And Optimization, Qing Yi

Dissertations and Theses

Present-day datacenter networks (DCNs) are designed to achieve full bisection bandwidth in order to provide high network throughput and server agility. However, the average utilization of typical DCN infrastructure is below 10% for significant time intervals. As a result, energy is wasted during these periods. In this thesis we analyze traffic behavior of datacenter networks using traces as well as simulated models. Based on the insight developed, we present techniques to reduce energy waste by making energy use scale linearly with load. The solutions developed are analyzed via simulations, formal analysis, and prototyping. The impact of our work is significant …


Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett Apr 2011

Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett

Regis University Student Publications (comprehensive collection)

Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …


The Value Proposition Of Service-Oriented Architecture, David Norman Jan 2008

The Value Proposition Of Service-Oriented Architecture, David Norman

Regis University Student Publications (comprehensive collection)

The author of this thesis evaluates Service-Oriented Architecture (SOA) design and implementation strategies. The purpose is to provide the reader with the definition of Service-Oriented Architecture. This report discusses: (1) The definition of Service-Oriented Architecture, (2) The problems solved by Service-Oriented Architecture, (3) Application of design principles to achieve Service-Oriented Architecture. As a result of this investigation, Service-Oriented Architecture is a design style that is fundamentally about sharing and reuse of functionality across diverse applications, so that organizations can quickly adapt to changing business requirements while increasing IT asset reuse and minimizing integration and development costs.


Network Access Control: Disruptive Technology?, Craig Fisher Jan 2007

Network Access Control: Disruptive Technology?, Craig Fisher

Regis University Student Publications (comprehensive collection)

Network Access Control (NAC) implements policy-based access control to the trusted network. It regulates entry to the network by the use of health verifiers and policy control points to mitigate the introduction of malicious software. However the current versions of NAC may not be the universal remedy to endpoint security that many vendors tout. Many organizations that are evaluating the technology, but that have not yet deployed a solution, believe that NAC presents an opportunity for severe disruption of their networks. A cursory examination of the technologies used and how they are deployed in the network appears to support this …


Vacation System, Min-Wei Lee Jan 2005

Vacation System, Min-Wei Lee

Theses Digitization Project

The purpose of this project was to explore the use of Web services to solve enterprise computing problems. XML-based Web services allow complex information systems to be subdivided. In order to explore this architectural paradigm, two systems were built: an employee records sytem, and a vacation system.


Depth-First Search Embedded Wavelet Algorithm For Hardware Implementation, Li-Minn Ang Jan 2001

Depth-First Search Embedded Wavelet Algorithm For Hardware Implementation, Li-Minn Ang

Theses: Doctorates and Masters

The emerging technology of image communication over wireless transmission channels requires several new challenges to be simultaneously met at the algorithm and architecture levels. At the algorithm level, desirable features include high coding performance, bit stream scalability, robustness to transmission errors and suitability for content-based coding schemes. At the architecture level, we require efficient architectures for construction of portable devices with small size and low power consumption. An important question is to ask if a single coding algorithm can be designed to meet the diverse requirements. Recently, researchers working on improving different features have converged on a set of coding …


Classification Of Patterns In Eeg Recordings : A Comparison Of Back-Propagation Networks Vs. Predictive Autoencoder Networks, Brian Armieri May 1993

Classification Of Patterns In Eeg Recordings : A Comparison Of Back-Propagation Networks Vs. Predictive Autoencoder Networks, Brian Armieri

Theses

Recent research exploring the use of neural networks for electro-encephalogram (EEG) pattern classification has found that a three-layer back-propagation network could be successfully trained to identify high voltage spike-and-wave spindle (HVS) patterns caused by epileptic seizures (Jando et. al., in press). However, there is no reason to predict that back-propagation is the best possible network architecture for EEG classification. A back-propagation neural network and a predictive autoencoder neural network were compared to determine which network was better at correct classifying both HVS and non-HVS patterns.

Both networks were able to classify 88%-89% of all patterns using a limited set of …


An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand May 1992

An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand

Theses

The concepts in this thesis discuss and evaluate the need for systems integration. As a conceptual architecture, the OSCATM architecture is investigated. A prototype of the CS Department distributed information system is built following the guidelines and standards of this conceptual architecture. This prototype is implemented in 'C'. RPC (remote procedure call) is used for the communication channel to implement the distributed environment. Conclusions and results that were achieved by implementing this prototype are presented. The main outcome of this thesis is the introduction of the infrastructure to the GenSIF framework.


A Study In Systems Integration Architecture, Sashidhar M. Prasad Dec 1991

A Study In Systems Integration Architecture, Sashidhar M. Prasad

Theses

This Thesis studies the two architectures OSCA and ANSA which support the ODPSE principle in the first two parts. In the third part the framework for integrating these two architectures is described. The idea of integration architectures in relation to open architectures is studied using the enabling technologies.


Work-Preserving Real-Time Emulation Of Meshes On Butterfly Networks, Alf-Christian Achilles Aug 1991

Work-Preserving Real-Time Emulation Of Meshes On Butterfly Networks, Alf-Christian Achilles

Theses

The emulation of a guest network G on a host network H is work-preserving and real-time if the inefficiency, that is the ratio WG/WH of the amounts of work done in both networks, and the slowdown of the emulation are O(1).

In this thesis we show that an infinite number of meshes can be emulated on a butterfly in a work-preserving real-time manner, despite the fact that any emulation of an s x s-node mesh in a butterfly with load 1 has a dilation of Ω(logs).

The recursive embedding of a mesh in a butterfly presented by …