Blättern nach: : Betreuer | Gutachter | Betreuer & Gutachter
    • A Content-Oriented Architecture for Publish/Subscribe Systems 

      Chen, Jiachen (2015-04-01)
      With the user behavior of Internet shifting towards data dissemination and retrieval, Information Centric Networking (ICN) is proposed to suit these demands. ICN treats content as the first-class entity, with nodes exchanging ...
    • A Study of VoIP Performance in Anonymous Network - The Onion Routing (Tor) 

      Rizal, Maimun (2014-06-23)
      Information technology is developing rapidly, especially in the field of computer science, telecommunications and information systems. In the early days of telecommunications, voice networks could not be combined with data ...
    • Generic Methods for Adaptive Management of Service Level Agreements in Cloud Computing 

      Yaqub, Edwin (2015-11-27)
      The adoption of cloud computing to build and deliver application services has been nothing less than phenomenal. Service oriented systems are being built using disparate sources composed of web services, replicable datastores, ...
    • Pattern-Based Vulnerability Discovery 

      Yamaguchi, Fabian (2015-11-10)
      With our increasing reliance on the correct functioning of computer systems, identifying and eliminating vulnerabilities in program code is gaining in importance. To date, the vast majority of these flaws are found by ...
    • Verification of Security Properties Using Formal Techniques 

      Al-Shadly, Saleh (2014-02-12)
      Nowadays, the necessity of developing collaborative and distributed computing systems makes networks, and specially Internet, the key element of the system design process. Several new applications have been appeared in ...