This Is AuburnElectronic Theses and Dissertations

Browsing by Author "Hamilton, Drew"

Now showing items 1-10 of 10

Agent-Based Simulation of Behavioral Anticipation in Computer Networks: A Comparative Study of Anticipatory Fault Management 

Saple, Avdhootkishore (2006-05-15)
Network fault management is concerned with the detection, isolation and correction of anomalous conditions that occur in a computer network. Present state of art in fault management classifies existing methodologies into ...

A Case Study in Applying Agile Software Engineering Practices to Systems Engineering 

Kennedy, Matthew (2013-02-01)
With the fast-paced nature of technology, the need to rapidly field systems has never been more important. Success does not just depend on well-defined requirements but also on the ability to respond to change during and ...

A Defense System on DDOS Attacks in Mobile Ad Hoc Networks 

Yu, Xuan (2007-05-15)
Network security is a weak link in wired and wireless network systems. Malicious attacks have caused tremendous loss by impairing the functionalities of the computer networks. Denial of Service (DoS) and Distributed DoS ...

Energy-Efficient Resource Management for High-performance Computing Platforms 

Zong, Ziliang (2008-08-15)
In the past decade, high-performance computing (HPC) platforms like clusters and computational grids have been widely used to solve challenging and rigorous engineering tasks in industry and scientific applications. Due ...

Evaluation of Realistic Mobility Model for Comparative Study of Routing Protocols in IEEE 802.11p (DSRC) Vehicular Ad-hoc Network (VANET) 

Song, Dongsuk (2012-07-16)
As a countermeasure for rapidly changing topology and high mobility of vehicles, Vehicular Ad-hoc Network (VANET) is emerging as a standard routing protocol. When used efficiently, an ad-hoc routing protocol could play a ...

Iterative and Incremental System Lifecycle Development 

Bew, Gregory (2013-04-17)
One of the fundamental changes in our technologically advanced society is the breadth of technologies available and the diverse backgrounds, experiences, and skill sets of the many inventors and developers. Traditional ...

Neural Enhancement for Multiobjective Optimization 

Garrett, Aaron (2008-05-15)
In this work, a neural network approach is applied to multiobjective optimization problems in order to expand the set of optimal solutions. The network is trained using results obtained from existing evolutionary multiobjective ...

Symbiotic Adaptive Multisimulation 

Mitchell, Bradley (2007-12-15)
Systems characterized by non-linear interactions among diverse agents often exhibit emergent behavior that may be very different from what the initial conditions of these systems would suggest. Traditional simulation ...

Trusted, Third-Party Authenticated, Quantum Key Distribution 

Hood, Jonathan (2016-08-05)
This dissertation presents an algorithm that provides a way of establishing trust and authentication. The protocol negotiates a key using extensions to QKD algorithms that include non-repudiation and endpoint verification ...

Vulnerability Assessment of Java Bytecode 

Shah, Rahul (2005-12-15)
Security of the software applications has become a critical issue as software is now used in almost all sectors parts of our day to day life. There is always an underlying threat that a malicious user may be able to access ...