University of Twente Student Theses

Login

Programme: Internet Science and Technology MSc (60032)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: Essay
Number of items: 63.

Essay

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

Biesbroek, Rudolf (2014) Last-mile lightpath services : on packet-switched shared infrastructure.

Bolhuis, M (2014) Using an NFC-equipped mobile phone as a token in physical access control.

Braak, J.C. ter (2016) Radiolocalisation at construction sites.

Broekhuizen, V.P. (2008) Security for EPC discovery services.

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Chen, Zhen (2012) Workflow management solution for a security management application.

Chromik, Justyna Joanna (2015) Booters (black)list.

Conrads, J.G. (2019) DDoS Attack fingerprint extraction tool : making a flow-based approach as precise as a packet-based.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

Dzulqarnain, Dzulqarnain (2019) Investigating IoT malware characteristics to improve network security.

Eijkel, D.J. (2022) Anycast in the SCION Internet Architecture.

Eijnden, E.K. van den (2020) Optimal Handover in MEC for an Automotive Application.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Geuze, N.J. (2019) Energy management in smart grids using timed automata.

Graciano Martinez, Virginia (2021) A dynamic deployment framework for a Staging site in the Personal Health Train.

Hageman, Kaspar (2015) The Performance of ECC Algorithms in DNSSEC: A Model-based Approach.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX.

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Ingberg, G. (2006) Location aware performance measurements.

Kaijen, J.A.H. (2008) Management of risk & information security data.

Kamphuis, Gertjan (2014) Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Klink, Karel van (2022) Quantum Key Distribution in a Pan-European Network of National Research and Education Networks, Qualitative and Quantitative Aspects of Implementing a Quantum Key Distribution Network.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Larizgoitia Burgaña, Jon (2017) Design and evaluation of a link-state routing protocol for Internet-Wide Geocasting.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

Meijerink, B.J. (2015) Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks.

Min, Volker J.T. (2003) Transport accounting management in a multi-access technologies environment.

Moscoviter, D. (2016) Improving spatial indexing and searching for location-based DNS queries.

Naziris, Sotirios (2019) Infrastructure as code : towards dynamic and programmable IT systems.

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Ozaita Araico, Alejandro (2017) Detection of the crowdedness of a place sensing the devices in the area.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

Ravesteijn, W. van (2009) Connecting distributed e-health applications by means of a generic control protocol.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Sarrionandia Uriarte, Nora (2017) Efficiency of broadcasting in vehicular networks by means of 5G device-to-device communications.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Schutijser, C.J.T.M. (2018) Towards automated DDoS abuse protection using MUD device profiles.

Shabeer Ahmed, D.S. (2020) Sustainable hitlist : targets for internet scans.

Sharman, S.S. (2019) Item availability restricted.

Slootweg, M.H.F. (2015) Implementing and Characterising Medical Implantable Wireless Communication Using the Microsemi ZL70102 : And Prototyping a Load Measurement Tool for Unicompartmental Knee Replacement Operations.

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Steeg, D.P.M.H. van der (2014) Flow-based DDoS Attack Detection on Cisco IOS.

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Vlasveld, J. (2007) On context in context-aware ICT applications.

Vries, A.J.K. de (2008) Improving reliability of streaming radio.

Wicaksana, M.A. (2016) IPv4 vs IPv6 Anycast Catchment: a Root DNS Study.

Wierbosch, Mark (2014) It is raining packets.

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

This list was generated on Tue Apr 16 06:05:56 2024 CEST.