Institutional Repository

Browsing Theses and Dissertations by Author "Notre Dame University-Louaize. Department of Computer Sciences"

Browsing Theses and Dissertations by Author "Notre Dame University-Louaize. Department of Computer Sciences"

Sort by: Order: Results:

  • Nouhra, Virona (Notre Dame University-Louaize, 2018)
    In the last few years, Cloud Storage has taken a new turn in becoming the latest trend to create a huge impact in the IT world. Amazon Drive is a cloud storage mobile applications created by Amazon. This application provides online and easy access to documents, music, photos and videos saved in your cloud drive. Due to the importance and widespread of the cloud, not only regular users, but also criminals have taken advantage of the services provided by this new technology to commit digital crimes. Digital forensics is a branch of forensic sciences that aims at ...
  • Akiki, Pierre (Notre Dame University-Louaize, 2007)
    The term spatial data signifies all geometric objects of different dimensions and the relations that could bind these objects together. Spatial data is, in general, divided into two parts: crisp spatial data and vague spatial data. Crisp spatial data has determinate coordinates and boundaries, whereas vague spatial data has indeterminate ones. The demand for spatial data support in database management systems is growing every day, yet not all commercial products provide spatial data support natively, and those that do merely provide it partially. Since database management systems are at the heart ...
  • Salem, Elie (Notre Dame University-Louaize, 2006)
    A denial of service (DoS) attack is an attempt by a person or a group of persons to cripple an online service. This can have serious consequences on companies like Amazon and eBay, which rely on their online availability to do business. Many defense mechanisms have been proposed to thwart DoS attacks. One of these defense mechanisms is called hop-count filtering. Although an attacker can forge any field in the IP header, he or she cannot falsify the number of hops an IP packet takes to reach its destination. This hop-count information can be inferred from the time-to-live value in the IP header. ...
  • Azzi, Ziad (Notre Dame University-Louaize, 2005)
    Wireless sensor networking is an increasingly important technology that is used in a variety of applications, such as environmental monitoring, infrastructure management, public safety, medical, home and office security, transportation and military systems. However, until now, wireless sensor networks (WSNs) and their applications have been developed without considering an integrated management solution. This thesis analyzes in detail emerging wireless sensor management schemes and proposes a hybrid network model that establishes a combination between event-driven and continuous WSNs. The main ...
  • Haddad, Mireille J. (Notre Dame University-Louaize, 2017)
    Maintenance is the most costly phase of the software life cycle. The maintenance cost of a program is estimated to be over 80% of its total life cycle costs (Erlikh, 2000). Since most of the maintenance time is devoted to understanding the program itself, program comprehension becomes essential. Often, a large fraction of the maintenance time is spent on reading code to understand what functionality of the program it implements. An insufficiently documented source code can be challenging for developers to understand and maintain. A clear and concise documentation can help developers ...

Search DSpace


Advanced Search

Browse

My Account