• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 88
  • 35
  • 15
  • 12
  • 12
  • 6
  • 5
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 232
  • 42
  • 36
  • 23
  • 21
  • 19
  • 19
  • 19
  • 18
  • 18
  • 16
  • 16
  • 16
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Integration of Memory Subsystem with Microprocessor Supporting On-Chip Real Time Trace Compression

Lai, Chun-hung 06 September 2007 (has links)
In this thesis, we integrate the memory subsystem, including cache and MMU¡]Memory Management Unit¡^ with the embedded 32 bits microprocessor SYS32TM-II to support the virtual memory mechanism of the operating system and make memory management effectively among multi-processes in the system. To provide the virtual to physical address translation with MMU and to improve the system performance with cache. We reuse the memory subsystem of the LEON2 SoC platform and design the communication interface to coordinate the processor core SYS32TM-II with the LEON2 memory subsystem, and modify the LEON2 memory subsystem to compatible with SYS32TM-II. After the integration of memory subsystem, a reusing cache for program address trace compression in real time is proposed. The advantage is that reusing cache with minor hardware modification can not only save the hardware compressor overhead but also obtain a high compression ratio. Experimental results show that the proposed approach causes few hardware area overhead but achieves approximately 90% compression ratio at real-time. Therefore, this thesis is the memory subsystem with parameterized design and with the ability to support system debugging. The role of the memory subsystem is not only to improve the system performance and to provide the hardware support requiring by the operating system, with minor modification, the memory susbsystem can also capture the dynamic program execution trace in parallel with microprocessor. The address trace compression mechanism will not effect the program execution and capable to compress at real-time.
12

Synchronous/Asynchronous 4-T SRAM Using Dual Threshold Voltage

Leo, Hon-Yuan 04 November 2002 (has links)
­^¤å´£­n¡G Two different topics associated with their respective applications are proposed in this thesis. The first topic is focused on the implementation of a 4-Kb 500MHz 4-T CMOS SRAM using low-Vthn bitline drivers and high-Vthp latches. The storage of data is realized by a pair of cross-coupled PMOS transistors, while the wordline is controlled by a pair of NMOS transistors. The advantages of dual threshold voltage transistors can be used to reduce the access time and maintain data retention at the same time. The second topic is the implementation of cascade address transition detector (ATD) design with high noise immunity. We employ a feedback loop to prevent interference of noise and false alarm signal to stabilize the generated CS (Chip Select) signal. Besides, we use one delay buffer to dynamically adjust the CS strobe.
13

How shall they hear? a synthesis of concepts and solutions for church sound systems /

Jeffers, Michael W. January 1979 (has links)
Thesis (M.C.M.)--Western Conservative Baptist Seminary, 1979. / Includes bibliographical references (leaves 85-88).
14

WBG (Whois Based Geolocation): uma estratégia para localização geográfica de hosts na Internet

Endo, Patricia Takako 31 January 2008 (has links)
Made available in DSpace on 2014-06-12T15:54:02Z (GMT). No. of bitstreams: 2 arquivo1953_1.pdf: 1722836 bytes, checksum: 2be769931d2befdf5a296cf78a205f34 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2008 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / Baseado, por exemplo, na localização geográfica de um determinado host na Internet, podese oferecer serviços especializados, como: a) páginas web com preferências regionais (e.g. usuários online podem receber propagandas direcionadas ou ter a linguagem para apresentação de conteúdo selecionada automaticamente); b) controle de disponibilidade de dados, de acordo com a localização do usuário (e.g. pode-se restringir o acesso a determinados dados através de políticas regionais e autorização de transações a partir de localidades pré-estabelecidas), c) estudo e análise de tráfego geolocalizado para entender quem se comunica com quem no nível de usuários, regiões e países e identificação de anomalias de roteamento. Os aspectos comuns destas aplicações são a sua dependência em relação a estratégias, denominadas geolocalização. Contudo, alguns destes mecanismos apresentam uma baixa acurácia ou uma estimativa de localização geográfica não-aceitável para determinadas aplicações. Portanto, torna-se de grande importância estudos que melhorem a precisão, bem como a completude das estratégias utilizadas para inferir a geolocalização de hosts na Internet. Este trabalho tem como principais objetivos o estudo sobre as estratégias de geolocalização existentes; a proposta de uma estratégia que melhore a precisão das inferências de localização geográfica de hosts na Internet e a completude dos resultados; e o estudo de tráfego geolocalizado de uma base de dados da rede acadêmica do Estado de Pernambuco. A estratégia desenvolvida, denominada WBG (Whois Based Geolocation), é baseada em buscas whois online e possui uma heurística baseada na ferramenta traceroute
15

Le Petit Prince as a Graphic Novel: Images and Dual Address in Intersemiotic Translation

Twiss, Rob January 2016 (has links)
One of the most interesting aspects of Le Petit Prince by Antoine de Saint-Exupéry (1999[1946]) is its dual address. The illustrated narrative is at once a charming story for children and an allegory inviting adults to consider philosophical questions. In the graphic-novel adaptation of the book by Joann Sfar (2008), this allegory is obscured:; the abstract, philosophical ideas recede to the background while the material details of the story become more prominent. But this recession of the allegory does not mean that the adaptation turns its back on adult readers completely. The graphic novel creates a web of intertextual references, which, among other things, amplify the suggestion in the source text that the protagonist is Antoine de Saint-Exupéry himself. It thus displaces the adult interest from allegory to autobiography and the mechanism of adult address from allegory to intertextuality, restricting its adult audience. For those adult readers who remain addressed by the graphic novel, however, the text identifies itself explicitly as a translation, which has consequences for we should think about the “voice” of the translator. Un des aspects les plus intéressants du livre Le Petit Prince d’Antoine de Saint-Exupéry (1999 [1946]) tient au fait que le récit illustré est une histoire charmante pour les enfants en même temps qu’il invite les adultes à réfléchir à des questions philosophiques. Dans l’adaptation du récit en bande dessinée par Joann Sfar (2008), les éléments abstraits du livre s’estompent derrière les détails concrets de l’histoire. Cet effacement de l’allégorie ne signifie pourtant pas que la bande dessinée tourne le dos aux adultes : elle crée un réseau intertextuel qui renforce l’impression donnée par le texte source que le véritable protagoniste est Antoine de Saint-Exupéry. Ainsi, l’intérêt pour les questions philosophiques se reporte sur l’autobiographie et, passant de l’allégorie à l’intertextualité, la bande dessinée sollicite alors moins les adultes. Cependant, pour les adultes auquelles la bande dessinée s’addresse toujours, le texte s’identifie explicitement comme une traduction, ce qui implique une réévaluation du concept de la “voix” du traducteur.
16

Welcome Address

Rice, Judy 11 April 2024 (has links)
Welcome address for the 2024 Epsilon Sigma Conference.
17

Les termes d'adresse dans des romans victoriens / Terms of address in Victorian novels

Sabbatorsi, Marjorie 29 November 2014 (has links)
Dans l'échange verbal entre plusieurs personnes, des termes en particulier sont souvent employés pour s'adresser à autrui : il s'agit des termes d'adresse. Ces termes peuvent être considérés comme créateurs de liens entre le langage et la société par le fait qu'ils fournissent des informations non sans intérêt sur la relation unissant les interlocuteurs. Il existe divers moyens de communiquer et de traduire une certaine forme de politesse, de familiarité, de distance, d'affection, de haine, etc., dont ces termes font partie. En plus de leur valeur sémantique, ils possèdent une valeur sociale et culturelle non négligeable.Les huit romans retenus dans cette étude, écrits par quatre grands écrivains de l'époque victorienne (Charlotte Brontë, Charles Dickens, George Eliot et Anthony Trollope), offrent au lecteur curieux un aperçu privilégié de la deuxième moitié du XIXème siècle. Outre l'aspect littéraire, les thèmes abordés en relation avec les événements de l'époque intéresseront le lecteur historien et le mode de vie et les mœurs décrits fourniront de précieux détails au lecteur sociologue, tous ces aspects étant également facilement accessibles au lecteur ordinaire. Cet examen synchronique des termes d'adresse permet, non seulement de montrer la pluralité des termes pouvant être utilisés en adresse directe, mais aussi de souligner l'importance des facteurs linguistiques, paralinguistiques et extra-linguistiques dans toute étude de cette nature. / In verbal exchange between several speakers, a particular category of linguistic sign is frequently used when naming the participants: these are known as terms of address. Insofar as they provide information about the nature of the relation that unite the members of the group, these terms can be regarded as a means of creating links between language and society. They are also among the main contributors to the various systems implemented in the expression and communication of courtesy, familiarity, distance, affection, loathing, etc. Apart from their semantic value, they are of an indubitable socio-cultural interest.The eight novels, written by four major Victorian authors (Charlotte Brontë, Charles Dickens, George Eliot and Anthony Trollope) that have been chosen for this study, provide, for the curious reader, a precious insight into the second half of the nineteenth century. Of great appeal to the lay reader, the themes developed in their historical context – apart from the purely literary aspect – cannot fail to interest the social historian and the customs and conventions described contain precious data for the sociologist. This synchronic study of terms of address, not only reveals the plurality of the terms that are available in verbal exchange, but also underlines the importance of the linguistic, paralinguistic and extra-linguistic factors that should be taken into account in any study of this nature.
18

Improving speech intelligibility with a constant-beamwidth, wide-bandwidth loudspeaker array

Winker, Douglas Frank, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
19

The pragmatics of direct address in the Iliad: a study in linguistic politeness

Brown, Howard Paul January 2003 (has links)
No description available.
20

Identifying memory address disclosures

North, John January 2015 (has links)
Software is still being produced and used that is vulnerable to exploitation. As well as being in devices in the homes of many people around the world, programs with these vulnerabilities are maintaining life-critical systems such as power-stations, aircraft and medical devices and are managing the creation and distribution of billions of pounds every year. These systems are actively being exploited by governments, criminals and opportunists and have led to loss of life and a loss of wealth. This dependence on software that is vulnerable to exploitation has led to a society with tangible concerns over cyber-crime, cyber-terrorism and cyber-warfare. As well as attempts to eliminate these vulnerabilities, techniques have been developed to mitigate their effects; these prophylactic techniques do not eliminate the vulnerabilities but make them harder to exploit. As software exploitation is an ever evolving battle between the attackers and the defenders, identifying methods to bypass these mitigations has become a new battlefield in this struggle and the techniques that are used to do this require vulnerabilities of their own. As many of the mitigation techniques are dependent upon secrecy of one form or another, vulnerabilities which allow an attacker to view those secrets are now of importance to attackers and defenders. Leaking of the contents of computer memory has always been considered a vulnerability, but until recently it has not typically been considered a serious one. As this can be used to bypass key mitigation techniques, these vulnerabilities are now considered critical to preventing whole classes of software exploitation. This thesis is about detecting these types of leaks and the information they disclose. It discusses the importance of these disclosures, both currently and in the future. It then introduces the first published technique to be able to reliably identify specific classes of these leaks, particularly address disclosures and canary-disclosures. The technique is tested against a series of applications, across multiple operating systems, using both artificial examples and software that is critical, commonplace and complex.

Page generated in 0.0469 seconds