• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 88
  • 35
  • 15
  • 12
  • 12
  • 6
  • 5
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 232
  • 42
  • 36
  • 23
  • 21
  • 19
  • 19
  • 19
  • 18
  • 18
  • 16
  • 16
  • 16
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Cost-effective Designs for Supporting Correct Execution and Scalable Performance in Many-core Processors

Romanescu, Bogdan Florin January 2010 (has links)
<p>Many-core processors offer new levels of on-chip performance by capitalizing on the increasing rate of device integration. Harnessing the full performance potential of these processors requires that hardware designers not only exploit the advantages, but also consider the problems introduced by the new architectures. Such challenges arise from both the processor's increased structural complexity and the reliability issues of the silicon substrate. In this thesis, we address these challenges in a framework that targets correct execution and performance on three coordinates: 1) tolerating permanent faults, 2) facilitating static and dynamic verification through precise specifications, and 3) designing scalable coherence protocols.</p> <p>First, we propose CCA, a new design paradigm for increasing the processor's lifetime performance in the presence of permanent faults in cores. CCA chips rely on a reconfiguration mechanism that allows cores to replace faulty components with fault-free structures borrowed from neighboring cores. In contrast with existing solutions for handling hard faults that simply shut down cores, CCA aims to maximize the utilization of defect-free resources and increase the availability of on-chip cores. We implement three-core and four-core CCA chips and demonstrate that they offer a cumulative lifetime performance improvement of up to 65% for industry-representative utilization periods. In addition, we show that CCA benefits systems that employ modular redundancy to guarantee correct execution by increasing their availability.</p> <p>Second, we target the correctness of the address translation system. Current processors often exhibit design bugs in their translation systems, and we believe one cause for these faults is a lack of precise specifications describing the interactions between address translation and the rest of the memory system, especially memory consistency. We address this aspect by introducing a framework for specifying translation-aware consistency models. As part of this framework, we identify the critical role played by address translation in supporting correct memory consistency implementations. Consequently, we propose a set of invariants that characterizes address translation. Based on these invariants, we develop DVAT, a dynamic verification mechanism for address translation. We demonstrate that DVAT is efficient in detecting translation-related faults, including several that mimic design bugs reported in processor errata. By checking the correctness of the address translation system, DVAT supports dynamic verification of translation-aware memory consistency.</p> <p>Finally, we address the scalability of translation coherence protocols. Current software-based solutions for maintaining translation coherence adversely impact performance and do not scale. We propose UNITD, a hardware coherence protocol that supports scalable performance and architectural decoupling. UNITD integrates translation coherence within the regular cache coherence protocol, such that TLBs participate in the cache coherence protocol similar to instruction or data caches. We evaluate snooping and directory UNITD coherence protocols on processors with up to 16 cores and demonstrate that UNITD reduces the performance penalty of translation coherence to almost zero.</p> / Dissertation
62

Design And Simulation Of A Flash Translation Layer Algorithm

Ayar, Yusuf Yavuz 01 June 2010 (has links) (PDF)
Flash Memories have been widely used as a storage media in electronic devices such as USB flash drives, mobile phones and cameras. Flash Memory offers a portable and non-volatile de- sign, which can be carried to everywhere without data loss. It is durable against temperature and humidity. With all these advantages, Flash Memory gets popular day by day. However, Flash Memory has also some disadvantages, such as erase-before restriction and erase limi- tation of each individual block. Erase-before restriction pushes every single writable unit to be erased before an update operation. Another limitation is that every block can be erased up to a fixed number. Flash Translation Layer - FTL is the solution for these disadvantages. Flash Translation Layer is a software module inside the Flash Memory working between the operating system and the memory. FTL tries to reduce these disadvantages of Flash Memory via implementing garbage collector, address mapping scheme, error correcting and many oth- ers. There are various Flash Translation Layer software. Some of them have been reviewed in terms of their advantages and disadvantages. The study aims at designing, implementing and simulating a NAND type FTL algorithm.
63

Visualizing Endpoint Security Technologies using Attack Trees

Pettersson, Stefan January 2008 (has links)
<p>Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memory, address randomization, system call interception and file integrity monitoring are described along with the attacks they are designed to defend against. The coverage of each countermeasure is then visualized with the help of attack trees. Attack trees are normally used for describing how systems can be attacked but here they instead serve the purpose of showing where in an attack a countermeasure takes effect. Using attack trees for this highlights a couple of important aspects of a security mechanism, such as how early in an attack it is effective and which variants of an attack it potentially defends against. This is done by the use of what we call defensive codes that describe how a defense mechanism counters a sub-goal in an attack. Unfortunately the whole process is not well formalized and depends on many uncertain factors.</p>
64

Do ideologies matter? : Idea analysis of foreign policy in the United States of America

Siedberg, Marie January 2009 (has links)
<p>The aim of this essay is to clarify if there is an ideological difference within the political area of foreign policy of the United States. The question that will be answered is: Is the American foreign policy coloured by different ideologies, or has that area of politics become an arena without ideology differences?</p><p>In order to answer the question, the method used in this essay is idea analysis using ideal types as analytical instrument. The texts that are being analysed are the State of the Union Addresses of four American presidents. The presidents are Carter, Reagan, Bush and Clinton and each president give this speech once a year. The presidents are chosen due to the fact that their presidencies follow each other and are as recently in time as possible.</p><p>After analysing all of the speeches and considering the surrounding circumstances, like the Cold War, I came to the conclusion that there is no ideological difference within foreign policy of the United States of America. Some areas of foreign policy, however, show more or less connotations to either idealism or realism. Even tough ideology plays a part; there is no difference between the liberal party and the conservative party.</p>
65

A PRELIMINARY STUDY FOR IDENTIFYING NAT TRAFFIC USING MACHINE LEARNING

Gokcen, Yasemin 01 April 2014 (has links)
It is shown in the literature that the NAT devices have become a convenient way to hide the identity of malicious behaviors. In this thesis, the aim is to identify the presence of the NAT devices in the network traffic and (if possible) to predict the number of users behind those NAT devices. To this end, I utilize different approaches and evaluate the performance of these approaches under different network environments represented by the availability of different data fields. To achieve this, I propose a machine learning (ML) based approach to detect NAT devices. I evaluate my approach against different passive fingerprinting techniques representing the state-of-the-art in the literature and show that the performance of the proposed ML based approach is very promising even without using any payload (application layer) information.
66

Address and the Semiotics of Social Relations

Poynton, Cate McKean January 1991 (has links)
Doctor of Philosophy / This thesis is concerned with the realm of the interpersonal: broadly, those linguistic phenomena involved in the negotiation of social relations and the expression of personal attitudes and feelings. The initial contention is that this realm has been consistently marginalised not only within linguistic theory, but more broadly within western culture, for cultural and ideological reasons whose implications extend into the bases of classical linguistic theory. Chapter 1 spells out the grounds for this contention and is followed by two further chapters, constituting Part I: Language and Social Relations. Chapter 2 identifies and critiques the range of ways in which the interpersonal has been conventionally interpreted: as style, as formality, as politeness, as power and solidarity, as the expressive, etc. This chapter concludes with an argument for the need for a stratified model of language in order to deal adequately with these phenomena. Chapter 3 proposes such a model, based on the systemic-functional approach to language as social semiotic. The register category tenor within this model is extended to provide a model of social relations as a semiotic system. The basis for the identification of the three tenor dimensions, power, distance and affect, is the identification of three modes of deployment or realisation of the interpersonal resources of English in everyday discourse: reciprocity, proliferation and amplification. Parts II and III turn their attention to one significant issue in the negotiation of social relations: address. The focus is explicitly on Australian English, but there is considerable evidence that most if not all of the forms discussed in Part II occur in other varieties of English, especially British and American, and that some at least of the practices discussed in Part III involve the same patterns of social relations with respect to the tenor dimensions of power, distance and affect. Because most varieties of contemporary English do not have a set of options for second-person pronominal address, as is the case in many of the world's languages, English speakers use names and other nominal forms which need to be described. Part II is descriptive in orientation, providing an account of the grammar of VOCATION in English, including a detailed description of the nominal forms used. Chapter 4 investigates the identification and functions of vocatives, and includes empirical investigations of vocative position in clauses and vocative incidence in relation to speech function or speech act choices. Chapter 5 presents an account of the grammar of English name forms, organised as a paradigmatic system. This chapter incorporates an account of the processes used to produce the various name-forms used in address, including truncation, reduplication and suffixation. Chapter 6 consists of an account of non-name forms of address, organised in terms of the systemic-functional account of nominal group structure. This chapter deals with single-word non-name forms of address and the range of nominal group structures used particularly to communicate attitude, both positive and negative. Part III is ethnographic in orientation. It describes some aspects of the use of the forms described in Part II in contemporary address practice in Australia and interprets such practice using the model of social relations as semiotic system presented in Part I. The major focuses of attention is on address practice in relation to the negotiation of gender relations, with some comment on generational relations of adults with children, on class relations and on ethnic relations in nation with a diverse population officially committed to a policy of a multiculturalism. Part III functions simultaneously as a coda for this thesis, and a prologue for the kind of ethnographic study that the project was originally intended to be, but which could not be conducted in the absence of an adequate linguistically-based model of social relations and an adequate description of the resources available for address in English.
67

Titles of address in Christian Greek epistolography to 527 A.D.

Dinneen, Lucilla, January 1929 (has links)
Thesis (Ph. D.) Catholic University of America, 1929. / Bibliography included in preface.
68

Title of address in Christian Latin epistolography to 543 A.D

O'Brien, Mary Bridget, January 1930 (has links)
Thesis (Ph. D.)--Catholic University of America, 1930. / Includes bibliographical references (p. xii-xiv; "Collections": p. ix-x).
69

LADY TALK : A critical discourse analysis of the representation of women over 50 in fashion and lifestyle magazines

Karlsson, Niquita January 2018 (has links)
The complex concept of the ageing woman must be viewed in relation to both what it means to be a woman and what it means to age. Both women and the elderly are discriminated against in different respects; therefore it could be argued that the ageing woman is discriminated against in a double sense. This study investigates how women over the age of 50 are portrayed linguistically in fashion and lifestyle magazines with the aim to reveal the underlying attitudes as well as social and cultural ideologies regarding the topic today. Based on Wodak (2001), I employed critical discourse analysis (CDA) methodology, with a particular focus on terms of address and attributes identified in selected fashion and lifestyle magazines. The findings revealed that although the women were addressed mainly in terms of their professional titles, the emphasis was put on them as ageing women by a continuous mentioning of their age, their past and physical consequences from the process of ageing.        Further, personality traits and emotional and physical attributes were evaluated in terms of negative and positive associations, revealing positive attitudes (e.g. happy, curious, experienced) regarding emotions and personality traits, but negative associations (e.g. weight gain, grey hair, old) in relation to their ageing bodies and their appearances.
70

Dos telejornais aos programas esportivos: gêneros televisivos e modos de endereçamento

Silva, Fernanda Mauricio da January 2005 (has links)
Submitted by Suelen Reis (suziy.ellen@gmail.com) on 2013-05-24T13:58:29Z No. of bitstreams: 1 dissertacao Fernanda da Silva.pdf: 3103316 bytes, checksum: 4236c108aa56f3874e4b80fee918217e (MD5) / Made available in DSpace on 2013-05-24T13:58:29Z (GMT). No. of bitstreams: 1 dissertacao Fernanda da Silva.pdf: 3103316 bytes, checksum: 4236c108aa56f3874e4b80fee918217e (MD5) Previous issue date: 2005 / A presente dissertação, intitulada Dos telejornais aos programas esportivos: gêneros televisivos e modos de endereçamento, tem como objetivo central compreender a relação texto-leitor a partir da noção de gêneros televisivos. Os gêneros televisivos, como postula Jesus Martín-Barbero, são estratégias de comunicabilidade que se colocam entre os programas e os receptores, servindo como parâmetro de escritura para os produtores e fonte de expectativas para os receptores. Classificamos a programação da televisão brasileira em cinco gêneros televisivos básicos: programas jornalísticos, programas de auditório, ficção seriada, publicidade reality shows, sendo que o gênero programas jornalísticos, nosso objeto, pode ser dividido em subgêneros: telejornais, programas de jornalismo temático, programas de entrevista e documentários. Nosso objetivo é conhecer as estratégias de construção de dois subgêneros televisivos: os telejornais e os programas de jornalismo temático – especificamente os programas esportivos. Acreditamos que a análise comparativa nos permite reconhecer os limites e tensões dentro de cada subgênero e as articulações sofridas pelo jornalismo para se adaptar aos subgêneros. As contribuições que cada programa traz para o interior do subgênero a que faz parte é dada pelos modos de endereçamento, conceito que procura responder à pergunta “quem este programa pensa que nós (os telespectadores) somos?”. Para tanto, analisamos os programas Bate-Bola com o Assinante (ESPN Brasil), Jornal Nacional (TV Globo), Globo Esporte (TV Globo), Jornal da Band (TV Bandeirantes) e Esporte Total (TV Bandeirantes) durante o período de 1º a 15 de outubro de 2003. Uma das principais contribuições deste trabalho é uma proposta metodológica para análise de programas jornalísticos televisivos desenvolvida a partir do conceito de modos de endereçamento. A metodologia consta de nove operadores de análise: pacto sobre o papel do jornalismo, contexto comunicativo, mediadores, temática, formatos de apresentação da notícia, recursos da linguagem televisiva, recursos a serviço do jornalismo, texto verbal e relação com as fontes de informação. Assim, a partir da observação desses elementos, esperamos chegar às características de cada programa individualmente e, posteriormente, do subgênero ao qual ele faz parte. / Salvador

Page generated in 0.0454 seconds