• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 88
  • 35
  • 15
  • 12
  • 12
  • 6
  • 5
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 232
  • 42
  • 36
  • 23
  • 21
  • 19
  • 19
  • 19
  • 18
  • 18
  • 16
  • 16
  • 16
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

"Formas de tratamento no português brasileiro: a alternância tu/você na cidade de Santos - SP" / Pronouns of Address in Brazilian Portuguese: the alternance of tu/você in Santos - SP

Artarxerxes Tiago Tacito Modesto 04 September 2006 (has links)
Esta pesquisa visa a descrever e explicar o uso das formas de tratamento tu e você em Santos, cidade do litoral do Estado de São Paulo, levando em consideração aspectos sociolingüísticos e pragmático-discursivos, que atuam na alternância destas formas. Há, segundo RAMOS (2001), dois pontos de vista que têm norteado as pesquisas sobre as formas de tratamento: um de natureza sócio-histórica, que leva em consideração o uso amplo de você como uma opção por um tratamento igualitário, e outro que trata o problema como um processo de mudança baseado na implementação da forma você com estatuto pronominal, que desta forma vem alterando a concordância e acarretando muitas mudanças no sistema pronominal a partir de meados dos séculos XIX. Assim, este trabalho apresenta um estudo quantitativo das formas de tratamento tu e você em Santos, buscando os fatores relevantes para a primeira das duas abordagens sugeridas, além de fazer algumas considerações acerca da segunda abordagem. Com o suporte da metodologia da Sociolingüística Variacionista Laboviana, busca-se explicitar até que ponto as diferentes situações interacionais levam os falantes a escolherem uma ou outra forma pronominal. Constituem o corpus analisado 20 inquéritos correspondentes a textos conversacionais realizados entre falantes santistas. Em outras palavras, busca-se verificar em que medida fatores discursivos (referenciação, expressividade,monitoramento), ao lado dos fatores sociais (gênero, faixa etária, escolaridade dos informantes) e um lingüístico (função sintática da forma de tratamento), podem explicar o fenômeno. Adota-se, por conseguinte, uma perspectiva funcionalista de análise, já que se leva em conta toda a situação comunicativa: o propósito do evento da fala, seus participantes e o contexto discursivo. / This research aims to describe and explain the ways of address “tu” and “você” in Santos, city of the coast of São Paulo, considering sociolinguistic and pragmatic discursive aspects that act on the alternation of these forms. There is, according to RAMOS(2001), two points of view that have lead the researches on the ways of address: one of socio- historical nature, that considers the ample use of “você” as an option for equalitarian treatment, and another one that sees the problem as a change in process problem, based on the implementation of the form “você” with a pronominal statute, causing by this way modifications in the concordance and provocating many changes in the pronominal system since the middle of the XIX centuries. Therefore, this work presents a quantitative study of the ways of address “tu” and “você” in Santos, looking for the relevant factors presented by the first of these two approaches above, but it makes some considerations about the second approach too. Supported by the Labovian Variacionist Sociolinguistic Methodology, it looks to explicit how the different interacional situations lead the speakers to select one or another pronominal form. The corpus is composed by 20 recordings of santistas speakers conversations. By other words, it looks for verifying how the discursive factors (referentiation, expressivity, monitoring), sided by social factors (gender, age, scholarship of the speakers) and a linguistic factor (syntactic function of the ways of address), can explain the phenomena. It takes, therefore, a functionalist perspective of analysis, because it considers all the communicative situation: the speaking event proposal, its participants and the discursive context.
72

GAAP: um protocolo de alocação de endereços para redes ad hoc móveis em cenários de emergência

Bacelar Júnior, Laércio Péricles 25 March 2011 (has links)
Made available in DSpace on 2015-04-11T14:02:39Z (GMT). No. of bitstreams: 1 laercio.pdf: 2277333 bytes, checksum: 0c22421ce1e12c94ae57ae0a4365183e (MD5) Previous issue date: 2011-03-25 / In emergency scenarios, such as in natural disasters, technological or manmade, search and rescue teams in the affected region may use solutions for mobile ad hoc networks (Mobile Ad hoc Networks - MANETs) to address any lack of network infrastructure communication. Emergency networks are those built on disaster scenarios and have properties such as robust and resilient communication, not necessarily have some communication infrastructure and mainly offer not only data communication but also voice. Thus, in case of lack of communication infrastructure, a MANET can act as an emergency network. For communication between nodes in a MANET can be performed, it is necessary that each node is configured with unique address. Due to the ability of nodes self-organize, by creating temporary and arbitrary topologies, address allocation should be done automatically. Many papers have appeared dealing with the allocation of addresses in MANETs, but most solutions presents a number of limitations related mainly to the limited applicability in scenarios and introduction of high control traffic on the network. In this context, this paper presents a new solution for address allocation that assigns unique addresses to nodes in emergency networks. Results showed that the proposed solution is efficient in critical scenarios in comparison with other protocols examined, with low latency to obtain an address and reduced control traffic on the network reduced. / Em cenários de emergência, tais como em desastres naturais, tecnológicos ou causados pelo homem, equipes de busca e resgate da região afetada podem utilizar soluções de redes ad hoc móveis (Mobile Ad hoc Networks - MANETs) para suprir eventuais carências de infraestrutura da rede de comunicação. Redes de emergência são aquelas construídas sobre cenários de desastres e têm propriedades tais como comunicação robusta e resiliente, não são necessariamente infraestruturadas e principalmente oferecem comunicação de dados e não somente voz. Assim, em caso de carência de infraestrutura de comunicação, uma MANET pode atuar como uma rede de emergência. Para que a comunicação entre os nós de uma MANET possa ser realizada, é necessário que cada nó esteja configurado com endereço único. Devido à capacidade dos nós de se auto-organizarem criando topologias temporárias e arbitrárias, a alocação de endereços deve seja feita de forma automática. Muitos trabalhos têm surgido tratando da alocação de endereços em MANETs, porém a maioria das soluções apresenta uma série de limitações relacionadas principalmente à aplicabilidade em cenários restritos e introdução de elevado tráfego de controle na rede. Neste contexto, este trabalho apresenta uma nova solução de alocação de endereços que atribui endereços únicos aos nós em redes de emergência. Resultados mostraram que a solução proposta se mostrou eficiente em cenários críticos em comparação com outros protocolos analisados, apresentando baixa latência na obtenção de endereço e tráfego de controle reduzido na rede.
73

O tratamento na interação: formas e fórmulas usadas no estabelecimento e encerramento de contato em e-mails de lingua alemã e de língua portuguesa / Forms of address in interaction: forms and formulas used in the establishment and closure of contact emails in German and Portuguese

Juliana Granço Marcelino de Moraes 30 September 2011 (has links)
Na presente pesquisa faz-se um estudo sobre o tratamento na interação, considerando que o tratamento não se limita apenas às formas pronominais e nominais, mas faz parte de um ritual da interação. Entende-se que ele está presente durante toda a interação, de forma mais marcada no estabelecimento e encerramento do contato e, como faz parte de um ritual lingüístico, a escolha do tratamento dispensado ao interlocutor é culturalmente marcada e segue padrões sociais de comportamento. Para adequar-se às diferentes situações comunicativas, os locutores utilizam formas de tratamento (pronominais e nominais) e fórmulas que os auxiliem na abordagem do outro. As fórmulas usadas no tratamento fazem parte das chamadas fórmulas de rotina e fórmulas discursivas, as quais foram analisadas, neste trabalho, de maneira contrastiva entre a língua alemã e a língua portuguesa, em e-mails de ambas as línguas. / This research focuses on forms of address in verbal interaction considering that they are not limited to pronouns or nouns, but should be seen as a central piece in the interaction ritual. They are present throughout interaction, more clearly at the moments when contact begins and ends, and, since they are part of a linguistic ritual, the choice of the form used to address the interlocutor is culturally marked and follows social patterns of behavior. In order to fit different communicative situations, speakers use forms of address (both nouns and pronouns) and formulas that help them to approach the hearer. The formulas used in address are known as routine and discoursive formulas, both of which are analyzed in this research in a contrast between German and Portuguese, using e-mails written in both languages.
74

Centralized and distributed address correlated network coding protocols / Optimisation et application du codage réseau dans l'architecture des futurs réseaux sans fils

Abdul-Nabi, Samih 28 September 2015 (has links)
Le codage de reseau (CR) est une nouvelle technique reposant, sur la realisation par les noeuds du reseau, des fonctions de codage et de decodage des donnees afin d’ameliorerle debit et reduire les retards. En utilisant des algorithmes algebriques, le codage consiste àcombiner ensemble les paquets transmis et le decodage consiste à restaurer ces paquets. Cette operation permet de reduire le nombre total de transmissions de paquets pour echanger les donnees, mais requiere des traitements additionnels au niveau des noeuds. Le codage de reseau peut etre applique au niveau de differentes couches ISO.Toutefois dans ce travail, sa mise en noeuvre est effectuee au niveau de la couche reseau. Dans ce travail de thèse, nous presentons des techniques de codage de reseau s’appuyantsur de nouveaux protocoles permettant d’optimiser l’utilisation de la bande passante,D’ameliorer la qualite de service et de reduire l’impact de la perte de paquets dans les reseaux a pertes. Plusieurs defis ont ete releves notamment concernant les fonctions de codage/decodage et tous les mecanismes connexes utilises pour livrer les paquets echanges entre les noeuds. Des questions comme le cycle de vie des paquets dans le reseau, lacardinalite des messages codes, le nombre total d’octets transmis et la duree du temps de maintien des paquets ont ete adressees analytiquement, en s’appuyant sur des theoremes, qui ont ete ensuite confirmes par des simulations. Dans les reseaux a pertes, les methodes utilisees pour etudier precisement le comportement du reseau conduisent a la proposition de nouveaux mecanismes pour surmonter cette perte et reduire la charge.Dans la premiere partie de la these, un etat de l’art des techniques de codage de reseauxest presente a partir des travaux de Alshwede et al. Les differentes techniques sont detaillees mettant l’accent sur les codages lineaires et binaires. Ces techniques sont decrites en s’appuyant sur differents scenarios pour aider a comprendre les avantages etles inconvenients de chacune d’elles. Dans la deuxieme partie, un nouveau protocole base sur la correlation des adresses (ACNC) est presente, et deux approches utilisant ce protocole sont introduites ; l’approche centralisee ou le decodage se fait aux noeuds d’extremites et l’approche distribueeou chaque noeud dans le reseau participe au decodage. Le decodage centralise est elabore en presentant d’abord ses modeles de decision et le detail du decodage aux noeuds d’extremites. La cardinalite des messages codes recus et les exigences de mise en mémoire tampon au niveau des noeuds d’extremites sont etudiees et les notions d’age et de maturite sont introduites. On montre que le decodage distribue permet de reduire la charge sur les noeuds d’extremite ainsi que la memoire tampon au niveau des noeuds intermediaires. La perte et le recouvrement avec les techniques de codage de reseau sont examines pour les deux approches proposees. Pour l’approche centralisee, deux mecanismes pour limiter l’impact de la perte sont presentes. A cet effet, le concept de fermetures et le concept dessous-ensembles couvrants sont introduits. Les recouvrements optimaux afin de trouver l’ensemble optimal de paquets a retransmettre dans le but de decoder tous les paquets reçus sont definis. Pour le decodage distribue, un nouveau mecanisme de fiabilite saut a saut est propose tirant profit du codage de reseau et permettant de recuperer les paquets perdus sans la mise en oeuvre d’un mecanisme d’acquittement. / Network coding (NC) is a new technique in which transmitted data is encoded and decoded by the nodes of the network in order to enhance throughput and reduce delays. Using algebraic algorithms, encoding at nodes accumulates various packets in one message and decoding restores these packets. NC requires fewer transmissions to transmit all the data but more processing at the nodes. NC can be applied at any of the ISO layers. However, the focus is mainly on the network layer level. In this work, we introduce novelties to the NC paradigm with the intent of building easy to implement NC protocols in order to improve bandwidth usage, enhance QoS and reduce the impact of losing packets in lossy networks. Several challenges are raised by this thesis concerning details in the coding and decoding processes and all the related mechanisms used to deliver packets between end nodes. Notably, questions like the life cycle of packets in coding environment, cardinality of coded messages, number of bytes overhead transmissions and buffering time duration are inspected, analytically counted, supported by many theorems and then verified through simulations. By studying the packet loss problem, new theorems describing the behavior of the network in that case have been proposed and novel mechanisms to overcome this loss have been provided. In the first part of the thesis, an overview of NC is conducted since triggered by the work of Alshwede et al. NC techniques are then detailed with the focus on linear and binary NC. These techniques are elaborated and embellished with examples extracted from different scenarios to further help understanding the advantages and disadvantages of each of these techniques. In the second part, a new address correlated NC (ACNC) protocol is presented and two approaches using ACNC protocol are introduced, the centralized approach where decoding is conducted at end nodes and the distributed decoding approach where each node in the network participates in the decoding process. Centralized decoding is elaborated by first presenting its decision models and the detailed decoding procedure at end nodes. Moreover, the cardinality of received coded messages and the buffering requirements at end nodes are investigated and the concepts of aging and maturity are introduced. The distributed decoding approach is presented as a solution to reduce the overhead on end nodes by distributing the decoding process and buffering requirements to intermediate nodes. Loss and recovery in NC are examined for both centralized and distributed approaches. For the centralized decoding approach, two mechanisms to limit the impact of loss are presented. To this effect, the concept of closures and covering sets are introduced and the covering set discovery is conducted on undecodable messages to find the optimized set of packets to request from the sender in order to decode all received packets. For the distributed decoding, a new hop-to-hop reliability mechanism is proposed that takes advantage of the NC itself and depicts loss without the need of an acknowledgement mechanism.
75

Automatické rozpoznávání adres elektronické pošty na webových stránkách. / Automatic recognition of e-mail addresses on the websites

Moravcová, Iva January 2011 (has links)
This work is focusing on reasons for protection of email addresses against automatic recognition, which aims to find other recipients of spam. Includes description of how this protection can be increased and these methods are evaluated in terms of level of protection and conservation addresses accessibility of websites. The part of this work is to determine the current status of the website addresses of public universities in terms of utilized methods of record. Status on these sites is investigated using application, which in addition to finding addresses, finding the method of writing on a selected sample sites. The various methods used to write addresses are evaluated on the results of the application and other recommendations for improvement are discussed.
76

ETSU Fall 2014 Commencement Address

Barton, Alison L. 01 December 2014 (has links)
No description available.
77

Using Literacy to Address Bullying in the Classroom

Sharp, L. Kathryn, Fowler, M. J. 01 December 2015 (has links)
No description available.
78

Using Literacy to Address Bullying in the Classroom

Sharp, L. Kathryn, Fowler, M. J. 01 July 2014 (has links)
No description available.
79

Le discours du MEDEF sur la relance de l’économie en France / The discourse ofthe MEDEF on the revival of French economy

Engström Dray, Eva January 2018 (has links)
In this paper we study two speeches held by the chairman of the MEDEF, Pierre Gattaz, at the opening ceremony of the Summer universities in 2016 and 2017. The event is organised by the MEDEF, the leading network of entrepreneurs in France, every summer at the end of August. It is an important event gathering key people and decision-makers from the political and economical arena from France and abroad, and thus an ideal occasion for the network to put forward its claims on necessary changements and reforms to get in place in order to improve the entrepreneurial climat in France. We conduct a discursive analysis of the two speeches to see how the economical discourse in France is pronounced by the MEDEF and what specifically characterises it. We also look at the social and  political context to see how it impacts the speeches. Another important aspect is to study the image of the speaker and how it is constructed in the two speeches by analysing the expressions, vocabulary, disposition and demeanor. We also compare the common denominators and differentiators of both speeches.
80

Analýza zdrojů nevyžádané elektronické pošty / Analysis of email spam sources

Caha, Tomáš January 2019 (has links)
The first part of this thesis deals with an approach of designing and developing of application for IP geolocation using various geolocation databases. Methods of geographical location of network devices and amount of available data provided by chosen commercial and freely accessible geolocation databases are presented. The data are summarized with focus on methods of obtaining information about IP addresses from various databases. In the paper there are also presented ways used to develop the Python application and its parts, which can be easily reused in other programs. The command line program was created to demonstrate that all parts of the developed application work properly. The whole application is freely accesible under the conditions of the MIT license, published on GitHub (https://github.com/tomas-net/ip2geotools/) and in the Python package index PyPi. The second part of this thesis deals with the description of cyberthreats and the use of developed application to mass geolocation of IP addresses that are listed in chosen freely accessible lists as sources of email spam or cyberattacks. Geographical analysis of cyberattacks sources shows countries of origin. Results of analysis are presented in graphs and maps.

Page generated in 0.0526 seconds