• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1531
  • 192
  • 128
  • 104
  • 19
  • 18
  • 9
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 3
  • Tagged with
  • 2196
  • 2196
  • 850
  • 456
  • 442
  • 283
  • 275
  • 248
  • 241
  • 221
  • 214
  • 202
  • 201
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Evaluating hardware/software partitioning and an embedded Linux port of the Virtex-II pro development system

Lin, Hsiang-Ling Jamie. January 2006 (has links) (PDF)
Thesis (M.S. in computer engineering)--Washington State University, May 2006. / Includes bibliographical references (p. 63-64).
142

Slicing and characterizing typical-case behavior for component-based embedded systems

Russell, Jeffry Thomas, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2005. / Vita. Includes bibliographical references.
143

A rule-based component parameterization technique for QoS trade-off reconfiguration /

Zhou, Jia. January 2007 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2007. / Includes vita. Includes bibliographical references (leaves 220-230)
144

Functional play : playfulness in user interfaces : this thesis is submitted to Auckland University of Technology in partial fulfillment of the degree of Master of Arts (Art and Design) in the year of 2005 by Orry Wijanarko Soegiono.

Soegiono, Orry Wijanarko. January 2005 (has links)
Thesis (MA--Art and Design) -- Auckland University of Technology.
145

Threat hunting, definition and framework

Liliengren, Theodor, Löwenadler, Paul January 2018 (has links)
Being pioneers comes with advantages and responsibility. The concept of threathunting is currently being subsidized by businesses promoting their products. Additionally,there is little or no information regarding the implementation and theeffects, which vary depending on the organization. Threat hunting needed an unbiaseddefinition in accordance with employees in IT security. Consequently, theframeworks used when assessing threat hunting had to be objective. This thesispresents a definition of threat hunting, composed using impartial opinions. Furthermore,the thesis provides unique frameworks to assist when implementing andassessing threat hunting at an organization. This thesis has several areas of application:as a knowledge base for threat hunting, as the recommended practice forimplementing threat hunting and as groundwork for a more comprehensive evaluationof threat hunting capabilities. Ultimately, the thesis offers unprecedentednonpartisan information and recommendations on threat hunting.
146

An investigation into contextual approaches to requirements capture

Jirotka, Marina January 2001 (has links)
Designing innovative computer systems is no longer simply a technical issue. There is now a growing awareness that a grounded understanding of the social and organisational context into which these systems are to be deployed, until recently overlooked, may be critical, particularly in the early phases of design. It is in these stages, known as requirements elicitation, capture or analysis, or more generally Requirements Engineering, that researchers have begun to acknowledge both social and technical concerns in the requirements for systems. This thesis aims to mediate between a detailed appreciation of the social organisation of the workplace and the technical structure of information technology. In order to do this, we explore the relevance of recent developments in the social sciences, principally ethnomethodology and interaction analysis, for providing an alternative analytic orientation for requirements capture. In particular, we outline the principal characteristics of an approach that takes into account the details of the moment-to-moment production of work activities and communicative practices. It is argued that attendance to such interactional features will improve requirements practice, and hence will ultimately lead to more sensitive designs for supporting collaborative work. To illustrate this approach, we take as an example the development of particular technologies for a complex work setting - financial trading rooms. Results of the analysis are then used to discuss requirements for systems to support trading. In particular, we consider how issues emerging from this analysis, developed from an ethnomethodological orientation, could inform requirements analysis. In this regard, we investigate approaches to modelling interactional resources, including the use of formal notations developed for sequential and communicating processes, and provide requirements analysts with sensitivities by which to consider naturalistic settings. This forms the basis for mutually dependent investigations: on the system design side, drawing on the model to allow consideration of conflicts introduced by technological choices; and on the social science side, providing an agenda for renewed investigation into the domain. We conclude by discussing the pre-requisites necessary so that approaches in this thesis could be integrated within the software development process.
147

Efficient and portable multi-tasking for heterogeneous systems

Margiolas, Christos January 2015 (has links)
Modern computing systems comprise heterogeneous designs which combine multiple and diverse architectures on a single system. These designs provide potentials for high performance under reduced power requirements but require advanced resource management and workload scheduling across the available processors. Programmability frameworks, such as OpenCL and CUDA, enable resource management and workload scheduling on heterogeneous systems. These frameworks fully assign the control of resource allocation and scheduling to the application. This design sufficiently serves the needs of dedicated application systems but introduces significant challenges for multi-tasking environments where multiple users and applications compete for access to system resources. This thesis considers these challenges and presents three major contributions that enable efficient multi-tasking on heterogeneous systems. The presented contributions are compatible with existing systems, remain portable across vendors and do not require application changes or recompilation. The first contribution of this thesis is an optimization technique that reduces host-device communication overhead for OpenCL applications. It does this without modification or recompilation of the application source code and is portable across platforms. This work enables efficiency and performance improvements for diverse application workloads found on multi-tasking systems. The second contribution is the design and implementation of a secure, user-space virtualization layer that integrates the accelerator resources of a system with the standard multi-tasking and user-space virtualization facilities of the commodity Linux OS. It enables fine-grained sharing of mixed-vendor accelerator resources and targets heterogeneous systems found in data center nodes and requires no modification to the OS, OpenCL or application. Lastly, the third contribution is a technique and software infrastructure that enable resource sharing control on accelerators, while supporting software managed scheduling on accelerators. The infrastructure remains transparent to existing systems and applications and requires no modifications or recompilation. In enforces fair accelerator sharing which is required for multi-tasking purposes.
148

En jämförande studie mellan Software-Defined Networking protokollen OpenFlow & OpFlex

Fahlén, Tony January 2017 (has links)
Software-Defined Networking är ett sätt att implementera ett nätverk som helt styrs från en central plats. Målet med SDN är att vara ett flexibelt nätverk som snabbt kan förändras för att klara av dagens massiva dataströmmar. För att SDN ska kunna fungera krävs det att ett protokoll används för att sköta kommunikationen mellan den centrala kontrollpunkten och nätverksutrustningen i nätverket. OpenFlow är ett sådant protokoll. OpenFlow protokollet är väl etablerat och används i många av dagens SDN-nätverk. Ett alternativ till detta är OpFlex, ett protokoll som är nytt på dagens marknad men har stöd från en mängd stora tillverkare i datavärlden. Målet med denna rapport är att jämföra dessa protokoll både teoretisk och även praktiskt via experiment i laborationsmiljö för att identifiera likheter och skillnader mellan protokollen. För att kunna jämföra dem utfördes först en omfattande litteraturstudie där information samlades in och sammanställdes om protokollen. Efter detta sattes en laborationsmiljö upp för att testa hur protokollen arbetar. Efter experimenten sammanställdes litteraturstudien och laborationsresultaten och protokollen bedömdes på olika områden. Slutligen lyftes olika situationer fram där respektive protokoll skulle lämpas att väljas över det andra. / Software-Defined Networking is a way to implement a fully-managed network from a central location. The goal of SDN is to be a flexible network that can quickly adapt to new configurations to handle today’s massive data streams. In order for SDN to work, a protocol is required to manage communication between the central control point and the network equipment within the network. OpenFlow is such a protocol, The OpenFlow protocol is very well established and used in many of today’s SDN networks. An alternative to OpenFlow is OpFlex, a protocol that is relatively new on today’s market, but has the support of many major manufacturers within networking and computers. The aim of this thesis is to compare these protocols both theoretically and practically through experiments in a laboratory environment to identify similarities and differences between these protocols. In order to be able to compare them, a comprehensive literature study was first conducted where information about the protocols was collected and compiled. After this, a laboratory environment was set up to test how the protocols work. After the experiments, the literature study and the laboratory results were compiled the protocols were assessed in different areas. Finally, different situations were raised where each protocol would be suitable to be chosen over the other.
149

Bästa praxisar i ett funktionellt och reaktivt JavaScript-ramverk på ett medelstort teknikföretag : En fallstudie

Arreström, Leopold, Magnusson, Fanny January 2020 (has links)
Exsitec AB är ett medelstort svenskt teknikföretag som nyligen börjat använda sig av ramverket NgRx för tillståndshantering i sina applikationer. Utvecklarna på Exsitec AB har upplevt att de saknar riktlinjer för hur ramverket bäst ska användas, framförallt hur de ska undvika att stora projekt som använder ramverket inte ska bli svårhanterliga. Denna fallstudie syftar till att utröna hur deras arbete med NgRx ser ut vid tiden för studien och utifrån det ta fram praxisar som gör arbetet lättare. Detta görs genom att först genomföra en intervjuserie för att förstå den nuvarande situationen och hitta problemområden. Därefter genomförs kodförståelseexperiment för att se om föreslagna lösningar kan öka kodförståelsen på Exsitec AB. Från detta tas tre praxisar fram med vilka Exsitec ABs arbete med NgRx kan underlättas.
150

Industrial Internet of Things Edge Computing : Edge Forensics

Sufiye, Shooresh January 2018 (has links)
Internet of Things (IoT) is an upcoming prominent technology which is quickly growing. Not all IoTdemands of computing resources can be satisfied by cloud, and obstacles are firmer when it comes to mobility and agility. Thus, edge computing as a suitable middleware can fill the gap between cloud and IoT devices. Refer to the latest researches, edge security is still evolving, and forensics is almost untouched. In this work, we attempt to study available technologies and materials then design and implement an edge computing application which addresses the challenge of log collection from different edge devices. The interaction between edge and cloud is in a fashion that cloud entity can perform log collection from heterogeneous edge devices belong to different owners. On the other hand, due to local computing on the logs, the edge devicecan trust cloud party. Results show that thanks to the crucial topological position of the edge devices, the concept of edge computing can easily solve similar cloud challenges.

Page generated in 0.0618 seconds