• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 14
  • 14
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Open-Access-Policy der TU Bergakademie Freiberg

Obst, Martina, Nagel, Stefanie 30 June 2023 (has links)
Im Sinne der Berliner Erklärung bekennt sich die TU Bergakademie Freiberg in ihrer neuen Open-Access-Policy zu den Prinzipien des offenen Zugangs zu wissenschaftlichen Ergebnissen. Sie ermuntert Ihre Angehörigen, diese Prinzipien zu unterstützen und gibt Handlungsempfehlungen. Die Policy bildet einen Baustein im Kontext von Open Science, in welchem der barrierearme, rechtssichere Umgang, die Weiterverarbeitung und Langzeitarchivierung von Forschungsdaten, Bildungsmaterialien, Software u.a. geregelt werden muss.
2

Doktoranders förhållningssätt till Open Access : En studie av epistemiska kulturers betydelse för doktoranders tankar kring vetenskaplig publicering / Postgraduates and their approach to Open Access : The significance of epistemic cultures within scholary communication

Osser, David, Wennerholm, Lena January 2013 (has links)
The aim of this bachelor-thesis is to study how postgraduates approach open access during times of change within scholarly communication. Our theoretical framework is based upon Knorr Cetinas epistemic cultures and Cullen & Chawners theory that there is a paradigmatic conflict within scholarly communication due to the fact that open access has failed to reach the same level of prominence among researchers as it has within research libraries. We interviewed six postgraduates at Malmö högskola in order to find answers to our research questions. We identified a shared epistemic culture among the postgraduates, which can be explained by the fact that being postgraduates, they all share similar experiences and values. We chose to call this epistemic culture the horizontal epistemic culture. During the interviews institution-specific cultures were expressed as well. These institution-specific cultures we chose to call the vertical epistemic cultures. Our study shows that the basic principle of the open access movement, namely to make all research freely available, has encountered difficulties when it comes to being incorporated within both the horizontal and the vertical epistemic culture. The statements of the postgraduates unanimously show that open access is viewed neither as a concept nor as a real publishing-alternative for them. We can conclude that the statements of the postgraduates show a similar conflict between the traditional publishing system and open access publishing that Cullen and Chawner identified. Research libraries should be aware of these cultures in order to be able to collaborate more efficiently with the postgraduates. / Program: Bibliotekarie
3

"Political changes and access policies in Malagasy Higher Education since independence (1960-2008)"

Hanitra, Rasoanampoizina. January 2011 (has links)
<p>The objective of this research was to investigate the relationships between the political change and the access policy changes in Madagascar since independence. In this study qualitative and quantitative data were used. The qualitative research consisted of eleven in-depth interviews and the collection of policy documents from 1960 to 2008. Open-ended questionnaires were utilized to collect data and to achieve the objectives of the research. Policy documents were analyzed to identify government policy changes. The main findings from the research showed that access policy changed with each major change in political leadership. Four major political periods and four respective main access policy changes were identified from 1960 to 2008. Higher education policy in general changed when there was a major change in presidential leadership. The main conclusions of this study were that access policy changes were the result of major changes in presidential leadership and that in spite of rhetoric to the contrary, universities did not have the autonomy to resist changes in access policy because of the top-down state system and the institutional financial dependence on the national government.</p>
4

"Political changes and access policies in Malagasy Higher Education since independence (1960-2008)"

Hanitra, Rasoanampoizina. January 2011 (has links)
<p>The objective of this research was to investigate the relationships between the political change and the access policy changes in Madagascar since independence. In this study qualitative and quantitative data were used. The qualitative research consisted of eleven in-depth interviews and the collection of policy documents from 1960 to 2008. Open-ended questionnaires were utilized to collect data and to achieve the objectives of the research. Policy documents were analyzed to identify government policy changes. The main findings from the research showed that access policy changed with each major change in political leadership. Four major political periods and four respective main access policy changes were identified from 1960 to 2008. Higher education policy in general changed when there was a major change in presidential leadership. The main conclusions of this study were that access policy changes were the result of major changes in presidential leadership and that in spite of rhetoric to the contrary, universities did not have the autonomy to resist changes in access policy because of the top-down state system and the institutional financial dependence on the national government.</p>
5

A trust-based adaptive access control model for wireless sensor networks

Maw, Htoo Aung January 2015 (has links)
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further decline in the patient's condition or can even lead to death. Therefore, the availability of data is more important than security concerns. The overwhelming priority is to take care of the patient, but the privacy and confidentiality of that patient's medical records cannot be neglected. In current healthcare applications, there are many problems concerning security policy violations such as unauthorised denial of use, unauthorised information modification and unauthorised information release of medical data in the real world environment. Current WSN access control models used the traditional Role-Based Access Control (RBAC) or cryptographic methods for data access control but the systems still need to predefine attributes, roles and policies before deployment. It is, however, difficult to determine in advance all the possible needs for access in real world applications because there may be unanticipated situations at any time. This research proceeds to study possible approaches to address the above issues and to develop a new access control model to fill the gaps in work done by the WSN research community. Firstly, the adaptive access control model is proposed and developed based on the concept of discretionary overriding to address the data availability issue. In the healthcare industry, there are many problems concerning unauthorised information release. So, we extended the adaptive access control model with a prevention and detection mechanism to detect security policy violations, and added the concept of obligation to take a course of action when a restricted access is granted or denied. However, this approach does not consider privacy of patients' information because data availability is prioritised. To address the conflict between data availability and data privacy, this research proposed the Trust-based Adaptive Access Control (TBA2C) model that integrates the concept of trust into the previous model. A simple user behaviour trust model is developed to calculate the behaviour trust value which measures the trustworthiness of the users and that is used as one of the defined thresholds to override access policy for data availability purpose, but the framework of the TBA2C model can be adapted with other trust models in the research community. The trust model can also protect data privacy because only a user who satisfies the relevant trust threshold can get restricted access in emergency and unanticipated situations. Moreover, the introduction of trust values in the enforcement of authorisation decisions can detect abnormal data access even from authorised users. Ponder2 is used to develop the TBA2C model gradually, starting from a simple access control model to the full TBA2C. In Ponder2, a Self-Managed Cell (SMC) simulates a sensor node with the TBA2C engine inside it. Additionally, to enable a full comparison with the proposed TBA2C model, the Break-The-Glass Role Based Access Control (BTGRBAC) model is redesigned and developed in the same platform (Ponder2). The proposed TBA2C model is the first to realise a flexible access control engine and to address the conflict between data availability and data privacy by combining the concepts of discretionary overriding, the user behaviour trust model, and the prevention and detection mechanism.
6

"Political changes and access policies in Malagasy Higher Education since independence (1960-2008)"

Hanitra, Rasoanampoizina January 2011 (has links)
Magister Educationis - MEd / The objective of this research was to investigate the relationships between the political change and the access policy changes in Madagascar since independence. In this study qualitative and quantitative data were used. The qualitative research consisted of eleven in-depth interviews and the collection of policy documents from 1960 to 2008. Open-ended questionnaires were utilized to collect data and to achieve the objectives of the research. Policy documents were analyzed to identify government policy changes. The main findings from the research showed that access policy changed with each major change in political leadership. Four major political periods and four respective main access policy changes were identified from 1960 to 2008. Higher education policy in general changed when there was a major change in presidential leadership. The main conclusions of this study were that access policy changes were the result of major changes in presidential leadership and that in spite of rhetoric to the contrary, universities did not have the autonomy to resist changes in access policy because of the top-down state system and the institutional financial dependence on the national government. / South Africa
7

SECURE MIDDLEWARE FOR FEDERATED NETWORK PERFORMANCE MONITORING

Kulkarni, Shweta Samir 06 August 2013 (has links)
No description available.
8

Hit and Bandwidth Optimal Caching for Wireless Data Access Networks

Akon, Mursalin January 2011 (has links)
For many data access applications, the availability of the most updated information is a fundamental and rigid requirement. In spite of many technological improvements, in wireless networks, wireless channels (or bandwidth) are the most scarce resources and hence are expensive. Data access from remote sites heavily depends on these expensive resources. Due to affordable smart mobile devices and tremendous popularity of various Internet-based services, demand for data from these mobile devices are growing very fast. In many cases, it is becoming impossible for the wireless data service providers to satisfy the demand for data using the current network infrastructures. An efficient caching scheme at the client side can soothe the problem by reducing the amount of data transferred over the wireless channels. However, an update event makes the associated cached data objects obsolete and useless for the applications. Frequencies of data update, as well as data access play essential roles in cache access and replacement policies. Intuitively, frequently accessed and infrequently updated objects should be given higher preference while preserving in the cache. However, modeling this intuition is challenging, particularly in a network environment where updates are injected by both the server and the clients, distributed all over networks. In this thesis, we strive to make three inter-related contributions. Firstly, we propose two enhanced cache access policies. The access policies ensure strong consistency of the cached data objects through proactive or reactive interactions with the data server. At the same time, these policies collect information about access and update frequencies of hosted objects to facilitate efficient deployment of the cache replacement policy. Secondly, we design a replacement policy which plays the decision maker role when there is a new object to accommodate in a fully occupied cache. The statistical information collected by the access policies enables the decision making process. This process is modeled around the idea of preserving frequently accessed but less frequently updated objects in the cache. Thirdly, we analytically show that a cache management scheme with the proposed replacement policy bundled with any of the cache access policies guarantees optimum amount of data transmission by increasing the number of effective hits in the cache system. Results from both analysis and our extensive simulations demonstrate that the proposed policies outperform the popular Least Frequently Used (LFU) policy in terms of both effective hits and bandwidth consumption. Moreover, our flexible system model makes the proposed policies equally applicable to applications for the existing 3G, as well as upcoming LTE, LTE Advanced and WiMAX wireless data access networks.
9

Hit and Bandwidth Optimal Caching for Wireless Data Access Networks

Akon, Mursalin January 2011 (has links)
For many data access applications, the availability of the most updated information is a fundamental and rigid requirement. In spite of many technological improvements, in wireless networks, wireless channels (or bandwidth) are the most scarce resources and hence are expensive. Data access from remote sites heavily depends on these expensive resources. Due to affordable smart mobile devices and tremendous popularity of various Internet-based services, demand for data from these mobile devices are growing very fast. In many cases, it is becoming impossible for the wireless data service providers to satisfy the demand for data using the current network infrastructures. An efficient caching scheme at the client side can soothe the problem by reducing the amount of data transferred over the wireless channels. However, an update event makes the associated cached data objects obsolete and useless for the applications. Frequencies of data update, as well as data access play essential roles in cache access and replacement policies. Intuitively, frequently accessed and infrequently updated objects should be given higher preference while preserving in the cache. However, modeling this intuition is challenging, particularly in a network environment where updates are injected by both the server and the clients, distributed all over networks. In this thesis, we strive to make three inter-related contributions. Firstly, we propose two enhanced cache access policies. The access policies ensure strong consistency of the cached data objects through proactive or reactive interactions with the data server. At the same time, these policies collect information about access and update frequencies of hosted objects to facilitate efficient deployment of the cache replacement policy. Secondly, we design a replacement policy which plays the decision maker role when there is a new object to accommodate in a fully occupied cache. The statistical information collected by the access policies enables the decision making process. This process is modeled around the idea of preserving frequently accessed but less frequently updated objects in the cache. Thirdly, we analytically show that a cache management scheme with the proposed replacement policy bundled with any of the cache access policies guarantees optimum amount of data transmission by increasing the number of effective hits in the cache system. Results from both analysis and our extensive simulations demonstrate that the proposed policies outperform the popular Least Frequently Used (LFU) policy in terms of both effective hits and bandwidth consumption. Moreover, our flexible system model makes the proposed policies equally applicable to applications for the existing 3G, as well as upcoming LTE, LTE Advanced and WiMAX wireless data access networks.
10

Economics of Science: Labor Markets, Journal Markets, and Policy

Staudt, Joseph M. 29 August 2016 (has links)
No description available.

Page generated in 0.0312 seconds