• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 8
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 44
  • 44
  • 44
  • 20
  • 13
  • 13
  • 11
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

GUI driven End to End Regression testing with Selenium

Hamberg, Christer January 2017 (has links)
Digitalization has changed our world and how we interact with different systems. Desktop applications have more and more been integrated with internet, and the web browser has become the Graphical User Interface (GUI) in today’s system solutions. A change that needs to be considered in the automated regression testing process. Using the actual GUI has over time shown to be a complicated task and is therefore often broken out as its own standalone test object. This study looked into time and quality constrains of using the GUI as driver of the regression testing of business requirements in a web based solution. By evaluating the differences in execution times of test cases between Application Programming Interface (API) calls and GUI driven testing, flakiness of test results and required modifications over time for a specific test suite. These constraints were analyzed by looking into how reliability of the test results could be achieved. With a GUI driven full end to end scope the quality in software solutions could be improved with a reduction in the number of interface issues and detected errors in deployed systems. It would also reduce the volume of test cases that needs to be executed and maintained as there are no longer standalone parts to verify separately with partially overlapping test cases. The implementation utilized Selenium WebDriver to drive the GUI and the results showed that by utilizing Selenium the test execution times were increased from approximately 2 seconds (API) to 20-75 seconds (Selenium). The flaky test results could be eliminated by applying the appropriate pattern to detect, locate, and scroll into visibility prior to interacting with the elements. In the end of the study the test execution results were 100% reliable. The navigation required 15 modifications over time to keep them running. By applying the appropriate pattern a reliable test result can be achieved in end to end regression testing where the test case is driven from the GUI, however with an increase in execution time.
22

InGriDE: um ambiente integrado e extensível de desenvolvimento para computação em grade / InGriDE: an integrated and extensible development environment for grid computing

Eduardo Leal Guerra 07 May 2007 (has links)
Recentes avanços proporcionaram às grades computacionais um bom nível de maturidade. Esses sistemas têm sido implantados em ambientes de produção de qualidade na comunidade de pesquisa acadêmica e vêm despertando um grande interesse da indústria. Entretanto, desenvolver aplicações para essas infra-estruturas heterogêneas e distribuídas ainda é uma tarefa complexa e propensa a erros. As iniciativas de facilitar essa tarefa resultaram, na maioria dos casos, em ferramentas não integradas e baseadas em características específicas de cada grade computacional. O presente trabalho tem como objetivo minimizar a dificuldade de desenvolvimento de aplicações para a grade através da construção de um ambiente integrado e extensível de desenvolvimento (IDE) para computação em grade chamado InGriDE. O InGriDE fornece um conjunto único de ferramentas compatíveis com diferentes sistemas de middleware, desenvolvidas baseadas na interface de programação Grid Application Toolkit (GAT). O conjunto de funcionalidades do InGriDE foi desenvolvido com base na plataforma Eclipse que, além de fornecer um arcabouço para construção de IDEs, facilita a extensão do conjunto inicial de funcionalidades. Para validar a nossa solução, utilizamos em nosso estudo de caso o middleware InteGrade, desenvolvido no nosso grupo de pesquisa. Os resultados obtidos nesse trabalho mostraram a viabilidade de fornecer independência de middleware para IDEs através do uso de uma interface genérica de programação como o GAT. Além disso, os benefícios obtidos com o uso do Eclipse como arcabouço para construção de IDEs indicam que os recursos fornecidos por esse tipo de arcabouço atendem de forma eficiente as necessidades inerentes ao processo de desenvolvimento de aplicações para a grade. / Computational grids have evolved considerably over the past few years. These systems have been deployed in production environments in the academic research community and have increased the interest by the industrial community. However, developing applications over heterogeneous and distributed infrastructure is still a complex and error prone process. The initiatives to facilitate this task, in the majority of the cases, resulted in isolated, middleware-specific tools. This work has the objective of minimizing the difficulty of developing grid applications through the construction of an integrated and extensible development environment for grid computing, called InGriDE. InGriDE provides a unique set of tools, compliant with different middleware systems, based on the Grid Application Toolkit (GAT). We developed the InGriDE set of features, based on the Eclipse platform, which provides both a framework for building IDEs and the possibility to extend the initial set of features. To validate our solution we used the InteGrade middleware, developed in our research group, as our case study. The results obtained from our work showed the viability of providing middleware independence to IDEs through the use of a generic application programming interface like GAT. Moreover, the benefits obtained through the use of Eclipse as our framework for building IDEs indicates that this kind of framework satisfies the requirements inherent to the grid application development process in a efficient way.
23

Multi agent system for web database processing, on data extraction from online social networks.

Abdulrahman, Ruqayya January 2012 (has links)
In recent years, there has been a ood of continuously changing information from a variety of web resources such as web databases, web sites, web services and programs. Online Social Networks (OSNs) represent such a eld where huge amounts of information are being posted online over time. Due to the nature of OSNs, which o er a productive source for qualitative and quantitative personal information, researchers from various disciplines contribute to developing methods for extracting data from OSNs. However, there is limited research which addresses extracting data automatically. To the best of the author's knowledge, there is no research which focuses on tracking the real time changes of information retrieved from OSN pro les over time and this motivated the present work. This thesis presents di erent approaches for automated Data Extraction (DE) from OSN: crawler, parser, Multi Agent System (MAS) and Application Programming Interface (API). Initially, a parser was implemented as a centralized system to traverse the OSN graph and extract the pro- le's attributes and list of friends from Myspace, the top OSN at that time, by parsing the Myspace pro les and extracting the relevant tokens from the parsed HTML source les. A Breadth First Search (BFS) algorithm was used to travel across the generated OSN friendship graph in order to select the next pro le for parsing. The approach was implemented and tested on two types of friends: top friends and all friends. In case of top friends, 500 seed pro les have been visited; 298 public pro les were parsed to get 2197 top friends pro les and 2747 friendship edges, while in case of all friends, 250 public pro les have been parsed to extract 10,196 friends' pro les and 17,223 friendship edges. This approach has two main limitations. The system is designed as a centralized system that controlled and retrieved information of each user's pro le just once. This means that the extraction process will stop if the system fails to process one of the pro les; either the seed pro le ( rst pro le to be crawled) or its friends. To overcome this problem, an Online Social Network Retrieval System (OSNRS) is proposed to decentralize the DE process from OSN through using MAS. The novelty of OSNRS is its ability to monitor pro les continuously over time. The second challenge is that the parser had to be modi ed to cope with changes in the pro les' structure. To overcome this problem, the proposed OSNRS is improved through use of an API tool to enable OSNRS agents to obtain the required elds of an OSN pro le despite modi cations in the representation of the pro le's source web pages. The experimental work shows that using API and MAS simpli es and speeds up the process of tracking a pro le's history. It also helps security personnel, parents, guardians, social workers and marketers in understanding the dynamic behaviour of OSN users. This thesis proposes solutions for web database processing on data extraction from OSNs by the use of parser and MAS and discusses the limitations and improvements. / Taibah University
24

Feeding a data warehouse with data coming from web services. A mediation approach for the DaWeS prototype / Alimenter un entrepôt de données par des données issues de services web. Une approche médiation pour le prototype DaWeS

Samuel, John 06 October 2014 (has links)
Cette thèse traite de l’établissement d’une plateforme logicielle nommée DaWeS permettant le déploiement et la gestion en ligne d’entrepôts de données alimentés par des données provenant de services web et personnalisés à destination des petites et moyennes entreprises. Ce travail s’articule autour du développement et de l’expérimentation de DaWeS. L’idée principale implémentée dans DaWeS est l’utilisation d’une approche virtuelle d’intégration de données (la médiation) en tant queprocessus ETL (extraction, transformation et chargement des données) pour les entrepôts de données gérés par DaWeS. A cette fin, un algorithme classique de réécriture de requêtes (l’algorithme inverse-rules) a été adapté et testé. Une étude théorique sur la sémantique des requêtes conjonctives et datalog exprimées avec des relations munies de limitations d’accès (correspondant aux services web) a été menée. Cette dernière permet l’obtention de bornes supérieures sur les nombres d’appels aux services web requis dans l’évaluation de telles requêtes. Des expérimentations ont été menées sur des services web réels dans trois domaines : le marketing en ligne, la gestion de projets et les services d’aide aux utilisateurs. Une première série de tests aléatoires a été effectuée pour tester le passage à l’échelle. / The role of data warehouse for business analytics cannot be undermined for any enterprise, irrespective of its size. But the growing dependence on web services has resulted in a situation where the enterprise data is managed by multiple autonomous and heterogeneous service providers. We present our approach and its associated prototype DaWeS [Samuel, 2014; Samuel and Rey, 2014; Samuel et al., 2014], a DAta warehouse fed with data coming from WEb Services to extract, transform and store enterprise data from web services and to build performance indicators from them (stored enterprise data) hiding from the end users the heterogeneity of the numerous underlying web services. Its ETL process is grounded on a mediation approach usually used in data integration. This enables DaWeS (i) to be fully configurable in a declarative manner only (XML, XSLT, SQL, datalog) and (ii) to make part of the warehouse schema dynamic so it can be easily updated. (i) and (ii) allow DaWeS managers to shift from development to administration when they want to connect to new web services or to update the APIs (Application programming interfaces) of already connected ones. The aim is to make DaWeS scalable and adaptable to smoothly face the ever-changing and growing web services offer. We point out the fact that this also enables DaWeS to be used with the vast majority of actual web service interfaces defined with basic technologies only (HTTP, REST, XML and JSON) and not with more advanced standards (WSDL, WADL, hRESTS or SAWSDL) since these more advanced standards are not widely used yet to describe real web services. In terms of applications, the aim is to allow a DaWeS administrator to provide to small and medium companies a service to store and query their business data coming from their usage of third-party services, without having to manage their own warehouse. In particular, DaWeS enables the easy design (as SQL Queries) of personalized performance indicators. We present in detail this mediation approach for ETL and the architecture of DaWeS. Besides its industrial purpose, working on building DaWeS brought forth further scientific challenges like the need for optimizing the number of web service API operation calls or handling incomplete information. We propose a bound on the number of calls to web services. This bound is a tool to compare future optimization techniques. We also present a heuristics to handle incomplete information.
25

Biblioteca, API e IDE para o desenvolvimento de projetos de metodologias de Ressonância Magnética / Library, API and IDE for the development of Magnetic Resonance methodologies

Pizetta, Daniel Cosmo 20 February 2014 (has links)
Neste trabalho serão discutidas novas ferramentas para a construção de um espectrômetro de Ressonância Magnética (RM) totalmente digital. A motivação parte das dificuldades encontradas pelos pesquisadores no momento de programar um equipamento de RM, incluindo a falta de ferramentas para desenvolvimento de metodologias, as quais não são oferecidas pelos softwares atuais. Em particular tratamos do desenvolvimento de uma biblioteca, a PyMR (Python Magnetic Resonance), de uma API (Application Program Interface) e de um IDE (Integrated Development Environment). Nesta estrutura, a biblioteca PyMR é o front-end para programação e setup dos equipamentos de RM enquanto a API constitui o back-end. O IDE, por sua vez, é uma ferramenta de auxílio especializado para criação e gerenciamento das metodologias e protocolos de RM de forma funcional e amigável. O desenvolvimento baseado no estado-da-arte das tecnologias de Computação e Ressonância Magnética garante a qualidade, robustez, adaptabilidade e ainda assim, a simplicidade para uso dos menos experientes. Para a validação do sistema, além de métricas de software, foi montada uma sequência de pulsos conhecida como CPMG (Carr-Purcell-Meiboom-Gill) executada no espectrômetro local sobre uma amostra de CuSO4 em solução, o qual mostrou valores de T2 compatíveis com os valores esperados. Os resultados do novo sistema mostram sua capacidade de atender as principais exigências dos usuários e desenvolvedores de metodologias de RM, oferecendo um amplo conjunto de ferramentas. Em suma, este projeto provê a estrutura básica e funcional de uma nova forma de se programar e utilizar equipamentos de RM, gerando um poderoso instrumento para a pesquisa na área. / In this study we discuss new tools for the building of a fully digital Magnetic Resonance (MR) spectrometer. The research was motivated by several difficulties experienced by researchers in programming MR machines, which include the lack of tools for the development of methodologies that are not currently offered by companies. In particular, we treat the development of a library, PyMR (Python Magnetic Resonance), an API (Application Program Interface) and an IDE (Integrated Development Environment). In this structure, the PyMR library acts as a front-end for MR equipment programming and setup while the API is a back-end. Finally, the IDE is a user-friendly tool that helps the developer to create and manage methodologies and protocols. The state-of-the-art of Computer Sciences and Magnetic Resonance technologies adopted here has ensured the quality, robustness and adaptability keeping simplicity for non-experienced users. For the validation of the system, besides software metrics, a pulse sequence known as CPMG (Carr-Purcell-Meiboom-Gill) was assembled and performed on an onsite spectrometer, using a solution of CuSO4 as a sample, which exhibited compatible T2 values. The results show that the system can meet the main requirements of both users and developers and offer a large set of tools. This project provides a basic and functional structure of a new way to program and use the MR equipment and a powerful tool for researchers in this area.
26

De briques et de blocs. La fonction éditoriale des interfaces de programmation (api) web : entre science combinatoire et industrie du texte / Of Bits and Blocks. The publishing function of web Application Programming Interfaces (APIs) : from a combinatorial science to an industry of text-processing

Goyet, Samuel 22 November 2017 (has links)
Boutons « J’aime », tweets ancrés… Toutes ces formes sont générées par des interfaces de programmation ou API, outils d’écriture informatique qui ont integré la chaîne de production des textes de réseau contemporains. Cette thèse interroge la fonction éditoriale des API, soit leur rôle dans la production, la standardisation et la circulation des « petites formes » des textes de réseau. Avec comme corpus les API de Facebook et de Twitter ainsi que les petites formes qu’elles permettent de produire, notre analyse techno-sémiotique s’articule en cinq chapitres. Le premier est une généalogie des API du point de vue de l’écriture combinatoire. Nous montrons que cette conception de l’écriture est un trait saillant de la programmation et de l’informatique. Le second chapitre interroge les imaginaires de l’écriture informatique, entre chiffre, combinatoire et méthode scientifique universelle. Le troisième chapitre est une analyse des conséquences sémiotiques de cet universalisme combinatoire, où nous montrons que les API proposent une conception du texte comme ensemble abstrait de blocs combinables. Abstraction du texte qui sert une « économie des passages », objet de notre quatrième chapitre, dans laquelle les API sont des lieux d’industrialisation d’une « pratique lettrée » : elles établissent des critères de lisibilité et de reproductibilité du texte. Parmi ces critères, nous notons une invisibilisation du rôle pourtant fondamental du calcul informatique. Nous proposons donc, dans un cinquième chapitre, des pistes pour développer une sémiotique qui prenne en compte le calcul comme mode d’expression propre aux médias numériques. / « Like » buttons, embedded tweets… All of these visual forms are produced by Application Programming Interfaces (APIs). APIs are digital writing tools which have become part of the publishing process of contemporary web pages. This thesis aims at understanding the « publishing function » of APIs : their role in the production, standardization and circulation of the « little forms » of online texts. Focused on Facebook’s and Twitter’s APIs, our work is divided into five chapters. The first one is a genealogy of the APIs, starting from their combinatorial aspect, a conception of writing which trace back to early programming and the invention of computer science. The second chapter is an inquiry about the imaginaries of calculus as a kind of writing, torn between the imaginary of numbers, of combinatorics and the search for a universal scientific method. The third chapter is a study of the semiotic consequences of this combinatorial universalism. We show how APIs are based on an idea of text as an abstract, modular object. This abstraction of the text is beneficial to an « economy of passages ». In this economy where circulation produce value, APIs are a place of « literate practices » (chapter four). They establish visual standards for the readability, production and circulation of online texts. Among these standards, there’s a systematic invizibilisation of the action of machines, although calculus is a necessary part of the production of digital texts. Therefore, in the fifth chapter, we give some epistemological elements towards non-anthropocentric semiotics, meaning : semiotics which would take into account computational machines as a part of the utterance of digital texts.
27

Coleta de dados em redes sociais: privacidade de dados pessoais no acesso via Application Programming Interface / Collection of data from social networks: privacy of personal data through access of the Application Programming Interface / Colecta de datos en redes sociales: privacidad de datos personales en el acceso vía Application Programming Interface

Rodrigues, Fernando de Assis [UNESP] 03 March 2017 (has links)
Submitted by Fernando de Assis Rodrigues (fernando@elleth.org) on 2017-03-08T18:31:59Z No. of bitstreams: 79 final.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) 1.png: 295336 bytes, checksum: 459beda12600ba335b293bc6ab407543 (MD5) 2.png: 4275028 bytes, checksum: 61d7e2aeba17cbb6bc721cd955357559 (MD5) 3.png: 4278867 bytes, checksum: 78190c57f8aa4cae32be9ff4e3c2b8b9 (MD5) 4.png: 3413913 bytes, checksum: d98179cd8a1720ec3a2ffe941f2617e0 (MD5) 5.png: 2572352 bytes, checksum: 094e37b003e0099dd78a1ec54ed78cdd (MD5) 6.png: 36209 bytes, checksum: 9e5d19706c8131e6c8d169b779114605 (MD5) 7.png: 13916308 bytes, checksum: 23c1db3f0340ac1e79a86f73bf8b64d9 (MD5) 8.png: 10016221 bytes, checksum: eae1e977ef51ebdf0f46990ee85f830a (MD5) 10.png: 4823750 bytes, checksum: fddce1fe56bc6e50d5aefc7d88a5599b (MD5) 11.png: 15076 bytes, checksum: 8f025ab18b9c12128f26be839fb7e7c6 (MD5) 12.png: 2034468 bytes, checksum: 73296cbf213f9e58b0e812bb82d65854 (MD5) 13.png: 2124812 bytes, checksum: 84a03f6e7edfd66fa4bdd6ede8f8d5e9 (MD5) 14.png: 2198512 bytes, checksum: dfec659b294b885f1d853c6a475a8fee (MD5) 15.png: 2053157 bytes, checksum: 0feab30e0c892b45939f17644d3000cf (MD5) 16.png: 70960 bytes, checksum: a675706ca5e284a01544b772aa354c35 (MD5) 17.png: 501763 bytes, checksum: 9f41bb83cac460cc7aeb618a3b81c623 (MD5) 18.png: 30898 bytes, checksum: 4cad6424be9272a63ad826682ac2cedc (MD5) 19.png: 227247 bytes, checksum: 1df7ea50df51d979d740bd21a78f7192 (MD5) 20.png: 176546 bytes, checksum: 29eca9e49b3ec71fa6438ffa2a90665f (MD5) 21.png: 171097 bytes, checksum: 20e944c37814c57bdb330bcca624142f (MD5) 22.png: 64778 bytes, checksum: eb66e18acd5f0942a332e7ad57b3a475 (MD5) 23.png: 911367 bytes, checksum: f733bd8baeffd584a71cc153e87f3fc0 (MD5) 24.png: 443014 bytes, checksum: dad199a0357cf118c1e834e32f29a656 (MD5) 25.png: 133262 bytes, checksum: d9a29c70f3e1bfaa17682dc06d7a94a8 (MD5) 26.png: 97345 bytes, checksum: 7c4f87d60bfddef584a1e31929b125e3 (MD5) 27.png: 121518 bytes, checksum: b648bdf82f061549b8615a276c35e86b (MD5) 28.png: 3907801 bytes, checksum: bce8b22ee075dd30de8903a89a482a44 (MD5) 29.png: 110594 bytes, checksum: 98d4617ddfc62e5186b2ea50750e145f (MD5) 30.png: 65675 bytes, checksum: d6d0ec7e29b63b3d8f3bbf93b33fe392 (MD5) 31.png: 77259 bytes, checksum: 7c650862e389ee010ebf227394b78ae5 (MD5) 32.png: 224392 bytes, checksum: 0f153cc54827e1e125950ba15a93a064 (MD5) 33.compressao.png: 2342753 bytes, checksum: 243f5209f09cf7b998f6a5e579e4b289 (MD5) 34.png: 13209736 bytes, checksum: a3fca0c436e0167e5292cb47683263c6 (MD5) 35.png: 331900 bytes, checksum: 230d44f9fbbd1d1f1b8e16ef4a90bef4 (MD5) 36.png: 7795486 bytes, checksum: ff219f75dea53645c3c8c506aee4f92c (MD5) 37.png: 53430944 bytes, checksum: 497a9784729f29b143815938b3d4d6dd (MD5) 38.png: 5733799 bytes, checksum: 665d395bae6b16fe105fde18c13bfad8 (MD5) 39.png: 219532 bytes, checksum: 5827b2cc4fdf0f8a4bf716aec8a1c5fa (MD5) 40.png: 127177 bytes, checksum: e152cddfffc9c805a89e5e50b8a1817c (MD5) 41.png: 1124665 bytes, checksum: 29d9fd8d9ee671f2b00643f986ed4ee6 (MD5) 42.png: 2383771 bytes, checksum: 3bf368dce4ef03e41b1b9b321ebf5d6b (MD5) 43.png: 2048283 bytes, checksum: d8c1afc1ff4926f26f87d6da2c340189 (MD5) 44.compressao.png: 4545708 bytes, checksum: 1a244e7d2a77739f25582a39ee0dca43 (MD5) 1.png: 91444 bytes, checksum: 97a9b0c6327395ecf131b7f08f852afe (MD5) 2.png: 93204 bytes, checksum: c4f43e7beace7624decc69d5c0bbd763 (MD5) 3.png: 136229 bytes, checksum: decbc71a5c674b502a19bb7ec3a4af39 (MD5) 4.png: 51275 bytes, checksum: 3fd73b126e99f2b7dd130af0bb44bdf2 (MD5) 5.png: 55362 bytes, checksum: 25c62c2e04a6487ff397321ace683cfe (MD5) 6.png: 30359 bytes, checksum: e5a89fc989ad68634201c273405d87cd (MD5) 1.ods: 14748 bytes, checksum: 5c53786fb4f59d40cfc67e265b3ccdbb (MD5) 2.ods: 12277 bytes, checksum: 85d3262eda8d0d19f2b9e68ca6a2ff60 (MD5) 3.ods: 29902 bytes, checksum: 21dce0898e77df8191be437bcf168491 (MD5) 4.ods: 26020 bytes, checksum: 75044d4b95e66473d1c38e29e2c1ddd9 (MD5) 5.ods: 25161 bytes, checksum: 64743c83195cdf34938b5e3142210535 (MD5) 6.ods: 23147 bytes, checksum: 67873780574e4a0c15048d1c18e8092c (MD5) 7.ods: 24872 bytes, checksum: 58b0b7758825e8bc80ec319f90cb30ed (MD5) 8.ods: 23642 bytes, checksum: 7e718def249e8b5c1ba5298d3e6101ae (MD5) 9.ods: 14540 bytes, checksum: b0af9d51d96c085aca53e416c8dc06e6 (MD5) 10.ods: 21679 bytes, checksum: eb531d5e51df06f11e0ae669a881e85f (MD5) 11.ods: 19560 bytes, checksum: 71de1352ca73f10c2cf6d738cd1cec4d (MD5) 12.ods: 14605 bytes, checksum: 31b8d0e606a2af909074980cd9a4a9c1 (MD5) 13.ods: 14233 bytes, checksum: a92806c87118d17b424acccb1f049816 (MD5) 14.ods: 17135 bytes, checksum: ba4d33d3045b7031dad15157a31d90be (MD5) 15.ods: 14245 bytes, checksum: 0a1b4b52bad09fc2dcf67639b1b6ba5b (MD5) 16.ods: 15790 bytes, checksum: 8cf6f938d822bb16cc84be8a422fc1c2 (MD5) 17.ods: 16843 bytes, checksum: c497070bd4d369d226a70c9e5d74c77e (MD5) 18.ods: 25388 bytes, checksum: b1871bedff625da6193de7545d19c4e7 (MD5) 19.ods: 67252 bytes, checksum: 8ebaf944dcae9d220b845680ca31188f (MD5) 20.ods: 27473 bytes, checksum: 923c1755f09c370ccb30729f2710f714 (MD5) 21.ods: 31513 bytes, checksum: 7d25175b6369b25e8b1dab068e610ba7 (MD5) 22.ods: 27301 bytes, checksum: 1064d84b82091b5f6d43cfc17b1d4636 (MD5) 23.ods: 38229 bytes, checksum: 290c7fe1ccbd28e18b5722899702bfed (MD5) 24.ods: 48098 bytes, checksum: 620ed74459343bc06f7eb6ed0d7679ec (MD5) 25.ods: 24148 bytes, checksum: 3cd42fc255ecea838588e3aae8dc19c4 (MD5) 26.ods: 26550 bytes, checksum: 4b6997336ee92c6def97e4909e858b7c (MD5) 27.ods: 27015 bytes, checksum: a20630e9c67be416d0e99f8fcbfe2384 (MD5) 28.ods: 20340 bytes, checksum: ce513515d2d38bb74a6234d7b748ab26 (MD5) 29.ods: 25812 bytes, checksum: 8f94b034213b8a281a25c1bc26e1e543 (MD5) / Rejected by LUIZA DE MENEZES ROMANETTO (luizamenezes@reitoria.unesp.br), reason: Solicitamos que realize uma nova submissão seguindo as orientações abaixo: Foram submetidos 79 arquivos, apenas 1 arquivo deve ser submetido em formato PDF. O arquivo PDF não deve estar protegido e a dissertação/tese deve estar em um único arquivo, inclusive os apêndices e anexos, se houver. Corrija estas informações e realize uma nova submissão contendo o arquivo correto. Agradecemos a compreensão. on 2017-03-13T17:21:20Z (GMT) / Submitted by Fernando de Assis Rodrigues (fernando@elleth.org) on 2017-03-14T01:09:45Z No. of bitstreams: 1 final.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) / Approved for entry into archive by LUIZA DE MENEZES ROMANETTO (luizamenezes@reitoria.unesp.br) on 2017-03-17T19:30:40Z (GMT) No. of bitstreams: 1 rodrigues_fa_dr_mar.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) / Made available in DSpace on 2017-03-17T19:30:40Z (GMT). No. of bitstreams: 1 rodrigues_fa_dr_mar.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) Previous issue date: 2017-03-03 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / O desenvolvimento das redes sociais é tema de estudos de várias áreas do conhecimento, e com o aumento do uso da Internet em atividades profissionais e de entretenimento, surgiram as redes sociais online: serviços com o intuito de proporcionar uma interface de relacionamento entre indivíduos. Algumas destas redes possuem milhões de usuários, que consentiram acordo aos Termos de Uso. Os Termos de Uso destes serviços contém a delimitação dos processos de coleta de dados por agentes externos, criando um efeito em cascata de identificação do usuário, e pode potencializar atividades prejudiciais à privacidade. O estudo procura verificar se processos sistematizados de coleta de dados sobre documentos que contém características das interfaces de coleta das Application Programming Interfaces (APIs), e os Termos de Uso podem auxiliar a identificação de atividades potencialmente prejudiciais à privacidade dos usuários (referenciados) e revelar pré-requisitos de conhecimentos sobre as tecnologias envolvidas neste processo, conceitos prévios à identificação das características, e áreas profissionais envolvidas no entendimento das informações sobre tecnologias voltadas às APIs e condições dos Termos de Uso. O objetivo é propor um modelo de dados orientado a análise sobre questões de privacidade de dados pessoais, a partir da identificação das características da coleta de dados de referenciados via API, para auxiliar na identificação de potenciais ações e atividades prejudiciais à privacidade, realizadas na coleta de dados. O universo de pesquisa está delimitado aos serviços disponíveis na Internet que utilizam APIs como interfaces de interoperabilidade de seus conteúdos, e a amostra foi definida em três APIs: do Facebook, do Twitter e do LinkedIn. A metodologia adotada é a análise exploratória, de caráter qualitativo, com métodos combinados a partir da exploração das características técnicas das APIs e da leitura dos documentos disponíveis, sendo segmentada pelas perspectivas: Áreas Profissionais envolvidas, Tecnologias de Coleta e Pré-requisitos de Conhecimento. Para realização, propõe-se três ciclos: o primeiro, com a identificação das características das estruturas de coletas de dados e das funcionalidades apresentadas pelas APIs; o segundo ciclo propõe uma modelagem de dados, a partir da coleta das características das estruturas existentes (Modelagem Direta), e; o terceiro ciclo, uma Modelagem de Segunda Ordem, com informações específicas sobre a privacidade de dados de referenciados para a análise de aspectos de privacidade de dados compartilhados a terceiros. Ao final, apresenta uma lista de critérios para o acompanhamento e a avaliação das informações dos documentos de referência e Termos de Uso das redes sociais, como forma de identificar possíveis relações entre a ausência de dados. Nas considerações, sustentamos que este ambiente é complexo e ofuscado aos referenciados, porém o modelo de dados e os instrumentos elaborados podem auxiliar a minimizar a complexidade dos documentos de referência sobre a interoperabilidade de conjuntos de dados a agentes externos e no entendimento dos Termos de Uso. / The development of social networks is a topic of study for several areas, and with the increased use of the Internet in professional and leisure activities, online social networks have emerged: services with the goal of providing an interface between individuals. Some of these networks have millions of users, who agree and give their consente to the Terms of Use. The Terms of Use of these services contain the delimitation of the processes of data collection by external agents, creating a cascading effect of user identification and can enhance activities which are detrimental to user privacy. This study looks to verify if the systematic data collection processes for documents which contain characteristics of the Application Programming Interfaces (APIs) data collection and the Terms of Use can help in identifying activities potentially harmful to user privacy (referenced) and reveal prerequisites of knowledge about the technology involved in this process, concepts prior to identifying characteristics and professional areas involved in understanding the technology of the API and the Terms of Use. The objective is to propose an analysis based data model on personal privacy data issues, from the identification of the characteristics of the collection of data from the referenced API to assisting in identifying potential actions and activities which are detrimental to privacy obtained through the data collection process. The research universe is limited to the services available on the Internet that use APIs as interoperability interfaces of their content and the sample was defined in three APIs: from Facebook, Twitter and LinkedIn. The methodology adopted was exploratory analysis, in qualitative form, with combined methods based on the exploitation of the technical characteristics of APIs and the reading of available documents, being segmented by the perspectives: professional areas involved, collection technology and knowledge prerequisites. To conduct this study, three cycles are proposed: first, with the identification of the characteristics of the structure of data collection and the functionalities presented by the APIs; second, propose a model of the data from the collection of the characteristics of existing structures (Direct Model); and third, a model of Second Order, with specific information about referenced data privacy for the analysis of data privacy aspects to share with third parties. In the end, present a list of criteria for the monitoring and evaluation of the information of referenced documents and the Terms of Use of social networks, as a way of identifying possible relationships between the absence of data. In the considerations, we maintain the idea that this environment is complex and obfuscated to those referenced, but the data model and the instruments developed can help to minimize the complexity of referenced documents about the interoperability of datasets to external agents and understanding the Terms of Use. / El desarrollo de las redes sociales es tema de estudio de varias áreas del conocimiento, y con el aumento del uso de la Internet en actividades profesionales y de entretenimiento, surgieron las redes sociales en línea: servicios con el fin de proporcionar una interface de relacionamiento entre individuos. Algunas de estas redes poseen millones de usuarios, los cuales dieron su consentimiento al acuerdo de los Términos de Uso. Los Términos de estos servicios engloban la delimitación de los procesos de colecta de datos por agentes externos, creando un efecto en cascada de identificación del usuario, y puede potencializar actividades perjudiciales para la privacidad. El estudio pretende verificar si procesos sistematizados de colecta de datos sobre documentos que contienen características de las interfaces de colecta de las Application Programming Interfaces (APIs), y los Términos de Uso, pueden auxiliar en la identificación de actividades potencialmente perjudiciales para la privacidad de los usuarios (referenciados) y revelar prerrequisitos de conocimientos sobre las tecnologías involucradas en este proceso, conceptos previos a la identificación de las características, y áreas profesionales que participan en el entendimiento de las informaciones sobre tecnologías direccionadas a las APIs y condiciones de los Términos e Uso. El objetivo es proponer un modelo de datos orientado al análisis sobre cuestiones de privacidad de datos personales, a partir de la identificación de las características de la colecta de datos referenciados vía API, para auxiliar en la identificación de potenciales acciones y actividades perjudiciales para la privacidad, realizadas en la colecta de datos. El universo de pesquisa está delimitado a los servicios disponibles en la Internet que utilizan APIs como interfaces de interoperabilidad de sus contenidos, y la muestra fue definida en tres APIs: de Facebook, de Twitter y de LinkedIn. La metodología adoptada es un análisis exploratorio, de carácter cualitativo, con métodos combinados a partir de la exploración de las características técnicas de las APIs y de la lectura de los documentos disponibles, siendo segmentada por las perspectivas: Áreas Profesionales involucradas, Tecnologías de Colecta y Prerrequisitos de Conocimiento. Para la realización, se proponen tres ciclos: i. con la identificación de las características de las estructuras de colectas de datos y de las funcionalidades presentadas por las APIs; ii. ciclo, propone un modelaje de datos, a partir de la colecta de las características de las estructuras existentes (Modelaje Directo), y; iii. ciclo, un Modelaje de Segundo Orden, con informaciones específicas sobre la privacidad de los datos de referenciados para el análisis de aspectos de privacidad de datos compartidos con terceros. Finalmente, presenta una lista de criterios para el acompañamiento y la evaluación de las informaciones de los documentos de referencia y Términos de Uso de las redes sociales, como forma de identificar posibles relaciones entre la ausencia de datos. En las consideraciones, sustentamos que este ambiente es complejo y confuso para los referenciados, no obstante el modelo de datos y los instrumentos elaborados pueden contribuir a minimizar la complejidad de los documentos de referencia sobre la interoperabilidad de conjuntos de datos a agentes externos y en el entendimiento de los Términos de Uso.
28

Carrier Grade Adaptation for an IP-based Multimodal Application Server: Moving the SoftBridge into SLEE

Sun, Tao January 2004 (has links)
<p>Providing carrier grade characteristics for Internet Protocol (IP) communication applications is a significant problem for IP application providers in order to offer integrated services that span IP&nbsp / and telecommunication networks. This thesis addresses the provision of life-cycle management, which is only one carrier grade characteristic, for a SoftBridge application, which is an example of IP communication applications. A SoftBridge provides semi-synchronous multi-modal IP-based communication. The work related to IP-Telecommunication integrated services and the SoftBridge is analyzed with respect to life-cycle management in a literature review. It is suggested to use an Application Server in a Next Generation Network (NGN) to provide life-cyclemanagement functionality for IP-Telecommunication applications. In this thesis, the Application Server is represented by a JAIN Service Logic Execution Environment(JSLEE), in which&nbsp / a SoftBridge application can be deployed, activated, deactivated, uninstalled and upgraded online.Two methodologies are applied in this research: exploratory prototyping, which evolves the development of a SoftBridge application, and empirical comparison, which is concerned with the empirical evaluation of a SoftBridge application in terms of carriergrade capabilities. A SoftBridge application called SIMBA&nbsp / provides a Deaf Telephony service similar to aprevious Deaf Telephony SoftBridge, However, SIMBA&rsquo / s SoftBridge design and implementation are unique to this thesis. In order to test the life-cycle&nbsp / management ability of SIMBA, an empirical evaluation is carried out including the experiments oflife-cycle management and call-processing performance. The final experimental results of the evaluation show that a JSLEE is able to provide life-cycle management for SIMBA without causing a significant decrease in performance. In conclusion, the life-cycle management can be provided&nbsp / or a SoftBridge application by using an Application Server such as a JSLEE. Futhermore, the results indicate that&nbsp / approach of using Application Server (JSLEE) integration should be&nbsp / sufficiently general to provide life cycle management, and indeed other carrier grade capabilities, for other IP communication applications. This allows IP communication applications to be&nbsp / &nbsp / &nbsp / integrated into an NGN.</p>
29

Carrier Grade Adaptation for an IP-based Multimodal Application Server: Moving the SoftBridge into SLEE

Sun, Tao January 2004 (has links)
<p>Providing carrier grade characteristics for Internet Protocol (IP) communication applications is a significant problem for IP application providers in order to offer integrated services that span IP&nbsp / and telecommunication networks. This thesis addresses the provision of life-cycle management, which is only one carrier grade characteristic, for a SoftBridge application, which is an example of IP communication applications. A SoftBridge provides semi-synchronous multi-modal IP-based communication. The work related to IP-Telecommunication integrated services and the SoftBridge is analyzed with respect to life-cycle management in a literature review. It is suggested to use an Application Server in a Next Generation Network (NGN) to provide life-cyclemanagement functionality for IP-Telecommunication applications. In this thesis, the Application Server is represented by a JAIN Service Logic Execution Environment(JSLEE), in which&nbsp / a SoftBridge application can be deployed, activated, deactivated, uninstalled and upgraded online.Two methodologies are applied in this research: exploratory prototyping, which evolves the development of a SoftBridge application, and empirical comparison, which is concerned with the empirical evaluation of a SoftBridge application in terms of carriergrade capabilities. A SoftBridge application called SIMBA&nbsp / provides a Deaf Telephony service similar to aprevious Deaf Telephony SoftBridge, However, SIMBA&rsquo / s SoftBridge design and implementation are unique to this thesis. In order to test the life-cycle&nbsp / management ability of SIMBA, an empirical evaluation is carried out including the experiments oflife-cycle management and call-processing performance. The final experimental results of the evaluation show that a JSLEE is able to provide life-cycle management for SIMBA without causing a significant decrease in performance. In conclusion, the life-cycle management can be provided&nbsp / or a SoftBridge application by using an Application Server such as a JSLEE. Futhermore, the results indicate that&nbsp / approach of using Application Server (JSLEE) integration should be&nbsp / sufficiently general to provide life cycle management, and indeed other carrier grade capabilities, for other IP communication applications. This allows IP communication applications to be&nbsp / &nbsp / &nbsp / integrated into an NGN.</p>
30

Carrier grade adaptation for an IP-based multimodal application server: moving the softbridge into SLEE

Sun, Tao January 2004 (has links)
Magister Scientiae - MSc / Providing carrier grade characteristics for Internet Protocol (IP) communication applications is a significant problem for IP application providers in order to offer integrated services that span IP and telecommunication networks. This thesis addresses the provision of life-cycle management, which is only one carrier grade characteristic, for a SoftBridge application, which is an example of IP communication applications. A SoftBridge provides semi-synchronous multi-modal IP-based communication. The work related to IP-Telecommunication integrated services and the SoftBridge is analyzed with respect to life-cycle management in a literature review. It is suggested to use an Application Server in a Next Generation Network (NGN) to provide life-cyclemanagement functionality for IP-Telecommunication applications. In this thesis, the Application Server is represented by a JAIN Service Logic Execution Environment(JSLEE), in which a SoftBridge application can be deployed, activated, deactivated, uninstalled and upgraded online.Two methodologies are applied in this research: exploratory prototyping, which evolves the development of a SoftBridge application, and empirical comparison, which is concerned with the empirical evaluation of a SoftBridge application in terms of carriergrade capabilities. A SoftBridge application called SIMBA provides a Deaf Telephony service similar to aprevious Deaf Telephony SoftBridge, However, SIMBA’s SoftBridge design and implementation are unique to this thesis. In order to test the life-cycle management ability of SIMBA, an empirical evaluation is carried out including the experiments oflife-cycle management and call-processing performance. The final experimental results of the evaluation show that a JSLEE is able to provide life-cycle management for SIMBA without causing a significant decrease in performance. In conclusion, the life-cycle management can be provided or a SoftBridge application by using an Application Server such as a JSLEE. Futhermore, the results indicate that approach of using Application Server (JSLEE) integration should be sufficiently general to provide life cycle management, and indeed other carrier grade capabilities, for other IP communication applications. This allows IP communication applications to be integrated into an NGN.Providing carrier grade characteristics for Internet Protocol (IP) communication applications is a significant problem for IP application providers in order to offer integrated services that span IP and telecommunication networks. This thesis addresses the provision of life-cycle management, which is only one carrier grade characteristic, for a SoftBridge application, which is an example of IP communication applications. A SoftBridge provides semi-synchronous multi-modal IP-based communication. The work related to IP-Telecommunication integrated services and the SoftBridge is analyzed with respect to life-cycle management in a literature review. It is suggested to use an Application Server in a Next Generation Network (NGN) to provide life-cyclemanagement functionality for IP-Telecommunication applications. In this thesis, the Application Server is represented by a JAIN Service Logic Execution Environment(JSLEE), in which a SoftBridge application can be deployed, activated, deactivated, uninstalled and upgraded online.Two methodologies are applied in this research: exploratory prototyping, which evolves the development of a SoftBridge application, and empirical comparison, which is concerned with the empirical evaluation of a SoftBridge application in terms of carriergrade capabilities. A SoftBridge application called SIMBA provides a Deaf Telephony service similar to aprevious Deaf Telephony SoftBridge, However, SIMBA’s SoftBridge design and implementation are unique to this thesis. In order to test the life-cycle management ability of SIMBA, an empirical evaluation is carried out including the experiments oflife-cycle management and call-processing performance. The final experimental results of the evaluation show that a JSLEE is able to provide life-cycle management for SIMBA without causing a significant decrease in performance. In conclusion, the life-cycle management can be provided or a SoftBridge application by using an Application Server such as a JSLEE. Futhermore, the results indicate that approach of using Application Server (JSLEE) integration should be sufficiently general to provide life cycle management, and indeed other carrier grade capabilities, for other IP communication applications. This allows IP communication applications to be integrated into an NGN. / South Africa

Page generated in 0.5406 seconds