• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1918
  • 598
  • 576
  • 417
  • 240
  • 177
  • 57
  • 54
  • 42
  • 26
  • 26
  • 25
  • 24
  • 23
  • 20
  • Tagged with
  • 4807
  • 533
  • 503
  • 497
  • 429
  • 421
  • 376
  • 362
  • 354
  • 345
  • 340
  • 336
  • 320
  • 318
  • 317
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Code-switching in Hong Kong

Reynolds Lo, Kuk-chuen, Sabrina., 盧菊存. January 1985 (has links)
published_or_final_version / Language Studies / Master / Master of Arts
22

Frequency and characteristics of code switching in Hispanic bilingual preschool age children of Ohio and California a comparative study /

Coria-Navia, Anneris Bibiana. January 2010 (has links)
Title from first page of PDF document. Includes bibliographical references (p. 51-54).
23

Code-switching among students at the University of Zululand

Mqadi, Praxedis Fikile January 1990 (has links)
Submitted in partial fulfilment of the requirements for the degree of B.A. (HONS) in the Department of African Languages at the University of Zululand, South Africa, 1990 . / The purpose of this research is to investigate why students at the" University of Zululand code-switch. The research focuses particularly on environmental and social factors which lead students to code-switch. It also looks into the functions of code switching. On the whole it is intended to contribute to the findings already made on code-switching. Many researchers have found out that people tend to code switch because it has become a habit to do so. Such a reason does not sound linguistically convincing to me. Others claim that people code-switch because they want to display their 'education' or that they come from urban areas or townships. This again is not convincing enough since code-switching is a reality and would seem to come naturally. It is not something one does when one feels like it is usually done unconsciously.
24

Identifying malware similarity through token-based and semantic code clones

Lanclos, Christopher I. G. 08 December 2023 (has links) (PDF)
Malware is the source or a catalyst for many of the attacks on our cyberspace. Malware analysts and other cybersecurity professionals are responsible for responding to and understanding attacks to mount a defense against the attacks in our cyberspace. The sheer amount of malware alone makes this a difficult task, but malware is also increasing in complexity. This research provides empirical evidence that a hybrid approach using token-based and semantic-based code clones can identify similarities between malware. In addition, the use of different normalization techniques and the use of undirected matrices versus directed matrices were studied. Lastly, the impact of the use of inexact code clones was evaluated. Our results showed that our approach to determining the similarity between malware outperforms two methods currently used in malware analyses. In addition, we showed that overly generalized normalization of code sections would hinder the performance of the proposed method. At the same time, there is no significant difference between the use of directed and undirected matrices. This research also confirmed the positive impact of using inexact code clones when determining similarity.
25

Detecting code duplications in the NPM community

Liu, Hanwen 09 September 2021 (has links)
In the modern software development process, it has become a very mainstream practice to build software projects on top of third-party packages to simplify the development process. In this development method, it is quite common to copy existing code or files in other libraries instead of making regular calls. Although this approach can reduce the project's dependence on other libraries and make the project more streamlined, it also causes difficulties in maintenance and understanding. The ignorance of code duplication by third-party library community can even be exploited for malicious purpose, such as typo-squatting attack. This paper serves as a starting point to analyze the growing code duplication issues surrounding third-party open source packages, and what is the root cause of code duplication. In this paper, I conducted code duplication-related research based on some popular packages in the third-party open source packages community, the NPM community, by using the tokenizer tool and the code comparison tool to compute the code similarity, quantitatively analyzed the prevalence of code duplication in the NPM community, and did some related experiments based on this similarity. In the experiments, I found that code duplication is very common in NPM community: 17.1% of all the files have 1-93 similar file in other package when the threshold of similar file is set to 0.5. 29.3% of all the packages has at least one "similar package" when the threshold of similar package is set to 0.5. In all the 951 similar package pairs, 33.9% of them, 323 package pairs comes from the same domain. The ultimate goal of this paper is to promote the awareness of the commonness and the importance of code duplication in the third-party package community and the reasonable use of code duplication by developers in the project development. / In the modern software development process, developers often call other people's completed code to build their own programs. There are generally two ways to do this: indirectly call other people's code through "import" or similar instructions in the program, or directly copy and paste other people's code and make slight modifications. The second method can make the program more independent and easy to use, but the code duplication problem caused by this method also has great security risks.This paper serves as a starting point to analyze the growing code duplication issues, and what is the root cause of code duplication. In this paper, I conducted code duplication-related research based on some popular code packages in the NPM community.I used some tools to compute a value to define how different codes are similar to each other, quantitatively analyzed the prevalence of code duplication in the NPM community, and did some related experiments based on this similarity. In the experiments, I found that code duplication is very common in the NPM community: 17.1% of all the files have 1-93 similar file in other package, and 29.3% of all the package have at least one "similar package", when the definition of similar files and packages are not that "strict".In all the 951 similar package pairs, 33.9% of them, 323 package pairs comes from the same domain. The ultimate goal of this paper is to promote the awareness of the commonness and the importance of code duplication in the third-party package community and the reasonable use of code duplication by developers in the project development.
26

Programming Code-Modulator and Demodulation-Decoder Suited to PCM Systems

Daqing, Huang 11 1900 (has links)
International Telemetering Conference Proceedings / October 30-November 02, 1989 / Town & Country Hotel & Convention Center, San Diego, California / In order to suit the development of computer telemetry systems, we have developed the intelligent code-modulator and demodulation-decoder. In hardware, they consist of a monolithic processor and some high-integrated devices. Different code or decode ways and several subcarrier modulation or demodulation systems can be varied by carrying out corresponding software programs. In this paper, the equipments' hardware constructions and software cnarts and their main principles are presented.
27

A study of power control in CDMA overlay

虞愛, Yu, Ai. January 2000 (has links)
published_or_final_version / Electrical and Electronic Engineering / Doctoral / Doctor of Philosophy
28

The use of periodic ab initio methods in the determination of NMR quadrupole parameters

Johnson, Clive January 2002 (has links)
No description available.
29

Synchronisation techniques in spread spectrum communications

Goswami, C. S. January 1988 (has links)
No description available.
30

Automatic compiler generation from natural semantics specifications

McKeever, Stephen Walter January 2002 (has links)
No description available.

Page generated in 0.0356 seconds