• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 1
  • 1
  • Tagged with
  • 19
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Modeling and analysis of quantum cryptographic protocols

Ware, Christopher J 29 August 2008 (has links)
In this thesis we develop a methodology for the modeling and analysis of quantum security protocols, and apply it to a cheat sensitive quantum bit commitment protocol. Our method consists of a formalization of the protocol in the process algebra CQP, a conversion to the PRISM modeling language, verification of security properties, and the quantitative analysis of optimal cheat strategies for a dishonest party. We also define additional syntax and operational semantics for CQP to add decision making capability. For a two party protocol involving Alice committing a bit to Bob, we show that the protocol favors a dishonest Alice over a dishonest Bob. When only one party is dishonest, and uses an optimal cheat strategy, we also show that the probability of cheat detection is bounded at 0.037 for Bob and 0.076 for Alice. In addition, a dishonest Alice is able to reveal an arbitrary commit bit with probability 1 while a dishonest Bob is only able to extract the correct bit before it is revealed with probability 0.854. This bias is interesting as it gives us insight into how the overall protocol functions and where its weaknesses are. By identifying these weaknesses we provide a foundation for future improvements to the protocol to reduce cheating bias or increase cheat detection. Finally, our methodology reveals the weakness of PRISM in modeling quantum variables to their full power and as a result we propose the development of a new modeling tool for quantum protocols.
12

Scalable services for massively multiplayer online games / Services passant à l'échelle pour les jeux massivement multi-joueurs en ligne

Veron, Maxime Pierre Andre 25 September 2015 (has links)
Les jeux massivement multi-joueurs en ligne (jeux MMOGs) visent à rassembler un nombre infini de joueurs dans le même univers virtuel. Pourtant, tous les MMOG existants reposent sur des architectures client / serveur centralisé qui imposent une limite sur le nombre maximum de joueurs (avatars) et sur les ressources qui peuvent coexister dans un univers virtuel donné. Cette thèse vise à proposer des solutions pour améliorer l'évolutivité de MMOG. Cette thèse explore deux services qui sont essentiels à toutes les variantes de MMOG: jumelage et détection de triche. Ces deux services sont les goulots d'étranglement connus, et pourtant les implémentations actuelles restent centralisées. Cette thèse montre également qu'il est possible de concevoir un service d'arbitrage au-dessus d'un système de réputation. Le service résultant reste très efficace sur une grande échelle, à la fois en termes de performance et en termes de prévention de la fraude. Comme l'arbitrage est un problème similaire à la détection de fautes, cette thèse étend l'approche proposée pour surveiller les défaillances. / Massively Multi-player Online Games (MMOGs) aim at gathering an infinite number of players within the same virtual universe. Yet all existing MMOGs rely on centralized client/server architectures which impose a limit on the maximum number of players (avatars) and resources that can coexist in any given virtual universe. This thesis aims at proposing solutions to improve the scalability of MMOGs. To address the wide variety of their concerns, MMOGs rely on independent services such as virtual world hosting, avatar storage, matchmaking, cheat detection, and game design. This thesis explores two services that are crucial to all MMOG variants: matchmaking and cheat detection. Both services are known bottlenecks, and yet current implementations remain centralized. This thesis also shows that it is possible to design a peer to peer refereeing service on top of a reputation system. The resulting service remains highly efficient on a large scale, both in terms of performance and in terms of cheat prevention. Since refereeing is somewhat similar to failure detection, this thesis extends the proposed approach to monitor failures. The resulting failure detection service scales with the number of monitored nodes and tolerates jitter.
13

Postoje žáků ke školnímu podvádění. / Attitudes of pupils to school cheating.

Vodrážková, Jana January 2018 (has links)
The diploma thesis is focused on the research of school cheating in pupils of the second level of elementary schools. Based on a self-reporting questionnaire survey, the aim of the thesis is to find out what motivates the pupils to cheat and what attitude they take to possibly punish detected fraud. Another goal is to find out the frequency of individual types of school cheating, the influence of gender and the learning benefit of school cheating. It has been found that pupils are relatively often used in cheating on the internet at the primary school. Also, there was greater tolerance for cheating when pupils do not attach the importance of punishment for an exposed fraud, rather they would not punish their exposed classmates. Key words: dishonest behavior, unusual cheating, electronic cheating, elementary school pupils, motivation to cheat
14

HOW CAN COMPUTER-BASED PROGRAMMING EXAMS BE IMPLEMENTED FOR ENGINEERING STUDENTS?

Farshchi Alvarez, Aria Richard, Gölman, Fredrik January 2021 (has links)
Programmering inkluderar vanligtvis användningen av en dator och en textredigerare, men ändå avslutas programmeringskurser vid högskolor och universitet ofta med traditionella skriftliga tentor för att bedöma studenternas förvärvade praktiska kunskaper. Denna traditionella examineringsmetod begränsar komplexiteten i programmeringsproblem och kan leda till oavsiktliga subjektiva bedömningar. Tidigare studier om datorbaserade programmeringstentor som efterliknar verkliga programmeringsförhållanden tyder på att bedömningen av studenternas förvärvade kunskaper kan effektiviseras samtidigt som både betygs- och administrationsprocesser förenklas. Vi använder Bunges generella vetenskapliga metod och fallstudiemetodik för att utveckla ett system för datorbaserade programmeringstentor som kan implementeras på KTH Kista. Våra resultat tyder på att programmeringstentor kan utföras säkert på studenternas egna datorer genom att starta datorn i en begränsad förkonfigurerad systemmiljö med blockerad internetåtkomst från ett USBminne. Parat med den öppna lärplattformen Moodle kan tentorna administreras elektroniskt och utformas med automatiska rättningssprocesser. För att hjälpa tentavakter utvecklade vi även ett observationsverktyg som kan upptäcka om den begränsade systemmiljön kringgås. Trots uteblivna verkliga tester av systemet på grund av omständigheterna orsakade av den pågående pandemin, drar vi, med stöd av tidigare studier, slutsatsen att vår föreslagna lösning för datorbaserade programmeringstentor kan förbättra kvaliteten och effektiviteten av programmeringskurser och deras examinationsprocesser. / Programming usually includes the use of a computer and a text editor, yet programming courses given at institutions of higher education often conclude with traditional written exams to assess the students’ acquired practical knowledge. This traditional examination method restricts the complexity of programming problems and may result in unintentional subjective assessments. Previous research on computer-based programming exams that mimic real programming conditions suggest that the assessment of the students’ acquired knowledge can be made more efficient while also simplifying both grading and administration processes. We use Bunge’s general scientific method and case study methodology to develop a system for computer-based programming exams that can be implemented at KTH Kista. Our results suggest that programming exams can be safely performed on the students’ own computers by booting the computer into a restricted preconfigured system environment with blocked Internet access from a usb flash drive. Paired with the open-source learning management system Moodle, the exams can be administered electronically and designed with automatic grading processes. To help exam invigilators we also developed an observation tool that can detect if the restricted system environment is circumvented. Despite the lack of real tests of the system due to the circumstances caused by the ongoing pandemic, we conclude, with the support of previous studies, that our proposed solution for computer-based programming exams can improve the quality and efficiency of programming courses and their examination processes.
15

Det godkända fusket : Normförhandlingar i gymnasieskolans bedömningspraktiker / Cheating by Consent : Norm negotiations in assessment practices of upper secondary schools

Fonseca, Lars January 2014 (has links)
Education on behalf of social trust constitutes a central theme in all societies. Different forms of cheating and fraud have a negative impact on the bonds of social trust. The purpose of the thesis is to increase understanding of the scope for learning about the individual-society relationship as it finds expression in pedagogical practices involving norms relating to cheating. The established norms concerning school cheating are identified in group-based discussions involving Upper Secondary students and teachers. Students ascribe each other roles on the basis of the perceived capacity to produce school results and thereby also to justify the need for school cheating. In the norm negotiations a significant tolerance is shown towards cheating which is adjudged to be necessary, provided that a hierarchic, fair distribution of grades can be retained. The teachers perceive expectations of acting for goal fulfilment, in the form of good student grades, as based on economic arguments. Good student grades imply satisfied customers in a market exposed to competition and a strong market value for the individual school. From a critical viewpoint these norms are related to the contemporary, dominant neo-liberal principles of commercialisation and individualisation in social organisation. The school actors perceive, in accordance with stratified norm theory, the norms from economic systems of conduct as more strongly conditioning on conduct than those norms from political-administrative or socio-cultural conduct systems. The teachers are aware of expectations, in hidden concert and consent with other school stakeholders, to offer social approval for student cheating and sympathetic marking concerning the lowest grade for passing i.e. violation of rules, where this is necessary to meet the economic as well as political-administrative objectives that have been established. To be part of pedagogic practices involving school cheating implies learning to uncouple rules and practice, law and morality. Such a double agenda is incompatible with norms and ideals in official curricula as well as being destructive of the bonds of social trust; it thereby functions as a hidden curriculum.
16

Polymorphic metabolism and the eco-evolutionary influence of social feeding strategies

Lindsay, Richard James January 2016 (has links)
Microbes live in complex environments where competitive and cooperative interactions occur that dictate their success and the status of their environment. By furthering our understanding of the interactions between microbes, questions into the evolution of cooperation, disease virulence and biodiversity can be addressed. This will help develop strategies to overcome problems concerning disease, socioeconomics and conservation. We use an approach that combines evolutionary ecology theory with genetics and molecular biology to establish and develop model microbial ecological systems to examine feeding strategies, in what has been termed synthetic ecology. Using the model fungal plant pathogen system of rice blast disease, we generated less virulent gene deletion mutants to examine the sociality of feeding strategies during infection and test a nascent virulence reduction strategy based on competitive exclusion. We revealed that the success of the pathogen is unexpectedly enhanced in mixed strain infections containing the virulent wild-type strain with a less virulent gene deletion mutant of the metabolic enzyme invertase. Our finding is explained by interference between different social traits that occur during sucrose feeding. To test the generality of our result, gene deletion mutants of putative proteases were generated and characterised. We found that if virulence related genes acted ‘privately’, as predicted by social theory, the associated mutants would not make viable strains to use for this virulence reduction strategy by competitive exclusion. Our study then went on to study the fitness of digesting resources extracellularly, as many microbes do, given that this strategy is exposed to social exploitation by individuals who do not pay the metabolic costs. This was investigated by developing an experimental system with Saccharomyces cerevisiae. Though internalising digestion could suppress cheats, the relative fitness of opposing strategies was dependent upon the environmental and demographic conditions. Using this polymorphic system, the influence of competitors on the stability of cooperation, and the influence of cheats on the maintenance of diversity were assessed. To test the fitness of internal versus external digestion in a more natural setting, we generated an internally digesting strain of the rice blast fungus. In addition to suppressing cheats, the strain had enhanced fitness and virulence over the wild-type. We propose that this is caused by a shift in a trade-off between yield and rate. We show how a synthetic ecology approach can capture details of the biology underlying complex ecological processes, while having control over the factors that drive them, so that the underlying mechanisms can be teased apart.
17

Elektronické knihy na VŠE / Electronic books at VŠE

Saska, Filip January 2012 (has links)
The master dissertation Electronic books at VSE is focused on analysing the opportunities of e-books in the environment of VSE. The aim is to describe the current state of different study materials used at VSE and to explore different ways of improving them using e-book technology. The dissertation briefly describes various attributes of e-books with stress on the relevant attributes -- the possibility of inserting notes, bookmarks, multimedia and interactive content. Also the possibility of editing the content and sharing resulting changes with other students is a key attribute. The dissertation then moves on to describe the different kinds of study materials that are in use at VSE. The second half of the dissertation builds on previous analysis of the study materials and introduces a hypothetical optimal state, which could result from implementing e-book technology. This state is the answers the question of what is actually possible to achieve. The next chapter in this half is the technical analysis, which answers the question of how is it possible to achieve the suggested hypothetical state. The conclusion of this dissertation answers the questions whether the proposed solution is a viable candidate for implementation. The results of this dissertation could be used as a guideline for the project of implementation of e-book technology in the environment of VSE.
18

In the Company of Cheaters (16th-Century Aristocrats and 20th-Century Gangsters)

Murdock, Mark Cammeron 24 June 2009 (has links) (PDF)
This document contains a meta-commentary on the article that I co-authored with Dr. Corry Cropper entitled Breaking the Duel's Rules: Brantôme, Mérimée, and Melville, that will be published in the next issue of Essays in French Literature and Culture, and an annotated bibliography of primary and secondary sources featuring summaries and important quotes dealing with duels, honor, honor codes, cheating, historical causality, chance, and sexuality. Also, several examples of film noir are cited with brief summaries and key events noted. The article we wrote studies two instances of cheating in duels: one found in Brantôme's Discours sur les duels and the other in Prosper Mérimée's Chronique du règne de Charles IX, and the traditional, as well as anti-causal, repercussions they had. Melville's Le Deuxième souffle is also analyzed with regards to the Gaullist Gu Minda and the end of the aristocratic codes of honor that those of his generation dearly respected but that were overcome by the commercial world of republican law and order.
19

Fauxtopia

Kampf, Raymond William 01 January 2004 (has links)
To all who come to this fictitious place:Welcome.Fauxtopia is your land. Here, age relives distorted memories of the past, and here, youth may savor the challenge of trying to understand the present. Fauxtopia is made up of the ideals, the dreams and the fuzzy facts which have re-created reality... with the hope that it will be a source of edutainment for all the world.Ray KampfFauxtopia DedicationApril 1st, 2004

Page generated in 0.0512 seconds