• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 3
  • 1
  • Tagged with
  • 32
  • 32
  • 23
  • 11
  • 11
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Combinatorial properties of uniform designs and their applications in the constructions of low-discrepancy designs

Tang, Yu 01 January 2005 (has links)
No description available.
12

Unfolding design spaces interactively / by Sambit Datta.

Datta, Sambit January 2004 (has links)
"June 27, 2004" / Includes bibliographical references (leaves 180-195) / xiii, 195 leaves : ill. ; 30 cm. / Title page, contents and abstract only. The complete thesis in print form is available from the University Library. / Thesis (Ph.D.)--University of Adelaide, School of Architecture, Landscape Architecture and Urban Design, 2004
13

New quartet methods in phylogenetic combinatiorics /

Weyer-Menkhoff, Jan. January 1900 (has links)
Thesis (doctoral)--Universität Bielefeld, 2003. / Includes bibliographical references (p. 147-152).
14

The Existence of Balanced Tournament Designs and Partitioned Balanced Tournament Designs

Bauman, Shane January 2001 (has links)
A balanced tournament design of order <I>n</I>, BTD(<I>n</I>), defined on a 2<I>n</I>-set<I> V</i>, is an arrangement of the all of the (2<I>n</i>2) distinct unordered pairs of elements of <I>V</I> into an <I>n</I> X (2<I>n</i> - 1) array such that (1) every element of <I>V</i> occurs exactly once in each column and (2) every element of <I>V</I> occurs at most twice in each row. We will show that there exists a BTD(<i>n</i>) for <i>n</i> a positive integer, <i>n</i> not equal to 2. For <I>n</i> = 2, a BTD (<i>n</i>) does not exist. If the BTD(<i>n</i>) has the additional property that it is possible to permute the columns of the array such that for every row, all the elements of<I> V</I> appear exactly once in the first <i>n</i> pairs of that row and exactly once in the last <i>n</i> pairs of that row then we call the design a partitioned balanced tournament design, PBTD(<I>n</I>). We will show that there exists a PBTD (<I>n</I>) for <I>n</I> a positive integer, <I>n</I> is greater than and equal to 5, except possibly for <I>n</I> an element of the set {9,11,15}. For <I>n</I> less than and equal to 4 a PBTD(<I>n</I>) does not exist.
15

Preemptive mobile code protection using spy agents

Kalogridis, Georgios January 2011 (has links)
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts in mobile code scenarios. In this security paradigm, a spy agent, i.e. a mobile agent which circulates amongst a number of remote hosts, can employ a variety of techniques in order to both appear 'normal' and suggest to a malicious host that it can 'misuse' the agent's data or code without being held accountable. A framework for the operation and deployment of such spy agents is described. Subsequently, a number of aspects of the operation of such agents within this framework are analysed in greater detail. The set of spy agent routes needs to be constructed in a manner that enables hosts to be identified from a set of detectable agent-specific outcomes. The construction of route sets that both reduce the probability of spy agent detection and support identification of the origin of a malicious act is analysed in the context of combinatorial group testing theory. Solutions to the route set design problem are proposed. A number of spy agent application scenarios are introduced and analysed, including: a) the implementation of a mobile code email honeypot system for identifying email privacy infringers, b) the design of sets of agent routes that enable malicious host detection even when hosts collude, and c) the evaluation of the credibility of host classification results in the presence of inconsistent host behaviour. Spy agents can be used in a wide range of applications, and it appears that each application creates challenging new research problems, notably in the design of appropriate agent route sets.
16

Geometric typed feature structures : toward design space exploration / Teng-Wen Chang.

Chang, Teng-Wen January 1999 (has links)
Bibliography: leaves 231-239. / x, 290 leaves : ill. ; 30 cm. / Title page, contents and abstract only. The complete thesis in print form is available from the University Library. / Demonstrates the significance and usefulness of representation in geometry by generating various floor design layouts for a typical Australian house, a single fronted cottage and the building enclosures. / Thesis (Ph.D.)--University of Adelaide, School of Architecture, Landscape Architecture and Urban Design, 2000?
17

New quartet methods in phylogenetic combinatorics /

Weyer-Menkhoff, Jan. January 2003 (has links)
Univ., Diss.--Bielefeld, 2003.
18

Double-Change Covering Designs with Block Size k = 4

Gamachchige, Nirosh Tharaka Sandakelum Gangoda 01 August 2017 (has links) (PDF)
A double-change covering design (dccd) is an ordered set of blocks with block size k is an ordered collection of b blocks, B = {B1,B2, · · · ,Bb}, each an unordered subset of k distinct elements from [v] = {1, 2, · · · , v}, which obey: (1) each block differs from the previous block by two elements, and, (2) every unordered pair of [v] appears in at least one block. The object is to minimize b for a fixed v and k. Tight designs are those in which each pair is covered exactly once. We present constructions of tight dccd’s for arbitrary v when k = 2 and minimal constructions for v <= 20 when k = 4. A general, but not minimal, method is presented to construct circular dccd for arbitrary v when k = 4.
19

Some results on the association schemes of bilinear forms /

Huang, Tayuan January 1985 (has links)
No description available.
20

Applications of Graph Theory and Topology to Combinatorial Designs

Somporn Sutinuntopas 12 1900 (has links)
This dissertation is concerned with the existence and the isomorphism of designs. The first part studies the existence of designs. Chapter I shows how to obtain a design from a difference family. Chapters II to IV study the existence of an affine 3-(p^m,4,λ) design where the v-set is the Galois field GF(p^m). Associated to each prime p, this paper constructs a graph. If the graph has a 1-factor, then a difference family and hence an affine design exists. The question arises of how to determine when the graph has a 1-factor. It is not hard to see that the graph is connected and of even order. Tutte's theorem shows that if the graph is 2-connected and regular of degree three, then the graph has a 1-factor. By using the concept of quadratic reciprocity, this paper shows that if p Ξ 53 or 77 (mod 120), the graph is almost regular of degree three, i.e., every vertex has degree three, except two vertices each have degree tow. Adding an extra edge joining the two vertices with degree tow gives a regular graph of degree three. Also, Tutte proved that if A is an edge of the graph satisfying the above conditions, then it must have a 1-factor which contains A. The second part of the dissertation is concerned with determining if two designs are isomorphic. Here the v-set is any group G and translation by any element in G gives a design automorphism. Given a design B and its difference family D, two topological spaces, B and D, are constructed. We give topological conditions which imply that a design isomorphism is a group isomorphism.

Page generated in 0.0539 seconds