Spelling suggestions: "subject:"computer files"" "subject:"coomputer files""
1 |
Using UNIX segment level file locks with Ada tasksSwist, Mark B. January 1992 (has links)
Thesis (M.S.)--Kutztown University of Pennsylvania, 1992. / Source: Masters Abstracts International, Volume: 45-06, page: 3193. Abstract precedes thesis as [2] preliminary leaves. Typescript. Includes bibliographical references (leaves 16-18).
|
2 |
Waardetoevoeging tot die intydse biblioteekkatalogus20 November 2014 (has links)
M.A. (Information Science) / Please refer to full text to view abstract
|
3 |
Peer-to-peer replication to improve file availability.January 2007 (has links)
Ye, Chong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (leaves 61-63). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Classification of P2P systems --- p.1 / Chapter 1.2 --- Replication in P2P systems --- p.3 / Chapter 1.3 --- Related work --- p.7 / Chapter 1.4 --- Organization --- p.10 / Chapter 1.5 --- Publications derived from this work --- p.11 / Chapter 2 --- P2P Replication System --- p.12 / Chapter 2.1 --- Peers --- p.13 / Chapter 2.2 --- Erasure code replication --- p.13 / Chapter 2.3 --- Estimation of file availability --- p.14 / Chapter 2.4 --- Problem formulation --- p.15 / Chapter 2.5 --- Performance metrics --- p.17 / Chapter 3 --- Decentralized Decisions --- p.19 / Chapter 3.1 --- Writable peer set --- p.20 / Chapter 3.2 --- Stretch factor estimation --- p.21 / Chapter 3.3 --- Locking phase --- p.22 / Chapter 4 --- Equal Weight Replication --- p.23 / Chapter 4.1 --- The decentralized replication algorithms --- p.23 / Chapter 4.1.1 --- Random algorithm --- p.23 / Chapter 4.1.2 --- Group partition algorithm --- p.25 / Chapter 4.1.3 --- High Available First (HAF) algorithm --- p.27 / Chapter 4.2 --- Evaluation of algorithms --- p.29 / Chapter 4.2.1 --- Simulation setup --- p.29 / Chapter 4.2.2 --- Simulation results --- p.31 / Chapter 4.3 --- Summary --- p.40 / Chapter 4.4 --- Clarification of individual contributions --- p.41 / Chapter 5 --- Replication with Preferences --- p.43 / Chapter 5.1 --- Problem re-defined --- p.44 / Chapter 5.2 --- The Bi-weight model --- p.46 / Chapter 5.3 --- The statistical rounding policy --- p.48 / Chapter 5.4 --- The distributed replication algorithm --- p.49 / Chapter 5.5 --- Evaluation of the algorithm --- p.51 / Chapter 5.5.1 --- Simulation setup --- p.51 / Chapter 5.5.2 --- Simulation results --- p.52 / Chapter 5.6 --- Discussion --- p.56 / Chapter 5.7 --- Summary --- p.57 / Chapter 6 --- Future work --- p.58 / Chapter 7 --- Conclusion --- p.59 / Bibliography --- p.61
|
4 |
A class-specific ensemble feature selection approach for classification problemsSoares, Caio, Gilbert, Juan E., January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Vita. Includes bibliographical references (p. 41-48).
|
5 |
Design and implementation of a multimedia DBMS catalog management, table creation and data insertion /Pei, Su-Cheng. January 1990 (has links) (PDF)
Thesis (M.S. in Engineering Science)--Naval Postgraduate School, December 1990. / Thesis Advisor: Lum, Vincent Y. Second Reader: Wu, Thamas C. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Identifier(s): Data base management systems, data management, multimedia data bases, data bases, data processing, tables(data), computer files, MDBMS (multimedia data base management system), Ingres data bases, abstract data types, catalog management, integrated systems, theses. Author(s) subject terms: Multimedia Database Management System, Multimedia, DBMS, MDBMS, media database. Includes bibliographical references (p. 186-187). Also available in print.
|
6 |
The West Point database conversion project -- from a network to a relational DBMSGuilmette, Daniel J. Wilson, Georgette P. January 1990 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 1990. / Thesis Advisor(s): Lum, Vincent Y. Second Reader: Wu, C. Thomas. "June 1990." Description based on title screen as viewed on March 24, 2010. DTIC Identifier(s): Data Bases, Systems Engineering, Prototypes, United States Military Academy, Computer Files, Formats. Author(s) subject terms: EER Diagram, Relational Database Design, Intermediate File Format, Oracle DBMS. Includes bibliographical references (p. 210-212). Also available in print.
|
7 |
The Design and Implementation of an Intelligent Agent-Based File SystemHopper, S. Andrew 05 1900 (has links)
As bandwidth constraints on LAN/WAN environments decrease, the demand for distributed services will continue to increase. In particular, the proliferation of user-level applications requiring high-capacity distributed file storage systems will demand that such services be universally available. At the same time, the advent of high-speed networks have made the deployment of application and communication solutions based upon an Intelligent Mobile Agent (IMA) framework practical. Agents have proven to present an ideal development paradigm for the creation of autonomous large-scale distributed systems, and an agent-based communication scheme would facilitate the creation of independently administered distributed file services. This thesis thus outlines an architecture for such a distributed file system based upon an IMA communication framework.
|
8 |
A historical-legal analysis of search and seizure of electronic records for the prosecution of financial crimes in South AfricaPoyo, Unathi 30 September 2020 (has links)
Crime has been around since the beginning of time. In an evolving society, and the methodology of crime also changes. The methodology of combating and preventing crime should aim to match the speed at which crime occurs. Criminal procedure deals with the powers of the police to investigate crimes.1 The Criminal Procedure Act 51 of 1977 (CPA) contains the principles of search and seizure in chapter 2. The promulgation of the CPA was during a period where the computer was a new phenomenon. At this time, it was inconceivable that technology would ever advance and become so ubiquitous, to the point that technology would infiltrate every aspect of our lives, and laws. There has since been many developments in our law, especially a new Constitutional dispensation.2 There have been developments and technological advancements that have had a direct and indirect bearing on the CPA. People use technology to communicate, transact, and unfortunately, to commit crime. These developments require there to be amendments in the CPA. There has been no specific amendments relating to search and seizure which are of significance in addressing technological advances. It is recommended that the amendments to the CPA include definitions and guidelines for procedural aspects of collection of electronic evidence. / Criminal and Procedural Law / LL. M. (Criminal and Procedural Law)
|
Page generated in 0.0913 seconds