• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3865
  • 1127
  • 353
  • 338
  • 324
  • 182
  • 162
  • 95
  • 64
  • 59
  • 48
  • 42
  • 38
  • 28
  • 28
  • Tagged with
  • 8679
  • 2529
  • 1660
  • 1510
  • 1441
  • 1285
  • 1225
  • 1197
  • 1037
  • 997
  • 973
  • 971
  • 945
  • 870
  • 825
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Once More Unto the Breach': Professional Responsibility and Computer Ethics : A of Positive "Responsibility in Computing"

Gotterbarn, Don 01 June 2008 (has links)
No description available.
12

Pedagogical Framework for Ethical Development

Dark, Melissa, Epstein, Richard, Morales, Linda, Countermine, Terry, Yuan, Qing, Ali, Muhammed, Rose, Matt, Harter, Nathan 01 December 2007 (has links)
No description available.
13

A Practical Introduction to Input and Output Ports

Tarnoff, David 01 December 2006 (has links)
This chapter discusses how microprocessors interact with devices. It takes the student from the basics of input and output, through the design of the interface between a processor and an external device, and concludes with a discussion of how to improve the performance of the I/O interface using interrupts. The PC parallel port is examined to give the student a chance to apply these concepts in hardware and software. Once the student has studied the material of this chapter and completed the hands-on experiments, they will be prepared to begin a study of how device drivers work within the context of an operating system.
14

A Practical Introduction to Serial Protocols

Tarnoff, David 01 December 2006 (has links)
This chapter discusses how addressing information, control information, and data are encapsulated in a serial packet or frame. It shows the bit-level detail of an IEEE 802.3 Ethernet frame, an IP packet, and a TCP packet and shows how these protocols are used to create a sample protocol stack. The GNU-licensed and Windows-based application Packetyzer is used to explore a sample TCP/IP packet contained in an Ethernet frame. Once the student has studied the material of this chapter and has completed the hands-on experiment, he or she will have the skills to examine any packet or frame and, using the description of its protocol, extract the details of the message.
15

Addressing Ethical and Professional Risks of ICT Development Using Software Development Impact Statements

Gotterbarn, Don 01 January 2002 (has links)
The ethical and professional risks of information and communications technoogy (ICT) development using software developemnt impact statements were discussed. The risks focused on included missed schedule, over budget, and failing to meet the system's specified requirements. The two factors which contribue to these failres were related to system stakeholders. The two factors were stated as limited consideration of system stakeholders to the software developer and the customer, and the limited scope of software risk analysis to technical and cost issues.
16

Open Source Software: Intellectual Challenges to the Status Quo

Wolf, Marty J., Bowyer, Kevin, Gotterbarn, Don, Miller, Keith 01 January 2002 (has links)
No description available.
17

Ethics in Qualitative Studies of Commercial Software Enterprises Ethical Analysis

Gotterbarn, Donald 01 December 2001 (has links)
An ethical dilemma is presented to show how to resolve the tension between the goals of assuring the quality of research data on a current project while not compromising the confidentiality of private information gained from previous research. It is emphasized that once the tactical mistake had been made, it is possible to reason out from a utilitarian point of view and derive the solution to the problem at hand.
18

Enhancing Risk Analysis Using Software Development Impact Statements

Gotterbarn, D. 01 January 2001 (has links)
Any software project goes through three distinct phases: an initial phase where the feasibility of the project is examined, a requirements phase that lays out the overall structure and function of the project, and a detailed phase that lays out the plans for building the software. Each of these phases has its peculiar risks. A narrow approach to risk analysis focusing on just the business stakeholders and understanding the scope of software project risks to include only schedules, budgets and functionality has contributed to significant software failures. A process called "Software Development Impact Statements" (SoDIS™) is presented which both expands the concept of software risk to include social, professional and ethical risks that lead to software failure, and extends the range of stakeholders considered in risk analysis.. Using a SoDIS risk analysis enlarges the project scope considered by software developers. The SoDIS process is incorporated into an a version of the spiral lifecycle model. A tool to develop impact statements is used to illustrate the SoDIS process.
19

Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles

Paranjothi, Anirudh, Tanik, Urcun, Wang, Yuehua, Khan, Mohammad S. 01 June 2019 (has links)
Vehicular Ad-hoc Networks enable efficient communication between vehicles with the aim of improving road safety. However, the growing number of vehicles in dense regions and obstacle shadowing regions like Manhattan and other downtown areas leads to frequent disconnection problems resulting in disrupted radio wave propagation between vehicles. To address this issue and to transmit critical messages between vehicles and drones deployed from service vehicles to overcome road incidents and obstacles, we proposed a hybrid technique based on fog computing called Hybrid-Vehfog to disseminate messages in obstacle shadowing regions and a multihop technique to disseminate messages in nonobstacle shadowing regions. Our proposed algorithm dynamically adapts to changes in an environment and benefits in efficiency with robust drone deployment capability as needed. Performance of Hybrid-Vehfog is carried out in Network Simulator and Simulation of Urban Mobility simulators. The results showed that Hybrid-Vehfog outperformed Cloud-assisted Message Downlink Dissemination Scheme, Cross-Layer Broadcast Protocol, PEer-to-Peer protocol for Allocated REsource, Fog-Named Data Networking with mobility, and flooding schemes at all vehicle densities and simulation times.
20

Hybrid Model for Security-Aware Cluster Head Selection in Wireless Sensor Networks

Shankar, Achyut, Jaisankar, Natarajan, Khan, Mohammad S., Patan, Rizwan, Balamurugan, Balusamy 01 April 2019 (has links)
Wireless sensor network (WSN) is considered as the resource constraint network, in which the entire nodes have limited resources. In WSN, prolonging the lifetime of the network remains as the unsolved point. Accordingly, this study intends to propose a hybrid GGWSO (Grouped Grey Wolf Search Optimisation) algorithm to improve the performance of a cluster head selection in WSN, so that the network's lifetime can be extended. The proposed method concerns the main constraints associated with distance, delay, energy, and security. This study compares the performance of the proposed GGWSO with several traditional algorithms like artificial bee colony (ABC), fractional ABC, group search optimisation and Grey Wolf optimisation-based cluster head selection. During the performance analysis, the various ranges of risk, such as 20, 60, and 100% are added to validate the performance variations, by evaluating the number of alive nodes, and normalised network energy remained in the network. The simulation results have shown that there is a need for a hybrid model for attaining the superior results.

Page generated in 0.0828 seconds