• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 18
  • 7
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 39
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Designing and implementing a system for automating the Java project analysis process

Yan, Zheng January 2008 (has links)
<p>A process for the analysis and collection of information of software systems has been defined. It extracts relevant information of project source files from an online repository and stores that meta-information in a database for further processing. Then, according to the meta-information in the database, it downloads the source files and writes the feedback information back to the database as well. Now the data can be used as input for various analysis tools, in our case a tool called VizzAnalyzer, which reads the project source code and performs a series of software quality analyses.</p><p>But actually, the process, which is mentioned above needs, a lot of manual work, makes the work inefficient and the analysis of large numbers of projects impossible.</p><p>Thus, a series of thesis projects has been devised to automate the whole process. This thesis aims at automating the information extraction and source file download work, which will make the latter preparation of the analysis task much easier and more efficient.</p>
12

Designing and implementing a system for automating the Java project analysis process

Yan, Zheng January 2008 (has links)
A process for the analysis and collection of information of software systems has been defined. It extracts relevant information of project source files from an online repository and stores that meta-information in a database for further processing. Then, according to the meta-information in the database, it downloads the source files and writes the feedback information back to the database as well. Now the data can be used as input for various analysis tools, in our case a tool called VizzAnalyzer, which reads the project source code and performs a series of software quality analyses. But actually, the process, which is mentioned above needs, a lot of manual work, makes the work inefficient and the analysis of large numbers of projects impossible. Thus, a series of thesis projects has been devised to automate the whole process. This thesis aims at automating the information extraction and source file download work, which will make the latter preparation of the analysis task much easier and more efficient.
13

App download decision from the perspective of Transaction Costs influence on App revenue model

Dabbous, Fouad January 2017 (has links)
Despite the huge market size of mobile applications and the large number of involved stakeholders fewresearch about app users’ intentions to download apps and factors affecting their decision had been carriedout. Current study examine app download decision from a transaction costs perspective and the effect of itselements on app download taking into consideration free and paid revenue model type for app. An onlinesurvey is developed to collect field data. One hundred and one valid response are obtained and used to testthe proposed research model. The findings indicated that transaction costs for app and market weresignificant driving factors that negatively impacted download for free model. Temporal asset specificityshowed to be an essential driving factor for app download. The research model gave positive indicationsabout transaction costs theory being a good framework to analyze app download decision.
14

Evaluation of unidirectional background push content download services for the delivery of television programs

Fraile Gil, Francisco 02 September 2013 (has links)
Este trabajo de tesis presenta los servicios de descarga de contenido en modo push como un mecanismo eficiente para el envío de contenido de televisión pre-producido sobre redes de difusión. Hoy en día, los operadores de red dedican una cantidad considerable de recursos de red a la entrega en vivo de contenido televisivo, tanto sobre redes de difusión como sobre conexiones unidireccionales. Esta oferta de servicios responde únicamente a requisitos comerciales: disponer de los contenidos televisivos en cualquier momento y lugar. Sin embargo, desde un punto de vista estrictamente académico, el envío en vivo es únicamente un requerimiento para el contenido en vivo, no para contenidos que ya han sido producidos con anterioridad a su emisión. Más aún, la difusión es solo eficiente cuando el contenido es suficientemente popular. Los servicios bajo estudio en esta tesis utilizan capacidad residual en redes de difusión para enviar contenido pre-producido para que se almacene en los equipos de usuario. La propuesta se justifica únicamente por su eficiencia. Por un lado, genera valor de recursos de red que no se aprovecharían de otra manera. Por otro lado, realiza la entrega de contenidos pre-producidos y populares de la manera más eficiente: sobre servicios de descarga de contenidos en difusión. Los resultados incluyen modelos para la popularidad y la duración de contenidos, valiosos para cualquier trabajo de investigación basados en la entrega de contenidos televisivos. Además, la tesis evalúa la capacidad residual disponible en redes de difusión, por medio de estudios empíricos. Después, estos resultados son utilizados en simulaciones que evalúan las prestaciones de los servicios propuestos en escenarios diferentes y para aplicaciones diferentes. La evaluación demuestra que este tipo de servicios son un recurso muy útil para la entrega de contenido televisivo. / This thesis dissertation presents background push Content Download Services as an efficient mechanism to deliver pre-produced television content through existing broadcast networks. Nowadays, network operators dedicate a considerable amount of network resources to live streaming live, through both broadcast and unicast connections. This service offering responds solely to commercial requirements: Content must be available anytime and anywhere. However, from a strictly academic point of view, live streaming is only a requirement for live content and not for pre-produced content. Moreover, broadcasting is only efficient when the content is sufficiently popular. The services under study in this thesis use residual capacity in broadcast networks to push popular, pre-produced content to storage capacity in customer premises equipment. The proposal responds only to efficiency requirements. On one hand, it creates value from network resources otherwise unused. On the other hand, it delivers popular pre-produced content in the most efficient way: through broadcast download services. The results include models for the popularity and the duration of television content, valuable for any research work dealing with file-based delivery of television content. Later, the thesis evaluates the residual capacity available in broadcast networks through empirical studies. These results are used in simulations to evaluate the performance of background push content download services in different scenarios and for different applications. The evaluation proves that this kind of services can become a great asset for the delivery of television content / Fraile Gil, F. (2013). Evaluation of unidirectional background push content download services for the delivery of television programs [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/31656 / TESIS
15

Improving Transmission Efficiency and Scalability for Peer-to-Peer Live Streaming

Li, Zemeng 27 July 2010 (has links)
No description available.
16

Anomaly Detection Through System and Program Behavior Modeling

Xu, Kui 15 December 2014 (has links)
Various vulnerabilities in software applications become easy targets for attackers. The trend constantly being observed in the evolution of advanced modern exploits is their growing sophistication in stealthy attacks. Code-reuse attacks such as return-oriented programming allow intruders to execute mal-intended instruction sequences on a victim machine without injecting external code. Successful exploitation leads to hijacked applications or the download of malicious software (drive-by download attack), which usually happens without the notice or permission from users. In this dissertation, we address the problem of host-based system anomaly detection, specifically by predicting expected behaviors of programs and detecting run-time deviations and anomalies. We first introduce an approach for detecting the drive-by download attack, which is one of the major vectors for malware infection. Our tool enforces the dependencies between user actions and system events, such as file-system access and process execution. It can be used to provide real time protection of a personal computer, as well as for diagnosing and evaluating untrusted websites for forensic purposes. We perform extensive experimental evaluation, including a user study with 21 participants, thousands of legitimate websites (for testing false alarms), 84 malicious websites in the wild, as well as lab reproduced exploits. Our solution demonstrates a usable host-based framework for controlling and enforcing the access of system resources. Secondly, we present a new anomaly-based detection technique that probabilistically models and learns a program's control flows for high-precision behavioral reasoning and monitoring. Existing solutions suffer from either incomplete behavioral modeling (for dynamic models) or overestimating the likelihood of call occurrences (for static models). We introduce a new probabilistic anomaly detection method for modeling program behaviors. Its uniqueness is the ability to quantify the static control flow in programs and to integrate the control flow information in probabilistic machine learning algorithms. The advantage of our technique is the significantly improved detection accuracy. We observed 11 up to 28-fold of improvement in detection accuracy compared to the state-of-the-art HMM-based anomaly models. We further integrate context information into our detection model, which achieves both strong flow-sensitivity and context-sensitivity. Our context-sensitive approach gives on average over 10 times of improvement for system call monitoring, and 3 orders of magnitude for library call monitoring, over existing regular HMM methods. Evaluated with a large amount of program traces and real-world exploits, our findings confirm that the probabilistic modeling of program dependences provides a significant source of behavior information for building high-precision models for real-time system monitoring. Abnormal traces (obtained through reproducing exploits and synthesized abnormal traces) can be well distinguished from normal traces by our model. / Ph. D.
17

Change and Growth of Australian Music Value Chains

Steedman, Sam, sam.steedman@gmail.com January 2009 (has links)
The Australian music industry is growing and developing yet specific information about the ways in which distribution systems develop is limited. In this study I examined the growth and change of the Australian music value chain. This includes the development of digital distribution systems and the effect that peer-to-peer technology has on system development, specifically the disintermediation between consumers and artists to the detriment of the multinational value chains. The drivers of this change are broken into social and technical elements in order to describe the growth and change occurring. The method used included a comprehensive literature review and use of secondary data from key music industry associations. The Australian music industry is a subset of the global industry and is led by foreign markets and their methods in which music content moves from the creators to the consumers. The consumption patterns of Australian music consumers are changing. The overall value of the music industry is dropping as the new digital downloads market emerges and the overall volume of sales increases; this reflects similar trends in foreign markets. CD single sales have dropped and digital single sales (in MP3 format) have increased. However, there needs to be a balance in the future development of Australian music distribution systems between the needs of music consumers and the sustainability of music companies, where there is both connectivity and steady revenue flow. There are technical elements that have caused a movement away from the traditional forms of music distribution as new technologies facilitate the change, such as Apple's iPod and broadband Internet connections. Advancement of distribution systems has increased piracy levels and the response has been the implementation of digital rights management (DRM), which prevents connectivity. There are also social elements that affect growth and change such as connectivity, or the consumers freedom to choose when, where and how to listen to their music. When music product has a restriction placed upon it its value to the consumer drops. Multinational music companies have failed to recognise the value users place on the freedom to pick and choose and have tried to control rather than to co-develop systems that meets both parties needs.
18

Tillgång eller ägande : En studie i konsumentvärde på marknaden för digital underhållningsmedia / Access vs. Ownership : a Study of Consumer Value on the Digital Media Entertainment Market

Sivertzen, Oscar, Noble, Tom January 2013 (has links)
Syftet med uppsatsen har varit att genom kvalitativa intervjuer lyfta fram motpolerna kringdagens konsumtion av digital underhållningsmedia och fastställa om konsumenters syn på värdekan relateras till deras val av att antingen betala för ägandet eller för tillgänglighet av den. Metoden har bestått av åtta stycken kvalitativa intervjuer där respondenter fått frågor om sinkonsumtion av digitala underhållningsmedia inom; musik, video, spel och podcasts. Uppsatsen kommer fram till att konsumenter ser värdet i användningen av mediet och inte iägandet av det. Konsumenterna vill således hellre strömma sin media än att ladda ner den. Deväljer därför mer eller mindre obehindrat den tjänst som har bäst utbud. Konsumenterna menardock att det i dagsläget finns en viss otrygghet i strömningstjänsterna. Otryggheten växer ju merengagemang mediet kräver, vilket gör att spel och video som enligt respondenterna var primäraaktiviteter, vilka kräver högre engagemang, har en tendens att hellre vilja laddas ner avkonsumenterna medan musik och podcast, vilka kräver lägre engagemang, sekundära aktiviteter, hellre strömmas. / Purpose/Aim: The purpose of the thesis was to examine if consumers perceived the value of digital media entertainment in the access of the media and/or the ownership of it. Material/Method: The material consisted of 8 qualitative interviews which was presented in anarrative form. The interviews investigated consumers digital media entertainment habits and inparticular if the consumers downloaded or streamed their content. Main results: Consumers perceived the value of digital media entertainment through the accessof it, value-in-use, rather than in the ownership of it, value-in-exchange. On the other hand, themore engaged the consumers were in their use of the media, the more concerned they were withdownloading the content rather than streaming it.
19

Os fatores que influenciaram o download gratuito de música na Internet

Santos Junior, Maurício Frederico dos January 2009 (has links)
Submitted by Estagiário SPT BMHS (spt@fgv.br) on 2011-11-21T10:36:47Z No. of bitstreams: 1 1417928.pdf: 4248148 bytes, checksum: e2f47a82b8b6f05c2d2f979e7596b3f8 (MD5) / Approved for entry into archive by Estagiário SPT BMHS (spt@fgv.br) on 2011-11-21T10:37:11Z (GMT) No. of bitstreams: 1 1417928.pdf: 4248148 bytes, checksum: e2f47a82b8b6f05c2d2f979e7596b3f8 (MD5) / Approved for entry into archive by Estagiário SPT BMHS (spt@fgv.br) on 2011-11-21T10:37:49Z (GMT) No. of bitstreams: 1 1417928.pdf: 4248148 bytes, checksum: e2f47a82b8b6f05c2d2f979e7596b3f8 (MD5) / Made available in DSpace on 2011-11-21T10:38:00Z (GMT). No. of bitstreams: 1 1417928.pdf: 4248148 bytes, checksum: e2f47a82b8b6f05c2d2f979e7596b3f8 (MD5) Previous issue date: 2009 / A disseminação do formato mp3 como padrão para arquivos de música, aliada ao crescimento da Internet, fez surgir uma poderosa rede de distribuição de música online. A extrema disponibilidade, diversidade de escolha e facilidade de acesso para quem possui banda larga em seus computadores fez crescer o download de músicas pela Internet, revolucionando o mundo fonográfico. O objetivo geral deste estudo é identificar quais fatores, na perspectiva do consumidor, têm maior influência no download gratuito de música pela Internet através de uma pesquisa exploratória de duas fases. Na primeira fase, qualitativa, foram realizadas entrevistas não estruturadas com usuários e consumidores de redes peer-to-peer de download de música pela Internet e entrevista semi-estruturada com um ex-executivo da indústria fonográfica. Na fase seguinte, quantitativa, foram aplicados questionários estruturados a pessoas que efetuam download de música pela Internet. Adotou-se a regressão linear múltipla como modelo para interpretar os dados colhidos junto à amostra e testar as hipóteses relacionadas as variáveis: acessibilidade ao produto, percepção de injustiça no preço e faixa etária. Os resultados sugerem a não rejeição das três hipóteses estudadas. / The dissemination of the mp3 format as standard for archives of music, coupled with the growth of the Internet, has shown a powerful network of online distribution of musico The extreme availability, diversity of choice and ease of access for those who have broadband on their computers grew to download songs over the Internet, revolutionizing the world phonographic. The aim of this study is to identify which factors, from the perspective of consumers, have more influence on the free download of music via the Internet through an exploratory research in two phases. In the first phase, qualitative, unstructured interviews were conducted with consumers and users of peer-to-peer downloading of music over the Internet and semistructured interview with a former executive of the music industry. In the following phase, quantitative, structured questionnaires were applied to people who download music from the Internet. It was adopted a multiple linear regression model to interpret the data collected from the sample and to test the hypotheses: product accessibility, perceptions of injustice in the price and age. The results suggest not rejecting the three studied hypotheses.
20

Téléchargement de Contenus dans les réseaux véhiculaires / Content download in the Vehicular Networks

Astudillo Salinas, Darwin Fabián 27 September 2013 (has links)
L’évolution des systèmes de communications sans fil a permis d’envisager de très nombreuses applications pour les systèmes de transport intelligents (ITS). Elles peuvent ou non utiliser une infrastructure et iront de la sécurité routière aux applications de confort du conducteur ou aux jeux en réseaux. La mise à jour de cartes constitue de notre point de vue une application représentative dans la mesure où ce n’est pas une application de sécurité en tant que telle, mais qu’en revanche elle peut contribuer à réduire les embouteillages en améliorant l’efficacité dans la prise de décisions des conducteurs. Elle possède des caractéristiques facilement identifiables : volume élevé de données, faible contrainte de délai, possibilité de mise en œuvre par des communications d’infrastructure à véhicule, entre véhicules, et hybrides. L’objectif est que les contenus soient téléchargés intégralement par tous les véhicules en un temps minimal, en utilisant le moins de ressources possible et au moindre coût. Les solutions qui sont apparues comme les plus adaptées ont concerné l’utilisation de solutions 802.11p avec ou sans infrastructure. Dans le cas de solutions avec infrastructure, un certain nombre de points d’accès diffuseront des informations avec des zones de couverture le plus souvent disjointes. Vu les tailles de zone retenues et/ou le débit consacré à ce type d’applications, le passage devant un seul point d’accès ne suffira pas à télécharger de telles cartes. Il s’agit alors de définir des stratégies de diffusion d’information. Une première étude a consisté à comparer une stratégie unicast à du broadcast/multicast. Cette dernière se révèle largement meilleure. Une combinaison de ces principes n’améliore pas les performances du système, car le débit consacré à la transmission unicast ne compense pas le débit non utilisé par le broadcast. Le problème provient des doublons reçus par les véhicules en passant auprès de plusieurs points d’accès consécutifs. Afin d’atténuer le phénomène des doublons, nous avons eu recours au Codage Réseau linéaire pseudo-aléatoire. L’idée est que le point d’accès diffuse des combinaisons linéaires de morceaux de fichiers. Le grand nombre de ces combinaisons linéaires réduit de façon significative ce phénomène. De façon complémentaire, nous avons étudié l’utilisation de communications ad-hoc pour combler les morceaux de fichier manquants, en particulier dans le cas d’absence d’infrastructure. Nous avons vérifié que l’on pouvait atteindre de bons résultats dans ce contexte en fonction de la diversité des morceaux de fichiers appartenant aux véhicules rencontrés. / The evolution of wireless communications systems have enabled to consider many applications for Intelligent Transportation Systems (ITS). They may or may not use the infrastructure. They will consider from the traffic safety applications up to the driver’s comfort or network games. The map updates are, from our point of view, a representative application but in the other hand it can help to reduce congestion in improving efficiency in decision making. It has well-defined characteristics : high volume of data, low delay constraint, possibility of implementation of infrastructure-to-vehicle communications, between vehicles and hybrids. The objective is that the contents are fully downloaded by all vehicles in minimum time, using fewer resources and lower costs. The solutions that have emerged as the most suitable concerned the use of the technology 802.11p with or without infrastructure. In the case of solutions with infrastructure, a number of access points broadcast information with coverage areas most often disjointed. Given the size of area used and/or flow devoted to this type of applications, the transition to a single access point is not enough to download these maps. It is then to define strategies of information dissemination. A first study was to compare a unicast strategy face to broadcast/multicast strategy. The latter appears largely improved. A combination of these principles does not improve system performance, because the flow devoted to unicast transmission does not compensate for the flow not used by the broadcast. The problem is duplicate chunks received by vehicles passing from several consecutive access points. To mitigate the phenomenon of duplication, we used the linear network coding pseudorandom. The idea is that the access point broadcasts linear combinations of chunks of files. The large number of these linear combinations significantly reduces this phenomenon. In a complementary manner, we investigated the use of ad hoc communications to fill the missing chunks of file, particularly in the absence of infrastructure. We verified that we could achieve good results in this context based on the diversity of chunks of files which are owned by the encountered vehicles.

Page generated in 0.0699 seconds