• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 155
  • 31
  • 23
  • 19
  • 6
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 325
  • 54
  • 52
  • 48
  • 46
  • 40
  • 38
  • 36
  • 31
  • 31
  • 30
  • 29
  • 27
  • 25
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Cultural Consultations in Criminal Forensic Psychology:A Thematic Analysis of the Literature

Radosteva, Alesya 14 September 2018 (has links)
No description available.
212

Regleringen av digitala avtalsobjekt i konsumentköplagen : Med fokus på tillhandahållanden av digitalt innehåll och digitala tjänster

Martinsson, Ejah January 2023 (has links)
This thesis describes the new regulation of digital products in the Consumer Services Act (2022:260). The essay focuses specifically on the supply of digital content and digital services which derive from an EU-directive 2019/770 (henceforth The Digital Content Directive). “Digital products” is a made-up concept in this thesis for the following objects: digital content and digital services, digital content and digital services supplied on tangible medium and goods with digital elements. Only the last-mentioned object is regulated in a separate EU-directive 2019/771 (henceforth The Sales of Goods Directive), due to its classification as “goods”. For a long period of time, Sweden and other member states of the EU have lacked uniform rules regarding digital products. The Commission acknowledged this absence and launched “The EU’s new digital single market strategy” (henceforth the DSM-strategy), with several targeted actions such as improving access for consumers to digital products and services within the EU as well as maximizing the growth potential of their digital economy. The DSM-strategy has then resulted in The Digital Content Directive and The Sales of Goods Directive which are the two EU-directives that have been implemented in the new Consumer Services Act in Sweden. The Digital Content Directive was implemented in a separate 9th chapter with numerous cross references to other chapters in the law as well as containing both unclear and inexplicit diction. In order to grasp the new regulation of digital products in Sweden, the different provisions applicable to each and every digital product, however with the main focus on digital content and digital services, are displayed and explained alongside an objectively questioning analysis throughout the essay. The conclusion of this juridical exposition is that although consumers have received satisfactory consumer protection throughout the EU, the Consumer Services Act should have been drafted differently. Furthermore, uncertainties regarding the possible “payments” with data are discovered. Especially concerning is the lack of definitive regulation and contractual remedies for consumers to initiate when paying with their data. Whether the aim of established consumer-friendly rules was achieved or not, viewed from a legislative drafting point of view, is also discussed in the final chapters of this paper. This particular question is likewise analyzed through a small-scale comparative analysis with Nordic countries. A proposal for the legislator is thereby presented; adopt the Finnish way of implementing these two EU-directives into the Consumer Services Act.
213

Reducing software complexity by hidden structure analysis : Methods to improve modularity and decrease ambiguity of a software system

Bjuhr, Oscar, Segeljakt, Klas January 2016 (has links)
Software systems can be represented as directed graphs where components are nodes and dependencies between components are edges. Improvement in system complexity and reduction of interference between development teams can be achieved by applying hidden structure analysis. However, since systems can contain thousands of dependencies, a concrete method for selecting which dependencies that are most beneficial to remove is needed. In this thesis two solutions to this problem are introduced; dominator- and cluster analysis. Dominator analysis examines the cost/gain ratio of detaching individual components from a cyclic group. Cluster analysis finds the most beneficial subgroups to split in a cyclic group. The aim of the methods is to reduce the size of cyclic groups, which are sets of co- dependent components. As a result, the system architecture will be less prone to propagating errors, caused by modifications of components. Both techniques derive from graph theory and data science but have not been applied to the area of hidden structures before. A subsystem at Ericsson is used as a testing environment. Specific dependencies in the structure which might impede the development process have been discovered. The outcome of the thesis is four to-be scenarios of the system, displaying the effect of removing these dependencies. The to-be scenarios show that the architecture can be significantly improved by removing few direct dependencies. / Mjukvarusystem kan representeras som riktade grafer där komponenter är noder och beroenden mellan komponenter är kanter. Förbättrad systemkomplexitet och minskad mängd störningar mellan utvecklingsteam kan åstadkommas genom att applicera teorin om gömda beroende. Eftersom system kan innehålla tusentals beroenden behövs en konkret metod för att hitta beroenden i systemet som är fördelaktiga att ta bort. I den här avhandlingen presenteras två lösningar till problemet; dominator- och klusteranalys. Dominatoranalys undersöker kostnad/vinst ration av att ta bort individuella komponenter i systemet från en cyklisk grupp. Klusteranalys hittar de mest lönsamma delgrupperna att klyva isär i en cyklisk grupp. Metodernas mål är att minska storleken på cykliska grupper. Cykliska grupper är uppsättningar av komponenter som är beroende av varandra. Som resultat blir systemarkitekturen mindre benägen till propagering av fel, orsakade av modifiering av komponenter. Båda metoderna härstammar från grafteori och datavetenskap men har inte applicerats på området kring gömda strukturer tidigare. Ett subsystem på Ericsson användes som testmiljö. Specifika beroenden i strukturen som kan vara hämmande för utvecklingsprocessen har identifierats. Resultatet av avhandlingen är fyra potentiella framtidsscenarion av systemet som visualiserar effekten av att ta bort de funna beroendena. Framtidsscenariona visar att arkitekturen kan förbättras markant genom att avlägsna ett fåtal direkta beroenden.
214

Daily stand up meetings - hiss eller diss? / Daily stand up meetings - hit or shit?

Stedt, Lotten, Vutolen, Cajsa January 2022 (has links)
Syftet med studien är att beskriva hur agila team upplever digitala DSM samt kartlägga vilka tekniska ochsociala behov som uppfylls och/eller saknas. De teman som undersöktes var hur digitala DSMgenomfördes praktiskt, vilka tekniska verktyg som användes samt vilken social inverkan det hade påteamet. För att ge riktning åt studien skrevs tre forskningsfrågor med tillhörande tre hypoteser sombaseras på tidigare forskning. Hypoteserna som utformades löd; (H1) vid digitala DSM behöver fler än detre centrala frågorna diskuteras, (H2) funktioner som simulerar den fysiska arbetsplatsen är bärande för ettfungerande digitalt DSM och (H3) minskad informell kommunikation vid distansarbete kompenseras avatt digitala DSM utökas i tid. Studien har genomförts genom att samla in data från en webbaserad enkätsom skickades ut med hjälp av grindvaktare till flera agila team. Enkäten bestod av både kvalitativafritextfrågor och kvantitativa flervalsfrågor som baserades på Theory of distances (Bjarnason et al., 2016),en sammanställning av intergroup theory samt tidigare forskning. Resultatet visade att små skillnaderfanns mellan traditionella och digitala DSM. Hybrid-varianter, minskad informell kommunikation ochbrist på heltäckande funktioner ansågs vara den största utmaningen med digitala DSM. Fördelarnaupplevdes olika beroende på personliga förutsättningar hos respondenterna. Slutsatserna som kunde drasav studien var att det saknades funktioner för att stödja synlighet av emotioner och kroppsspråk men attfunktioner, som skärmdelning, gav en gemensam bild av projektet. Den informella kommunikationenbehöver aktivt inkluderas vid digitala DSM vilket gör att digitala DSM blir längre än traditionella. Vidareforskning hade kunnat fokusera på virtuella mötesrum som en del av lösningen på identifierade problem. / The purpose of the study is to describe how agile teams experience digital DSM and to elucidate whichtechnical and social needs that are met and/or missing. Following themes were examined: how digitalDSM was implemented in practice, what technical tools were used and what social impact digital DSMshad on the team. To give direction to the study, three research questions were formulated with threeassociated hypotheses based on previous research. The hypotheses that were formed were; (H1) in digitalDSM, more than the three central questions were discussed, (H2) functions that simulate the physicalworkplace are essential for a functioning digital DSM and (H3) reduced informal communication inremote work is compensated by time extended digital DSM. The study was conducted by collecting datafrom a web-based survey that was provided to several agile teams with the help of gatekeepers. Thequestionnaire consisted of both qualitative open questions and quantitative multiple-choice questionsbased on Theory of distances (Bjarnason et al., 2016), a compilation of intergroup theory and previousresearch. The results show that there are small differences between traditional and digital DSMs. Hybridvariants, reduced informal communication and lack of comprehensive features were considered to be thegreatest challenge with digital DSM. The benefits were experienced differently depending on the personalcharacteristics of the respondents. The conclusions of the study were that there were no technicalfunctions to back the visibility of emotions and body language, but that functions such as screen sharing,gave a common picture of the project. The informal communication needs to be actively included indigital DSMs which makes digital DSMs more protracted than traditional ones. Further research can focus on virtual meeting rooms as part of the solution to the identified problems
215

Extending relational model transformations to better support the verification of increasingly autonomous systems

Callow, Glenn January 2013 (has links)
Over the past decade the capabilities of autonomous systems have been steadily increasing. Unmanned systems are moving from systems that are predominantly remotely operated, to systems that include a basic decision making capability. This is a trend that is expected to continue with autonomous systems making decisions in increasingly complex environments, based on more abstract, higher-level missions and goals. These changes have significant implications for how these systems should be designed and engineered. Indeed, as the goals and tasks these systems are to achieve become more abstract, and the environments they operate in become more complex, are current approaches to verification and validation sufficient? Domain Specific Modelling is a key technology for the verification of autonomous systems. Verifying these systems will ultimately involve understanding a significant number of domains. This includes goals/tasks, environments, systems functions and their associated performance. Relational Model Transformations provide a means to utilise, combine and check models for consistency across these domains. In this thesis an approach that utilises relational model transformation technologies for systems verification, Systems MDD, is presented along with the results of a series of trials conducted with an existing relational model transformation language (QVT-Relations). These trials identified a number of problems with existing model transformation languages, including poorly or loosely defined semantics, differing interpretations of specifications across different tools and the lack of a guarantee that a model transformation would generate a model that was compliant with its associated meta-model. To address these problems, two related solvers were developed to assist with realising the Systems MDD approach. The first solver, MMCS, is concerned with partial model completion, where a partial model is defined as a model that does not fully conform with its associated meta-model. It identifies appropriate modifications to be made to a partial model in order to bring it into full compliance. The second solver, TMPT, is a relational model transformation engine that prioritises target models. It considers multiple interpretations of a relational transformation specification, chooses an interpretation that results in a compliant target model (if one exists) and, optionally, maximises some other attribute associated with the model. A series of experiments were conducted that applied this to common transformation problems in the published literature.
216

DSM-PM2 : une plate-forme portable pour l'implémentation de protocoles de cohérence multithreads pour systèmes à mémoire virtuellement partagée

Antoniu, Gabriel 21 November 2001 (has links) (PDF)
Dans leur présentation traditionnelle, les systèmes à mémoire distribuée virtuellement partagée (MVP, en anglais DSM) permettent à des processus de partager un espace d'adressage commun selon un modèle de cohérence fixé : cohérence séquentielle, à la libération, etc. Les pro- cessus peuvent habituellement être distribués sur des noeuds physiquement distincts et leurs in- teractions par la mémoire commune sont implémentées (de manière transparente) par la MVP, en utilisant une bibliothèque de communication. Dans la plupart de travaux dans ce domaine, il est sous-entendu que la MVP et l'architecture sous-jacente sont données. Le programmeur doit alors adapter son application à ce cadre fixe, afin d'obtenir une exécution efficace. Cette approche impose des limitations statiques et ne permet pas de comparer des approches alternatives. La contribution de cette thèse consiste à proposer une plate-forme générique d'implémentation et d'expérimentation appelée DSM-PM2, qui permet de développer et d'optimiser conjointement les applications distribuées et le(s) protocole(s) de cohérence de la MVP sous-jacente. Cette plate-forme, implémentée entièrement au niveau logiciel, est portable sur plusieurs architectures de grappes hautes performances. Elle fournit les briques de bases nécessaires pour implémenter et évaluer une large classe de protocoles de cohérence multithreads dans un cadre unifié. Trois mo- dèles de cohérence sont actuellement supportés : la cohérence séquentielle, la cohérence à la libéra- tion et la cohérence Java. Plusieurs études de performance ont été effectuées à l'aide d'applications multithreads pour l'ensemble des protocoles proposés, sur différentes plates-formes. DSM-PM a été validé par son utilisation en tant que cible d'un système de compilation Java pour des grappes appelé Hyperion.
217

Managing Dependencies in Knowledge-Based Systems: A Graph-Based Approach

Tapankov, Martin January 2009 (has links)
<p>In knowledge-based engineering, the inference engine plays an important part in the behaviour of the system. A flexible and adaptive execution scheme allows the designer to experiment with different modes of operation and selecting an appropriate one with respect to the initial data set and the execution goal.</p><p>In this project, an extension of an existing research prototype software in the field of knowledge-based engineering will be developed, with the goal of building a reliable and easy to use dependency resolution engine that will replace a less-than-ideal current implementation of the same. A discussion will be included how the knowledge concepts and objects can be represented in an abstract mathematical form, converting at the same time the problem of dependency resolution to a more formally specified one in terms of the data abstraction proposed. Some algorithms and methods that are used to operate on the data set will be discussed from both a theoretical and programming point of view, analysing their complexity, proposing and testing their implementation. Graphical interface controls that can be used to visualize and understand easily the relations in the available knowledge base will be also demonstrated.</p><p>The testing and verification of the resulting software will be presented, comparing its behaviour against reference tools serving similar purposes. Methods for validating the consistency of the knowledge base will also be discussed. Finally, the integration of the newly-developed code within the context of the prototype will be discussed, commenting on the new features and functionality gained.</p>
218

Un poison même à petite dose : étude de la structure latente et des facteurs développementaux du sadisme sexuel

Longpré, Nicholas 08 1900 (has links)
Les délinquants sexuels sadiques sont généralement décrits comme une entité clinique particulière commettant des délits graves. Or, la notion même de sadisme sexuel pose un nombre important de problèmes. Parmi ceux-ci, on retrouve des problèmes de validité et de fidélité. Perçu comme une maladie dont on est atteint ou pas, le sadisme a été étudié comme si les sadiques étaient fondamentalement différents. À l’heure actuelle, plusieurs travaux laissent croire que la majorité des troubles psychologiques se présentent comme une différence d'intensité (dimension) plutôt qu’une différence de nature (taxon). Même si la conception médicale prévaut encore en ce qui concerne le sadisme sexuel, plusieurs évoquent l’idée qu’il pourrait être mieux conceptualisé à l’aide d’une approche dimensionnelle. En parallèle, nos connaissances sur les facteurs contributifs au développement du sadisme sexuel sont limitées et reposent sur de faibles appuis empiriques. Jusqu'à présent, très peu d'études se sont intéressées aux facteurs menant au développement du sadisme sexuel et encore moins ont tenté de valider leurs théories. En outre, nos connaissances proviennent majoritairement d'études de cas portant sur les meurtriers sexuels, un sous-groupe très particulier de délinquants fréquemment motivé par des intérêts sexuels sadiques. À notre connaissance, aucune étude n'a proposé jusqu'à présent de modèle développemental portant spécifiquement sur le sadisme sexuel. Pourtant, l'identification de facteurs liés au développement du sadisme sexuel est essentielle dans notre compréhension ainsi que dans l'élaboration de stratégie d'intervention efficace. La présente thèse s'inscrit dans un contexte visant à clarifier le concept de sadisme sexuel. Plus spécialement, nous nous intéressons à sa structure latente, à sa mesure et à ses origines développementales. À partir d'un échantillon de 514 délinquants sexuels évalué au Massachusetts Treatment Center, la viabilité d’une conception dimensionnelle du sadisme sexuel sera mise à l’épreuve à l'aide d'analyses taxométriques permettant d'étudier la structure latente d'un construit. Dans une seconde étape, à l'aide d'analyses de Rasch et d'analyses appartenant aux théories de la réponse à l'item à deux paramètres, nous développerons la MTC Sadism Scale (MTCSS), une mesure dimensionnelle du sadisme sexuel. Dans une troisième et dernière étape, un modèle développemental sera élaboré à l'aide d'équations structurales. La présente thèse permettra de contribuer à la clarification du concept de sadisme sexuel. Une clarification de la structure latente et des facteurs développementaux permettra de saisir les devis de recherche les plus à même de capturer les aspects essentiels. En outre, ceci permettra d'identifier les facteurs pour lesquels une intervention est la plus appropriée pour réduire la récidive, ou la gravité de celle-ci. / Sadistic offenders are generally described as a particular clinical entity committing serious offenses. However, the very notion of sexual sadism is plague with a significant number of problems. Among these, there are important problems of validity and reliability. Perceived as a disease which one can or can't have, sadism was studied as if sadistic offenders were fundamentally different from non-sadistic offenders. Actually, several studies suggest that the majority of psychological disorders present a dimensional rather that a taxonic structure. Therefore, the difference between two individuals will be a difference of intensity instead of nature. Although the medical conceptualization still prevails regarding sexual sadism, many evoke the idea that it might be best conceptualized using a dimensional approach. On the other hand, our knowledge on the factors leading to the development of sexual sadism are based on weak empirical foundations. So far, very few studies have examined the factors leading to the development of sexual sadism and even fewer have attempted to validate their theories. In addition, our knowledge mainly comes from case studies of sexual murderers, some of whom exhibit an extreme form of sexual sadism. To our knowledge, no study has proposed a developmental model of sexual sadism. The identification of factors associated with the development of sexual sadism is essential in our understanding of this paraphilia and in the development of effective intervention strategies. The aim of the present thesis is to clarify the concept of sexual sadism. Specifically, we are interested in its latent structure, its assessment and its developmental origins. From a sample of 514 sexual offenders assessed at the Massachusetts Treatment Center, the viability of a dimensional conception of sexual sadism will be tested using taxometrics analyses. In a second step, using Rasch analyses and two-parameters item response theory analyses, we will develop the MTCSS, a dimensional measure of sexual sadism. In a third and final stage, a developmental model of sexual sadism will be developed using structural equations analyses. The current thesis will contribute significantly to the clarification of the concept of sexual sadism. A clarification of its latent structure and developmental factors will allow to develop better research designs to capture the essential aspects of sexual sadism. In addition, this will allow to identify the factors for which intervention is the most appropriate to reduce recidivism, or the severity of it.
219

Técnicas de otimização não-linear aplicada a algoritmos DSM

NEVES, Darlene Maciel 09 November 2007 (has links)
Submitted by Edisangela Bastos (edisangela@ufpa.br) on 2013-01-08T19:18:39Z No. of bitstreams: 2 license_rdf: 23898 bytes, checksum: e363e809996cf46ada20da1accfcd9c7 (MD5) Dissertacao_TecnicasOtimizacaoNaolinear.pdf: 1651076 bytes, checksum: fa57b2105cf7dc60b02f0754371ecee5 (MD5) / Approved for entry into archive by Ana Rosa Silva(arosa@ufpa.br) on 2013-01-17T14:43:15Z (GMT) No. of bitstreams: 2 license_rdf: 23898 bytes, checksum: e363e809996cf46ada20da1accfcd9c7 (MD5) Dissertacao_TecnicasOtimizacaoNaolinear.pdf: 1651076 bytes, checksum: fa57b2105cf7dc60b02f0754371ecee5 (MD5) / Made available in DSpace on 2013-01-17T14:43:15Z (GMT). No. of bitstreams: 2 license_rdf: 23898 bytes, checksum: e363e809996cf46ada20da1accfcd9c7 (MD5) Dissertacao_TecnicasOtimizacaoNaolinear.pdf: 1651076 bytes, checksum: fa57b2105cf7dc60b02f0754371ecee5 (MD5) Previous issue date: 2007 / Esta dissertação apresenta os algoritmos considerados estado-da-arte para gerenciamento dinâmico de espectro (DSM). As técnicas de otimização utilizadas nos algoritmos DSM são abordadas e brevemente discutidas para melhor entendimento, descrição e comparação dos algoritmos. A análise comparativa entre os algoritmos foi realizada considerando o ganho em taxa (kbps) obtido em simulações. Para tanto, foi realizado em laboratório um conjunto de medições de função de transferência direta e de acoplamento, posteriormente utilizadas nas simulações dos algoritmos IWF, ISB e SCALE. Os resultados obtidos nas simulações através do uso das funções de transferência medidas mostraram melhor desempenho quando comparados aos demais resultados ao considerar funções de transferência obtidas a partir do padrão 1% pior caso, resultado este reflexo da aproximação 1% em que os pares apresentam maiores níveis de crosstalk em todas as frequências da função de transferência. Dentre os algoritmos comparados, o ISB e SCALE obtiveram desempenho semelhante em canais padronizados, ficando o IWF com o desempenho próximo ao SSM. No entanto, nas simulações em cenários com canais medidos, os três algoritmos tiveram ganhos muito próximo devido ao baixo nível de crosstalk. / This M.Sc. thesis presents state-of-art algorithms for dynamic spectrum management (DSM). The strategy and description of each DSM algorithm are presented and briefly discussed as well as a comparative analysis between them for better understanding. This analysis was conducted considering the rate gain (kbps) obtained from computer simulations and the results are presented by tables and rate region curves. Additionally, it was conducted in laboratory a set of direct and coupling transfer function measurements. Later on, those measurements were used during DSM algorithms simulations; this dissertation focused in the IWF, ISB and SCALE algorithms. The results obtained from the transfer function measurements showed better performance compared to the results with transfer function 1% worst-case model. The later considers 1% of pairs present the biggest crosstalk level in all transfer function frequencies. In the case where standardized channels were employed, ISB and SCALE obtained similar performances whereas IWF had a performance quite similar to SSM. On the other hand, these three algorithms had similar gain in simulations evolving the measured channels because the low crosstalk level.
220

Um protótipo para desenvolvimento e aplicação de estratégias de otimização em sistemas xDSL práticos

MEDEIROS, Eduardo Lins de 19 April 2010 (has links)
Submitted by Hellen Luz (hellencrisluz@gmail.com) on 2017-10-04T17:32:51Z No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_PrototipoDesenvolvimentoAplicacao.pdf: 1668249 bytes, checksum: cd94542f915fbee0247c145c058c84ec (MD5) / Rejected by Edisangela Bastos (edisangela@ufpa.br), reason: on 2017-10-10T17:04:36Z (GMT) / Submitted by Hellen Luz (hellencrisluz@gmail.com) on 2017-10-11T16:43:33Z No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_PrototipoDesenvolvimentoAplicacao.pdf: 1668249 bytes, checksum: cd94542f915fbee0247c145c058c84ec (MD5) / Approved for entry into archive by Irvana Coutinho (irvana@ufpa.br) on 2017-10-16T13:25:44Z (GMT) No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_PrototipoDesenvolvimentoAplicacao.pdf: 1668249 bytes, checksum: cd94542f915fbee0247c145c058c84ec (MD5) / Made available in DSpace on 2017-10-16T13:25:44Z (GMT). No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_PrototipoDesenvolvimentoAplicacao.pdf: 1668249 bytes, checksum: cd94542f915fbee0247c145c058c84ec (MD5) Previous issue date: 2010-04-19 / FADESP - Fundação de Amparo e Desenvolvimento da Pesquisa / Este trabalho tem como objetivo o desenvolvimento de um prototipo para aplicação de estrategias de otimização em sistemas xDSL praticos. O prototipo descrito constitui-se de componentes de software e um setup experimental, capaz de gerar estímulos (trafego e ruídos) para uma rede DSL completa, a m de avaliar seu desempenho num ambiente controlado com equipamentos comerciais não modi cados. Os resultados obtidos com o prototipo, bem como suas aplicações no campo de otimização de sistemas DSL são apresentados. / This work describes the development of a prototype for the application of optimization strategies for practical xDSL systems. The prototype described here is made of software components and an experimental setup, capable of generating IP tra c and noise signals, in order to evaluate the performance of a complete DSL network in a controlled environment, with commercial unmodi ed hardware. The results obtained with the prototype as well as its applications for optimization of practical xDSL systems are presented.

Page generated in 0.0832 seconds