• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 308
  • 163
  • 91
  • 68
  • 35
  • 19
  • 10
  • 10
  • 8
  • 6
  • 6
  • 5
  • 5
  • 5
  • 3
  • Tagged with
  • 823
  • 152
  • 113
  • 86
  • 81
  • 80
  • 80
  • 77
  • 75
  • 68
  • 67
  • 62
  • 61
  • 59
  • 59
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Sinais da Guimarães urbana em 1498

Sá, Alberto, 1968- January 2001 (has links)
No description available.
42

Analysis of Policy Water Resources of the State of Cearà from the evolution of the implementation of budgetary resources from 1995 to 2012. / AnÃlise da polÃtica de recursos hÃdricos do Estado do Cearà a partir da evoluÃÃo da aplicaÃÃo dos recursos orÃamentÃrios no perÃodo de 1995 a 2012

Karine Machado Campos Fontenele 10 December 2013 (has links)
The state of CearÃ, inserted in the semiarid Northeast, has been following the global trend of the development of water resources policy, but the challenge is to continue its effective implementation, considering the need to ensure water availability and improving the quality of water, besides the implementation of management instruments against a background of increasing demand and thus polluting sources. Starting from the premise that public sector intervention in water resources policy is essential and mandatory due to the need of managing conflicts and major investments, government planning and evaluating their actions become decisive factors for the successful management these resources. From this rationale, this study sought to analyze the development of the Water Resources of the State of Cearà policy observing the execution of the State budget in the period 1995-2012 on the political context, the involvement of funding agencies, major products delivered infrastructure, studies, projects and periods of drought. Technical comparisons, observations and analyzes of facts were used, and the relationship thereof. As a result, it was observed that the budgetary execution of SRH was strongly influenced politics, especially in the last years of government mandates, funding sources that were instrumental in the implementation of policy and drought years did not interfere directly in the budget implementation of SRH in every year. As for studies and projects, the research showed that there was a concentration in the early years of the analysis. Based on the information gathered and analysis is intended to support government planning with greater knowledge, maximizing the results of public spending, identifying successes and overcoming bottlenecks. / O estado do CearÃ, inserido no semiÃrido Nordestino, vem acompanhando a evoluÃÃo mundial do desenvolvimento da polÃtica de Recursos HÃdricos, porÃm o grande desafio à dar continuidade a sua efetiva implementaÃÃo, considerando a necessidade de garantir a disponibilidade hÃdrica e a melhoria da qualidade de Ãgua, alÃm da implantaÃÃo dos instrumentos de gestÃo diante de um cenÃrio de crescente aumento da demanda e, consequentemente, de fontes poluidoras. Partindo da premissa que a intervenÃÃo do setor pÃblico na polÃtica de recursos hÃdricos à essencial e obrigatÃria em virtude da necessidade do gerenciamento de conflitos e da realizaÃÃo de grandes investimentos, o planejamento governamental e a avaliaÃÃo das suas aÃÃes tornam-se fatores decisivos para uma boa gestÃo desses recursos. A partir desta justificativa, este trabalho buscou analisar a evoluÃÃo da polÃtica de Recursos HÃdricos do Estado do Cearà observando a execuÃÃo orÃamentÃria do Estado no perÃodo de 1995 a 2012 diante do contexto polÃtico, da participaÃÃo de agentes financiadores, dos principais produtos entregues de infraestrutura, estudos, projetos e dos perÃodos de seca. Adotou-se como estratÃgia de pesquisa o estudo de caso, utilizando tÃcnicas de comparaÃÃes, observaÃÃes e anÃlises de fatos, bem como a interdependÃncia dos mesmos. Como resultado, observou-se que a execuÃÃo orÃamentÃria da SRH sofreu forte influencia polÃtica, principalmente nos Ãltimos anos de mandatos governamentais; que as fontes financiadoras foram decisivas na implantaÃÃo da polÃtica e que os anos de seca nÃo interferiram diretamente na execuÃÃo orÃamentÃria anual da SRH. Quanto aos estudos e projetos, a pesquisa mostrou que houve uma concentraÃÃo nos primeiros anos da anÃlise. Baseado nas informaÃÃes levantadas e nas anÃlises pretende-se subsidiar o planejamento governamental com maior conhecimento, maximizando o resultado do gasto pÃblico, identificando Ãxitos e superando pontos de estrangulamento.
43

Verification of Cyber Physical Systems

Murali, Dilip Venkateswaran 20 September 2013 (has links)
Due to the increasing complexity of today\'s cyber-physical systems, defects become inevitable and harder to detect. The complexity of such software is generally huge, with millions of lines of code. The impact of failure of such systems could be hazardous. The reliability of the system depends on the effectiveness and rigor of the testing procedures. Verification of the software behind such cyber-physical systems is required to ensure stability and reliability before the systems are deployed in field. We have investigated the verification of the software for Autonomous Underwater Vehicles (AUVs) to ensure safety of the system at any given time in the field. To accomplish this, we identified useful invariants that would aid as monitors in detecting abnormal behavior of the software. Potential invariants were extracted which had to be validated. The investigation attempts to uncover the possibility of performing this method on existing Software verification platforms. This was accomplished on Cloud9, which is built on KLEE and using the Microsoft\'s VCC tool. Experimental results show that this method of extracting invariants can help in identifying new invariants using these two tools and the invariants identified can be used to monitor the behavior of the autonomous vehicles to detect abnormality and failures in the system much earlier thereby improving the reliability of the system. Recommendations for improving software quality were provided. The work also explored safety measures and standards on software for safety critical systems and Autonomous vehicles. Metrics for measuring software complexity and quality along with the requirements to certify AUV software were also presented. The study helps in understanding verification issues, guidelines and certification requirements. / Master of Science
44

Control Flow Based Static Execution Time Analysis Using Symbolic Execution

Sundell, Isak January 2022 (has links)
To ensure the correctness of real time systems, it is important to determine the execution time of tasks. The worst case execution time of each task needs to be found in order to determine if the system is schedulable. This thesis aims at bounding the execution time of programs analyzed by KLEE, a symbolic execution engine. This is done by estimating the cycles required on the Cortex-M4 processor. A custom fork of KLEE has been created which outputs additional information about the program under analysis. This information is used by a tool written in Rust which reconstructs the corresponding control flow in optimized assembly code. KLEE analyzes an intermediate representation language, LLVM IR. This representation is used in the compilation process of many programming languages. One of these languages is Rust which has been the primary focus of the tool. Testing has been done on applications written with the RTIC framework. The measured cycles of these applications has been correctly bounded for all test cases.
45

CRIU-RTX: Remote Thread eXecution using Checkpoint/Restore in Userspace

Noor Mohamed, Mohamed Husain 21 July 2023 (has links)
Scaling up application performance on single high-end machines is increasingly becoming difficult due to scalability challenges of processor interconnects, cache coherence protocols, and memory bandwidth. Significant prior work has addressed this problem by scaling-out application threads across multiple nodes to exploit resources outside the single machine boundary. Prior works have also leveraged heterogeneous instruction set architecture (ISA) systems to improve application performance as well as energy-efficiency, a major cost driver in datacenters, by augmenting high-end servers with power-efficient embedded boards. Existing works, however, suffer from deployability challenges due to dependencies on the operating system or programming models that require non-trivial application modifications. We introduce CRIU-RTX, a userspace framework to scale-out multi-threaded applications across multiple nodes. Integrated with HetMigrate, a prior work on migrating processes across heterogeneous-ISA systems, CRIU-RTX can suspend a subset of threads in a process and resume their execution on different nodes, including, but not limited to heterogeneous-ISA nodes. CRIU-RTX implements distributed shared memory in userspace, thereby allowing application threads to access distributed memory transparently without any operating system dependency. Our experimental evaluations show 21% to 43% performance gains while scaling-out applications across x86-64 servers, and energy efficiency gains of up to 18% while scaling-out across a cluster of x86-64 server and ARM64 embedded boards. Since CRIU-RTX does not depend on operating system modifications, it can be easily deployed on a diverse set of machines, including, but not limited to ISA-different machines running the stock Linux operating system. / Master of Science / Commonly referred to as "Moore's Law", Gordan Moore predicted that the number of transistors on a chip would double every two years. However, this law no longer holds true, leading to a shift in computer research and development. To meet the increasing demands for faster and cheaper servers, researchers began exploring alternative computer designs. Data centers have started adopting servers with diverse architectures to enhance the cost-to-performance ratio, resulting in heterogeneous environments. Distributed execution refers to the process of running computational tasks or executing software across multiple interconnected systems or nodes. Instead of relying on a single machine or processor, the workload is distributed among a network of computers, allowing for parallel processing and improved performance. Prior works in this direction had difficulty in adoption due to customized hardware or operating system requirements. This thesis introduces CRIU-RTX, a userspace framework to scale-out application threads without operating system dependency. We implemented a distributed shared memory system in userspace to allow application threads running in scaled-out execution to access distributed memory as if they are running on the same machine. Our evaluations of CRIU-RTX show significant improvement in performance and energy-efficiency.
46

ATT: Execution models for logic programs

Chen, Pu January 1995 (has links)
No description available.
47

Living on Ohio''s Death Row

Lose, Eric, Ph.D. 23 September 2011 (has links)
No description available.
48

Execution time analysis for dynamic real-time systems

Zhou, Yongjun January 2002 (has links)
No description available.
49

Reducing execution overhead in multitasking system architectures

Killeen, Timothy F. January 1994 (has links)
No description available.
50

Secure and Efficient In-Process Monitor and Multi-Variant Execution

Yeoh, SengMing 01 February 2021 (has links)
Control flow hijacking attacks such as Return Oriented Programming (ROP) and data oriented attacks like Data Oriented Programming (DOP) are problems still plaguing modern software today. While there have been many attempts at hardening software and protecting against these attacks, the heavy performance cost of running these defenses and intrusive modifications required has proven to be a barrier to adoption. In this work, we present Monguard, a high-performance hardware assisted in-process monitor protection system utilizing Intel Memory Protection Keys (MPK) to enforce execute-only memory, combined with code randomization and runtime binary patching to effectively protect and hide in-process monitors. Next, we introduce L-MVX, a flexible lightweight Multi-Variant Execution (MVX) system running in the in-process monitor system that aims to solve some of the performance problems of recent MVX defenses through selective program call graph protection and in-process monitoring, maintaining security guarantees either by breaking attacker assumptions or creating a scenario where a particular attack only works on a single variant. / Master of Science / Memory corruption attacks are still prevalent on modern software. While there have been many attempts at hardening software and preventing against these attacks, the heavy performance cost of running these defenses and intrusive modifications required have proven to be a barrier to adoption. In this work, we present L-MVX, a high-performance hardware assisted in-process monitor protection system that provides an unintrusive and efficient way to defend against these attacks on monitor systems. We also introduce L-MVX, a flexible lightweight process monitoring engine running on L-MVX that aims to solve some of the performance problems of recent monitor defenses.

Page generated in 0.0456 seconds