• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 326
  • 92
  • 70
  • 52
  • 34
  • 31
  • 16
  • 9
  • 8
  • 7
  • 6
  • 5
  • 5
  • 5
  • 5
  • Tagged with
  • 804
  • 340
  • 131
  • 125
  • 124
  • 117
  • 100
  • 69
  • 68
  • 65
  • 63
  • 62
  • 60
  • 60
  • 57
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
491

A core signaling component of the notch network + a molecular interaction database accessible through an online VLSIC-like interface

Barsi, Julius Christopher 28 August 2008 (has links)
Not available / text
492

Varför barn får kontaktperson och kontaktfamilj : En aktstudie om barnens bakgrund och skäl till insats

Westin, Sara, Österlund, Elin January 2013 (has links)
The aim of this study was to look into why children receive the interventions contact person and contact family. This was done by studying case-files. The main questions were: -       How common is it that there are reasons for the intervention linked to parents and which are the most common? -       How common is it that there are reasons for the intervention and problems linked to children and which are the most common? -       Is there any indication of connections between reasons, age, gender or type of intervention? If so, what are the connections? The main results of this study were that most of the children lived with a single mother, often with a weak social network, and in need of relief. It was more common that reasons were linked to children then parents and the most common reasons indicated a need for an extra adult. The most frequent problem related to children were externalizing behavior. Connections among children were found between; externalizing behavior and gender; age and type of intervention; amount of problems, age and type of intervention.
493

Antivirusinių programų failinės sistemos realaus laiko stebėjimo algoritmai / Real-time Tracking System for Antivirus Engines

Talmontienė, Jūratė 19 June 2013 (has links)
Šiame baigiamajame darbe yra nagrinėjami antivirusinėse programose taikomi failinės sistemos realaus laiko stebėjimo metodai – API sąsajos funkcijų perėmimas, failinių sistemų filtravimo tvarkyklės, dėklinės failinės sistemos, FUSE technologijos panaudojimas. Pateikiami metodų privalumai ir trūkumai. Darbo pabaigoje aprašoma C/C++ programavimo kalbomis sukurta realaus laiko failinės sistemos stėbėjimo programa - failinės sistemos filtravimo tvarkyklė ir vartotojo lygio modulis. Darbą sudaro šešios pagrindinės dalys: įvadas, teorinė, analitinė ir programavimo dalys, išvados ir literatūros sąrašas. Darbo apimtis – 54 p. teksto be priedų, 16 pav., 3 lent., 28 bibliografiniai šaltiniai. Atskirai pridedami darbo priedai. / In this final work antivirus file system real-time file system tracking methods – usage of file system filter drivers, API hooking, stackable file systems, FUSE technology for antivirus are analyzed. The pros and cons of these methods are given. At the end of the thesis real-time file system tracking program developed in the C/C++ programming languages is presented. Created program consists of two parts – file system filter driver and user-mode module. Structure of the work: introduction, theoretical, analysis and programming parts, conclusions, references. Thesis consists of: 54 p. text without appendixes, 16 pictures, 3 tables, 28 bibliographical entries. Appendixes included.
494

Reducing Size and Complexity of the Security-Critical Code Base of File Systems

Weinhold, Carsten 09 July 2014 (has links) (PDF)
Desktop and mobile computing devices increasingly store critical data, both personal and professional in nature. Yet, the enormous code bases of their monolithic operating systems (hundreds of thousands to millions of lines of code) are likely to contain exploitable weaknesses that jeopardize the security of this data in the file system. Using a highly componentized system architecture based on a microkernel (or a very small hypervisor) can significantly improve security. The individual operating system components have smaller code bases running in isolated address spaces so as to provide better fault containment. Their isolation also allows for smaller trusted computing bases (TCBs) of applications that comprise only a subset of all components. In my thesis, I built VPFS, a virtual private file system that is designed for such a componentized system architecture. It aims at reducing the amount of code and complexity that a file system implementation adds to the TCB of an application. The basic idea behind VPFS is similar to that of a VPN, which securely reuses an untrusted network: The core component of VPFS implements all functionality and cryptographic algorithms that an application needs to rely upon for confidentiality and integrity of file system contents. These security-critical cores reuse a much more complex and therefore untrusted file system stack for non-critical functionality and access to the storage device. Additional trusted components ensure recoverability.
495

Rescuing the legacy project: a case study in digital preservation and technical obsolescence

Mickens, Leah M. 08 April 2009 (has links)
The ability to maintain continuous access to digital documents and artifacts is one of the most significant problems facing the archival, manuscript repository, and record management communities in the twenty-first century. This problem with access is particularly troublesome in the case of complex digital installments, which resist simple migration and emulation strategies. The Legacy Project, which was produced by the William Breman Jewish Heritage Museum in Atlanta, was created in the early 2000s as a means of telling the stories of Holocaust survivors who settled in metropolitan Atlanta. Legacy was an interactive multimedia kiosk that enabled museum visitors to read accounts, watch digital video, and examine photographs about these survivors. However, several years after Legacy was completed, it became inoperable, due to technological obsolescence. By using Legacy as a case study, I examine how institutions can preserve access to complex digital artifacts and how they can rescue digital information that is in danger of being lost.
496

Characterisation of end-to-end performance for web-based file server respositories /

Mascarenhas da Veiga Alves, Manoel Eduardo. January 2001 (has links) (PDF)
Thesis (M.Eng.Sc.)--University of Adelaide, Dept. of Electrical and Electronic Engineering, 2001. / Bibliography: leaves 128-135.
497

Computational proxies : an object-based infrastructure for computational science /

Cushing, Judith Bayard. January 1995 (has links)
Thesis, (Ph. D.)--Oregon Graduate Institute of Science and Technology, 1995.
498

How do experienced Information Lens users use rules?

January 1988 (has links)
Wendy E. Mackay ... [et. al.]. / "October 1988." / Includes bibliographical references (p. 12).
499

Characterisation of end-to-end performance for web-based file server respositories

Mascarenhas da Veiga Alves, Manoel Eduardo. January 2001 (has links) (PDF)
Bibliography: leaves 128-135. Investigates the behaviour of TCP bulk file transfer application sessions in a broadband access environment. Introduces some concepts for evaluating network behaviour: a path instability parameter for analyzing different TCP connections; a minimum RTT delay and a minimum typical path for estimating path characteristics between a client and application servers.
500

Periodic Data Structures for Bandwidth-intensive Applications

Albanese, Ilijc 12 January 2015 (has links)
Current telecommunication infrastructure is undergoing significant changes. Such changes involve the type of traffic traveling through the network as well as the requirements imposed by the new traffic mix (e.g. strict delay control and low end-to-end delay). In this new networking scenario, the current infrastructure, which remained almost unchanged for the last several decades, is struggling to adapt, and its limitations in terms of power consumption, scalability, and economical viability have become more evident. In this dissertation we explore the potential advantages of using periodic data structures to handle efficiently bandwidth-intensive transactions, which constitute a significant portion of today's network traffic. We start by implementing an approach that can work as a standalone system aiming to provide the same advantages promised by all-optical approaches such as OBS and OFS. We show that our approach is able to provide similar advantages (e.g. energy efficiency, link utilization, and low computational load for the network hardware) while avoiding the drawbacks (e.g. use of optical buffers, inefficient resource utilization, and costly deployment), using commercially available hardware. Aware of the issues of large scale hardware redeployment, we adapt our approach to work within the current transport network architecture, reusing most of the hardware and protocols that are already in place, offering a more gradual evolutionary path, while retaining the advantages of our standalone system. We then apply our approach to Data Center Networks (DCNs), showing its ability to achieve significant improvements in terms of network performance stability, predictability, performance isolation, agility, and goodput with respect to popular DCN approaches. We also show our approach is able to work in concert with many proposed and deployed DCN architectures, providing DCNs with a simple, efficient, and versatile protocol to handle bandwidth-intensive applications within the DCs. / Graduate

Page generated in 0.0267 seconds