491 |
A core signaling component of the notch network + a molecular interaction database accessible through an online VLSIC-like interfaceBarsi, Julius Christopher 28 August 2008 (has links)
Not available / text
|
492 |
Varför barn får kontaktperson och kontaktfamilj : En aktstudie om barnens bakgrund och skäl till insatsWestin, Sara, Österlund, Elin January 2013 (has links)
The aim of this study was to look into why children receive the interventions contact person and contact family. This was done by studying case-files. The main questions were: - How common is it that there are reasons for the intervention linked to parents and which are the most common? - How common is it that there are reasons for the intervention and problems linked to children and which are the most common? - Is there any indication of connections between reasons, age, gender or type of intervention? If so, what are the connections? The main results of this study were that most of the children lived with a single mother, often with a weak social network, and in need of relief. It was more common that reasons were linked to children then parents and the most common reasons indicated a need for an extra adult. The most frequent problem related to children were externalizing behavior. Connections among children were found between; externalizing behavior and gender; age and type of intervention; amount of problems, age and type of intervention.
|
493 |
Antivirusinių programų failinės sistemos realaus laiko stebėjimo algoritmai / Real-time Tracking System for Antivirus EnginesTalmontienė, Jūratė 19 June 2013 (has links)
Šiame baigiamajame darbe yra nagrinėjami antivirusinėse programose taikomi failinės sistemos realaus laiko stebėjimo metodai – API sąsajos funkcijų perėmimas, failinių sistemų filtravimo tvarkyklės, dėklinės failinės sistemos, FUSE technologijos panaudojimas. Pateikiami metodų privalumai ir trūkumai. Darbo pabaigoje aprašoma C/C++ programavimo kalbomis sukurta realaus laiko failinės sistemos stėbėjimo programa - failinės sistemos filtravimo tvarkyklė ir vartotojo lygio modulis. Darbą sudaro šešios pagrindinės dalys: įvadas, teorinė, analitinė ir programavimo dalys, išvados ir literatūros sąrašas. Darbo apimtis – 54 p. teksto be priedų, 16 pav., 3 lent., 28 bibliografiniai šaltiniai. Atskirai pridedami darbo priedai. / In this final work antivirus file system real-time file system tracking methods – usage of file system filter drivers, API hooking, stackable file systems, FUSE technology for antivirus are analyzed. The pros and cons of these methods are given. At the end of the thesis real-time file system tracking program developed in the C/C++ programming languages is presented. Created program consists of two parts – file system filter driver and user-mode module. Structure of the work: introduction, theoretical, analysis and programming parts, conclusions, references. Thesis consists of: 54 p. text without appendixes, 16 pictures, 3 tables, 28 bibliographical entries. Appendixes included.
|
494 |
Reducing Size and Complexity of the Security-Critical Code Base of File SystemsWeinhold, Carsten 09 July 2014 (has links) (PDF)
Desktop and mobile computing devices increasingly store critical data, both personal and professional in nature. Yet, the enormous code bases of their monolithic operating systems (hundreds of thousands to millions of lines of code) are likely to contain exploitable weaknesses that jeopardize the security of this data in the file system. Using a highly componentized system architecture based on a microkernel (or a very small hypervisor) can significantly improve security. The individual operating system components have smaller code bases running in isolated address spaces so as to provide better fault containment. Their isolation also allows for smaller trusted computing bases (TCBs) of applications that comprise only a subset of all components.
In my thesis, I built VPFS, a virtual private file system that is designed for such a componentized system architecture. It aims at reducing the amount of code and complexity that a file system implementation adds to the TCB of an application. The basic idea behind VPFS is similar to that of a VPN, which securely reuses an untrusted network: The core component of VPFS implements all functionality and cryptographic algorithms that an application needs to rely upon for confidentiality and integrity of file system contents. These security-critical cores reuse a much more complex and therefore untrusted file system stack for non-critical functionality and access to the storage device. Additional trusted components ensure recoverability.
|
495 |
Rescuing the legacy project: a case study in digital preservation and technical obsolescenceMickens, Leah M. 08 April 2009 (has links)
The ability to maintain continuous access to digital documents and artifacts is one
of the most significant problems facing the archival, manuscript repository, and record
management communities in the twenty-first century. This problem with access is
particularly troublesome in the case of complex digital installments, which resist simple
migration and emulation strategies. The Legacy Project, which was produced by the
William Breman Jewish Heritage Museum in Atlanta, was created in the early 2000s as a
means of telling the stories of Holocaust survivors who settled in metropolitan Atlanta.
Legacy was an interactive multimedia kiosk that enabled museum visitors to read
accounts, watch digital video, and examine photographs about these survivors. However,
several years after Legacy was completed, it became inoperable, due to technological
obsolescence. By using Legacy as a case study, I examine how institutions can preserve
access to complex digital artifacts and how they can rescue digital information that is in
danger of being lost.
|
496 |
Characterisation of end-to-end performance for web-based file server respositories /Mascarenhas da Veiga Alves, Manoel Eduardo. January 2001 (has links) (PDF)
Thesis (M.Eng.Sc.)--University of Adelaide, Dept. of Electrical and Electronic Engineering, 2001. / Bibliography: leaves 128-135.
|
497 |
Computational proxies : an object-based infrastructure for computational science /Cushing, Judith Bayard. January 1995 (has links)
Thesis, (Ph. D.)--Oregon Graduate Institute of Science and Technology, 1995.
|
498 |
How do experienced Information Lens users use rules?January 1988 (has links)
Wendy E. Mackay ... [et. al.]. / "October 1988." / Includes bibliographical references (p. 12).
|
499 |
Characterisation of end-to-end performance for web-based file server respositoriesMascarenhas da Veiga Alves, Manoel Eduardo. January 2001 (has links) (PDF)
Bibliography: leaves 128-135. Investigates the behaviour of TCP bulk file transfer application sessions in a broadband access environment. Introduces some concepts for evaluating network behaviour: a path instability parameter for analyzing different TCP connections; a minimum RTT delay and a minimum typical path for estimating path characteristics between a client and application servers.
|
500 |
Periodic Data Structures for Bandwidth-intensive ApplicationsAlbanese, Ilijc 12 January 2015 (has links)
Current telecommunication infrastructure is undergoing significant changes. Such changes involve the type of traffic traveling through the network as well as the requirements imposed by the new traffic mix (e.g. strict delay control and low end-to-end delay). In this new networking scenario, the current infrastructure, which remained almost unchanged for the last several decades, is struggling to adapt, and its limitations in terms of power consumption, scalability, and economical viability have become more evident.
In this dissertation we explore the potential advantages of using periodic data structures to handle efficiently bandwidth-intensive transactions, which constitute a significant portion of today's network traffic.
We start by implementing an approach that can work as a standalone system aiming to provide the same advantages promised by all-optical approaches such as OBS and OFS. We show that our approach is able to provide similar advantages (e.g. energy efficiency, link utilization, and low computational load for the network hardware) while avoiding the drawbacks (e.g. use of optical buffers, inefficient resource utilization, and costly deployment), using commercially available hardware.
Aware of the issues of large scale hardware redeployment, we adapt our approach to work within the current transport network architecture, reusing most of the hardware and protocols that are already in place, offering a more gradual evolutionary path, while retaining the advantages of our standalone system.
We then apply our approach to Data Center Networks (DCNs), showing its ability to achieve significant improvements in terms of network performance stability, predictability, performance isolation, agility, and goodput with respect to popular DCN approaches. We also show our approach is able to work in concert with many proposed and deployed DCN architectures, providing DCNs with a simple, efficient, and versatile protocol to handle bandwidth-intensive applications within the DCs. / Graduate
|
Page generated in 0.0267 seconds