• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 70
  • 14
  • 14
  • 13
  • 9
  • 7
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 156
  • 15
  • 12
  • 12
  • 12
  • 11
  • 11
  • 11
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Automated Reflection of CTF Hostile Exploits (ARCHES)

January 2019 (has links)
abstract: As the gap widens between the number of security threats and the number of security professionals, the need for automated security tools becomes increasingly important. These automated systems assist security professionals by identifying and/or fixing potential vulnerabilities before they can be exploited. One such category of tools is exploit generators, which craft exploits to demonstrate a vulnerability and provide guidance on how to repair it. Existing exploit generators largely use the application code, either through static or dynamic analysis, to locate crashes and craft a payload. This thesis proposes the Automated Reflection of CTF Hostile Exploits (ARCHES), an exploit generator that learns by example. ARCHES uses an inductive programming library named IRE to generate exploits from exploit examples. In doing so, ARCHES can create an exploit only from example exploit payloads without interacting with the service. By representing each component of the exploit interaction as a collection of theories for how that component occurs, ARCHES can identify critical state information and replicate an executable exploit. This methodology learns rapidly and works with only a few examples. The ARCHES exploit generator is targeted towards Capture the Flag (CTF) events as a suitable environment for initial research. The effectiveness of this methodology was evaluated on four exploits with features that demonstrate the capabilities and limitations of this methodology. ARCHES is capable of reproducing exploits that require an understanding of state dependent input, such as a flag id. Additionally, ARCHES can handle basic utilization of state information that is revealed through service output. However, limitations in this methodology result in failure to replicate exploits that require a loop, intricate mathematics, or multiple TCP connections. Inductive programming has potential as a security tool to augment existing automated security tools. Future research into these techniques will provide more capabilities for security professionals in academia and in industry. / Dissertation/Thesis / Masters Thesis Computer Science 2019
62

Extremal transition and quantum cohomology / 端転移と量子コホモロジー

Xiao, Jifu 24 September 2015 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(理学) / 甲第19259号 / 理博第4114号 / 新制||理||1592(附属図書館) / 32261 / 京都大学大学院理学研究科数学・数理解析専攻 / (主査)准教授 入谷 寛, 教授 加藤 毅, 教授 吉川 謙一 / 学位規則第4条第1項該当 / Doctor of Science / Kyoto University / DFAM
63

WEIGHTED CURVATURES IN FINSLER GEOMETRY

Runzhong Zhao (16612491) 30 August 2023 (has links)
<p>The curvatures in Finsler geometry can be defined in similar ways as in Riemannian geometry. However, since there are fewer restrictions on the metrics, many geometric quantities arise in Finsler geometry which vanish in the Riemannian case. These quantities are generally known as non-Riemannian quantities and interact with the curvatures in controlling the global geometrical and topological properties of Finsler manifolds. In the present work, we study general weighted Ricci curvatures which combine the Ricci curvature and the S-curvature, and define a weighted flag curvature which combines the flag curvature and the T -curvature. We characterize Randers metrics of almost isotropic weighted Ricci curvatures and show the general weighted Ricci curvatures can be divided into three types. On the other hand, we show that a proper open forward complete Finsler manifold with positive weighted flag curvature is necessarily diffeomorphic to the Euclidean space, generalizing the Gromoll-Meyer theorem in Riemannian geometry.</p>
64

Newton-Okounkov Bodies of Bott-Samelson & Peterson Varieties

DeDieu, Lauren January 2016 (has links)
The theory of Newton-Okounkov bodies can be viewed as a generalization of the theory of toric varieties; it associates a convex body to an arbitrary variety (equipped with auxiliary data). Although initial steps have been taken for formulating geometric situations under which the Newton-Okounkov body is a rational polytope, there is much that is still unknown. In particular, very few concrete and explicit examples have been computed thus far. In this thesis, we explicitly compute Newton-Okounkov bodies of some cases of Bott-Samelson and Peterson varieties (for certain classes of auxiliary data on these varieties). Both of these varieties arise, for instance, in the geometric study of representation theory. Background on the theory of Newton-Okounkov bodies and the geometry of flag and Grassmannian varieties is provided, and well as background on Bott-Samelson varieties, Hessenberg varieties, and Peterson varieties. In the last chapter we also discuss how certain techniques developed in this thesis can be generalized. In particular, a generalization of the flat family of Hessenberg varieties constructed in Chapter 6, which may allow us to compute Newton-Okounkov bodies of more general Peterson varieties, is an ongoing collaboration with H. Abe and M. Harada. / Thesis / Doctor of Philosophy (PhD)
65

“‘Heritage’ Not Hate”: The Confederate Flag as an ‘Iconic Identity Text’ Within a Narrative of Racial Healing

Watts, Sharon A. 09 August 2006 (has links)
No description available.
66

The Combinatorial Curve Neighborhoods of Affine Flag Manifold in Type A<sub>n-1</sub><sup>(1)</sup>

Aslan, Songul 12 August 2019 (has links)
Let X be the affine flag manifold of Lie type A<sub>n-1</sub><sup>(1)</sup> where n ≥ 3 and let W<sub>aff</sub> be the associated affine Weyl group. The moment graph for X encodes the torus fixed points (which are elements of the affine Weyl group W<sub>aff</sub> and the torus stable curves in X. Given a fixed point u ∈ W<sub>aff</sub> and a degree d = (d₀, d₁, ..., d<sub>n−1</sub>) ∈ ℤ<sub>≥0</sub><sup>n</sup>, the combinatorial curve neighborhood is the set of maximal elements in the moment graph of X which can be reached from u′ ≤ u by a chain of curves of total degree ≤ d. In this thesis we give combinatorial formulas and algorithms for calculating these elements. / Doctor of Philosophy / The study of curves on flag manifolds is motivated by questions in enumerative geometry and physics. To a space of curves and incidence conditions one can associate a combinatorial object called the ‘combinatorial curve neighborhood’. For a fixed degree d and a (Schubert) cycle, the curve neighborhood consists of the set of all elements in the Weyl group which can be reached from the given cycle by a path of fixed degree in the moment graph of the flag manifold, and are also Bruhat maximal with respect to this property. For finite dimensional flag manifolds, a description of the curve neighborhoods helped answer questions related to the quantum cohomology and quantum K theory rings, and ultimately about enumerative geometry of the flag manifolds. In this thesis we study the situation of the affine flag manifolds, which are infinite dimensional. We obtain explicit combinatorial formulas and recursions which characterize the curve neighborhoods for flag manifolds of affine Lie type A. Among the conclusions, we mention that, unlike in the finite dimensional case, the curve neighborhoods have more than one component, although all components have the same length. In general, calculations reflect a close connection between the curve neighborhoods and the Lie combinatorics of the affine root system, especially the imaginary roots.
67

「高山低頭,河水讓路」 —大躍進時期革命語言之研究 / “The mountain lowers the head; the river allows passing through”— Study of revolutionary language in the great leap forward

劉兆崑, Liou, Jhao Kun Unknown Date (has links)
大躍進運動,貫徹烏托邦主義,結合毛澤東及其追隨者賦予的闡釋,加上嚴格管制的官方宣傳體系與人民對理想的渴望,演變為大規模集體狂熱運動。對共產主義世界、烏托邦理想的期待與將國家推往急速發展的思想,這種思想化為多樣化的語言論述,藉由傳媒大肆散佈,並形成獨樹一幟的語言風格。 本研究分為五個章節,除導論簡述本文研究要旨外,首先將說明革命語言與中國共產黨之關聯性,定義革命語言的基本內涵,並說明中共革命語言的形成。其次說明中共宣傳的策略與手段,對意識形態及語言的散播發生何種影響。而後進入研究核心,以《人民日報》、《紅旗》文獻與《紅旗歌謠》新民歌,歸納大躍進革命語言的構成內容,並依據前文歸納,分析革命語言的特徵。 / The Great Leap Forward carried out Utopia doctrine, combined the explanation that Mao Zedong and his followers offered to, in addition, the official propaganda system that control strictly and aspiration of the people about ideal, developed into extensive collective's fanatic movement. The expectation of communist world and Utopia ideal, thought of push the country to develop rapidly, the thought turned into variety of languages, spread out by the media, and formed the language style of taking the course of its own. This research is divided into five chapters, except that the introduction, at first will prove the relation of revolutionary language and the CCP, define the basic intension of the revolutionary language, and explain the forming revolutionary language of CCP. Secondly, to show that CCP’s propaganda tactics and means how influenced ideology and language. And then enter the core of studying, in the documents of " People's Daily ", "Red Flag "'and new folk songs of " Red Flag Ballad ", sum up the composition content of the revolutionary language of the Great Leap Forward, and according to preceding paragraphs, analyze the characteristic of the revolutionary language.
68

Métricas de Randers Localmente Dualmente Flat / Locally Dually Flat Randers Metric

Fernandes, Karoline Victor 26 February 2010 (has links)
Made available in DSpace on 2014-07-29T16:02:22Z (GMT). No. of bitstreams: 1 dissertacao karoline fernandes.pdf: 700169 bytes, checksum: bbcf93fe91f369b6605215c70576e124 (MD5) Previous issue date: 2010-02-26 / We will study the Finsler metric, on a manifold M, defined as the sum of a Riemannian metric and a 1-form, they are known as Randers metric. We will classify those that are locally dually flat, that is, for all point exists a coordinate system in which the equation of the geodesic has a special form, the coefficients of spray is given in terms of the metric one and a local scalar function, we will also characterize the Randers metric that is locally dually flat with almost isotropic flag curvature / Estudaremos as métricas de Finsler, em uma variedade M, definidas como soma de uma métrica Riemanniana e de uma 1-forma, elas são conhecidas como métricas de Randers. Classificaremos aquelas que são localmente dualmente flat, isto é, para todo ponto existe um sistema de coordenadas no qual a equação das geodésicas tem uma forma especial pois os coeficientes do spray são dados em termos da métrica e de uma função escalar, caracterizaremos também as métricas de Randers que são localmente dualmente flat com curvatura flag quase-isotrópica
69

Live and Let Love : En kritisk studie av svensk homonationalism i en politisk manifestation i samband med de olympiska spelen i Sotji 2014

Andersson, Tova January 2016 (has links)
The aim of this thesis is to examine how the construction of the swedish national self-image can be interpreted in relation to the protests against the russian anti-gay laws, leading up to the olympic games in Sotji 2014. I form a basis for my analysis in Jasbir K. Puars conceptual frame of homonationalism and examine the swedish political action Live and Let Love that took place at Stockholms Stadion in the fall of 2013. The analysis shows how the inclusion of a homonormative homosexuality becomes an important factor for the construction of Sweden as an open and tolerant nation in contrast to Russia as a non tolerant nation. This construction of "us" and the "Other" manifests through a discourse of tolerance. The national sense of community is formed through interaction between national symbols and symbols of the LGBT community.
70

財務報表舞弊預警模型

黃郁凱 Unknown Date (has links)
本研究旨在由傳統財務指標及公司治理角度分析近年來我國因財務報表舞弊遭一審判決有罪之公司發生的舞弊警訊(Red Flags),建立財務報表舞弊預警模型,作為會計師執行舞弊偵測時的參考,降低因查核舞弊所產生的審計失敗,並可作為主管機關實質審查選案標準及投資人選擇投資標的之參考。 本文以民國85年至95年因財務報表舞弊遭法院一審判決有罪之27家公司為樣本,分別使用財務及公司治理變數建立財務報表舞弊預警模型,再以Cascade Logistic迴歸分析結合財務及公司治理模型,檢視Cascadev Logistic模型的正確判別率。實證結果顯示,財務變數中舞弊當期應付帳款成長率、舞弊當期存貨成長率、應收帳款收現天數對前期同一比率與財務報表舞弊呈顯著正相關;舞弊當期資產報酬率對前期同一比率、舞弊當期銷貨成長率與財務報表舞弊呈顯著負相關。公司治理變數中董監持股、控制持股、外部個人監事席次與財務報表舞弊顯著負相關;財報重編次數呈顯著正相關,良善的公司治理機制與財務舞弊具負向關連性。而整合的Cascade Logistic模型,財務及公司治理變數均與財務報表舞弊呈顯著相關,且均具增額解釋。 / Presented are a profile of a sample of fraud companies in Taiwan from 1996 to 2006, their financial and corporate governance characteristics, suggested fincial and corporate governance logistic models for detecting fraud and a final combine cascade logistic model. The results suggest both systematic relationships between the probability of fraud and financial and corporate governance characteristic variables. This evidence is consistent with the usefulness of accounting data in detecting fraud and the effectiveness of proper corporate governance in protecting fraud happening. Because the cascade logistic model correctly identifies approximately 90% of the companies involved or not invleved in fraud, the model can be a useful screening device for auditors to detect fraud, low down the propobility of audit failure and the cost of lawsuit due to fraud.

Page generated in 0.0527 seconds