• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 13
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Sexo virtual : nova modalidade de gozo ou gozo "do mesmo" com nova roupagem?: um olhar psicanalítico do sujeito na contemporaneidade

Baroni, Mara 08 August 2014 (has links)
Dissertação (mestrado)—Universidade de Brasília, Instituto de Psicologia, Programa de Pós-Graduação em Psicologia Clínica e Cultura, 2014. / Submitted by Ana Cristina Barbosa da Silva (annabds@hotmail.com) on 2014-11-12T19:12:17Z No. of bitstreams: 1 2014_MaraBaroni.pdf: 962427 bytes, checksum: 03c71f53bfa9aeffb0961b635f2ee3d1 (MD5) / Approved for entry into archive by Guimaraes Jacqueline(jacqueline.guimaraes@bce.unb.br) on 2014-11-13T11:26:54Z (GMT) No. of bitstreams: 1 2014_MaraBaroni.pdf: 962427 bytes, checksum: 03c71f53bfa9aeffb0961b635f2ee3d1 (MD5) / Made available in DSpace on 2014-11-13T11:26:54Z (GMT). No. of bitstreams: 1 2014_MaraBaroni.pdf: 962427 bytes, checksum: 03c71f53bfa9aeffb0961b635f2ee3d1 (MD5) / O presente trabalho pretende analisar o sujeito na contemporaneidade, bem como a utilização da internet e dos gadgets como mediadores do sexo virtual. Essa nova modalidade de gozo, ou o gozo “do mesmo”, ou seja, um gozo voltado para autoerotismo com uma nova roupagem, é uma proposta inovadora, mas que já provoca mudanças na subjetividade dos sujeitos. A cultura, que vem sofrendo transformações ao longo do tempo, é determinante. O enfraquecimento da figura paterna e da religião, e as conquistas sociais e sexuais das mulheres, contribuíram para uma nova forma de atuação dos sujeitos. Na era da informação e da globalização, a produção de objetos produzidos pela tecnociência atinge os sujeitos através do Discurso do Capitalista, com a promessa de satisfação e gozo pleno. Em uma sociedade narcísica, voltada para o espetáculo e que valoriza demasiadamente os objetos de consumo, ter visibilidade no palco da cena social é um traço marcante do sujeito contemporâneo, que busca consumir o objeto,anulando a divisão subjetiva que é fonte do seu desejo. A busca por prazer sexual, o qual é mediado pelas máquinas, é uma modalidade de gozo que insiste em fazer a relação sexual existir. O objetivo deste trabalho é abordar, através da psicanálise, como o Discurso do Capitalista e a produção dos gadgets pela tecnociência, aliados à exploração constante das imagens no âmbito público e privado, apontam para as novas modalidades de gozo do sujeito na contemporaneidade. O presente trabalho é teórico e a metodologia utilizada foi a de pesquisa bibliográfica através de obras, artigos e sites. O sujeito contemporâneo, que ainda está se delineando para nós, pesquisadores que estamos ao mesmo tempo analisando e vivenciado todas as transformações, é um sujeito que por meio do consumo e das novas tecnologias tem buscado o apoio simbólico para a sua falta-ser e demandas pulsionais. A tecnociência está ocupando um espaço simbólico que na contemporaneidade está vazio. ____________________________________________________________________________ ABSTRACT / The present work intends on analyzing the contemporary subject, as well as the use of theinternet and gadgets as mediators of virtual sex. This new kind of jouissance, or the jouissanceof “the self”, that is, a jouissance focused on autoeroticism with a new appearance, is aninnovative proposition, which is already responsible for changes provoked in the subjectivityof the subjects. The culture, which has been suffering transformations over time, is determinant.The weakening effect observed on the father’s figure and religion, as well as the social andsexual achievements of women, have contributed to a new way of action for the subject. In thetimes of information and globalization, the production of objects by technoscience reachessubjects through The Capitalist Discourse, that sells a promise of complete satisfaction andfulfillment. In a narcissistic society, which focuses on the spectacle and values unduly theobjects of consumption, having a spot on the social stage becomes a key feature of thecontemporary subject, which aims at object consumption, while annulling the subjectivesegmentation that consists on the source of desire. The search for sexual pleasure mediated bymachines is a type of jouissance that insists on making the sexual relation exist. The main goalhere is to approach through psychoanalysis how the Capitalist Discourse, as well as theproduction of gadgets by technoscience allied to the constant exploitation of images both inpublic and private scope, bring to light the new modalities of jouissance of the contemporarysubject. The present work is theory-based, using as methodology bibliographic research mainlythrough academic work, articles and websites. The contemporary subject, who is still outlininghimself to us, researchers, that are not only analyzing, but also experiencing all thesetransformations, is a subject that has been searching for symbolic support for his lack of beingand instinctual demands through consumption and new technologies. Technoscience has beentaking up a symbolic space that was still empty in the contemporaneity.
2

La connexion au quotidien : réflexion sur nos temporalités

Migault, Ariane 07 1900 (has links)
Dans les médias d’information, il est de plus en plus régulièrement question, recherches scientifiques à l’appui, du danger que poserait la connexion pour tous ceux et celles qui passent trop de temps branché.e.s à des appareils numériques. Une charge normative est ainsi apposée sur la connexion et le temps. Ce mémoire explore la conception de la connexion par les personnes qui la vivent et l’interrogent au quotidien. L’objectif est aussi de comprendre comment celle-ci pourrait orienter leurs expériences du temps ou comment elle pourrait être tributaire des temporalités induites par la société. La méthodologie de cette recherche exploratoire a pris la forme d’entrevues semi-dirigées menées à Montréal auprès de quatre personnes « connectées » et réfléchissant la connexion au quotidien. Nous nous rencontrions une fois par semaine pendant un mois et les participant.e.s remplissaient régulièrement un journal de bord qu’iels me présentaient ensuite, pour amorcer nos rendez-vous. À la lumière de l’analyse des transcriptions d’entrevues, je suggère que les participant.e.s ont en commun différentes approches de la dé-connexion. Cette dernière peut se conceptualiser en termes d’infrastructures, d’artefacts et de symboles. Aussi, différentes temporalités parcourent, modulent et son modulées par la dé-connexion vécue comme un moyen de s’intégrer socialement et de viser un idéal de connexion (temporellement) équilibré. / Based on various scientific studies, news media discourse address more and more regularly the danger posed by connection to all of those who spend too much time using digital devices. A normative load is therefore placed on connection and time. This research project aims to: a) explore what connection means to people whose daily lives involve being connected and questioning their connection; and b) to understand how their approach to connection may orient their experiences of time while at the same time being affected by the temporalities around which today’s societies are organized. The methodological approach that guides this exploratory research features semi-structured interviews conducted in Montreal with four “connected” people who questioned the place of connection in their daily lives. We met once a week for a month and the participants regularly filled out a logbook which they then presented to me at the beginning of each of our conversations. Based on the analysis of interview transcripts, I suggest that the participants share different approaches to dis-connection. The latter can be conceptualized in terms of infrastructure, artifacts and symbols. Also different temporalities modulate and are modulated by this dis-connection as people experience it as a means to fit in, and to aim for an ideal (time) balanced practice.
3

Vývoj webových komponent AJAX v prostředí ExtJS / Development of AJAX Web Components in ExtJS

Dytrych, Jaroslav January 2009 (has links)
This thesis deals with the design and implementation of the page layout manager for a web user interface composed of components. A part of solution is also a new XML format for configuring of the manager of page layout and composition and a new application interface for components. The created system has met the requirements of the European project KiWi and has passed the acceptance tests of its project team.
4

Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis / Dasty : Exponera Verkliga Konsekvenser av Prototype Pollution med Hjälp av Dynamic Taint Analysis

Moosbrugger, Paul January 2023 (has links)
Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. Gadgets can lead to various exploits, including denial-of-service, data exfiltration, and arbitrary code execution (ACE). Current research focuses primarily on the detection of pollution, while only a few discuss gadget detection. Those that do either propose detection solutions for browser-side applications or selected frameworks. This thesis aims to answer how prototype pollution affects modern server-side applications built on the Node.js framework. We propose a system that can automatically detect potential prototype pollution gadgets in Node.js applications. We utilize dynamic taint tracking to find flows from polluted prototypes to exploitable functions. Our system consists of multiple distinct runs. A first run analyzes a program without changing the control-flow to avoid premature termination through exceptions and program crashes. In subsequent runs, the system selectively changes conditionals to increase coverage. Based on our methodology, we implement Dasty, a performant dynamic taint analysis for prototype pollution gadgets built on NodeProf and the Truffle Instrumentation Framework. Dasty can automatically analyze third-party packages by utilizing their test suites. We use our implementation to analyze the 5000 most depended upon npm packages and verify the resulting flows systematically, focusing on ACE and similar high-profile vulnerabilities. Through the analysis, we identify 16 new gadgets in packages used by thousands of applications. Our results suggest that prototype pollution can lead to serious security issues in many modern applications. / Prototype pollution är en sårbarhet i JavaScript och andra prototypbaserade språk som tillåter skadliga aktörer att injicera en egenskap i ett objekts prototype. Den prototype som blivit komprometterad kan därefter utlösa gadgets - delar av kod som använder egenskaperna på känsliga positioner. Gadgets kan leda till olika exploiteringar, inklusive denial-of-service, dataexfiltrering och arbitrary code execution (ACE). Aktuell forskning fokuserar främst på detektion av prototype pollution, medan endast ett fåtal diskuterar detektion av gadgets. De som gör det föreslår antingen detekteringslösningar för applikationer på webbläsarnivå eller enskilda ramverk. Detta examensarbete syftar till att svara på hur prototype pollution påverkar moderna applikationer på serversidan byggda med ramverket Node.js. Vi föreslår ett system som automatiskt kan upptäcka potentiella prototype pollution gadgets i Node.js-applikationer. Vi använder dynamic taint tracking för att hitta flöden från injicerade prototyper till exploateringsbara funktioner. Vårt system består av flera distinkta körningar. En första körning analyserar ett program utan att ändra kontrollflödet för att undvika för tidig terminering p.g.a. exceptions och programkrascher. I efterföljande körningar ändrar systemet selektivt villkoren för att öka täckningen. Baserat på vår metodik implementerar vi Dasty, en snabb dynamic taint analysis för prototype pollution gadgets byggda på NodeProf och Truffle Instrumentation Framework. Dasty kan automatiskt analysera tredjepartspaket genom att använda deras testramverk. Vi använder vår implementering för att analysera de 5000 mest npm-beroende paketen och verifiera de resulterande flödena systematiskt, med fokus på ACE och liknande högprofilerade sårbarheter. Genom analysen identifierar vi 16 nya gadgets i paket som används av tusentals applikationer. Våra resultat tyder på att prototype pollution kan leda till allvarliga säkerhetsproblem i många moderna applikationer.
5

Možnosti technologie Google Wave / Google Wave Technology

Michlík, Pavel January 2010 (has links)
The Master’s thesis explains API and features of Google Wave technology, which was designed for flexible real-time collaboration of defined participants. The project aim was description of Google Wave basic elements and creation of sample Wave extensions, demonstrating capabilities of the communication protocol. The first extension (robot) was developed using client libraries in Java. The second extension (gadget) shows another approach of Google Wave extensions, based on XML, HTML, CSS and JavaScript.
6

Domácí automatizace se senzory třetích stran / Home Automation with Third-Party Sensors

Macháč, Matej January 2016 (has links)
The aim of this work is to evaluate possibilities to integrate wireless devices for home automation in BeeeOn system developed on the Faculty of Information Technology in Brno. This thesis describes USB modules that allow connenction to these devices. It describes the communication protocols that the modules can handle and devices using these protocols. It also deals with FHEM system, its features and possibilities of communication with the BeeeOn system. A reader can also find decription of implementation of every module created to provide support of wireless devices to the gate of BeeeOn system.
7

Designing a Wireless Charger for Smartphones / Trådlös laddare för smartphones.

Kureekkal, Tony Sabu January 2019 (has links)
The wireless charging market has seen exponential growth in recent years and wireless charging is quickly becoming the standard in consumer electronic devices to eliminate inconveniences of wired chargers. The adoption of wireless charging technology is most visible in the smartphone industry. This thesis report elicits the process involved in designing a Wireless charger that complies with the Qi- Wireless Standards set by the Wireless Power Consortium. The drawbacks of current product offerings and user needs are identified, and conceptual solutions that could strengthen the wireless charging experience are explored. The most promising solution is developed upon which results in a full-scale functional prototype.
8

The impact of social media influencers on the purchase intention of Tech gadgets among Gen Z and Y : Sweden

Meglaj, Valentina, Zafar, Naqash January 2022 (has links)
No description available.
9

Quantitative Metrics and Measurement Methodologies for System Security Assurance

Ahmed, Md Salman 11 January 2022 (has links)
Proactive approaches for preventing attacks through security measurements are crucial for preventing sophisticated attacks. However, proactive measures must employ qualitative security metrics and systemic measurement methodologies to assess security guarantees, as some metrics (e.g., entropy) used for evaluating security guarantees may not capture the capabilities of advanced attackers. Also, many proactive measures (e.g., data pointer protection or data flow integrity) suffer performance bottlenecks. This dissertation identifies and represents attack vectors as metrics using the knowledge from advanced exploits and demonstrates the effectiveness of the metrics by quantifying attack surface and enabling ways to tune performance vs. security of existing defenses by identifying and prioritizing key attack vectors for protection. We measure attack surface by quantifying the impact of fine-grained Address Space Layout Randomization (ASLR) on code reuse attacks under the Just-In-Time Return-Oriented Programming (JITROP) threat model. We conduct a comprehensive measurement study with five fine-grained ASLR tools, 20 applications including six browsers, one browser engine, and 25 dynamic libraries. Experiments show that attackers only need several seconds (1.5-3.5) to find various code reuse gadgets such as the Turing Complete gadget set. Experiments also suggest that some code pointer leaks allow attackers to find gadgets more quickly than others. Besides, the instruction-level single-round randomization can restrict Turing Complete operations by preventing up to 90% of gadgets. This dissertation also identifies and prioritizes critical data pointers for protection to enable the capability to tune between performance vs. security. We apply seven rule-based heuristics to prioritize externally manipulatable sensitive data objects/pointers. Our evaluations using 33 ground truths vulnerable data objects/pointers show the successful detection of 32 ground truths with a 42% performance overhead reduction compared to AddressSanitizer. Our results also suggest that sensitive data objects are as low as 3%, and on average, 82% of data objects do not need protection for real-world applications. / Doctor of Philosophy / Proactive approaches for preventing attacks through security measurements are crucial to prevent advanced attacks because reactive measures can become challenging, especially when attackers enter sophisticated attack phases. A key challenge for the proactive measures is the identification of representative metrics and measurement methodologies to assess security guarantees, as some metrics used for evaluating security guarantees may not capture the capabilities of advanced attackers. Also, many proactive measures suffer performance bottlenecks. This dissertation identifies and represents attack elements as metrics using the knowledge from advanced exploits and demonstrates the effectiveness of the metrics by quantifying attack surface and enabling the capability to tune performance vs. security of existing defenses by identifying and prioritizing key attack elements. We measure the attack surface of various software applications by quantifying the available attack elements of code reuse attacks in the presence of fine-grained Address Space Layout Randomization (ASLR), a defense in modern operating systems. ASLR makes code reuse attacks difficult by making the attack components unavailable. We perform a comprehensive measurement study with five fine-grained ASLR tools, real-world applications, and libraries under an influential code reuse attack model. Experiments show that attackers only need several seconds (1.5-3.5) to find various code reuse elements. Results also show the influence of one attack element over another and one defense strategy over another strategy. This dissertation also applies seven rule-based heuristics to prioritize externally manipulatable sensitive data objects/pointers – a type of attack element – to enable the capability to tune between performance vs. security. Our evaluations using 33 ground truths vulnerable data objects/pointers show the successful identification of 32 ground truths with a 42% performance overhead reduction compared to AddressSanitizer, a memory error detector. Our results also suggest that sensitive data objects are as low as 3% of all objects, and on average, 82% of objects do not need protection for real-world applications.
10

Mobile Ajax

Al Tayr, Hydar, Al Hakim, Mahmud January 2008 (has links)
This report describes a master thesis performed at SICS (Swedish Institute of Computer Science) and KTH (The Royal Institute of Technology) in Stockholm. Ajax stands for "Asynchronous JavaScript and XML" and it's not a programming language, but a suite of technologies used to develop web applications with more interactivity than the traditional web pages. Ajax applications can be adapted for mobile and constrained devices. This has been called Mobile Ajax. While the technique is the same, Mobile Ajax generally is considered to be a special case of Ajax, because it deals with problems specific to the mobile market. The purpose of this thesis has been to examine which possibilities and disadvantages has the Mobile Ajax from developers and users perspective. In addition we compare Mobile Ajax with Java Micro Edition (Java ME) and Flash Lite. This has been done through literature studies and development of a databased chat client (MAIM -Mobile Ajax Instant Messenger). The application sends and receives direct messages in real time between differently mobile devices. Then MAIM application has been compared with our own developed Java ME and Flash Lite chat clients. We have tested all three applications with different models of mobile devices and on different web browsers. The results have shown that mobile Ajax makes possible the creation of sophisticated and dynamic mobile web applications and is better than the classic web application model, but this requires that the mobile device has a modern and compatible web browser like Opera mobile. / Denna rapport beskriver ett examensarbete utfört på SICS (Swedish Institute of Computer Science) och KTH (Kungliga Tekniska Högskolan) i Stockholm. Ajax står för "Asynchronous JavaScript and XML" och är inte något programmeringsspråk, utan ett samlingsnamn för några tekniker som kan användas för att utveckla webbtillämpningar med mer interaktivitet än traditionella webbsidor. Ajax-tillämpningar kan anpassas till mobila och begränsade enheter. Detta har fått namnet Mobile Ajax . Medan tekniken är det samma, ses Mobile Ajax som ett specialfall av Ajax, för att den behandlar problem som är specifika till den mobila marknaden. Syftet med denna uppsats har varit att undersöka vilka möjligheter och nackdelar som Mobile Ajax har utifrån ett utvecklar- och användarperspektiv. Dessutom jämför vi Mobile Ajax med Java Micro Edition (Java ME) och Flash Lite. Detta har gjorts genom litteraturstudier och utveckling av en databasbaserad chattklient (MAIM -Mobile Ajax Instant Messenger). Applikationen skickar och tar emot direkt meddelanden i realtid mellan olika mobila enheter. MAIM har sedan jämförts med egenutvecklade Java ME och Flash Lite chattklienter. Vi har testat alla tre applikationer med olika modeller av mobila enheter och på olika webbläsare. Resultaten har visat att Mobile Ajax möjliggör skapandet av sofistikerade och dynamiska mobila webbapplikationer och är mycket bättre än den klassiska webbapplikationsmodellen. Men detta förutsätter att den mobila enheten har en "modern" och kompatibel webbläsare t.ex. Opera Mobile.

Page generated in 0.0525 seconds