• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 78
  • 34
  • 21
  • 18
  • 16
  • 11
  • 8
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 229
  • 65
  • 35
  • 29
  • 23
  • 22
  • 21
  • 19
  • 18
  • 18
  • 18
  • 18
  • 16
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Simulation of the IBM System/7

Lewis, Ted C. 05 1900 (has links)
This thesis describes the simulation of the IBM SYSTEM/7. The research leading to this thesis involved the development of a PL/I computer program that runs on an IBM 360/50 computer and simulates the IBM SYSTEM/7. Various methods of simulation are examined and guidelines for computer simulation of another computer are established. The SYSTEM/7 simulator (SIM/7) is the heart of this thesis. SIM/7 simulates the IBM SYSTEM/7 entirely with software as opposed to an emulator which involves the combined use of hardware and software to perform the simulation process. This thesis contains a general introduction to computer simulation, reason for simulation, a user's guide for SIM/7 and a definition of the SYSTEM/7 processor using the Vienna Definition Language.
82

A Comparison of File Organization Techniques

Rogers, Roy Lee 08 1900 (has links)
This thesis compares the file organization techniques that are implemented on two different types of computer systems, the large-scale and the small-scale. File organizations from representative computers in each class are examined in detail: the IBM System/370 (OS/370) and the Harris 1600 Distributed Processing System with the Extended Communications Operating System (ECOS). In order to establish the basic framework for comparison, an introduction to file organizations is presented. Additionally, the functional requirements for file organizations are described by their characteristics and user demands. Concluding remarks compare file organization techniques and discuss likely future developments of file systems.
83

Macro Control Structures for Structured Programming in ALC

Connally, Kim G. 12 1900 (has links)
This thesis describes a set of computer program control structures which permits the application of certain structured programming techniques to the IBM/360 assembly language (ALC). The control structures are implemented by programmerdefined instructions known as macros. A history of computer software is presented, providing a basis for the emergence of structured programming. A survey of the major concepts of structured programming with special attention to control structures and their significance to structured programming follows. The macros developed in this study include DO, ENDDO, LEAVE, CASE, and ENDCASE. They provide a looping control structure, a loop-escape construct, and a selective control structure. Examples of usage are given.
84

What-if analýza v nástroji CPM / What-if analysis in the CPM tool

Pokorný, Jiří January 2010 (has links)
This thesis deals with the management approach in performance management, today known world by the concept of Corporate Performance Management. CPM describes the relationship to Business Intelligence and methodologies, processes, metrics and technologies that together form the concept. There is also a description of CPM applications which cover the five most commonly deployed areas. The second part is devoted to what-if analysis that is one of several methodologies which are part of the CPM package. It also contains the list of competing tools that cover this area. The following hypothetical example of putting what-if analysis, aimed at resolving issues of fictitious company, related to costs, revenue and profit. Example is based on technology developed at IBM Cognos TM1. During the example solutions are presented with all the basic functionality that this technology offers.
85

Computer systems recommendations for the MBA programme : research report.

January 1982 (has links)
by Lau Sui-yin, Eddie, Chan Wan-kam. / Bibliography: leaves 110-111 / Thesis (M.B.A.)--Chinese University of Hong Kong, 1982
86

Buyers' reactions to the IBM notebook computer.

January 1992 (has links)
Lorraine Yuen Tai Yeung. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1992. / Includes bibliographical references (leaf 28). / ABSTRACT --- p.i / TABLE OF CONTENTS --- p.ii / LIST OF FIGURES --- p.iv / ACKNOWLEDGEMENTS --- p.v / GLOSSARY --- p.vi / Chapter CHAPTER 1 --- INTRODUCTION --- p.1 / Chapter 1.0 --- Description of Personal Computers --- p.1 / Chapter 2.0 --- IBM Notebook Computer --- p.8 / Chapter 3.0 --- Objective and Significance of the Research --- p.19 / Chapter CHAPTER 2 --- LITERATURE REVIEW --- p.21 / Chapter 1.0 --- Competitive Environment --- p.21 / Chapter 2.0 --- Strategies of Major PC Manufacturers --- p.23 / Chapter 3.0 --- Hong Kong Market --- p.25 / Chapter 4.0 --- Hong Kong PC Market Segmentation by Industrial Applications --- p.26 / BIBLIOGRAPHY --- p.28 / Chapter CHAPTER 3 --- METHODOLOGY --- p.30 / Chapter 1.0 --- Exploratory Projects --- p.30 / Chapter 2.0 --- Trade Survey --- p.34 / Chapter CHAPTER 4 --- KEY FINDINGS --- p.36 / Chapter 1.0 --- Findings on Buyers' Reactions to the Notebook Computers --- p.36 / Chapter 2.0 --- Retailers and Dealers --- p.41 / Chapter CHAPTER 5 --- CONCLUSIONS AND RECOMMENDATIONS --- p.46 / Chapter 1.0 --- Conclusions --- p.46 / Chapter 2.0 --- Recommendations --- p.54 / APPENDICES / Chapter I --- An Example of Radio Networking / Chapter II --- PC Unit Sales in Hong Kong: 1989 - 1995 / Chapter III --- 1990 Hong Kong PC Market Shares by Dollar Volume / Chapter IV --- The IBM Notebook Computer Specifications / Chapter V --- The IBM Notebook Computer Advertisement / Chapter VI --- The IBM Notebook Computer Sales Volume / Chapter VII --- Notebook Computer Competitive Information / Chapter VIII --- Questionnaire Part 1 / Chapter IX --- Questionnaire Part 2 / Chapter X --- Focus Group Discussion Guide / Chapter XI --- Retailers and Dealers Interview Guide / Chapter XII --- Demographic Information of Participants / Chapter XIII --- Detailed Information on the Survey Findings / Chapter XIV --- The IBM Notebook Computer Direct Mail Advertisement / Chapter XV --- Media Placement of the IBM Notebook Computer Ad (as shown in Appendix V)
87

Analyse de la régulation du facteur de transcription E2F1 par cIAP1 / Analysis of E2F1 by clAP1

Allègre-Cultot, Jennifer 02 February 2017 (has links)
CIAP1 (cellular Inhibitor of Apoptosis 1) possède une activité E3-ubiquitine ligase et présente des propriétés oncogéniques. Récemment, notre équipe a montré que cIAP1 pouvait réguler l’activité du facteur de transcription E2F1. L’objectif de mon travail de thèse était d’approfondir les mécanismes de cette régulation et d’évaluer l’importance de la coopération cIAP1-E2F1 dans l’activité oncogénique de cIAP1. J’ai démontré une interaction d’E2F1 avec la poche hydrophobe du domaine BIR3 de cIAP1. J’ai par ailleurs démontré l’importance de la première hélice α de ce domaine pour l’interaction de cIAP1 avec E2F1 et avec les autres protéines partenaires de cIAP1 capables de lier la poche hydrophobe du domaine BIR3. De plus, j’ai participé au travail montrant pour la première fois une régulation d’E2F1 par une ubiquitinylation non dégradative. cIAP1 permet la conjugaison de chaînes d’ubiquitines de type K63 sur les lysines 161 et 164 d’E2F1. Cette modification post-traductionnelle est indispensable à la stabilisation de la protéine lors d’un stress génotoxique et elle permet le recrutement du facteur de transcription sur les promoteurs des gènes cibles. Enfin, l’analyse des propriétés oncogéniques de cIAP1 n’ont pas permis, à ce jour, d’évaluer l’importance de la coopération cIAP1-E2F1. Cependant, nous avons montré l’importance du domaine BIR1 pour les propriétés oncogéniques de cIAP1 (domaine nécessaire à l’interaction de cIAP1 avec l’adaptateur moléculaire TRAF2). / The cellular inhibitor of Apoptosis 1 (cIAP1) behaves as an E3 ubiquitin ligase and has oncogenic properties. Previously, our team has shown that cIAP1 can regulate the E2F1 transcription factor activity. My research project has been focused on deepening our current knowledge on this interaction. Firstly, we characterized the E2F1-cIAP1 interaction, then we analyzed the regulation of E2F1 by cIAP1 and finally assessed the importance of the cIAP1-E2F1 interaction for the oncogenic properties of cIAP1. I have demonstrated a interaction of E2F1 with the hydrophobic pocket of the BIR3 domain of cIAP1. Moreover, I highlighted that the alpha 1 helix of the BIR3 domain is mandatory for the stability of this pocket. Moreover, we discovered an ubiquitination on lysine 161 and 164 of E2F1 by cIAP1. This ubiquitination is essential for the stability and transcriptional activity of E2F1. Finally, it appears that the cIAP1 BIR1 domain that is required for the interaction with TRAF2 is involved in its oncogenic properties.
88

Simulation of IBM/370 input/output

Gellineau, Antonio Cortes January 1976 (has links)
Thesis. 1976. M.S.--Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. / Microfiche copy available in Archives and Engineering. / Includes bibliographical references. / by Antonio C. Gellineau. / M.S.
89

Methodology for mapping quantum and reversible circuits to IBM Q architectures /

Almeida, Alexandre Araujo Amaral de. January 2019 (has links)
Orientador: Alexandre César Rodrigues da Silva / Abstract: Research in the field of quantum circuits has increased as technology advances in the development of quantum computers. IBM offers access to quantum computers via the cloud service called IBM Q. However, these architectures have some restrictions regarding the types of quantum gates that can be realized. This work proposes a methodology for the mapping of quantum and reversible circuits to the architectures made available by the IBM Q project. The methodology consists in finding CNOT mappings using a set of defined qubits movements to satisfy the architectures constraints by adding as few gates as possible. In order to reduce the number of CNOT gates needing mapping, the permutation of the circuit can be changed. One alternative to find this permutation is trough exhaustive search. However, is not feasible as the number of qubit increases. To solve this problem, the permutation problem was formulated as an Integer Linear Programming problem. The mapping of quantum circuits realized with non-implementable gates and reversible Toffoli circuits to the IBM quantum architectures were proposed in this work as well. This was done by adapting the developed CNOT mappings along with the Integer Linear Programming formulation. The proposed methodology was evaluated by mapping quantum and reversible circuits to an IBM quantum architectures with 5 and 16 qubits. The results were compared with two algorithms that map quantum circuits to IBM architectures. The cost metric used in the evalua... (Complete abstract click electronic access below) / Resumo: Pesquisa no campo de circuitos quânticos tem alavancado conforme a tecnologia avança no desenvolvimento de computadores quânticos. Atualmente, a IBM oferece acesso a computadores quânticos através do serviço em nuvem chamado IBM Q. No entanto, essas arquiteturas têm algumas restrições com relação aos tipos de portas quânticas e qubits em que uma porta CNOT pode ser implementada. Neste trabalho foi proposta uma metodologia para o mapeamento de circuitos quânticos e reversíveis para as arquiteturas disponibilizadas pelo projeto IBM Q. A metodologia consiste em mapear as portas CNOT utilizando uma série de movimentos de qubits, mantendo a permutação do circuito inalterada. A fim de reduzir o número de portas CNOT não implementáveis, a permutação do circuito pode ser alterada. Uma alternativa para encontrar essa permutação é a busca exaustiva. No entanto, é inviável conforme o número de qubits aumenta. Para resolver este problema, o problema de permutação foi formulado como um problema de Programação Linear Inteira. Como a metodologia é facilmente adaptável, o mapeamento de circuitos quânticos utilizando portas quânticas não implementáveis e circuitos reversíveis Toffoli também foram propostas neste trabalho. A avaliação da metodologia proposta foi feita com a realização do mapeamento de circuitos quânticos e reversíveis para arquiteturas quânticas com 5 e 16 qubits. Os resultados foram comparados com dois algoritmos que mapeiam circuitos quânticos para arquiteturas IBM. A métric... (Resumo completo, clicar acesso eletrônico abaixo) / Doutor
90

資訊服務業知識管理之研究-以台灣HP與台灣IBM為例

劉權瑩, Chuan-Ying Liu Unknown Date (has links)
知識就是力量,是戰場上打敗敵人的力量,也是商場上擊退競爭對手的力量。由於資訊產業發展重心逐漸由資訊硬體市場轉為資訊服務市場,為了維持台灣在全球資訊市場的領先地位,發展國內資訊服務產業成為刻不容緩的議題,另外,資訊服務業乃是高度知識密集的產業,故本研究擬探討國內資訊服務業知識管理之先進廠商-台灣HP與台灣IBM-如何運用知識管理創造競爭力,內容包括:如何使用科技工具促進知識管理、如何藉由人事制度改善知識管理、如何利用組織結構促進知識管理…等主題,提供給國內其他資訊服務廠商觀摩參考,期能促進國內資訊服務業的發展以及知識管理實務的推展。 本研究針對台灣HP與台灣IBM之「業務/技術支援單位」、「人事制度」與「專業服務單位」,在「知識移轉與流通」、「知識轉換」、「知識創造」、「知識蓄積與擴散」、「知識管理的組織」等知識管理議題中,分別選定其中數項主題進行深入探討,而研究方法則以「個案研究法」為主,藉由實地訪談各單位相關人員,深入瞭解該部門知識管理作法。之後,除了介紹台灣HP與台灣IBM現行知識管理實務,並加以相互比較之外,本研究也將個案知識管理實務與相關知識管理理論進行對照驗證,並檢討個案現行作法之利弊得失。最後,根據文獻理論與訪問結果,本研究也於文末提出整合性的結論與心得,盼能作為實務界人士與後續研究者探討相關議題時之參考。 本研究主要結論如後: 1. 在「知識的移轉與流通」方面,關於知識流通的來源,企業應將顧客視為重要的知識流通來源,而關於種子部隊的移轉使命,企業應挑選具備相關技能專長之成員,輪流擔任種子部隊,並評估其受訓成效以及授課成效,同時給予適當獎勵,以促進組織新知識之移轉。 2. 在「知識的轉換」方面,促進主管傳授技能經驗給下屬的方法包括「領導成效的評估」以及「工作記錄」(將下屬之技能發展軌跡記載於主管之工作記錄當中),而促進成員之間彼此傳授技能經驗的方法則包括「評估各成員『團隊合作』的績效」、「公共評議制」、「利益不重疊」、「評估整體績效」等。 3. 在「知識的創造」方面,促進組織知識創造的作法包括「給予員工充分的自主權」、「培養多種才能的員工」、「與外在環境保持聯繫」、「減少組織的垂直疆界與水平疆界」等。 4. 在「知識的蓄積與擴散」方面,促進知識蓄積與擴散的作法包括「萃取個人經驗並儲存之」(要求各成員重點記錄工作內容並將之存檔)、「知識擴散」(邀請績優人員在會議中分享經驗,或擔任內部講師,或領導專案團隊)、「工作編制與工作設計」(藉工作編制與工作設計提高各成員工作內容之間的互賴性)等,而創造知識分享的文化之作法則包括「主管必須以身作則」、「績效評估」、「鼓勵分享」、「審慎甄選新人」等。 第壹章、 緒論 1 第一節、 研究動機 1 第二節、 研究目的 4 第貳章、 文獻探討 5 第一節、 知識的定義 5 第二節、 知識的特質 6 第三節、 知識與資訊 7 第四節、 知識的內涵與分類 8 第五節、 知識管理的議題 20 第參章、 研究方法 58 第一節、 研究取向 58 第二節、 研究議題 58 第三節、 研究對象 59 第四節、 研究內容 60 第五節、 研究架構 63 第六節、 研究方法 65 第七節、 研究限制 66 第肆章、 個案介紹-台灣HP 67 第一節、 HP簡介 67 第二節、 台灣HP簡介 73 第三節、 業務單位的知識管理議題 78 第四節、 技術支援單位的知識管理議題 92 第五節、 人事制度與知識管理 112 第六節、 知識管理組織-HPC 132 第七節、 其他知識管理議題 146 第伍章、 個案介紹-台灣IBM 153 第一節、 IBM簡介 153 第二節、 台灣IBM簡介 158 第三節、 業務單位的知識管理議題 161 第四節、 技術支援單位的知識管理議題 171 第五節、 人事制度與知識管理 185 第六節、 知識管理組織-Y2K綜合策進處 196 第七節、 其他知識管理議題 203 第陸章、 個案分析 215 第一節、 個案對照 215 第二節、 理論與實務的比較 226 第柒章、 結論與建議 230 第一節、 結論 230 第二節、 後續研究建議 245 第三節、 結語 246 參考文獻 247

Page generated in 0.0168 seconds