• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 104
  • 34
  • 12
  • 8
  • 7
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 206
  • 206
  • 30
  • 25
  • 19
  • 18
  • 17
  • 17
  • 16
  • 16
  • 16
  • 15
  • 14
  • 13
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Scheduling of labor and machine limited production systems

Sahney, Vinod K. January 1900 (has links)
Thesis (Ph. D.)--University of Wisconsin--Madison, 1970. / Vita. Typescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references.
22

The University of Wisconsin water supply alternatives under the Critical Path Method

Jordao, Eduardo Pacheco. January 1965 (has links)
Thesis (M.S.)--University of Wisconsin--Madison, 1965. / eContent provider-neutral record in process. Description based on print version record. Bibliography: l. 71-73.
23

Forecasting project costs with special emphasis on mass communications

Svestka, Frank Joseph, January 1966 (has links)
Thesis (Ph. D.)--University of Wisconsin--Madison, 1966. / Typescript. Vita. Description based on print version record. Includes bibliographical references.
24

Dynamic path planning of an omni-directional robot in a dynamic environment

Wu, Jianhua. January 2005 (has links)
Thesis (Ph.D.)--Ohio University, March, 2005. / Title from PDF t.p. Includes bibliographical references (162-166)
25

Examining Models of Eating Disorder Symptomatology Among University Women of South Asian Origin in the U.S.

Lovell, Jennifer Lynn 01 January 2008 (has links)
In the present study, the author tested the validity of certain variables and paths from a model of eating disorder (ED) symptomatology (T. L. Tylka & L. M. Subich, 2004) along with several alternative models (i.e., including poor interoceptive awareness, ethnic identity, and body mass) within a sample of U.S. University women of South Asian origin. The original sample included 440 women, but responses differed based on graduate and international status. Therefore, path analytic procedures focused on 255 undergraduate, non-international women. Results indicated excellent fit for 5 models and adequate fit for the 6th model. Exploratory analyses did not support self-esteem as a moderator but did support the role of internalization of beauty standards in the ED symptomatology of South Asian American women (c.f., Reddy & Crowther, 2007). The results are discussed in light of their contributions, implications, and limitations.
26

Formalising the systems approach to rock engineering

Jiao, Yong January 1995 (has links)
No description available.
27

Topology-inspired probabilistic path replanning in dynamic environments

Fisher, Richard January 2018 (has links)
A thesis submitted to the Faculty of Science, University of the Witwatersrand, in fulfilment of the requirements for the degree of Master of Science, 2018 / Path replanning in high dimensional dynamic environments is critical to the success of interactive and reactive robotic agents. State of the art replanning algorithms typically extend sampling-based methods such as rapidly-exploring random trees (RRT) or probabilistic roadmaps (PRM). However, the speed of replanning in complex configuration spaces is relatively slow, which limits the effectiveness of robotic agents in highly dynamic environments. This thesis proposes DRM-connect, a novel generalisation of the PRM and RRT-connect algorithms, which carries out replanning in dynamic environments by executing graph searches over an underlying graph G, using lazy collision checking. If a path through the graph is not found, DRM-connect will repair the graph using a novel extension to RRT-connect, which we call PRM-connect. Additionally, we investigate using an approximate Reeb graph as the underlying graph G, which attempts to capture the underlying topology of the task manifold from prior experience. DRM-connect is tested with both a Reeb graph and na¨ıve graph in a 2-D domain and compared to RRT, while DRMconnect with a Reeb graph is tested in three 7-D domains, and compared to RRT-connect. Through simulation we show that the combination of DRM-connect and a Reeb graph typically outperforms both RRT/RRT-connect and DRM-connect with a na¨ıve graph in terms of replanning times, with minimal impact on the length of the solution path. / XL2019
28

Critical path tracing as a diagnostic evaluation method for sequential systems

Mann, Timothy Lee, 1950- January 1988 (has links)
Diagnostic tests are designed to detect and isolate faults in sequential systems. The problem is to evaluate the effectiveness of the design. For stuck faults a diagnostic model can be used. A fault simulation strategy is presented for generating this model. First, definitions, for identifying critical inputs are derived. A definition is a statement of the conditions to sensitize an input. Then a fault free simulation is used to generate a critical value array. A critical path is traced through the sensitized inputs marked in the array using a critical value array tracing algorithm that is developed. This algorithm traces a path back in time, as required for a sequential system, to identify detectable faults for the model.
29

Algorithm for resource allocation in critical path method

Yi, Sang-yŏng., Yi, Sang-yŏng. January 1971 (has links)
No description available.
30

Code Clone Discovery Based on Concolic Analysis

Krutz, Daniel Edward 01 January 2013 (has links)
Software is often large, complicated and expensive to build and maintain. Redundant code can make these applications even more costly and difficult to maintain. Duplicated code is often introduced into these systems for a variety of reasons. Some of which include developer churn, deficient developer application comprehension and lack of adherence to proper development practices. Code redundancy has several adverse effects on a software application including an increased size of the codebase and inconsistent developer changes due to elevated program comprehension needs. A code clone is defined as multiple code fragments that produce similar results when given the same input. There are generally four types of clones that are recognized. They range from simple type-1 and 2 clones, to the more complicated type-3 and 4 clones. Numerous clone detection mechanisms are able to identify the simpler types of code clone candidates, but far fewer claim the ability to find the more difficult type-3 clones. Before CCCD, MeCC and FCD were the only clone detection techniques capable of finding type-4 clones. A drawback of MeCC is the excessive time required to detect clones and the likely exploration of an unreasonably large number of possible paths. FCD requires extensive amounts of random data and a significant period of time in order to discover clones. This dissertation presents a new process for discovering code clones known as Concolic Code Clone Discovery (CCCD). This technique discovers code clone candidates based on the functionality of the application, not its syntactical nature. This means that things like naming conventions and comments in the source code have no effect on the proposed clone detection process. CCCD finds clones by first performing concolic analysis on the targeted source code. Concolic analysis combines concrete and symbolic execution in order to traverse all possible paths of the targeted program. These paths are represented by the generated concolic output. A diff tool is then used to determine if the concolic output for a method is identical to the output produced for another method. Duplicated output is indicative of a code clone. CCCD was validated against several open source applications along with clones of all four types as defined by previous research. The results demonstrate that CCCD was able to detect all types of clone candidates with a high level of accuracy. In the future, CCCD will be used to examine how software developers work with type-3 and type-4 clones. CCCD will also be applied to various areas of security research, including intrusion detection mechanisms.

Page generated in 0.1014 seconds