• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 111
  • 79
  • 41
  • 18
  • 17
  • 14
  • 6
  • 6
  • 4
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 375
  • 54
  • 34
  • 34
  • 34
  • 31
  • 30
  • 27
  • 26
  • 26
  • 25
  • 22
  • 22
  • 22
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Historie a současnost klášterní knihovny u sv. Tomáše v Praze / Past and Present of the Convent Library of Saints Thomas in Prague

Sladká, Veronika January 2015 (has links)
Monastery library of Order of Hermits of Saint Augustin in Prague is an outstanding book collection of considerable scientific and historical value. Nowadays, it consists of more than 18 000 volumes. Saint Thomas monastery was founded by Wenceslaus II. in 1278 and had, from the very beginning,, a leading role among other monasteries of this order in Bohemia. From the early 14th century an Augustinian university was run there - as the only one in vast province of Bavaria, to which Bohemia belonged. In the 17th century, an independent Bohemian province was established and Saint Thomas monastery became a natural centre of it. This diploma thesis aims to provide an overview of a history of library and to introduce significant members of Augustinian order, who contributed to development (in time of prosperity) of library. Author is particularly focused on early modern period, to which scholars have not paid attention yet, and events connected to the end of the Thirty Years War, when, as it was assumed in the past, the library sustained big damage. Apart from that, everyday interest and care for books and libraries inside the order will be characterised and the cultural and historical impact of the library of Saint Thomas convent will also be emphasized. Origins and medieval period of the library is...
342

Historický knihovní fond Městského muzea Bechyně / The Oldest Part of the Library of the Municipal Museum Bechyně

Jadlovská, Anežka January 2021 (has links)
The aim of the thesis is description of the oldest part of the library of the Bechyně Municipal Mu- seum. The essential step was a close survey of the library collection. It was focused on identifica- tion of the prints, typology of bookbindings, provenance records, physical condition of the books, and conservation recommendations. The same structure is reflected in the text of the thesis. One of the results is a catalogue of the old prints and history of the museum. Another outcome is a set of forms containing the data for each book with recommended conservation interventions and precau- tions.
343

ROCK, TILL, AND ICE: A PROVENANCE STUDY OF THE BYRD GLACIER AND THE CENTRAL AND WESTERN ROSS SEA, ANTARCTICA

Palmer, Emerson Fowler 01 July 2008 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Petrography of the sand fraction, particle size analysis, and detrital zircon U/Pb isotope data, and pebble count data were collected from Byrd Glacier moraines and central/western Ross Sea till in order to study the glacially-driven sedimentological dynamics of the Byrd Glacier and to trace material transported from the Byrd Glacier into the Ross embayment. Most of the petrographic data show evidence of local derivation with the exception of the sites from the Lonewolf Nunataks as indicated by exotic rock types within the sand and pebble fractions. This, in conjunction with particle-size data of the samples from the Lonewolf Nunataks indicate that material from underneath the East Antarctic Ice Sheet (EAIS) is being transported to the surface and deposited in this area. The U/Pb ages of zircons from the Byrd Glacier show dominant populations of Ross to Pan-African ages (~533 - 610 Ma) with varying populations of older (Grenville to Archean) zircons. Late Precambrian (~588 – 610 Ma) aged detrital zircons in samples from the head of the Byrd Glacier are older than other dated grains found in the vicinity and may be evidence of early development of the Ross belt or represent evidence of sub-glacial extension of the Mozambique structure found in Dronning Maud Land. The west central Ross Sea till samples have a variety of mineral and lithic fragments that include a dominant population of polymict at certain depth intervals. Detrital zircon data suggests the potential provenance of two of these intervals may be derived from Marie Byrd Land and possibly the Byrd Glacier. Using sand petrography and U/Pb detrital zircon age dating, positive correlation was found between specific samples from the head of the Byrd Glacier and the western Ross Sea. The ice-sheet flow models of Stuiver et al. (1981), Licht and Fastook (1998), and Licht et al. (2005) each show potential support from aspects of this study. It is possible that dynamic ice-flow regime changes of the West and East Antarctic Ice Sheets into the Ross Sea may have occurred some time during the LGM as suggested by geochemical and petrographical evidence found within intervals of central and western Ross Sea cores.
344

Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs / Detektering av cyberhot med hjälp av maskininlärning på grafer : Inlärning av kontinuerliga tidsdiagram på härkomstgrafer

Reha, Jakub January 2023 (has links)
Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. Ever-increasingly skilled, organized, and funded threat actors combined with ever-increasing volumes and modalities of data require increasingly sophisticated and innovative cyber defense solutions. Current state-of-the-art security systems conduct threat detection on dynamic graph representations of computer systems and enterprise communication networks known as provenance graphs. Most of these security systems are statistics-based, based on rules defined by domain experts, or discard temporal information, and as such come with a set of drawbacks (e.g., incapability to pinpoint the attack, incapability to adapt to evolving systems, reduced expressibility due to lack of temporal information). At the same time, there is little research in the machine learning community on graphs such as provenance graphs, which are a form of largescale, heterogeneous, and continuous-time dynamic graphs, as most research on graph learning has been devoted to static homogeneous graphs to date. Therefore, this thesis aims to bridge these two fields and investigate the potential of learning-based methods operating on continuous-time dynamic provenance graphs for cyber threat detection. Without loss of generality, this work adopts the general Temporal Graph Networks framework for learning representations and detecting anomalies in such graphs. This method explicitly addresses the drawbacks of current security systems by considering the temporal setting and bringing the adaptability of learning-based methods. In doing so, it also introduces and releases two large-scale, continuoustime temporal, heterogeneous benchmark graph datasets with expert-labeled anomalies to foster future research on representation learning and anomaly detection on complex real-world networks. To the best of the author’s knowledge, these are one of the first datasets of their kind. Extensive experimental analyses of modules, datasets, and baselines validate the potency of continuous-time graph neural network-based learning, endorsing its practical applicability to the detection of cyber threats and possibly other semantically meaningful anomalies in similar real-world systems. / Cyberattacker är allestädes närvarande och blir allt vanligare inom industrin, samhället och statliga myndigheter. De påverkar ekonomin, politiken och enskilda individer. Allt skickligare, organiserade och finansierade hotaktörer i kombination med ständigt ökande volymer och modaliteter av data kräver alltmer sofistikerade och innovativa cyberförsvarslösningar. Dagens avancerade säkerhetssystem upptäcker hot på dynamiska grafrepresentationer (proveniensgrafer) av datorsystem och företagskommunikationsnät. De flesta av dessa säkerhetssystem är statistikbaserade, baseras på regler som definieras av domänexperter eller bortser från temporär information, och som sådana kommer de med en rad nackdelar (t.ex. oförmåga att lokalisera attacken, oförmåga att anpassa sig till system som utvecklas, begränsad uttrycksmöjlighet på grund av brist på temporär information). Samtidigt finns det lite forskning inom maskininlärning om grafer som proveniensgrafer, som är en form av storskaliga, heterogena och dynamiska grafer med kontinuerlig tid, eftersom den mesta forskningen om grafinlärning hittills har ägnats åt statiska homogena grafer. Därför syftar denna avhandling till att överbrygga dessa två områden och undersöka potentialen hos inlärningsbaserade metoder som arbetar med dynamiska proveniensgrafer med kontinuerlig tid för detektering av cyberhot. Utan att för den skull göra avkall på generaliserbarheten använder detta arbete det allmänna Temporal Graph Networks-ramverket för inlärning av representationer och upptäckt av anomalier i sådana grafer. Denna metod tar uttryckligen itu med nackdelarna med nuvarande säkerhetssystem genom att beakta den temporala induktiva inställningen och ge anpassningsförmågan hos inlärningsbaserade metoder. I samband med detta introduceras och släpps också två storskaliga, kontinuerliga temporala, heterogena referensgrafdatauppsättningar med expertmärkta anomalier för att främja framtida forskning om representationsinlärning och anomalidetektering i komplexa nätverk i den verkliga världen. Såvitt författaren vet är detta en av de första datamängderna i sitt slag. Omfattande experimentella analyser av moduler, dataset och baslinjer validerar styrkan i induktiv inlärning baserad på kontinuerliga grafneurala nätverk, vilket stöder dess praktiska tillämpbarhet för att upptäcka cyberhot och eventuellt andra semantiskt meningsfulla avvikelser i liknande verkliga system.
345

Analysis of glass beads from the “Roten Schmelzzimmer” in Arnstadt and glass tableware from the Grafschaft Schwarzburg-Sondershausen dating from the 17th and 18th century

Ramdani, Yamna 03 November 2023 (has links)
This study investigates various glass objects from the 17th and 18th centuries in Thuringia to gain insight into their manufacturing techniques. The objects include glass beads from the Roten Schmelzzimmer and diverse glass objects from the Schwarzburg-Sondershausen collection. The analytical methods include optical microscopy, CT, SEM-EDX, LA-ICP-MS and Raman spectroscopy. The glass beads from the Roten Schmelzzimmer were identified as soda-lime- and high-lead-silicate glasses, which were made using highly pure sands and halophytic plant ashes as a fluxing agent. These recipes are characteristic from the Mediterranean region. The beads were coloured in 11 different colours with copper, cobalt, manganese, iron, and were possibly opacified with salt and tartrate. The analysed glass objects from the Schwarzburg collection were made using different recipes based on potash-lime-silicate glass with high amounts of potash and calcium, and calcinated-bone ashes as a white opacifier, characteristic of central Europe.
346

Last Deglacial Arctic to Pacific Transgressions via the Bering Strait: Implications for Climate, Meltwater Source, Ecosystems and Southern Ocean Wind Strength

Nwaodua, Emmanuel C. 09 December 2013 (has links)
No description available.
347

Software Supply Chain Security: Attacks, Defenses, and the Adoption of Signatures

Taylor R Schorlemmer (14674685) 27 April 2024 (has links)
<p dir="ltr">Modern software relies heavily on third-party dependencies (often distributed via public package registries), making software supply chain attacks a growing threat. Prior work investigated attacks and defenses, but only taxonomized attacks or proposed defensive techniques, did not consistently define software supply chain attacks, and did not provide properties to assess the security of software supply chains. We do not have a unified definition of software supply chain attacks nor a set of properties that a secure software supply chain should follow.</p><p dir="ltr">Guaranteeing authorship in a software supply chain is also a challenge. Package maintainers can guarantee package authorship through software signing. However, it is unclear how common this practice is or if existing signatures are created properly. Prior work provided raw data on registry signing practices, but only measured single platforms, did not consider quality, did not consider time, and did not assess factors that may influence signing. We do not have up-to-date measurements of signing practices nor do we know the quality of existing signatures. Furthermore, we lack a comprehensive understanding of factors that influence signing adoption.</p><p dir="ltr">This thesis addresses these gaps. First, we systematize existing knowledge into: (1) a four-stage supply chain attack pattern; and (2) a set of properties for secure supply chains (transparency, validity, and separation). Next, we measure current signing quantity and quality across three kinds of package registries: traditional software (Maven Central, PyPI), container images (Docker Hub), and machine learning models (Hugging Face). Then, we examine longitudinal trends in signing practices. Finally, we use a quasi-experiment to estimate the effect that various factors had on software signing practices.</p><p dir="ltr">To summarize the findings of our quasi-experiment: (1) mandating signature adoption improves the quantity of signatures; (2) providing dedicated tooling improves the quality of signing; (3) getting started is the hard part — once a maintainer begins to sign, they tend to continue doing so; and (4) although many supply chain attacks are mitigable via signing, signing adoption is primarily affected by registry policy rather than by public knowledge of attacks, new engineering standards, etc. These findings highlight the importance of software package registry managers and signing infrastructure.</p>
348

Stratigraphy and Depositional History of the Pantano Formation (Oligocene-Early Miocene), Pima County, Arizona

Balcer, Richard Allen January 1984 (has links)
The Pantano Formation comprises 1,250 m of alluvial, fluvial, lacustrine, and volcanic rocks deposited in a basin formed in response to regional extension during mid- Tertiary time in southeastern Arizona. During deposition, the locations and composition of sediment source areas varied as contemporaneous uplift occurred adjacent to the basin. The lower half of the formation was deposited as alluvial fans that prograded northward, westward, and southward; the upper half was deposited during southwestward retreat of alluvial fan deposition and the onset of lacustrine deposition. An andesite flow separates the two depositional regimes. Radiometric dates of 24.4 ± 2.6 m.y. B.P. for the andesite and 36.7 ± 1.1 m.y. B.P. for a rhyolitic tuff disconformably underlying the formation indicate that deposition occurred during Oligocene to early Miocene time. Proper stratigraphic sequencing and description, paleocurrent analysis, and gravel provenance study aided in understanding the depositional history of the formation.
349

Recherches sur Orange antique : carte archéologique et étude céramologique. : Étude sur l’origine et la chronologie des importations de céramiques sigillées italiques en Narbonnaise : le cas d’Orange. : suivi d’une Carte archéologique d’Orange et du nord-ouest du Vaucluse

Roumégous, Anaïs 01 December 2012 (has links)
Cette thèse se compose de deux volets indépendants mais complémentaires : d'une part une carte archéologique d'Orange et du nord-ouest du Vaucluse ; d'autre part une étude sur l'origine et la chronologie des importations de céramiques sigillées italiques en Narbonnaise à partir du cas d'Orange. La carte archéologique synthétise les découvertes archéologiques touchant une période comprise entre 700 av. et 700 ap. J.-C. Toutes les informations disponibles ont été prises en compte (manuscrits, rapports d'opérations, sources imprimées) afin de dresser un état de la bibliographie et de préciser nos connaissances des vestiges antiques du nord-ouest du département de Vaucluse. Le corpus ainsi constitué est la base d'une réflexion sur l'occupation de la zone durant l'Antiquité, l'organisation urbaine de la colonie d'Orange et les limites du territoire de la cité. L'aspect historiographique constitue également un point important de ce travail. L'étude céramologique renouvelle nos repères chronologiques sur le développement urbain de la cité durant le premier siècle de son existence grâce, notamment, à la datation de l'enceinte, des différentes constructions monumentales du site de l'hémicycle et des contextes précoces des quartiers d'habitations à l'est du théâtre. L'étude céramologique s'attache par ailleurs à identifier l'origine des sigillées italiques recueillies à l'occasion des différents chantiers de fouilles, ce qui permet de dresser un bilan complet des ateliers. / This thesis consists of two parts, independent but complementary : on the one hand, an archaeological map of Orange and the northwest of Vaucluse; on the other hand, a study of the origin and the chronology of the imports of ceramics called italian sigillata in Gallia Narbonensis based on the case of Orange. The archaeological map synthesizes the archaeological discoveries touching a period included between 700 BC and 700 AD. All the available information was taken into account (manuscripts, reports, printed sources) to draw up a state of the bibliography and specify our knowledge of the antique vestiges of the northwest of Vaucluse. The corpus so established is the basis of a reflection on the occupation of the zone during the Antiquity, the urban organization of the city of Orange and the limits of its political territory. The historiographical aspect also constitutes an important point of this work. The ceramic study renews our chronological points of reference on the urban development of the city for its first century of existence, with in particular the dating of the surrounding wall, the various monumental constructions of the site of the « hémicycle » and the early contexts of living districts east of the theater. Besides, the ceramic study attempts to identify the origin of the examined italian sigillata, drawing up first a ou synthesis of workshops producing this ceramic. Indeed, if the italian sigillat seems well known, we quickly notice that it was almost always considered a homogeneous whole, without taking into account the existence of multiple workshops, in the constitution of typologies and datings.
350

Die Mainzer Karmelitenbibliothek

Ottermann, Annelen 30 September 2015 (has links)
Gegenstand der Untersuchung ist die Rekonstruktion und Analyse der Mainzer Karmelitenbibliothek von ihren frühesten archivalischen Zeugnissen in den 30er-Jahren des 15. Jahrhunderts bis zur Aufhebung des Klosters im Jahr 1802. Das Fehlen historischer Kataloge und eine lückenhafte archivalische Überlieferung zur Klostergeschichte bestimmten die Methodik der Analyse, deren Basis die Exemplare des Rekonstruktionsbestandes darstellten.(Hauptbestand in Mainz, Streubestände in Deutschland, Frankreich und den USA). Per autoptischer Ersterhebung konnten bislang 1589 Bände aus Mainzer Karmelitenprovenienz ermittelt werden, darunter 39 Handschriften und 289 Inkunabeln und Frühdrucke bis 1520. Die Arbeit steht im Forschungszusammenhang der Rekonstruktion klösterlicher Büchersammlungen, deren Ziel die De-Fragmentierung zerstreuter historischer Ensembles und die Bergung verschütteter Wissensräume geistlicher Gemeinschaften über ihre Bibliotheken ist. Sie macht sich Erkenntnisse, Methoden und Ergebnisse exemplarspezifischer Forschung zu eigen und leistet einen Beitrag zur anthropologischen Bibliotheksgeschichtsschreibung. Der Untersuchung lag das erkenntnisleitende Interesse zugrunde, die Sammlungsphysiognomie der Karmelitenbibliothek als Quelle für interdisziplinäre Forschungen wieder zugänglich zu machen. Im Dreischritt von Spurensuche, Spurensicherung und Spurendeutung wurde der Rekonstruktionsbestand auf Titel- und auf Exemplarebene analysiert und nach Verdichtung und Reflex des spirituellen und intellektuellen Profils in der Karmelitenbibliothek gefragt und geprüft, inwieweit sich klösterliche Wissensräume und Vernetzungen über Buchbesitz und Buchgebrauch in der erhaltenen Bibliothek abbildeten. Dabei standen die besonderen Wachstumsparameter einer mendikantischen Gebrauchsbibliothek, ihre Bestandszusammensetzung und die Strukturen der Bibliotheksverwaltung im Zentrum der Analyse. / The subject of this study is the reconstruction and analysis of the Mainz Carmelite library from the beginning of the 15th century (documentation of the earliest archival material) until the closure of the convent as a result of the secularisation in 1802. Lacking a catalogue and considering the existence of only few documents, the research project is mainly based on the surving copies once belonged to the convent: until today are registered 1589 copies with the provenance „Mainz Carmelites“, including 39 manuscripts and 289 incunables and early printed books until 1520. The study intends to be a contribution for the reconstruction of monastic libraries with the aim to unify surviving fragmentary collections. The known copies of the former Carmelite library have been looked into for their bibliographic and copy-specific records in order to get an idea of the intellectual and spiritual knowledge. Provenance research based on both personal as well as institutional ownership was done, including also information on circulation, acquisition and handling of the material in and outside monastic life.

Page generated in 0.0867 seconds