• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 66
  • 31
  • 21
  • 18
  • 17
  • 15
  • 7
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 218
  • 31
  • 24
  • 20
  • 20
  • 19
  • 17
  • 16
  • 16
  • 16
  • 16
  • 16
  • 15
  • 15
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

On Throughput-Reliability-Delay Tradeoffs in Wireless Networks

Nam, Young-Han 19 March 2008 (has links)
No description available.
162

How Secure is Verisure’s Alarm System?

Hamid, Lars-Eric, Möller, Simon January 2020 (has links)
Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. After an initial threat modeling, followedby penetration testing it turns out that the alarm system is not assecure as Verisure markets. We could find several security flawsin the system. Some of them let an attacker block the system,and others yield full control without the user’s knowledge. Thereare also a couple of vulnerabilities that could be exploited bypeople without any special knowledge regarding hacking or thesystem in general. / Säkerhet är en mycket viktig del i dagens samhälle. Verisure är ledande inom hemmalarmsystem med 30 års erfarenhet. I det här projektet utvärderar vi hur säkert deras larmsystem är från ett mjukvaruperspektiv. Systemet köptes i januari 2020. Efter en inledande hotmodellering och följande penetrationstester visar det sig att larmsystemet inte är lika säkert som Verisure marknadsför. Vi kunde under projektets gång hitta flera säkerhetsbrister i systemet. Några av dessa gör att en angripare kan blockera systemet och andra ger full kontroll utan användarnas vetskap. Det finns också ett par sårbarheter som kan utnyttjas av människor utan någon speciell kunskap om hacking eller systemet i allmänhet. / Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
163

A pattern-driven and model-based vulnerability testing for Web applications / Une approche à base de modèles et de patterns pour le test de vulnérabilités d'applications Web

Vernotte, Alexandre 29 October 2015 (has links)
Cette thèse propose une approche originale de test de vulnérabilité Web à partir de modèles etdirigée par des patterns de tests, nommée PMVT. Son objectif est d’améliorer la capacité de détectionde quatre types de vulnérabilité majeurs, Cross-Site Scripting, Injections SQL, Cross-Site RequestForgery, et Privilege Escalation. PMVT repose sur l’utilisation d’un modèle comportemental del’application Web, capturant ses aspects fonctionnels, et sur un ensemble de patterns de test devulnérabilité qui adressent un type de vulnérabilité de manière générique, quelque soit le type del’application Web sous test.Par l’adaptation de technologies MBT existantes, nous avons développé une chaîne outillée complèteautomatisant la détection des quatre types de vulnérabilité. Ce prototype a été exprimenté et évaluésur deux applications réelles, actuellement utiliseés par plusieurs dizaines de milliers d’utilisateurs.Les résultats d’expérimentation démontrent la pertinence et de l’efficience de PMVT, notamment enaméliorant de façon significative la capacité de détection de vulnérabilités vis à vis des scannersautomatiques d’applications Web existants. / This thesis proposes an original approach, dubbed PMVT for Pattern-driven and Model-basedVulnerability Testing, which aims to improve the capability for detecting four high-profile vulnerabilitytypes, Cross-Site Scripting, SQL Injections, CSRF and Privilege Escalations, and reduce falsepositives and false negatives verdicts. PMVT relies on the use of a behavioral model of theapplication, capturing its functional aspects, and a set of vulnerability test patterns that addressvulnerabilities in a generic way. By adapting existing MBT technologies, an integrated toolchain that supports PMVT automates thedetection of the four vulnerability types in Web applications. This prototype has been experimentedand evaluated on two real-life Web applications that are currently used by tens of thousandsusers. Experiments have highlighted the effectiveness and efficiency of PMVT and shown astrong improvement of vulnerability detection capabilities w.r.t. available automated Web applicationscanners for these kind of vulnerabilities.
164

Bidding models for bond market auctions / Budgivningsmodeller förauktioner på obligationsmarknaden

Engman, Kristofer January 2019 (has links)
In this study, we explore models for optimal bidding in auctions on the bond market using data gathered from the Bloomberg Fixed Income Trading platform and MIFID II reporting. We define models that aim to fulfill two purposes. The first is to hit the best competitor price, such that a dealer can win the trade with the lowest possible margin. This model should also take into account the phenomenon of the Winner's Curse, which states that the winner of a common value auction tends to be the bidder who overestimated the value. We want to avoid this since setting a too aggressive bid could be unprofitable even when the dealer wins. The second aim is to define a model that estimates a quote that allows the dealer to win a certain target ratio of trades. We define three novel models for these purposes that are based on the best competitor prices for each trade, modeled by a Skew Exponential Power distribution. Further, we define a proxy for the Winner's Curse, represented by the distance of the estimated price from a reference price for the trade calculated by Bloomberg which is available when the request for quote (RFQ) arrives. Relevant covariates for the trades are also included in the models to increase the specificity for each trade. The novel models are compared to a linear regression and a random forest regression method using the same covariates. When trying to hit the best competitor price, the regression models have approximately equal performance to the expected price method defined in the study. However, when incorporating the Winner's Curse proxy, our Winner's Curse adjusted models are able to reduce the effect of the Winner's Curse as we define it, which the regression methods cannot. The results of the models for hitting a target ratio show that the actual hit ratio falls within an interval of 5% of the desired target ratio when running the model on the test data. The inclusion of covariates in the models does not impact the results as much as expected, but still provide improvements with respect to some measures. In summary, the novel methods show promise as a first step towards building algorithmic trading for bonds, but more research is needed and should incorporate more of the growing data set of RFQs and MIFID II recorded transaction prices. / I denna studie utforskar vi modeller för optimal budgivning för auktioner på obligationsmarknaden med hjälp av data som samlats in från plattformen Bloomberg Fixed Income Trading och MIFID II-rapportering. Vi definierar modeller som ämnar att uppfylla två syften. Det första är att träffa det bästa konkurrentpriset så att en handlare kan vinna auktionen med minsta möjliga marginal. Denna modell bör också ta hänsyn till fenomenet Winner's Curse, som innebär att vinnaren av en så kallad common value auction tenderar att vara den budgivare som överskattat värdet. Vi vill undvika detta eftersom det kan vara olönsamt att skicka ett alltför aggressivt bud även om handlaren vinner. Det andra syftet är att definiera en modell som uppskattar ett pris som gör det möjligt för handlaren att vinna en viss andel av sina obligationsaffärer. Vi definierar tre nya modeller för dessa ändamål som bygger på de bästa konkurrentpriserna för varje transaktion vi har data på. Dessa modelleras av en Skew Exponential Power-fördelning. Vidare definierar vi en variabel som indirekt mäter fenomenet Winner's Curse, representerad av budprisets avstånd från ett referenspris för transaktionen beräknad av Bloomberg som är tillgänglig när en request for quote (RFQ) anländer. Relevanta kovariat för transaktionen implementeras också i modellerna för att öka specificiteten för varje transaktion. De nya modellerna jämförs med en linjärregression och en random forest-regression som använder samma kovariat. När målet är att träffa det bästa konkurrentpriset ger regressionsmodellerna ungefär samma resultat som expected price-modellen som definieras i denna studie. När man däremot integrerar effekten av Winner's Curse med den definierade indirekta variablen kan vår Winner's Curse-justerade modell minska effekten av Winner's Curse, vilket regressionsmetoderna inte kan. Resultaten av modellerna som ämnar vinna en förbestämd andel av transaktionerna visar att den faktiska andelen transaktioner som man vinner faller inom ett intervall på 5% kring den önskade andelen när modellen körs på testdata. Att inkludera kovariat i modellerna påverkar inte resultaten till den grad som uppskattades, men ger mindre förbättringar med avseende på vissa mättal. Sammanfattningsvis visar de nya metoderna potential som ett första steg mot att bygga algoritmisk handel för obligationer, men mer forskning behövs och bör utnyttja mer av den växande datamängden av RFQs och MIFID II-rapporterade transaktionspriser.
165

「道德臉面」威脅對選擇求助對象及考量因素的影響

韓貴香, Han, Kuei-Hsiang Unknown Date (has links)
本研究採情境實驗法,探討具有「道德臉面」威脅的請託情境,如何影響個人選擇不同的求助對象。研究一操弄請託情境為「有關」vs.「無關」道德臉面的威脅。結果發現:在「無關」道德臉面威脅的情境,絕大多數的問卷填答者,選擇向情感性關係的家人求助,這時個人決定找家人幫忙的主要考量,是希望獲得「較好的協助」;反之,在「有關」道德臉面威脅的情境下,絕大多數的問卷填答者,選擇向工具性關係的陌生人求助,而此時個人主要的考量,是為了「維護面子」。不過,在「有關」道德臉面威脅的請託情境,又無陌生人可以求助的情況,問卷填答者選擇向家人或朋友求助的人數,並沒有顯著的差異。 研究二操弄威脅「道德臉面」的請託情境,事件當事人和請託者之間不同的自我關聯程度(自己vs. 家人vs. 朋友),以及此失面子事件的發生,是否有一可被接受或同情的「合理藉口」。研究發現:當「自己」就是事件當事人,且沒有合理藉口時,問卷填答者傾向選擇工具性關係的陌生人求助。反之,如果事件的發生有一可解釋的外在理由,則問卷填答者選擇向陌生人和朋友求助的人數沒有顯著差異。當事件當事人是「家人」且沒有合理藉口時,填答者同樣會選擇向陌生人求助。不過,當「家人」有可被同情的藉口時,則絕大多數的填答者,選擇向朋友求助。在當事人是「朋友」的情境,則不管事件發生的理由為何,大多數的問卷填答者,均選擇向混合性關係的其他朋友求助。與研究一相同的是問卷填答者在選擇向「朋友」求助時,考量的因素是希望能獲得「較好的協助」,反之,當其選擇向「陌生人」求助時,考量的因素則是希望能「維護面子」。 研究三則設計在威脅個人「道德臉面」的請託情境中,有一些可以讓事件當事人覺得不會沒面子的可幫助熟識者(同事)。並操弄讓當事人感到「沒面子」程度不同的求助對象選擇(同事vs.陌生人vs.家人vs.朋友)。研究發現:當有不會讓當事人覺得沒面子的對象存在時,問卷填答者多優先選擇向此對象(同事)求助。只有在沒有此對象可以選擇的情況下,填答者才會退而求其次地選擇向「陌生人」求助,在連陌生人也無法選擇的情況下,問卷填答者選擇向家人或朋友求助的人數則沒有顯著差異。分析研究的資料則發現,影響問卷填答者分別選擇向「同事」、「陌生人」、「家人」或「朋友」求助的主要因素,是因為相對而言,在該不同求助對象的選擇下,問卷填答者對該對象比較不會覺得「沒面子」。 整體而言,在威脅「道德臉面」的請託情境中,最能預測問卷填答者,選擇哪一種關係對象求助的預測變項,是其「沒面子」的感受,而非西方個人主義文化中強調的「自尊」。同時,當個人因覺得「沒面子」而選擇向陌生人求助時,其考量的主要因素是希望能「維護面子」。換言之,在會威脅自己面子的情況下,是否能獲得對方「比較好的協助」,則不是那麼重要。
166

La politesse dans la communication interculturelle : les stratégies de politesse utilisées par les coréens apprenant le français comme langue seconde lors des situations de demande

Bae, Jin Ah 02 1900 (has links)
La présente recherche a pour objectif d’examiner les stratégies de politesse utilisées par des apprenants coréens qui apprennent le français comme langue seconde lors des situations de demande et de mettre en évidence le rôle de la L1 et de la culture d’origine des apprenants quant à leurs choix des stratégies de politesse en français. Trois groupes de répondants ont participé à la recherche : 30 locuteurs natifs coréens qui habitent à Séoul, en Corée, 30 étudiants coréens apprenant le français comme langue seconde à Montréal, au Canada, et 30 locuteurs natifs francophones habitant Montréal. Les données recueillies auprès des locuteurs natifs ont servi de bases de données reflétant respectivement les normes de la L1 et celles de la langue cible. Pour la collecte de données, nous avons utilisé quatre outils : le Discourse Completion Test (DCT) écrit, des échelles d’évaluation des variables contextuelles, un Questionnaire à choix multiples (QCM) ainsi qu’une entrevue semi-structurée. Les réponses obtenues au DCT écrit ont été analysées à l’aide du schéma de codage élaboré dans le cadre du Cross-Cultural Speech Act Realization Project (CCSARP) (Blum-Kulka, House, & Kasper, 1989). Les résultats de notre recherche ont démontré que les apprenants coréens ont estimé les variables contextuelles, comme l’intimité et le pouvoir social ressentis vis-à-vis de l’interlocuteur dans les situations de demande de façon similaire aux locuteurs natifs francophones, alors qu’ils ont eu tendance à estimer une plus grande gravité d’imposition de la demande que les deux groupes de locuteurs natifs dans plusieurs situations de demande. Quant aux stratégies de demande, tandis que ce sont les stratégies indirectes qui ont été le plus fréquemment utilisées par les apprenants coréens et les locuteurs natifs francophones, les apprenants coréens ont montré une tendance au transfert pragmatique de la L1, en recourant aux stratégies directes plus fréquemment que les locuteurs natifs francophones. De plus, étant donné que les apprenants coréens ont utilisé beaucoup moins d’atténuateurs que les locuteurs natifs francophones, leurs formules de demande étaient plus directes et moins polies que celles employées par les locuteurs natifs francophones. En ce qui concerne les mouvements de soutien (supportive moves), les apprenants coréens se sont démarqués des deux groupes de locuteurs natifs, en recourant plus fréquemment à certaines catégories de mouvements de soutien que les autres répondants. Les analyses de corrélation entre l’estimation des variables contextuelles et le choix des stratégies de politesse nous ont permis de constater que les apprenants coréens ainsi que les locuteurs natifs francophones ont eu tendance à utiliser davantage d’atténuateurs lorsque le locuteur possède moins de pouvoir social. Les implications des résultats pour l’enseignement et l’apprentissage des aspects de la politesse dans la classe de français langue seconde ont été exposées. / The aim of this study is to investigate request strategies that Korean learners of French use in request situations. The role played by the learners’ first language and their culture of origin in making these choices will also be explored. Three groups of respondents participated in this study: 30 native Korean speakers living in Seoul, Korea, 30 Korean French learners in Montreal, Canada, and 30 French native speakers living in Montreal. Data collected from native speakers of both Korean and French were used to create baseline data reflecting first and second language norms respectively. Four data collecting methods were used: the Discourse Completion Test (DCT); an assessment questionnaire evaluating situational factors such as intimacy, the social power between interlocutors and the degree of imposition of requests; the multiple choice questionnaire (MCQ); and a semi-constructed interview. The responses obtained from the written DCT were analysed using the coding scheme elaborated in the Cross-Cultural Speech Act Realization Project (CCSARP) (Blum-Kulka, House, & Kasper, 1989). The results of the study showed that the Korean French learners estimated situational factors like intimacy and the relative social power that they feel with interlocutors in a manner similar to that of the French native speakers. However, in many situations, the Korean learners of French tended to estimate that a request represented a greater imposition than either group of native speakers. Further, while the Korean French learners frequently used indirect strategies as the French native speakers used them, they showed a tendency towards pragmatic transfer from their first language (L1), using direct strategies more frequently than their native French-speaking counterparts. Moreover, as the Korean French learners used downgraders far less frequently, their semantic formulas were more direct and less polite than the ones used by French native speakers. Concerning supportive moves, the Korean French learners showed a different tendency from the two groups of native speakers, in that they used some categories of supportive moves more frequently. The correlation analysis between the results of the assessment questionnaire about situational factors and the politeness strategies used by respondents revealed that the Korean learners and the French native speakers used more downgraders when they have less social power than the hearer. Finally, the implications of these findings as relates to the pedagogical and didactic aspects of politeness in French as a second language classroom are examined.
167

Cloud application platform - Virtualization vs Containerization : A comparison between application containers and virtual machines

Vestman, Simon January 2017 (has links)
Context. As the number of organizations using cloud application platforms to host their applications increases, the priority of distributing physical resources within those platforms is increasing simultaneously. The goal is to host a higher quantity of applications per physical server, while at the same time retain a satisfying rate of performance combined with certain scalability. The modern needs of customers occasionally also imply an assurance of certain privacy for their applications. Objectives. In this study two types of instances for hosting applications in cloud application platforms, virtual machines and application containers, are comparatively analyzed. This investigation has the goal to expose advantages and disadvantages between the instances in order to determine which is more appropriate for being used in cloud application platforms, in terms of performance, scalability and user isolation. Methods. The comparison is done on a server running Linux Ubuntu 16.04. The virtual machine is created using Devstack, a development environment of Openstack, while the application container is hosted by Docker. Each instance is running an apache web server for handling HTTP requests. The comparison is done by using different benchmark tools for different key usage scenarios and simultaneously observing the resource usage in respective instance. Results. The results are produced by investigating the user isolation and resource occupation of respective instance, by examining the file system, active process handling and resource allocation after creation. Benchmark tools are executed locally on respective instance, for a performance comparison of the usage of physical resources. The amount of CPU operations executed within a given time is measured in order determine the processor performance, while the speed of read and write operations to the main memory is measured in order to determine the RAM performance. A file is also transmitted between host server and application in order to compare the network performance between respective instance, by examining the transfer speed of the file. Lastly a set of benchmark tools are executed on the host server to measure the HTTP server request handling performance and scalability of each instance. The amount of requests handled per second is observed, but also the resource usage for the request handling at an increasing rate of served requests and clients. Conclusions. The virtual machine is a better choice for applications where privacy is a higher priority, due to the complete isolation and abstraction from the rest of the physical server. Virtual machines perform better in handling a higher quantity of requests per second, while application containers is faster in transferring files through network. The container requires a significantly lower amount of resources than the virtual machine in order to run and execute tasks, such as responding to HTTP requests. When it comes to scalability the prefered type of instance depends on the priority of key usage scenarios. Virtual machines have quicker response time for HTTP requests but application containers occupy less physical resources, which makes it logically possible to run a higher quantity of containers than virtual machines simultaneously on the same physical server.
168

Eutanázie a trestní právo / Euthanasia and Criminal Law

Karásková, Barbora January 2018 (has links)
The thesis deals with legal aspects of euthanasia with special focus on criminal law context. It is divided into four broad chapters. First chapter defines terms that need to be understood perfectly for further work on the topic. Therefore, it deals with the term "euthanasia" and its division into active and passive euthanasia, direct and indirect, requested and unsolicited. There are also mentioned some related institutes such as dysthanasia, palliative and hospice care and assisted suicide. Last but not least, this chapter presents some arguments for and against euthanasia. Second chapter is devoted to legislation in foreign countries where euthanasia (or assisted suicide) has been legalized. Wider context of foreign legislation is important for realizing the consequences that possible legalization of euthanasia in the Czech Republic would bring. It can be clearly seen on the example of individual foreign states what legalization of euthanasia entails, how stringent the conditions that a request for termination of life has to meet are, and ultimately, we can decide whether we tend to endorse the legalization of euthanasia or go in the opposite course. Third chapter focuses on the merit of the matter, which is the legal regulation of euthanasia in the Czech Republic and the context of...
169

Fatores críticos sobre manifestações de interesse em Parcerias Público-Privadas e as propriedades da visão do produto / Critical success factors of unsolicited proposal in Public-Private Partnerships and product vision properties

Caproni, Tiago Vieira 08 March 2018 (has links)
Os Procedimentos de Manifestação de Interesse (PMI) e Propostas Não Solicitadas (PNS) são mecanismos para a viabilização de projetos de Parcerias Público-Privadas (PPP/PFIs). Contudo, a ausência de critérios claros para avaliação e priorização de parceiros, de forma transparente e técnica, leva à seleção adversa de propostas, contribuindo para o insucesso dos projetos. O principal instrumento utilizado na avaliação PPP/PFIs é uma análise quantitativa baseada no Value For Money (VfM). O propósito deste trabalho foi investigar os problemas relacionados com os processos de avaliação das propostas dos PMI submetidas aos órgãos demandantes dos serviços. Iniciou-se com a análise do Fatores Críticos para o Sucesso (FCSs) das PPP/PFIs, dos PMI e PNS, identificadas na literatura. Os Fatores Críticos foram apresentados a um conjunto de 78 especialistas que responderam também sobre a processo de análise das propostas. No questionário os autores foram confrontados também com as propriedades da visão. O resultado indica que a análise com o VfM seria incompleta e insuficiente para capturar a complexidade do escopo destes projetos. A pesquisa possibilitou ainda organizar os fatores críticos em 7 dimensões a serem consideradas na avaliação destes projetos. Essas dimensões podem ser utilizadas para a criação de instrumentos de avaliação e um exemplo foi proposto, um indicador nomeado de índice \"T\", avaliado por um grupo de 12 especialistas em projetos de PPP/PFIs. A pesquisa contribui, portanto, para apoiar a criação de instrumentos de avaliação de PPP/PFIs que considerem uma análise mais ampla, considerando aspectos qualitativos e quantitativos. / Unsolicited Proposals (UNPs) are one of the main mechanisms for verifying the feasibility of Public-Private Partnerships (PPP/PFIs/PFIs) projects. However, the lack of clear criteria to evaluate and to prioritize the partner, in a transparent and technical way, has led to adverse selection of proposals increasing the level of failure of these projects. The main instrument used in the PPP/PFIs evaluation is a quantitative analysis based on Value for Money. The purpose of this research was to investigate the problems related with the processes of evaluation of the Unsolicited Proposals (UNPs) that are submitted to the respective government offices. The study compiles the analysis of Critical Success Factors (CSFs) for Public-Private Partnerships (PPP/PFI) and the Unsolicited Proposals (UNPs), identified in the literature, and synthetized by the evaluation of a group of 78 specialists, resulting in the organization of 7 (seven) dimensions to be considered in the evaluation of these projects. This study also demonstrated that, according to these experts, the analysis with VfM would be incomplete and insufficient to capture the complexity of the scope of these projects. As an alternative a set of 7 (seven) indicators where created related to each dimension and a general index that synthetize the performance in the dimensions, considering qualitative and quantitative aspects. The index was labeled as \"T\" index and evaluated by a group of 12 (twelve) experts on PPP/PFI projects. The results from the analyses indicate that the index allows a linear comparative analysis between the proposals received by the public entity requesting the Public- Private Partnership (PPP/PFI) services. The model of indicators decreases the subjectivity of the choices made by public managers, resulting in greater transparency for the process of proposal qualification and security to the market.
170

Accoucher en France : prise en charge de la naissance en population générale / Giving Birth in France : Management in Population

Coulm, Bénédicte 29 November 2013 (has links)
Nous avons réalisé un état des lieux de la prise en charge des femmes au moment d’un accouchement en France, dans un contexte où la médecine fondée sur les preuves occupe une place de plus en plus importante dans la pratique des professionnels, où la fermeture de nombreuses maternités entraîne une concentration des naissances dans des établissements publics et spécialisés de plus en plus grands, et où l’on souhaite répondre aux besoins des femmes et à certaines de leurs demandes.Dans une première partie nous avons décrit comment les caractéristiques des maternités contribuent à expliquer les variations dans la prise en charge des femmes. Nous avons abordé la question pour la durée du séjour en post-partum et l’organisation de la prise en charge médicale à la sortie de la maternité, et pour les actes réalisés pendant l’accouchement chez des femmes à bas risque (déclenchement, césarienne, extraction instrumentale et épisiotomie). Dans une deuxième partie nous avons cherché à estimer la part des césariennes avant travail potentiellement évitables et la part des déclenchements sans motif médical et nous avons recherché quels facteurs étaient associés à ces actes.Le contenu des soins différait peu selon la taille ou le niveau de spécialisation de la maternité, sauf pour les interventions potentiellement évitables ou sans motif médical, plus fréquentes dans les petites maternités moins spécialisées, et les durées de séjour en maternité, beaucoup plus courtes dans les grandes maternités et celles de type 3. A l’inverse, le statut privé de la maternité influençait de manière forte la prise en charge des femmes : les interventions y étaient plus fréquentes, parfois en réponse à des demandes des femmes (déclenchements sans motif médical). Les caractéristiques médicales des femmes avaient un impact sur la réalisation des interventions obstétricales, avec des associations similaires à celles déjà publiées, mais les caractéristiques sociales des femmes influaient peu sur le contenu des soins.Les résultats fournissent un bilan général, utile pour évaluer les politiques de santé publique. Ils soulèvent des questions sur l’organisation des services et les processus qui conduisent aux décisions de réaliser certaines interventions obstétricales. / We assessed practices during delivery and the postpartum period in France, in a context where evidence based medicine plays a more and more important role in professional practice, where the closure of maternity units leads to a concentration of births in large public and specialized units, and where professionals want to meet the needs of women and some of their requests.We first described how maternity units’ characteristics contribute to explain variations in obstetrical intervention’s rates. We studied postpartum length-of-stay and support for women after discharge from maternity unit, and interventions performed during labor among low-risk women (inductions, cesareans, instrumental deliveries and episiotomy).In a second part we estimated the proportions of potentially avoidable cesarean deliveries and inductions without medical indications; we also investigated which factors were associated with these interventions.Obstetrical practices differed slightly depending on the size or the level of care of maternity units, except potentially avoidable cesareans, which were more frequent in small and low-specialized units, and postpartum length-of-stay, which were shorter in large and type 3 units. On the contrary, the private status of the unit strongly influenced the management of delivery: all studied interventions were more frequent in private units, sometimes in response to maternal requests (inductions without medical indications for example). Women’s medical characteristics had an impact on obstetric intervention rates; the associations were similar to those previously reported in other publications. However social characteristics had little influence on the content of care.The results provide an overall evaluation, useful for assessing perinatal public health policies. They raise questions about maternity unit organization and processes that lead to decisions to perform obstetrical interventions.

Page generated in 0.027 seconds