• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 59
  • 17
  • 17
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 103
  • 103
  • 78
  • 78
  • 72
  • 45
  • 44
  • 44
  • 44
  • 44
  • 44
  • 44
  • 44
  • 44
  • 39
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Exploring the use of the Balanced Scorecard (BSC) in the healthcare sector of the Kingdom of Saudi Arabia : rhetoric and reality : evaluate understanding the five perspectives of the BSC : evaluating the understanding of linkage between the BSC and strategy of the hospital : the reality of the implementation of BSC in KFSH

Al Thunaian, Saleh Abdulrahman January 2013 (has links)
This thesis aims to evaluate the implementation of the Balanced Scorecard (BSC) based on a case organization; the King Faisal Specialist Hospital and Research Centre (KFSH-RC). The study is an exploratory investigation. Understanding BSC perspectives is important for academic comprehension and is crucial for successful implementation. BSC at KFSH-RC includes five main perspectives: Quality of Care; Medical Care; Employees; Financial; and Education and Research (learning and growth). The thesis tackles two main anecdotal, practice-based arguments: BSC helps achieve business strategy, and the implementation of BSC has often fallen short of the assertions made about its potential for impact. A case study with a triangulation approach is justified and pursued. This study contributes to the literature in different ways. The application of the BSC has received limited attention in healthcare organisations in general, and in the Middle East and North Africa (MENA) in particular, and may be one of the first to explore such issues, across management and professional groups, to research BSC in the healthcare organisation in the KSA. It distinguishes between the understanding of financial and non-financial perspectives; and the researcher has developed a conceptual framework, which reflects the main elements of BSC implementation. Quantitative data analysis from the case study indicates that staff members at the KFSH possess only a shallow understanding of various BSC perspectives. The study revealed a consistent lack of understanding of BSC by the department employees, due to their lack of interest. The results show that performance measures following the implementation of BSC created no significant improvement. It also confirms that even some senior managers face difficulties understanding BSC perspectives. The qualitative-based findings indicate that the level of understanding of BSC for clinical services is not significantly different from that for non-clinical services; staff members of the KFSH resist the implementation of BSC in the early stages; and there is 'autocratic' leadership style at the KFSH inhibited the flow of information. The power distance and autocratic leadership style, in combination with an inadequate launch of BSC, fail to follow the implementation steps recommended by both Kaplan and Norton (2001a) and Kotter (1996). These organisational dynamics, it will be argued, are understated in the original BSC methodology, a view consistent with the findings of Woodley (2006) and may be especially so in environments with strong professional norms such as hospitals. The implications for the study and practice of non-profit organisations wishing to adopt methodology developed initially in a commercial context, is considered.
22

Secure Network Coding: Dependency of Efficiency on Network Topology

Pfennig, Stefan, Franz, Elke 25 November 2013 (has links) (PDF)
Network Coding is a new possibility to transmit data through a network. By combining different packets instead of simply forwarding, network coding offers the opportunity to reach the Min-Cut/Max-Flow capacity in multicast data transmissions. However, the basic schemes are vulnerable to so-called pollution attacks, where an attacker can jam large parts of the transmission by infiltrating only one bogus message. In the literature we found several approaches which aim at handling this kind of attack with different amounts of overhead. Though, the cost for a specific secure network coding scheme highly depends on the underlying network. The goal of this paper is on the one hand to describe which network parameters influence the efficiency of a certain scheme and on the other hand to provide concrete suggestions for selecting the most efficient secure network coding scheme considering a given network. We will illustrate that there does not exist “the best” secure network scheme concerning efficiency, but all selected schemes are more or less suited under certain network topologies.
23

Pellet Power

Vice President Research, Office of the January 2009 (has links)
Wood pellets are offering opportunities for a cleaner-burning biofuel but major concerns are overshadowing their potential. Tony Bi and UBC’s Clean Energy Research Centre are engineering solutions.
24

A Fine Balance

Vice President Research, Office of the January 2009 (has links)
Climate change is putting the Earth’s biodiversity in serious jeopardy. UBC’S Biodiversity Research Centre is aiming to understand the impact of this shift.
25

A Probabilistic Quantitative Analysis of Probabilistic-Write/Copy-Select

Baier, Christel, Engel, Benjamin, Klüppelholz, Sascha, Märcker, Steffen, Tews, Hendrik, Völp, Marcus 03 December 2013 (has links) (PDF)
Probabilistic-Write/Copy-Select (PWCS) is a novel synchronization scheme suggested by Nicholas Mc Guire which avoids expensive atomic operations for synchronizing access to shared objects. Instead, PWCS makes inconsistencies detectable and recoverable. It builds on the assumption that, for typical workloads, the probability for data races is very small. Mc Guire describes PWCS for multiple readers but only one writer of a shared data structure. In this paper, we report on the formal analysis of the PWCS protocol using a continuous-time Markov chain model and probabilistic model checking techniques. Besides the original PWCS protocol, we also considered a variant with multiple writers. The results were obtained by the model checker PRISM and served to identify scenarios in which the use of the PWCS protocol is justified by guarantees on the probability of data races. Moreover, the analysis showed several other quantitative properties of the PWCS protocol.
26

Roof and Wall Vents Study under Simulated Hurricane Winds

Kawade, Peeyush S. 09 December 2009 (has links)
Ventilation might seem like a minor consideration, but when properly installed, it can extend the life of the attic and roof structure of residential buildings saving huge dollar amounts in repair costs. The objectives of this study were to measure the wind effect on different kind of vents as the problem is vents are subjected to high wind loads during hurricane events and often fail causing water penetration and damage of interior contents. Wind-induced failure of rooftop vents during a hurricane may result in large openings in the roof that will allow water to penetrate into the building, a puncturing of the roof membrane, again allowing water infiltration, and detached rooftop vents can pose considerable threats as windborne debris. The study found that water infiltration through a vent system is dependent upon the differential pressure as well as the vent mechanism. For vents experiencing higher differential pressures, vent covers can be used during storms to reduce water infiltration. Active controls can also be designed to close the vents automatically as differential pressure increases based on the wind speed and wind angle of attack.
27

Transzendenz und Gemeinsinn: Themen und Perspektiven des Dresdner Sonderforschungsbereichs 804

Vorländer, Hans January 2011 (has links)
VORWORT: Ikonisch verdichtet sich auf dem Umschlag dieser Broschüre das Selbstbild Dresdens. Von der Brühlschen Terrasse, „Balkon Europas“ genannt, geht der Blick auf die Kunstakademie, mit der gläsernen Kuppel des Kunstvereins, die mit einer eigenartigen Figur an ihrer Spitze besetzt ist, die sich beim näheren Hinsehen als Chimäre aus Nike und Fama zu erkennen gibt. Auf dem Sockel in der Bildmitte steht Gottfried Semper, der jene Oper baute, die heute medial auch als „das schönste Brauhaus Deutschlands“ bekannt ist. Und am hinteren Bildrand werden das neu errichtete Coselpalais, benannt nach der berühmten Mätresse August des Starken, und die wiedererrichtete Frauenkirche sichtbar. Sie ist das Stein gewordene Symbol für die Rekonstruktion des „alten“ Dresden und zugleich Objekt eines neu-alten Bürgerstolzes. Betrachtet man dieses Bild, mag es verständlich erscheinen, dass manche sagen, Dresden sei gar keine Stadt, sondern ein Mythos. Indes, so wäre zu entgegnen, macht der Mythos erst die Stadt. „Elbflorenz“ – das ist die Erzählung von barocker Schönheit, Liebe zur Kunst und Prunk der alten Residenz. Es ist ein Erinnerungsmythos, zugleich aber auch ein Mythos der Wiederbegründung. Zwischen beide schiebt sich der Mythos des Opfers: die Zerstörung Dresdens am 13. und 14. Februar 1945. In den Konflikten um die Kirchen- und die Stadtrekonstruktion, um die Restituierung von räumlicher Mitte und urbaner Identität, hat sich eine die Bürgerschaft mobilisierende Energie zu erkennen gegeben. Sie hat es vermocht, dass mehr als drei Viertel der Kosten für den Wiederaufbau der Kirche von privaten Geldgebern gespendet wurde. Zugleich hat diese gemeinsinnige Kraft aber auch bei der Bebauung der die Frauenkirche umgebenden Brachen zu einer Emphase historistischer Rekonstruktionstreue auf dem Neumarkt geführt. In der Erzählung von Zerstörung und Wiederauferstehung verschränken sich mithin mythische Eigentranszendierung der Stadt und aktuelle Gemeinsinnsbehauptungen in einer höchst spannungsvollen Weise. Dresden illustriert die Fragestellung des Sonderforschungsbereichs, der in dieser Stadt auch seinen Sitz hat. Der Sonderforschungsbereich 804 „Transzendenz und Gemeinsinn“ wurde im Mai 2009 von der Deutschen Forschungsgemeinschaft bewilligt und besteht seit dem 1. Juli 2009 an der Technischen Universität Dresden. Er umfasst 20 Teilprojekte aus drei Fakultäten und neun Instituten der TU Dresden sowie von Partnern der italienischen Universitäten Turin und Matera und der Universität Zürich, Schweiz. Zudem besitzt der SFB 804 ein Integriertes Graduiertenkolleg zur Ausbildung von Doktoranden und internationalen Stipendiaten. Das Forschungsprogramm sieht vor, jenseits herkömmlicher Epocheneinteilungen Ordnungsformationen wie Stadt, Republik, Demokratie, Nation, bürgerliche Gesellschaft, Adel und Hof, religiöse und nicht-religiöse Gemeinschaften miteinander zu vergleichen. Stets geht es um die Analyse des spannungsvollen Zusammenspiels von Transzendenzformen und Gemeinsinnsvorstellungen bei Entstehung, Stabilisierung und Scheitern von vormodernen und modernen sozialen und politischen Ordnungen. Mit dieser interdisziplinär und international vernetzten Fragestellung setzt der SFB 804 die erfolgreiche Grundlagenforschung der Dresdner Geistes-, Sozial- und Kulturwissenschaften fort, die in der zweiten Hälfte der 1990er Jahre mit dem Sonderforschungsbereich 537 „Institutionalität und Geschichtlichkeit“ und einem Internationalen Graduiertenkolleg begonnen hat. Die folgenden Seiten beabsichtigen, den gemeinsamen Forschungsansatz und die Ziele der einzelnen Projekte des SFB 804 der wissenschaftlichen und interessierten Öffentlichkeit vorzustellen. Sie möchten auch zu Anregung und Auseinandersetzung einladen.:6 Hans Vorländer: Einleitung 16 Maria Häusl: Trennung und Öffnung. Alttestamentarische Diskurse um die Konstituierung des nachexilischen Israel 22 Matthias Klinghardt: Mahl und Kanon. Gemeinschaftsbildung im frühen Christentum 28 Martin Jehne: Die Investition eigener Ressourcen in die Gemeinschaft von der mittleren Republik bis in die hohe Kaiserzeit 34 Fritz-Heiner Mutschler: Tradition, Vernunft, Gott. Zur wechselnden Fundierung gemeinsinnigen Handelns vom Ausgang der Republik bis in die Umbruchphase des 3. Jahrhunderts 40 Cristina Andenna/Gert Melville: Dynastie, Idoneität und Transzendenz. Vergleichende Untersuchungen zum hohen und späten Mittelalter 46 Bruno Klein: Die Kirche als Baustelle. Großstädtische Sakralbauten im Mittelalter 52 Jürgen Müller: Das subversive Bild. Religiöse und profane Deutungsmuster in der Kunst der Frühen Neuzeit 58 Gerd Schwerhoff: Gottlosigkeit und Eigensinn. Religiöse Devianz in der Frühen Neuzeit 64 Winfried Müller: Gemeinsinnsdiskurse und religiöse Prägung zwischen Spätaufklärung und Vormärz (ca. 1770 - ca. 1848) 70 Hans Vorländer: Demokratische Ordnung zwischen Transzendenz und Gemeinsinn 76 Werner J. Patzelt: Transzendenz und Gemeinsinn als Ressourcen politischer Ordnungskonstruktion 82 Karl-Siegbert Rehberg: Kunstsakralisierung und Gemeinsinn 88 Hans-Georg Lippert: Das Planbare und das Unverfügbare. Modelle von Transzendenz und Gemeinsinn in Architektur und Städtebau im 20. Jahrhundert 94 Thomas Hänseroth: Das Fortschrittsversprechen von Technik und die Altruismusbehauptung der Ingenieure in der technokratischen Hochmoderne (ca. 1880 - 1970) 100 Christian Schwarke: Konstruktionen von Transzendenz und Gemeinsinn in Technik und Theologie 106 Karl Lenz: Transzendenz und Gemeinsinn in privaten Lebensformen 112 Thomas Rentsch: Transzendenz und Gemeinsinn in Geschichte und Gegenwart der Philosophie 118 Pier Paolo Portinaro: Die Sakralisierung der Kulturnation im italienischen Risorgimento 124 Georg Kohler: Die Kontingenz des Unverfügbaren - Die „Willensnation Schweiz“ 130 Marina Münkler: Das Ethos der Freundschaft 136 Gerd Schwerhoff: Integriertes Graduiertenkolleg 138 Kontakt und Impressum
28

QPPT: Query Processing on Prefix Trees

Kissinger, Thomas, Schlegel, Benjamin, Habich, Dirk, Lehner, Wolfgang January 2013 (has links)
Modern database systems have to process huge amounts of data and should provide results with low latency at the same time. To achieve this, data is nowadays typically hold completely in main memory, to benefit of its high bandwidth and low access latency that could never be reached with disks. Current in-memory databases are usually columnstores that exchange columns or vectors between operators and suffer from a high tuple reconstruction overhead. In this paper, we present the indexed table-at-a-time processing model that makes indexes the first-class citizen of the database system. The processing model comprises the concepts of intermediate indexed tables and cooperative operators, which make indexes the common data exchange format between plan operators. To keep the intermediate index materialization costs low, we employ optimized prefix trees that offer a balanced read/write performance. The indexed tableat-a-time processing model allows the efficient construction of composed operators like the multi-way-select-join-group. Such operators speed up the processing of complex OLAP queries so that our approach outperforms state-of-the-art in-memory databases.
29

Secure Network Coding: Dependency of Efficiency on Network Topology

Pfennig, Stefan, Franz, Elke January 2013 (has links)
Network Coding is a new possibility to transmit data through a network. By combining different packets instead of simply forwarding, network coding offers the opportunity to reach the Min-Cut/Max-Flow capacity in multicast data transmissions. However, the basic schemes are vulnerable to so-called pollution attacks, where an attacker can jam large parts of the transmission by infiltrating only one bogus message. In the literature we found several approaches which aim at handling this kind of attack with different amounts of overhead. Though, the cost for a specific secure network coding scheme highly depends on the underlying network. The goal of this paper is on the one hand to describe which network parameters influence the efficiency of a certain scheme and on the other hand to provide concrete suggestions for selecting the most efficient secure network coding scheme considering a given network. We will illustrate that there does not exist “the best” secure network scheme concerning efficiency, but all selected schemes are more or less suited under certain network topologies.
30

A Probabilistic Quantitative Analysis of Probabilistic-Write/Copy-Select

Baier, Christel, Engel, Benjamin, Klüppelholz, Sascha, Märcker, Steffen, Tews, Hendrik, Völp, Marcus January 2013 (has links)
Probabilistic-Write/Copy-Select (PWCS) is a novel synchronization scheme suggested by Nicholas Mc Guire which avoids expensive atomic operations for synchronizing access to shared objects. Instead, PWCS makes inconsistencies detectable and recoverable. It builds on the assumption that, for typical workloads, the probability for data races is very small. Mc Guire describes PWCS for multiple readers but only one writer of a shared data structure. In this paper, we report on the formal analysis of the PWCS protocol using a continuous-time Markov chain model and probabilistic model checking techniques. Besides the original PWCS protocol, we also considered a variant with multiple writers. The results were obtained by the model checker PRISM and served to identify scenarios in which the use of the PWCS protocol is justified by guarantees on the probability of data races. Moreover, the analysis showed several other quantitative properties of the PWCS protocol.

Page generated in 0.0844 seconds