• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 98
  • 32
  • 25
  • 20
  • 17
  • 14
  • 12
  • 7
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 236
  • 79
  • 79
  • 51
  • 32
  • 29
  • 29
  • 27
  • 26
  • 25
  • 23
  • 21
  • 19
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

A STUDY OF CLUSTER PAGING METHODS TO BOOST VIRTUAL MEMORY PERFORMANCE

RAMAN, VENKATESH 11 March 2002 (has links)
No description available.
62

A STUDY OF SWAP CACHE BASED PREFETCHING TO IMPROVE VITUAL MEMORY PERFORMANCE

KUNAPULI, UDAYKUMAR 11 March 2002 (has links)
No description available.
63

A Study of a Swap of Information Systems in an Organisation

Halén, Alexander, Mozalewski, Wiktor January 2011 (has links)
Denna studie är en fallstudie som behandlar telekomföretaget Relacoms arbete med att gå från ett affärssystem till ett annat. Vi har med hjälp av intervjuer och flera enkätundersökningar bland personal samt diskussion med företagets ledning erhållit relevant fakta. Den planering och de processer som företaget använts sig av har dokumenterats och analyserat med hjälp av teorier hämtade från diverse akademiska skrifter inom området. Vi avslutar vår studie med en slutsats där vi presenterar vårt resultat samt en rekommendation till Relacom som behandlar fortsättningen av övergångsarbetet. Vårt resultat av Relacoms tillvägagångssätt vid byte av affärssystem är att ledningen skötte sig väl, men vissa kommunikationsbrister uppstod. / This lucubration is a case study which deals with the telecommunications company Relacoms transition from one business system to another. Through interviews and surveys among staff and management we have been able to document and analyze the planning and processes used by Relacom using theories drawn from various academic writings in the field. Our study ends with a conclusion where our results are presented plus a recommendation to Relacom considering the continuation of the transition process.Our result shows that the management did well during Relacom´s transition of business system, but some communications issues emerged.
64

Message Authentication Codes On Ultra-Low SWaP Devices

Liao, Che-Hsien 27 May 2022 (has links)
This thesis focuses on specific crypto algorithms, Message Authentication Codes (MACs), running on ultra-low SWaP devices. The type of MACs we used is hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC). The most important thing about ultra-low SWaP devices is their energy usage. This thesis measures different implementations' execution times on ultra-low SWaP devices. We could understand which implementation is suitable for a specific device. In order to understand the crypto algorithm we used, this thesis briefly introduces the concept of hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC) from a high level, including their usage and advantage. The research method is empirical research. This thesis determines the execution times of different implementations. These two algorithms (HMAC and CBC-MAC) contain three implementations. The result comes from those implementations running on the devices we used. / Master of Science / The deployments of 5G cellular networks are now onboard. The demand increased due to consumers and the availability of more affordable devices. The amount of investment in 5G technology and infrastructure increases market interest in IoT. The 5G network security is essential. How to secure user privacy and their sensitive data while they use 5g network has become a big issue and needs to be solved. However, not all popular crypto algorithms are suited to all devices, especially in those resource-limited microcontrollers. In this thesis, we will deal with Message Authentication Codes that provide the data integrity check. With resource limit devices, energy usage is an important issue. We will identify which implementations have better energy usage depending on the device features. This thesis will use three implementations for each algorithm. The result of our experiment provide a straightforward way that helps people understand which implementation can run more efficiently on specific ultra-low devices.
65

Trh kreditních derivátů / Credit derivatives market

Prokop, Martin January 2010 (has links)
The main objective of this thesis is to acquaint the reader with the main types of credit derivatives, with the methods of functioning and with main valuation principles. The theoretical part focus on description of credit derivatives market developement with more detailed description of subjcts, who are operating on credit derivatives market. The analysis fosus on how the financial crises influenced these subjects and their credit derivatives portfolios. I have also described the new suggested regulation changes. As a conclusion is the estimation of the regulation changes on the credit derivatives market size.
66

Equité d'accès aux ressources dans les systèmes partagés best-effort / Resources access fairness in best-effort shared systems

Goichon, François 16 December 2013 (has links)
Au cours de la dernière décennie, l'industrie du service informatique s'est métamorphosée afin de répondre à des besoins client croissants en termes de disponibilité, de performance ou de capacité de stockage des systèmes informatisés. Afin de faire face à ces demandes, les hébergeurs d'infrastructures ont naturellement adopté le partage de systèmes où les charges de travail de différents clients sont exécutées simultanément. Cette technique, mutualisant les ressources à disposition d'un système entre les utilisateurs, permet aux hébergeurs de réduire le coût de maintenance de leurs infrastructures, mais pose des problèmes d'interférence de performance et d'équité d'accès aux ressources. Nous désignons par le terme systèmes partagés best-effort les systèmes dont la gestion de ressources est centrée autour d'une maximisation de l'usage des ressources à disposition, tout en garantissant une répartition équitable entre les différents utilisateurs. Dans ce travail, nous soulignons la possibilité pour un utilisateur abusif d'attaquer les ressources d'une plateforme partagée afin de réduire de manière significative la qualité de service fournie aux autres utilisateurs concurrents. Le manque de métriques génériques aux différentes ressources, ainsi que le compromis naturel entre équité et optimisation des performances forment les causes principales des problèmes rencontrés dans ces systèmes. Nous introduisons le temps d'utilisation comme métrique générique de consommation des ressources, métrique s'adaptant aux différentes ressources gérées par les systèmes partagés best-effort. Ceci nous amène à la spécification de couches de contrôles génériques, transparentes et automatisées d'application de politiques d'équité garantissant une utilisation maximisée des ressources régulées. Notre prototype, implémenté au sein du noyau Linux, nous permet d'évaluer l'apport de notre approche pour la régulation des surcharges d'utilisation mémoire. Nous observons une amélioration significative de la performance d'applications typiques des systèmes partagés best-effort en temps de contention mémoire. De plus, notre technique borne l'impact d'applications abusives sur d'autres applications légitimes concurrentes, puisque l'incertitude sur les durées d'exécution est naturellement amoindrie. / Over the last ten years, the IT services industry has gone through major transformations, to comply with customers ever-growing needs in terms of availability, performance or storage capabilities of IT infrastructures. In order to cope with this demand, IT service providers tend to use shared systems, executing mutiple workloads from distinct customers simultaneously on the same system. This technique allows service providers to reduce the maintenance cost of their infrastructure, by sharing the resources at their disposal and therefore maximizing their utilization. However, this assumes that the system is able to prevent arbitrary workloads from having significant impact on other workloads' performance. In this scenario, the operating system's resource multiplexing layer tries to maximize resource consumption, as well as enforcing a fair distribution among users. We refer to those systems as best-effort shared systems. In this work, we show that malicious users may attack a shared system's resources, to significantly reduce the quality of service provided to other concurrent users. This issue of resource control layers in shared systems can be linked to the lack of generic accounting metrics, as well as the natural trade-off that such systems have to make between fairness and performance optimization. We introduce the utilization time as a generic accounting metric, which can be applied to the different resources typically managed by best-effort shared systems. This metric allows us to design a generic, transparent and automated resource control layer, which enables the specification of simple resource management policies centered around fairness and resource consumption maximization. We applied this approach to the swap subsystem, a traditional operating system bottleneck, and implemented a prototype within the Linux kernel. Our results show significative performance enhancements under high memory pressure, for typical workloads of best-effort shared systems. Moreover, our technique bounds the impact of abusive applications on other legit applications, as it naturally reduces uncertainties over execution duration.
67

Analýza úrokových swapů po finanční krizi / Analysis of interest rate swaps after the financial crisis

Lukeš, Filip January 2015 (has links)
The goal of this master thesis is to analyze main changes affecting interest rate swaps in the Czech republic, which took place since 2007, in areas of regulation, valuation of interest rate swaps and negative interest rates. The first part defines derivative and describes sort of derivatives and type of swaps. The second part deals with interest rate swaps, pricing and valuation, and contractual documentation. The third part explains the impact of regulation MiFID I, EMIR and MiFID II on interest rate swaps. The fourth part analyzes changes in interest rate swaps valuation and negative interest rates issues.
68

Debt-Equity-Swap – Anwendung im Insolvenzplanverfahren – Rechtliche und praktische Probleme sowie Bewältigung von Hürden

Obendorf, Martin 21 July 2021 (has links)
Die Arbeit behandelt den Debt-Equity-Swap im Insolvenzplanverfahren. Sie geht dabei besonders auf die rechtlichen und praktischen Hürden des Debt-Equity-Swaps im Insolvenzplanverfahren ein und deren mögliche Bewältigung. Aufgrund der mutmaßlichen geringen Praxisrelevanz wird die Motivation der am Insolvenzplan Beteiligten besprochen. Hierfür beschäftigt sich ein der Teil der Arbeit mit einer Umfrage unter Berater*innen und Insolenzverwalter*innen. Die Arbeit schließt mit Vorschlägen zur Bewältigung von Hürden und einer abschließenden Betrachtung.
69

Deepfake detection by humans : Face swap versus lip sync / Människors förmåga att upptäcka deepfakes : Face swap mot lipsync

Sundström, Isak January 2023 (has links)
The term “deepfakes” refers to media content that has been manipulated using deep learning. This thesis project seeks to answer the question of how well humans are able to detect deepfakes. In particular, the project compares people’s ability to detect deepfakes between two different deepfake categories; face swap and lip sync. In order to achieve this, a perceptual user test was performed, in which 30 participants were given a number of lip sync, face swap and unaltered videos and were asked to classify which of them were unaltered and which of them were manipulated using deepfake technology. These results serve to fill in the gap in knowledge regarding perceptual user tests on deepfakes, for which only a small amount of research has been made. The results also serve to shed light on which types of deepfakes pose the biggest threat regarding the problem of malicious impersonation. The main conclusion from this study was that lip sync is likely harder for humans to detect than face swap. The percentage of correct classifications of lip sync videos was 52.7%, and the percentage of correct classifications of face swap videos was 91.3%. / Deepfakes är videor som har blivit manipulerade med hjälp av deep learning. Detta examensarbete utforskar huvudsakligen två olika kategorier av deepfakes, dessa två är: face swap och lip sync. Syftet med projektet är att svara på frågan: Hur bra är människor på att se om en video innehåller deepfakes eller inte? Dessutom ställs frågan: Vilken typ av deepfake mellan face swap och lip sync är svårare för människor att märka av? För att svara på dessa frågor genomfördes en användarsudie där 30 deltagare fick titta på ett antal lip sync, face swap och icke-manipulerade videor, och fick sedan försöka avgöra vilka av dom som var manipulerade och vilka som inte var manipulerade. Resultaten från den här studien hjälper till att fylla kunskapsklyftan som finns angående människors förmåga att upptäcka deepfakes, där bara en väldigt begränsad mängd studier finns. Resulaten kan också användas för att peka ut på vilka typer av deepfakes som utgör större hot angående lurendrejeri. Slutsatsen från studien var att lip sync är troligtvis svårare för människor att märka av än face swap, eller åtminstone för datasetet FakeAVCeleb. Andelen korrekta gissningar för lip sync videorna i studien var 52.7%, medan andelen korrekta gissningar för face swap var 91.3%.
70

Hantering av ränterisk med derivatinstrument / Managing interest rate risk with derivative instruments

Vesterberg, David, Ritzmo, Philip January 2024 (has links)
Den svenska fastighetsbranschen är genom bankernas höga exponering av stor vikt för Sveriges finansiella stabilitet. Sedan inflationen tagit fart under 2021, följde Riksbanken utvecklingen genom att från mitten av 2022 intensivt höja styrräntan till 4%. En identifierad sårbarhet har ansetts vara de ofta högt belånade fastighetsbolagen, vars finansieringskostnader stigit från tidigare periods noll- och minusränta.  En utbredd metod för ränteriskhantering är användandet av derivatinstrument, där bolagens storlek tidigare antytts ha stor påverkan. Syftet med studien är därför att undersöka hur de svenska medelstora fastighetsbolagen använt räntederivat för hantering av ränterisken under den senaste tidens ränteförändringar. Studien bygger på 11 intervjuer med Mid Cap noterade fastighetsbolag, som genom semistrukturerade intervjuer fått besvara frågor kring bolagens reaktion på ränteförändringen, incitamenten bakom derivatanvändning och strategiförändringar.  Resultatet visar att branschen inte väntat sig ränteförändringar av denna magnitud. Flera bolag beskriver sig ha förändrat sina finanspolicys och utökat sin räntesäkringsnivå avsevärt, men flera skillnader finns mellan bolagen. Incitamenten beskrivs primärt vara lånekovenanter såväl som intresset av att stabilisera kassaflödet. Det finns en stor variation i val av derivatinstrument, men klart står att derivat är betydligt mer flexibla än fasträntelån. Framöver beskrivs räntechocken som något bolag kommer att ha i beaktning vid utformandet av nya strategier för derivatanvändningen samt uppsättandet av finanspolicy. / The Swedish real estate sector is crucial to the financial stability of Sweden due to the banks' significant exposure. Following the rise in inflation in 2021, the Riksbank closely monitored the situation and, starting from mid-2022, aggressively raised the policy rate to 4%. A notable vulnerability identified is the highly leveraged nature of many real estate companies, whose financing costs have increased from the previous period of zero and negative interest rates. A common approach to managing interest rate risk is the use of derivative instruments, where company size has previously been indicated as a deciding factor. This study aims to investigate how medium-sized Swedish real estate companies have utilized interest rate derivatives to manage interest rate risk amid recent rate fluctuations. The study is based on 11 interviews with Mid Cap listed real estate companies, conducted through semi-structured interviews to explore their responses to interest rate changes, motivations for using derivatives, and strategic adjustments. The findings reveal that the industry did not anticipate interest rate changes of this magnitude. Several companies reported having revised their financial policies and significantly increased their level of interest rate hedging, although there are notable differences between companies. The primary motivations for using derivatives are described as loan covenants and the desire to stabilize cash flow. There is considerable variation in the choice of derivative instruments, but it is evident that derivatives offer significantly more flexibility than fixed-rate loans. Looking ahead, companies will take the recent interest rate shock into account when formulating new strategies for derivative use and establishing financial policies.

Page generated in 0.0469 seconds