• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 59
  • 27
  • 27
  • Tagged with
  • 111
  • 111
  • 85
  • 83
  • 72
  • 56
  • 54
  • 54
  • 54
  • 54
  • 54
  • 54
  • 54
  • 54
  • 53
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Exkursion ins Museum der deutschsprachigen Bewohner der böhmischen Länder in Ústí nad Labem (Aussig)

Küster, Kerstin, Mallinckrodt, Felicitas von January 2013 (has links)
Werden normalerweise neue Museen für bereits bestehende Sammlungen gebaut, so verkehrt sich in Ústí nad Labem dieses Prinzip ins Gegenteil. Auf Initiative des Collegium Bohemicum und unterstützt von der Jan Evangelista Purkyně-Universität Ústí nad Labem wurde 2006 das „Museum für die deutschsprachigen Bewohner der böhmischen Länder“ ins Leben gerufen. Das im Aufbau befindliche Museum hat sich zum Ziel gesetzt, das Wirken und den Beitrag der deutschsprachigen Bewohner in den böhmischen Ländern aus tschechischer Perspektive, aber in europäische Zusammenhänge eingebettet darzustellen und zu vermitteln. (...)
52

Measuring energy consumption for short code paths using RAPL

Hähnel, Marcus, Döbel, Björn, Völp, Marcus, Härtig, Hermann 28 May 2013 (has links)
Measuring the energy consumption of software components is a major building block for generating models that allow for energy-aware scheduling, accounting and budgeting. Current measurement techniques focus on coarse-grained measurements of application or system events. However, fine grain adjustments in particular in the operating-system kernel and in application-level servers require power profiles at the level of a single software function. Until recently, this appeared to be impossible due to the lacking fine grain resolution and high costs of measurement equipment. In this paper we report on our experience in using the Running Average Power Limit (RAPL) energy sensors available in recent Intel CPUs for measuring energy consumption of short code paths. We investigate the granularity at which RAPL measurements can be performed and discuss practical obstacles that occur when performing these measurements on complex modern CPUs. Furthermore, we demonstrate how to use the RAPL infrastructure to characterize the energy costs for decoding video slices.
53

Vernetzt planen und produzieren : Tagungsband Chemnitz 27. und 28. September 2004

Sammelband mehrerer Autoren 16 March 2007 (has links)
Die Tagung „Vernetzt planen und produzieren“ findet im Jahr 2004 zum vierten Mal in Chemnitz statt. Mit dieser Tagung wird der tiefgreifende Strukturwandel bei der Weiterentwicklung der Industriegesellschaft zur Dienstleistungs- und Wissensgesellschaft thematisiert. Die Entwicklung wandlungsfähiger Produktions- und Organisationsstrukturen ist unabdingbare Notwendigkeit zur Beherrschung dieses Wandels und zur Sicherung der Wettbewerbsfähigkeit der Unternehmen. Mit Beiträgen unter anderen aus den Sonderforschungsbereichen SFB 559 „Modellierung großer Netze in der Logisitk“, Universität Dortmund, Sprecher: Prof. Axel Kuhn SFB 467 „Wandlungsfähige Unternehmensstrukturen für die variantenreiche Serienproduktion“, Universität Stuttgart, Sprecher: Prof. Engelbert Westkämper SFB 457 „Hierarchielose regionale Produktionsnetze“, Technische Univesität Chemnitz, Sprecher: Prof. Egon Müller SFB 582 „Marktnahe Produktion individualisierter Produkte“, Technische Universität München, Sprecher: Prof. Udo Lindemann bieten sich interessante Möglichkeiten, wissenschaftliche Erkenntnisse und Erfahrungen zur Netzforschung und zur Wandlungsfähigkeit zwischen interessierten Wissenschaftlern und Praktikern auszutauschen und zu diskutieren. Internationale Beiträge zu Konzepten und Erfahrungen versprechen eine Vielfalt von Meinungen und Sichtweisen und damit anregende Diskussionen.
54

Energy-Efficient In-Memory Database Computing

Lehner, Wolfgang January 2013 (has links)
The efficient and flexible management of large datasets is one of the core requirements of modern business applications. Having access to consistent and up-to-date information is the foundation for operational, tactical, and strategic decision making. Within the last few years, the database community sparked a large number of extremely innovative research projects to push the envelope in the context of modern database system architectures. In this paper, we outline requirements and influencing factors to identify some of the hot research topics in database management systems. We argue that—even after 30 years of active database research—the time is right to rethink some of the core architectural principles and come up with novel approaches to meet the requirements of the next decades in data management. The sheer number of diverse and novel (e.g., scientific) application areas, the existence of modern hardware capabilities, and the need of large data centers to become more energy-efficient will be the drivers for database research in the years to come.
55

Wireless Interconnect for Board and Chip Level

Fettweis, Gerhard P., ul Hassan, Najeeb, Landau, Lukas, Fischer, Erik January 2013 (has links)
Electronic systems of the future require a very high bandwidth communications infrastructure within the system. This way the massive amount of compute power which will be available can be inter-connected to realize future powerful advanced electronic systems. Today, electronic inter-connects between 3D chip-stacks, as well as intra-connects within 3D chip-stacks are approaching data rates of 100 Gbit/s soon. Hence, the question to be answered is how to efficiently design the communications infrastructure which will be within electronic systems. Within this paper approaches and results for building this infrastructure for future electronics are addressed.
56

Waiting for Locks: How Long Does It Usually Take?

Baier, Christel, Daum, Marcus, Engel, Benjamin, Härtig, Hermann, Klein, Joachim, Klüppelholz, Sascha, Märcker, Steffen, Tews, Hendrik, Völp, Marcus January 2012 (has links)
Reliability of low-level operating-system (OS) code is an indispensable requirement. This includes functional properties from the safety-liveness spectrum, but also quantitative properties stating, e.g., that the average waiting time on locks is sufficiently small or that the energy requirement of a certain system call is below a given threshold with a high probability. This paper reports on our experiences made in a running project where the goal is to apply probabilistic model checking techniques and to align the results of the model checker with measurements to predict quantitative properties of low-level OS code.
57

Chiefly Symmetric: Results on the Scalability of Probabilistic Model Checking for Operating-System Code

Baier, Christel, Daum, Marcus, Engel, Benjamin, Härtig, Hermann, Klein, Joachim, Klüppelholz, Sascha, Märcker, Steffen, Tews, Hendrik, Völp, Marcus January 2012 (has links)
Reliability in terms of functional properties from the safety-liveness spectrum is an indispensable requirement of low-level operating-system (OS) code. However, with evermore complex and thus less predictable hardware, quantitative and probabilistic guarantees become more and more important. Probabilistic model checking is one technique to automatically obtain these guarantees. First experiences with the automated quantitative analysis of low-level operating-system code confirm the expectation that the naive probabilistic model checking approach rapidly reaches its limits when increasing the numbers of processes. This paper reports on our work-in-progress to tackle the state explosion problem for low-level OS-code caused by the exponential blow-up of the model size when the number of processes grows. We studied the symmetry reduction approach and carried out our experiments with a simple test-and-test-and-set lock case study as a representative example for a wide range of protocols with natural inter-process dependencies and long-run properties. We quickly see a state-space explosion for scenarios where inter-process dependencies are insignificant. However, once inter-process dependencies dominate the picture models with hundred and more processes can be constructed and analysed.
58

Secure degrees of freedom on widely linear instantaneous relay-assisted interference channel

Ho, Zuleita K.-M., Jorswieck, Eduard January 2013 (has links)
The number of secure data streams a relay-assisted interference channel can support has been an intriguing problem. The problem is not solved even for a fundamental scenario with a single antenna at each transmitter, receiver and relay. In this paper, we study the achievable secure degrees of freedom of instantaneous relay-assisted interference channels with real and complex coefficients. The study of secure degrees of freedom with complex coefficients is not a trivial multiuser extension of the scenarios with real channel coefficients as in the case for the degrees of freedom, due to secrecy constraints. We tackle this challenge by jointly designing the improper transmit signals and widely-linear relay processing strategies.
59

Interference Leakage Neutralization in Two-Hop Wiretap Channels with Partial CSI

Engelmann, Sabrina, Ho, Zuleita K.-M., Jorswieck, Eduard A. January 2013 (has links)
In this paper, we analyze the four-node relay wiretap channel, where the relay performs amplify-and-forward. There is no direct link between transmitter and receiver available. The transmitter has multiple antennas, which assist in securing the transmission over both phases. In case of full channel state information (CSI), the transmitter can apply information leakage neutralization in order to prevent the eavesdropper from obtaining any information about the signal sent. This gets more challenging, if the transmitter has only an outdated estimate of the channel from the relay to the eavesdropper. For this case, we optimize the worst case secrecy rate by choosing intelligently the beamforming vectors and the power allocation at the transmitter and the relay.
60

HAEC News

January 2013 (has links)
No description available.

Page generated in 0.1115 seconds