• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 16
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 40
  • 13
  • 12
  • 12
  • 11
  • 10
  • 8
  • 7
  • 7
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

CONTROL FLOW OBFUSCATION COMPLEXITY

KUMAR, AMIT 13 July 2005 (has links)
No description available.
2

The Quaternary evolution of the Rio Alias southeast Spain, with emphasis on sediment provenance

Maher, Elizabeth January 2005 (has links)
This study aims to determine the late-Quaternary evolution of an ephemeral, transverse river system developed in southeast Spain, with particular reference to sediment provenance variation. The Rio Alias drains two inter-montane east-west orientated Neogene sedimentary basins; the Sorbas and Almeria basins. Pliocene to present transpressional tectonics has led to inversion of the sedimentary basins and incision of the developing fluvial system. Fluvial incision has led to the preservation of a suite of alluvial terraces recording the late-Quaternary development of the Rio Alias. Fluvial system inauguration began in the Plio-Pleistocene epoch. The primary fluvial system developed as a consequent river later becoming superimposed and transverse to structure. The drainage basin of the Rio Alias has been sub-divided into 4 sub-basins; The Lucainena, Polopos, Argamason and El Saltador sub-basins. Each basin is structurally controlled. The impact of climate, tectonics, river-capture and eustatic sea-level variation on the fluvial system evolution varies both spatially and temporally across the sub-basins of the Rio Alias. Across the region alluvial aggradation is thought to relate to global glacial periods and incision to interglacial periods. The Lucainena sub-basin is largely controlled by climatic variation related to glacial interglacial cycles with slight modification due to local small scale river-capture and regional epeirogenic uplift. The Polopos sub-basin is also largely controlled by climatic variation, however a major river-capture event c.70ka beheaded the Rio Alias of c.70% of its drainage area. Following the loss of drainage the beheaded Rio Alias system lost stream power, this is reflected in the decrease in size of bedform geometry and the reduced incisional capacity of the fluvial system of the post-capture terrace sequence. In the Argamason sub-basin the Rio Alias crosses the Carboneras Fault Zone, a left-lateral strike slip fault. Late-Quaternary tectonic activity has significantly modified the climatically generated signal. Large tortuous meanders developed in response to normal tectonic activity and continued tectonically driven base-level lowering led to abandonment of terraces and local incision. The El Saltador sub-basin is located at the seaward end of the system and the climate generated phases of aggradation and incision have been greatly complicated by eustatic sea-level variation related to glacial/interglacial cycles. The lowering of base-level due to sea-level regression initially led to pronounced incision along steep gradients and to the development of meander loops in the seaward end of the Rio Alias, during what regionally was a climate driven phase of aggradation. Analysis of the alluvial sediment using a combination of field based clast analysis and laboratory analysis (petrology, SEM, magnetic analysis) allows a detailed picture of sediment provenance variation to be established throughout the evolution of the Rio Alias. Provenance analysis provides information on the timing and extent of river-capture related loss of drainage area, the relative timing of local tectonic activity and also provides new information regarding sediment source area variation throughout the development of the fluvial system. Detailed analysis of the terrace sediments and the modern channel indicates that as the fluvial system incises, local input of sediment from the steepening valley sides grows increasingly dominant. The coupling between the hillslopes and the channel thus changes through time. Sediment provenance analysis has increased our understanding of the long-term fluvial evolution of the Rio Alias, identifying not only sediment provenance variation due to river-capture and changing geology but to fluvial system development.
3

Margaret Atwood’s Divided Self

Moss, Kate 19 July 2011 (has links)
―Margaret Atwood‘s Divided Self‖ explores four novels by celebrated Canadian author, Margaret Atwood: Lady Oracle, Surfacing, Alias Grace, and The Robber Bride. Although others have discussed the reoccurring themes of disunity and duality in Atwood‘s work, these explorations have not addressed some of her newest novels and have taken a very limited approach to reading and understanding Atwood‘s theme of the divided self. This study opens up a literary ―conversation‖ about Atwood‘s theme of the divided self by examining the protagonists of these select novels by using different branches of theory and thought to fully explore this issue. To conquer their double or multiple identities Atwood‘s protagonists in these novels must take two actions: 1) Accept their double/multiple identities as a part of themselves and 2) transcend this position and the resulting ―hauntings‖ by their mothers (or their decision to choose a replacement female ―mother‖ figure) by becoming mothers themselves. The introduction chapter ―The Author as ‗Slippery Double‘‖ explores Atwood‘s position as a ―slippery (divided) subject‖ between her writing/social and interior selves. Chapter one, ―Canadian Women: Nature, Place, and the Divided Other in Atwood‘s Works‖ explores the role of nature, place, and femininity in Atwood‘s divided protagonists. Chapter two, ―The Uncanny Double: Haunting Entities and the Divided Self in Atwood‘s Fiction‖ contains the main argument and explores the role of the uncanny in Atwood‘s works. Although I explore these four novels most thoroughly explored, this theme runs throughout Atwood‘s entire body of work. Although I mostly use close readings of the primary texts, I also ground my argument in the work of theorists in several fields of thought including Sigmund Freud, Louis Althusser, George H. Mead, and Jacques Lacan.
4

You’re Not a Superhero, or Even an Artist! How the “Alias” Comic Book Holds the Answers

Wang, Lorraine 01 January 2016 (has links)
Superhero comic books are not art, and middle-aged, non-white women are not superheroes. I seek to disprove both of these assumptions, and I use the "Alias" comic books from 2001-2004 for my argument.
5

Vem vill inte vara sig själv En essä om alter egon av Sebastian Nordbeck

Nordbeck, Sebastian January 2012 (has links)
Vem vill inte vara sig själv [Who Doesn't to be Himself]  opens a discussion on the meaning and function of the alter ego in contemporary culture. In the essay the writer goes back and forth between describing and analyzing the examples he presents, mainly subcultural and media influenced facts and phenomena, and here and there he connects them to personal experiences, among other things the part the alter ego played in his first meeting with art.
6

Preserving Unique References in Java Lists

Smith, Daniel Wayne 18 January 2011 (has links)
The Java collection framework introduces aliasing when objects are added to and accessed from collections. This thesis describes a list component implemented in Java that preserves unique references of objects in the list, thereby avoiding undesired aliasing. We compared the running time of our list with three other lists from Java collections (Java collection framework, Google, and Functional Java) in five different applications. We found that the performance of our list was usually slightly slower than the performance of the Java list, but often much faster than the Google and Functional Java lists. We also compared the reasoning complexity of our list with Java's list by creating tracing tables for a method from a towers-of-Hanoi application and comparing the number of tokens in the table using our list with the number of tokens in the table using the Java list. We found that the number of tokens in the tracing table using the Java list was much higher than the number of tokens in the table using our list. We argue that this result will occur in any table for applications that use mutable list objects. / Master of Science
7

An Empirical Study of Alias Analysis Techniques

Tran, Andrew T 01 June 2018 (has links)
As software projects become larger and more complex, software optimization at that scale is only feasible through automated means. One such component of software optimization is alias analysis, which attempts to determine which variables in a program refer to the same area in memory, and is used to relocate instructions to improve performance without interfering with program execution. Several alias analyses have been proposed over the past few decades, with varying degrees of precision and time and space complexity, but few studies have been conducted to compare these techniques with one another, nor to measure with program data to confirm their accuracy. Normally, this is out of the scope of alias analyses because these processes are static, and can only rely upon the input source code. We address these limitations by instrumenting several benchmarks and combining their data with commonly used alias analyses to objectively measure the accuracy of those analyses. Additionally, we also gather additional program statistics to further determine which programs are the most suitable for evaluating subsequent alias analysis techniques.
8

Digital Storytelling

Rosberg, Emelie January 2005 (has links)
The purpose of this paper is to analyze and map out the cyber culture of the Internet and its all users, identity, design theories and services. How people communicate and how they build up their identities are some of the baselines. I will also discuss the important aspects of Interaction design and how this can be used in a Community for digital storytelling.The Internet, or new media, was founded in the 60’s by some great philosophers (McLuhan, Rheingold, Lambert and more). With influence from their books I will discuss and analyze what kind of media the Internet is and how it can be seen as extensions to our senses, as McLuhan claims. Moreover, Interaction design is a big part of this work and I have chosen some relevant Communities which are running on the Net today. What features do they have and how do they work? I have decided some appropriate design theories and I will explain how these web pages can develop a better site according to my new theories. When implementing digital storytelling on the Internet, problems can appear. What do people want for services on a Community and what do they find disturbing? What makes difference between a site for digital storytelling and another community for finding a life partner? I will discuss the differences between these two kinds of sites and develop a project site with all the best parts from all kinds of relevant web sites.
9

Optimalizace v překladači C pro VLIW architektury / Optimizations in C Compiler for VLIW Architectures

Baručák, Robert January 2014 (has links)
Presented is implementation of algorithm for alias analysis, which was integrated into LLVM framework. Properties and limitations of various alias analysis algorithms are discussed. Demonstrated are different approaches to working with predicates and integration of these principles with LLVM. One of the outcomes of this master's thesis is design and implementation of algorithm for profile guided if-conversion.
10

Gestion manuelle et sécuritaire de la mémoire en Typer

Génier, Simon 12 1900 (has links)
Dans ce mémoire, je présente une technique pour combiner du code de bas niveau à un langage purement fonctionnel avec types dépendants. Par code de bas niveau, je veux dire n’importe quel programme écrit dans un langage qui permet le contrôle direct des ressources de la machine. En particulier, ce texte s’intéresse à la gestion de la mémoire. Plus concrètement, un programmeur C contrôle l’endroit et le moment où un bloc de mémoire est alloué, ainsi que la façon dont l’objet est initialisé. Par exemple, on peut allouer de l’espace sur la pile pour immédiatement l’initialiser avec un memcpy. Alternativement, on peut allouer un bloc sur le tas et l’initialiser champ par champ plus tard. Pour certaines applications où la mémoire est limitée ou la performance importante, ce choix est important. Un tel niveau de contrôle n’est pas disponible dans les langages de haut niveau, sauf pour quelques exceptions. Les langages fonctionnels comme OCaml ou Haskell découragent ou même interdisent de modifier les champs d’un objet. C’est encore plus vrai pour les langages à types dépendants où la mutation est l’éléphant dans le magasin de porcelaine de la cohérence. C’est un choix de design intentionnel. Un programme pur est plus facile à comprendre et analyser, mais comment séparer l’initialisation de l’allocation quand un objet ne peut pas changer ? Ce mémoire essaie de démontrer que ce n’est pas parce que c’est impossible, mais parce que ces langages ne sont pas habituellement utilisés dans un contexte où c’est nécessaire. Par contre, ce n’est pas facile non plus. Pour garantir la sécurité et la cohérence, il faut modéliser l’état d’un objet partiellement initialisé au niveau des types, ce que la plupart des langages ont de la peine à faire. La combinaison du manque de nécessité et de la lourdeur syntaxique et conceptuelle est la raison pour laquelle cette fonctionnalité est souvent absente. Pour y parvenir, nous prenons un langage à types dépendants, Typer, et nous y ajoutons le nécessaire pour récupérer une partie du contrôle abandonné dans le design original. Nous permettons au programmeur d’allouer des blocs de mémoire et de les initialiser graduellement plus tard, sans compromettre les propriétés de sécurité du programme. Concrètement, nous utilisons les monades, un concept de la théorie des catégories déjà utilisé pour la modélisation d’effets de bord, pour limiter les mutations aux endroits sécuritaires. / In this thesis, I will demonstrate how to combine low-level code with dependent types. By low-level code, I mean any program authored in a language that allows direct control of computer resources. In particular, this text will focus on memory management. Specifically, a C programmer has control over the location and time when a block of memory is allocated, as well as how it is initialized. For instance, it is possible to allocate stack space to immediately initialize it with an invocation of memcpy. Alternatively, one can allocate heap spate and initialize it field by field later. For some applications where memory is constrained or performance is important, this choice can matter. This level of control is not available in high-level languages, barring a few exceptions. Functional languages such as OCaml or Haskell discourage or simply forbid the mutation of objects. This is especially the case in dependently typed languages where mutation is the bull in the china shop of consistency. This is a deliberate choice as a pure program is easier to understand and reason about. However, having allocation and initialization done in two distinct steps seems impossible in this situation. This thesis shows that this is not impossible, it is simply done this way because these kinds of languages are seldom used in a context where such control is necessary. This does not mean though that adding this feature is easy. If we are to guarantee both safety and consistency, we need to keep track of the initialization state at the type level. Most languages struggle to do this. Language designers simply forgo this feature because it is not useful to them in addition to being difficult to use. To achieve it, we start with a dependently typed language, Typer, and add back the mechanisms necessary to recover the control relinquished in the original design. We let the programmer allocate blocks of memory to initialize later, without compromising the safety properties of the program. Specifically, we use monads, a concept from category theory, a know technique to model side effects, to limit mutation to situations where it is safe.

Page generated in 0.0384 seconds