• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 241
  • 142
  • 127
  • 117
  • 16
  • 15
  • 14
  • 12
  • 7
  • 6
  • 6
  • 5
  • 4
  • 2
  • 2
  • Tagged with
  • 773
  • 203
  • 164
  • 124
  • 108
  • 107
  • 104
  • 89
  • 82
  • 73
  • 71
  • 70
  • 69
  • 62
  • 59
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Proper Plugin Protocols

Jaspan, Ciera N.C. 28 December 2011 (has links)
The ability of the software engineering community to achieve high levels of reuse from software frameworks has been tempered by the difficulty in understanding how to reuse them properly. When written correctly, a plugin can take advantage of the framework’s code and architecture to provide a rich application with relatively few lines of code. Unfortunately, doing this correctly is difficult because frameworks frequently require plugin developers to be aware of complex protocols between objects, and improper use of these protocols causes exceptions and unexpected behavior at run time. This dissertation introduces collaboration constraints, rules governing how multiple objects may interact in a complex protocol. These constraints are particularly difficult to understand and analyze because they may extend across type boundaries and even programming language boundaries. This thesis improves the state of the art through two mechanisms. First, it provides a deep understanding of these collaboration constraints and the framework designs which create them. Second, it introduces Fusion, an adoptable specification language and static analysis tool, that detects broken collaboration constraints in plugin code and demonstrates how to achieve this goal in a cost-effective manner that is practical for industry use. In this dissertation, I have done an empirical study of framework help forums which showed that collaboration constraints are burdensome for developers, as they take hours or even days to resolve. From this empirical study, I have identified several common properties of collaboration constraints. This motivated a new specification language, called Fusion, that is tailored for specifying collaboration constraints in a practical way. The specification language uses relationships to describe the abstract associations between objects and allows developers to specify collaboration constraints as logical predicates of relationships. Since a relationship is an abstraction above the code, this allows developers to easily specify constraints that cross type and language boundaries. There are three variants of the analysis: a sound variant that has false positives but no false negatives, a complete variant that has false negatives but no false positives, and a pragmatic variant that attempts to balance this tradeoff. In this dissertation, I successfully used Fusion to specify and analyze constraints from examples found in the help forums of the ASP.NET and Spring frameworks. Additionally, I ran Fusion on DaCapo, a 1.5 MLOC DaCapo benchmark for program analysis, to show that Fusion is scalable and provides precise enough results for industry with low specification cost. This dissertation examines many tradeoffs: the tradeoffs of framework designs, the tradeoffs of specification precision, and the tradeoffs of program analysis results are all featured. A central theme of this work is that there is no single right solution to collaboration constraints; there are only solutions that work better for a particular instance of the problem.
332

Foundations for analyzing security APIs in the symbolic and computational model

Künnemann, Robert 07 January 2014 (has links) (PDF)
Security critical applications often store keys on dedicated HSM or key-management servers to separate highly sensitive cryptographic operations from more vulnerable parts of the network. Access to such devices is given to protocol parties by the means of Security APIs, e.g., the RSA PKCS#11 standard, IBM's CCA and the TPM API, all of which protect keys by providing an API that allows to address keys only indirectly. This thesis has two parts. The first part deals with formal methods that allow for the identification of secure configurations in which Security APIs improve the security of existing protocols, e.g., in scenarios where parties can be corrupted. A promising paradigm is to regard the Security API as a participant in a protocol and then use traditional protocol analysis techniques. But, in contrast to network protocols, Security APIs often rely on the state of an internal database. When it comes to an analysis of an unbounded number of keys, this is the reason why current tools for protocol analysis do not work well. We make a case for the use of MSR as the back-end for verification and propose a new process calculus, which is a variant of the applied pi calculus with constructs for manipulation of a global state. We show that this language can be translated to MSR rules while preserving all security properties expressible in a dedicated first-order logic for security properties. The translation has been implemented in a prototype tool which uses the tamarin prover as a back-end. We apply the tool to several case studies among which a simplified fragment of PKCS#11, the Yubikey security token, and a contract signing protocol. The second part of this thesis aims at identifying security properties that a) can be established independent of the protocol, b) allow to catch flaws on the cryptographic level, and c) facilitate the analysis of protocols using the Security API. We adapt the more general approach to API security of Kremer et.al. to a framework that allows for composition in form of a universally composable key-management functionality. The novelty, compared to other definitions, is that this functionality is parametric in the operations the Security API allows, which is only possible due to universal composability. A Security API is secure if it implements correctly both key-management (according to our functionality) and all operations that depend on keys (with respect to the functionalities defining those operations). We present an implementation which is defined with respect to arbitrary functionalities (for the operations that are not concerned with key-management), and hence represents a general design pattern for Security APIs.
333

Immersive interaktive Entwicklung projektionsbasierter virtueller Umgebungen

Conrad, Stefan January 2008 (has links)
Zugl.: Koblenz, Landau, Univ., Diss., 2008
334

Generering av MSI-paket : En alternativ installationslösning

Fernström, Dan January 2008 (has links)
<p>Denna rapport beskriver Windows Installer och hur dess API kan användas för att generera MSI-paket. Det förklaras hur MSI-paket bör vara utformade och hur dessa kan användas.</p><p>Projektet resulterade i en prototyp åt uppdragsgivaren Capitex AB. Prototypen kunde användas för att generera MSI-paket för applikationen Säljstöd.</p>
335

Análise experimental e revisão crítica da equação recomendada pelas normas ASTM G148-97 e ISO 17081:2004 para o cálculo do coeficiente de difusidade do hidrogênio em metais e ligas. / Experimental analysis and critical review of the equation recommended by the ASTM standards G148-97 and ISO 17081: 2004 for the calculation of the diffusion coefficient of hydrogen in metals and alloys.

CARVALHO, João Paulo Dantas de. 23 March 2018 (has links)
Submitted by Johnny Rodrigues (johnnyrodrigues@ufcg.edu.br) on 2018-03-23T21:32:45Z No. of bitstreams: 1 JOÃO PAULO DANTAS DE CARVALHO - DISSERTAÇÃO PPGEQ 2015..pdf: 1534561 bytes, checksum: 93959f6eca85fa51565d250b6a984284 (MD5) / Made available in DSpace on 2018-03-23T21:32:45Z (GMT). No. of bitstreams: 1 JOÃO PAULO DANTAS DE CARVALHO - DISSERTAÇÃO PPGEQ 2015..pdf: 1534561 bytes, checksum: 93959f6eca85fa51565d250b6a984284 (MD5) Previous issue date: 2015-11-11 / CNPq / Desde a sua descoberta, em 1864 por Cailletet, a fragilização de metais por hidrogênio, foi sujeito a inúmeras investigações, sendo primeiramente estudado com a injeção de hidrogênio gasoso em metais e ligas. Devanathan e Stachurski (1962) desenvolveram a técnica eletroquímica de permeação de hidrogênio em metais e ligas, tornando o estudo mais prático, esta metodologia se baseia em uma dupla célula eletroquímica dispostas simetricamente onde o metal a ser estudado é inserido entre elas. Uma delas conhecida como célula de carga irá gerar o H2 a ser permeado através do corpo de prova e na outra, conhecida como célula de detecção, o mesmo será oxidado e quantificado seu fluxo. Toda a detecção é realizada potenciostaticamente, mas a geração pode ser realizada por meio galvanostático (método galvanostático-potenciostático), potenciostacamente (método duplo-potenciostático) ou por permeação em circuito aberto em meio ácido, chamado de „PCAA‟. As normas ASTM 148-97 (2003) e ISO 17081 (2004) padronizam os experimentos de permeação eletroquímica de hidrogênio. Como os diferentes métodos são baseados em soluções de contorno diferenciados para solução da segunda lei de Fick, tais normas não levam isto em consideração adotando o cálculo da difusividade do hidrogênio apenas pelo método duplo potenciostático, mesmo para aqueles que estudam o fenômeno, diga-se de passagem, em sua grande maioria, utilizando a metodologia galvanostático-potenciostático. Autores como McBreen et al (1966) e Boes & Zuchner (1972) descrevem o fenômeno de permeação de hidrogênio em metais de forma matemática, a partir da solução da segunda de lei de Fick, estes trabalhos atestam a diferença entre os métodos duplo-potenciostatico e galvanostático-potenciostático, porém nunca foi proposto um modelo que descreva o comportamento do método PCAA. Com isso, o trabalho tem como objetivo elucidar o emprego dos modelos matemáticos para determinação do coeficiente de difusão do hidrogênio em metais através das distintas técnicas eletroquímicas de permeação, utilizando os aços API 5L X70 e X65, além disto procurou-se um modelo matemático para o caso em que a geração de hidrogênio seja realizada pelo método PCAA. Neste trabalho atesta-se que que o uso das equações proposta pela norma, a princípio, subestimam o valor da difusividade. A equação proposta para o método PCAA, apresentou um perfeito ajuste de dados experimentais de permeação. A correlação proposta para o cálculo da difusividade mostrou-se coerente para estimar este parâmetro, não só para o caso PCAA, como também para todos os casos. / Since its discovery in 1864 by Cailletet, hydrogen embrittlement of metals, was subjected to numerous investigations, first being studied with the injection of gaseous hydrogen in metals and alloys. Devanathan and Stachurski (1962) developed the electrochemical technique of hydrogen permeation in metals and alloys, making it the study more practical this methodology is based on a dual symmetrically arranged electrochemical cell where the metal to be studied is inserted between them. One known as load cell will generate H2 to be permeated through the specimen and the other, known as the detection cell, it will be oxidized and its flow quantified. All detection is performed potentiostaticly, but the generation can be performed by galvanostatic (galvanostaticpotentiostatic method), potentiostaticly (double- potentiostatic method), or by hydrogen permeation on acid environment method known as a PCAA. The regulations ASTM 148-97 (2003) and ISO 17081 (2004) standardize the electrochemical hydrogen permeation experiments. How different methods are based on different workarounds for solution of the second Fick's law, such rules do not take this into account by adopting the calculation of the hydrogen diffusivity only by the dual voltage method, even for those who study the phenomenon, say passing for the most part, using the galvanostatic-potentiostatic methodology. Authors such as McBreen et al (1966) and Boes & Züchner (1972) describe the hydrogen permeation phenomenon in mathematical form of metal from the solution of the second Fick law, these works attest to the difference between the double-potentiostatic methods and galvanostatic-potentiostatic, but has never proposed a model that describes the behavior of the PCAA method. Thus, the study aims to elucidate the use of mathematical models to determine the hydrogen diffusion coefficient in metals through the different electrochemical techniques permeation using the API 5L steels X70 and X65, in addition sought a mathematical model for the case where the hydrogen generation is performed by the PCAA method. This work testifies that the use of the equations proposed by the standard at first underestimate the value of diffusivity. The equation proposed for the PCAA method, presented a perfect fit experimental permeation data. The proposed correlations for calculating the diffusivity was found to be consistent to estimate this parameter not only to the case PCAA, but also for all cases.
336

Implementation and evaluation of a centralized hardware monitoring system for HP servers : A case study

Stegard, Simon January 2018 (has links)
In this thesis, a centralized hardware monitoring system for HP servers is developed at Ericsson in Linköping. The centralized system is then evaluated and compared to the current decentralized monitoring system. The results show that not only is the information displayed by the centralized system more detailed, but the configuration process for new servers is also simplified. Cost savings are also identified, since the same monitoring plugin and configuration script can be used for all server generations. Interviews with employees who work with monitoring on a daily basis also shows that they prefer the centralized monitoring system over the current decentralized system, however a high availability solution needs to be implemented for the central part of the monitoring system since it otherwise can become a single point of failure.
337

SNP based literature and data retrieval

Veldsman, Werner Pieter January 2016 (has links)
>Magister Scientiae - MSc / Reference single nucleotide polymorphism (refSNP) identifiers are used to earmark SNPs in the human genome. These identifiers are often found in variant call format (VCF) files. RefSNPs can be useful to include as terms submitted to search engines when sourcing biomedical literature. In this thesis, the development of a bioinformatics software package is motivated, planned and implemented as a web application (http://sniphunter.sanbi.ac.za) with an application programming interface (API). The purpose is to allow scientists searching for relevant literature to query a database using refSNP identifiers and potential keywords assigned to scientific literature by the authors. Multiple queries can be simultaneously launched using either the web interface or the API. In addition, a VCF file parser was developed and packaged with the application to allow users to upload, extract and write information from VCF files to a file format that can be interpreted by the novel search engine created during this project. The parsing feature is seamlessly integrated with the web application's user interface, meaning there is no expectation on the user to learn a scripting language. This multi-faceted software system, called SNiPhunter, envisions saving researchers time during life sciences literature procurement, by suggesting articles based on the amount of times a reference SNP identifier has been mentioned in an article. This will allow the user to make a quantitative estimate as to the relevance of an article. A second novel feature is the inclusion of the email address of a correspondence author in the results returned to the user, which promotes communication between scientists. Moreover, links to external functional information are provided to allow researchers to examine annotations associated with their reference SNP identifier of interest. Standard information such as digital object identifiers and publishing dates, that are typically provided by other search engines, are also included in the results returned to the user. / National Research Foundation (NRF) /The South African Research Chairs Initiative (SARChI)
338

Interaktivní e-learningová aplikace pro podporu hudební nauky na ZŠ

Fíbek, Michal January 2015 (has links)
This thesis deals with the design and implementation of multi-platform web application based on HTML5, HTML5 Audio and Web Audio API, designed for elementary school students to develop their musical skills, especially musical hearing. The first part compares current educational programs designed to practise musical hearing and to educate musical notation. The following section develops design of music games and application interface, which is based on requirements, followed by analysis of web technologies for sound playback. Last part describes implementation of application in PHP (Nette Framework) with MySQL database and user testing.
339

Design and implementation of modules "Phases" and "External app connectivity" for real enterprise project "Time Project" using Angular2 and ASP.NET WEB API frameworks

KORTAN, Michal January 2017 (has links)
The thesis deals with module extension in currently developing project called Time Project 5. Specifically, the Phases, Notification and External Interface module. The thesis is divided into four major chapters. The first chapter introduces theoretical background consisting of backend and frontend technology description. The second chapter serves as determination of customer's expectations in form of functional and nonfunctional requirements gathering. The major focus of the third chapter is on application architecture design of both server and client side together with subcomponents design. Additionally, this chapter is complemented by the data model and Time Project 5 application design. The last, and at the same time, major chapter reveals the actual implementation of mentioned subcomponents including further necessary support features.
340

Caracterização de isolados do fungo Malassezia pachydermatis através do perfil enzimático

Lautert, Claudia January 2010 (has links)
Malassezia spp. são fungos lipofílicos, reconhecidos há mais de cem anos como membros da microbiota cutânea normal humana, bem como agentes de doenças dermatológicas. Desde 1980, são relatados como causadores de infecções sistêmicas oportunistas. Estas leveduras são frequentemente encontradas em uma grande variedade de animais homeotérmicos, e sua ampla distribuição no meio ambiente agora está sendo explorada através de técnicas moleculares e bioquímicas. O enfoque deste estudo foi a espécie não lipido-dependente Malassezia pachydermatis, e a sua caracterização através do perfil enzimático pelo sistema Api-Zym®. Deste modo, utilizaram-se 30 amostras de M. pachydermatis isoladas de cães, com e sem sinais clínicos, identificadas pela técnica de Reação em Cadeia da Polimerase (PCR). As amostras foram cultivadas em meio de Dixon modificado, incubadas a 37°C durante 48 horas, para posterior quantificação através de espectrofotometria. Um inóculo de 65 μl foi colocado em cada orifício do kit comercial de verificação enzimática e, após, incubado a 37ºC por 4 horas. Os resultados foram obtidos através da leitura visual e interpretação das titulações por escalas pré-determinadas, também foram avaliadas as reações através de “escaneamento” eletrônico. Todos os testes foram realizados em triplicata. Os resultados demonstraram a atividade de enzimas específicas pertencentes ao grupo das peptídeo hidrolases (100%), fosfohidrolases (98,3%) e éster hidrolases (91,6%), enquanto que as enzimas α-galactosidase, β-galactosidase, β-glicuronidase, α-manosidase e α-fucosidase caracterizaram 10% de todos os isolados. Além disso, não se comprovou a viabilidade do sistema utilizado no estudo para a caracterização enzimática da levedura. / Malassezia spp. are lipophilic fungi, which have been recognised for over a century as members of the normal human cutaneous flora, and also as agents of certain skin diseases. In addition, since the 1980s, they have been reported as causing opportunistic systemic infections. These yeasts have frequently been found on a diverse range of other warm-blooded animals, and their wider distribution in nature is now being explored using molecular techniques. The focus of the present study was the species no lipid-dependent Malassezia pachydermatis, and its characterization through the enzymatic profile by the Api-Zym® system. Then 30 isolated samples of dogs had been used, with and without clinical signals, identified by the technique of Polymerase Chain Reaction (PCR). The samples were cultivated into Dixon’s modified medium, incubated at 37°C during 48 hours, for posterior quantification through spectrophotometry. An inocula of 65 μl was placed in each microwell of the commercial kit of enzymatic verification and, after, it was incubated at 37ºC for 4h. The results were obtained through the visual reading and interpretation of the titulations by predetermined scales, it were also evaluated the reactions through electronic scanning. All the tests were performed in triplicate. The results demonstrated the activity of specific enzymes pertaining to the group of the peptide hydrolases (100%), phosphohydrolases (98,3%) and ester hydrolases (91,6%), while the enzymes α-galactosidase, β-galactosidase, β-glucuronidase, α-mannosidase and α-fucosidase characterized 10% off all the isolates. Moreover, it was not proven the viability of the system used in the study for the enzymatic characterization of the yeast.

Page generated in 0.0287 seconds