• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 6
  • 3
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 27
  • 9
  • 9
  • 8
  • 8
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Hon tar vad man vill ha : en studie av sexuella maktrelationer i samtida relationsromaner

Claesson, Marlene January 2006 (has links)
<p>The aim of this study is to analyse the sexual power relations in contemporary urban novels of Swedish female writers.</p><p>I have identified a discourse in these novels as a heteronormative matrix which power is ruled by norms and assumptions about normality in both the heterosexual and lesbian stories. For this purpose I have related to Ivar B. Neumanns theory that individuals always find a way to confront the discourse by three different strategies. These strategies are used in my study as tools to organise these novels, because it is possible to see that the protagonists find at least one of these strategy’s to her protest.</p><p>The first strategy I studied was the docile. Here I argument that the heroines in Alla vilda, Jag minns alla mina älskare och hur de brukade ta på mig, Inte enklare än så, Lögner and Att älska henne do not reject the discourse about sexual power relationships. The second strategy, named the oppositionist, implies the protagonists refusing to be left as victims. In one way or another, either by change the rolls of the sexes (Ta vad man vill ha) or by problematising the order of them (Ego girl) or find lesbianism as a way to reject the discourse (both the novels by Mian Lodalen: Smulklubbens skamlösa systrar and Trekant). The reluctant is the last strat-egy who is the creative one, which rejects some things and adapt to other. Here I place the heroines from Stjärnor utan svindel, Andra sidan Alex and Storlek 37.</p><p>The result of this study is that despite quite different strategies to oppose against the hetero-sexual power discourse and the normative femininity everyone relates to it and thereby con-firms it.</p>
12

Números complexos: uma abordagem histórica para aquisição do conceito

Rosa, Mario Servelli 04 June 1998 (has links)
Made available in DSpace on 2016-04-27T16:58:13Z (GMT). No. of bitstreams: 1 dissertacao_mario_servelli_rosa.pdf: 502996 bytes, checksum: d365cca02e9d5b83863fa5c7194daa61 (MD5) Previous issue date: 1998-06-04 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / O objetivo deste trabalho é criar uma seqüência didática, ou seja, propor uma série de atividades, para que os alunos entrem em contato com os números complexos da maneira como eles surgiram na História, e também para que operem com esses números. Essa maneira de introduzir os números complexos surgiu, quando analisando alguns livros didáticos, observamos que a maioria propunha uma equação do 2º grau, para ser resolvida, como por exemplo x2 + 1 = 0, e davam como solução um número i tal que j2 = -1. Essa maneira de abordar esses números, dá-nos a impressão de que na Matemática, tudo surge da inspiração de algumas pessoas que "inventam" os conceitos. Além disso, as equações do segundo grau não motivaram o surgimento dos complexos, uma vez que quando a resolução de uma equação desse tipo, proveniente de um problema, apresentava um discriminante negativo, isso apenas indicava que tal problema não tinha solução. Na seqüência didática que vamos apresentar, pretendemos que os alunos sintam a secessidade da extração da raiz quadrada de um número negativo, e que, operando com esses números, eles cheguem a respostas reais de problemas concretos. Para validar este trabalho, aplicamos um teste em alunos que já haviam estudado os números complexos de maneira diferente daquela por nós proposta; e o mesmo teste, para alunos que haviam realizado nossa seqüência didática, dois meses depois desse fato. Os resultados mostraram que as nossas atividades foram bem mais eficazes que outras maneiras de ensinar. Os alunos que já haviam estudado os números complexos, eram do 1º ano de Engenharia Mecânica da Universidade de Mogi das Cruzes, por isso, vindos de colégios diferentes, com propostas de ensino diferentes, mas, por uma das respostas dadas, concluímos que nenhum estudou como estamos propondo
13

Finding, extracting and exploiting structure in text and hypertext / Att finna, extrahera och utnyttja strukturer i text och hypertext

Ågren, Ola January 2009 (has links)
Data mining is a fast-developing field of study, using computations to either predict or describe large amounts of data. The increase in data produced each year goes hand in hand with this, requiring algorithms that are more and more efficient in order to find interesting information within a given time. In this thesis, we study methods for extracting information from semi-structured data, for finding structure within large sets of discrete data, and to efficiently rank web pages in a topic-sensitive way. The information extraction research focuses on support for keeping both documentation and source code up to date at the same time. Our approach to this problem is to embed parts of the documentation within strategic comments of the source code and then extracting them by using a specific tool. The structures that our structure mining algorithms are able to find among crisp data (such as keywords) is in the form of subsumptions, i.e. one keyword is a more general form of the other. We can use these subsumptions to build larger structures in the form of hierarchies or lattices, since subsumptions are transitive. Our tool has been used mainly as input to data mining systems and for visualisation of data-sets. The main part of the research has been on ranking web pages in a such a way that both the link structure between pages and also the content of each page matters. We have created a number of algorithms and compared them to other algorithms in use today. Our focus in these comparisons have been on convergence rate, algorithm stability and how relevant the answer sets from the algorithms are according to real-world users. The research has focused on the development of efficient algorithms for gathering and handling large data-sets of discrete and textual data. A proposed system of tools is described, all operating on a common database containing "fingerprints" and meta-data about items. This data could be searched by various algorithms to increase its usefulness or to find the real data more efficiently. All of the methods described handle data in a crisp manner, i.e. a word or a hyper-link either is or is not a part of a record or web page. This means that we can model their existence in a very efficient way. The methods and algorithms that we describe all make use of this fact. / Informationsutvinning (som ofta kallas data mining även på svenska) är ett forskningsområde som hela tiden utvecklas. Det handlar om att använda datorer för att hitta mönster i stora mängder data, alternativt förutsäga framtida data utifrån redan tillgänglig data. Eftersom det samtidigt produceras mer och mer data varje år ställer detta högre och högre krav på effektiviteten hos de algoritmer som används för att hitta eller använda informationen inom rimlig tid. Denna avhandling handlar om att extrahera information från semi-strukturerad data, att hitta strukturer i stora diskreta datamängder och att på ett effektivt sätt rangordna webbsidor utifrån ett ämnesbaserat perspektiv. Den informationsextraktion som beskrivs handlar om stöd för att hålla både dokumentationen och källkoden uppdaterad samtidigt. Vår lösning på detta problem är att låta delar av dokumentationen (främst algoritmbeskrivningen) ligga som blockkommentarer i källkoden och extrahera dessa automatiskt med ett verktyg. De strukturer som hittas av våra algoritmer för strukturextraktion är i form av underordnanden, exempelvis att ett visst nyckelord är mer generellt än ett annat. Dessa samband kan utnyttjas för att skapa större strukturer i form av hierarkier eller riktade grafer, eftersom underordnandena är transitiva. Det verktyg som vi har tagit fram har främst använts för att skapa indata till ett informationsutvinningssystem samt för att kunna visualisera indatan. Huvuddelen av den forskning som beskrivs i denna avhandling har dock handlat om att kunna rangordna webbsidor utifrån både deras innehåll och länkarna som finns mellan dem. Vi har skapat ett antal algoritmer och visat hur de beter sig i jämförelse med andra algoritmer som används idag. Dessa jämförelser har huvudsakligen handlat om konvergenshastighet, algoritmernas stabilitet givet osäker data och slutligen hur relevant algoritmernas svarsmängder har ansetts vara utifrån användarnas perspektiv. Forskningen har varit inriktad på effektiva algoritmer för att hämta in och hantera stora datamängder med diskreta eller textbaserade data. I avhandlingen presenterar vi även ett förslag till ett system av verktyg som arbetar tillsammans på en databas bestående av “fingeravtryck” och annan meta-data om de saker som indexerats i databasen. Denna data kan sedan användas av diverse algoritmer för att utöka värdet hos det som finns i databasen eller för att effektivt kunna hitta rätt information. / AlgExt, CHiC, ProT
14

Hon tar vad man vill ha : en studie av sexuella maktrelationer i samtida relationsromaner

Claesson, Marlene January 2006 (has links)
The aim of this study is to analyse the sexual power relations in contemporary urban novels of Swedish female writers. I have identified a discourse in these novels as a heteronormative matrix which power is ruled by norms and assumptions about normality in both the heterosexual and lesbian stories. For this purpose I have related to Ivar B. Neumanns theory that individuals always find a way to confront the discourse by three different strategies. These strategies are used in my study as tools to organise these novels, because it is possible to see that the protagonists find at least one of these strategy’s to her protest. The first strategy I studied was the docile. Here I argument that the heroines in Alla vilda, Jag minns alla mina älskare och hur de brukade ta på mig, Inte enklare än så, Lögner and Att älska henne do not reject the discourse about sexual power relationships. The second strategy, named the oppositionist, implies the protagonists refusing to be left as victims. In one way or another, either by change the rolls of the sexes (Ta vad man vill ha) or by problematising the order of them (Ego girl) or find lesbianism as a way to reject the discourse (both the novels by Mian Lodalen: Smulklubbens skamlösa systrar and Trekant). The reluctant is the last strat-egy who is the creative one, which rejects some things and adapt to other. Here I place the heroines from Stjärnor utan svindel, Andra sidan Alex and Storlek 37. The result of this study is that despite quite different strategies to oppose against the hetero-sexual power discourse and the normative femininity everyone relates to it and thereby con-firms it.
15

Evolving Our Heroes: An Analysis of Founders and "Founding Fathers" in American History Dissertations

Stawicki, John M. 26 November 2019 (has links)
No description available.
16

RealizaÃÃo de PrÃtica de FÃsica em Bancada e SimulaÃÃo Computacional para Promover o Desenvolvimento da Aprendizagem Significativa e Colaborativa / Realization of Pratical Physics Bench and Computer Simulation to promote the Development of the Collaborative and Meaningful Learning.

MÃrio Jorge Nunes Costa 25 January 2013 (has links)
nÃo hà / A avaliaÃÃo educacional brasileira, segundo o PISA, se reflete no quadro de desigualdades econÃmicas e sociais vivenciadas entre os hemisfÃrios norte e sul planetÃrios. A presente pesquisa objetiva investigar, de que maneira, a concepÃÃo e realizaÃÃo de uma atividade pedagÃgica colaborativa de experimentaÃÃo de bancada, apoiada por atividades pedagÃgicas de simulaÃÃo e modelagem computacional, pÃde contribuir para favorecer o desenvolvimento do processo de aprendizagem significativa. As atividades foram efetivadas enfatizando-se a construÃÃo e (re) significaÃÃo de conceitos de fÃsica, especificamente no tema eletricidade e circuitos elÃtricos. Foram inicialmente verificados os conhecimentos prÃvios dos alunos, atravÃs da aplicaÃÃo de questionÃrios de sondagem de conhecimentos. Em seguida, se realizaram aulas teÃricas, com foco na formaÃÃo de organizadores prÃvios. Em seguida, promoveram-se atividades fazendo uso pedagÃgico de software educacionais de simulaÃÃo e modelagem de circuitos de resistores elÃtricos, PhET e Crocodile, quando os alunos inter-relacionaram e/ou (re) significaram conceitos. Para tanto, vivenciaram e realizaram as mediÃÃes de grandezas elÃtricas e demais atividades propostas, sob a mediaÃÃo do presente Professor-Pesquisador. Numa etapa consecutiva, os alunos realizaram a prÃtica de experimentaÃÃo de bancada, relacionada ao mesmo tema anterior de circuitos elÃtricos, para (re) significar os conhecimentos dos alunos, partindo do estudo do brilho de lÃmpadas. Em todas as atividades laboratoriais, foram utilizados instrumentos de coleta de dados do tipo: gravaÃÃes de Ãudio e vÃdeo; respostas e relatos escritos pelos alunos nos roteiros das atividades de simulaÃÃo e modelagem computacional, atividade experimental de bancada e questionÃrios de sondagem de conhecimentos prÃvios e avaliaÃÃo da prÃtica pedagÃgica. A pesquisa classifica-se como qualitativa, exploratÃria e pesquisa-aÃÃo. No referencial teÃrico-metodolÃgico, destacam-se, como principais contribuiÃÃes, os pressupostos de: Dorneles, AraÃjo, Veit, no uso de software de simulaÃÃo e dificuldades de aprendizagem; Ribeiro et al., nos aspectos da integraÃÃo de laboratÃrios de experimentaÃÃo e simulaÃÃo, para facilitar o desenvolvimento da aprendizagem colaborativa, na qual destacam-se Ausubel, Novak e Valente; Moraes, Galiazzi e Okada, quanto ao mapeamento cognitivo da anÃlise textual discursiva; e Almeida, Prado e GÃes, quanto à anÃlise qualitativa de dados multidimensionais, com o uso do software CHIC. Sem perda de generalidade, a anÃlise dos dados de campo evidencia preliminarmente que: as atividades de simulaÃÃo e modelagem computacional contribuÃram para a formaÃÃo de organizadores prÃvios relativos a conceitos de eletricidade, leitura e interpretaÃÃo de medidas elÃtricas. Posteriormente, a atividade de experimentaÃÃo auxiliou os alunos a (re) significarem os conhecimentos de eletricidade e circuitos elÃtricos, as atividades de leitura, mediÃÃo e interpretaÃÃo de grandezas elÃtricas, auxiliando o desenvolvimento da aprendizagem significativa. A anÃlise dos resultados tambÃm revela indÃcios que, com a integraÃÃo entre as atividades de experimentaÃÃo de bancada e softwares de simulaÃÃo e modelagem computacional, os alunos, de forma colaborativa e minoritariamente cooperativa, (re) significaram e reelaboraram conhecimentos relativos a circuitos elÃtricos de resistores, porÃm, em determinados momentos, caracterizavam dificuldades de aprendizagem, pois nÃo conseguiam expressar suas concepÃÃes e argumentaÃÃes, de maneira a se apropriar corretamente dos conceitos de eletricidade.
17

Apropriação das tecnologias de informação e comunicação pelos gestores educacionais

Borges, Marilene Andrade Ferreira 24 June 2009 (has links)
Made available in DSpace on 2016-04-27T14:32:32Z (GMT). No. of bitstreams: 1 Marilene Andrade Ferreira Borges.pdf: 2551854 bytes, checksum: 5fa6c98a362a91ee17f0e06688f2a0fe (MD5) Previous issue date: 2009-06-24 / The objective of this thesis is to investigate how people Appropriate digital technologies, more specifically, to reveal and to understand how this process takes place. Initially the use of the term Appropriation was studied in different knowledge areas.The practical work included the study of the training course "Projeto Gestão Escolar e Tecnologias" (School and Technologies Management Project) and the data used was the text extracts from the "Memoriais Reflexivos" (Reflexive Memorials) produced by educational managers who participated in the course. These extracts were analyzed, categorized, compiled and submitted to a new analysis, using a multidimensional statistical method performed by the software CHIC- Coercion, Implication and Hierarchic Classification. The software generated similarity trees and the numbers of occurrences of the specified categories. Bar charts were then elaborated based on these numbers,using Excel. Based upon the analysis of all this information the result showed that: the presence of orientation principles of the Complex Thought, indicating that the process of technological Appropriation is a Complex process; the relations established among the person, the object and the "other", signaling that technological Appropriation is not in the person nor in the technologies itself, but it is in the relations established among them; and the Appropriation is configured as a spiral in an ascending movement, which happens as part of the computer mediation, peers and the course professors. This confirms, therefore, that the digital technologies Appropriation is a Relational, Complex and Spiral process, which is constituted in levels, although singular in its identities, they are part of a unique movement. At the base of this process it is the Emotional level which supports the existence of other levels such as Imitation,, Relation- Communication, Relation-Information, Reflective-Relation/Expression and Selfeducation. The Emotional level is not related to the Technical-Operational level. The identification, the comprehension and the understanding of these levels, will be able to contribute to the educators' training actions or to other segments that have digital technologies as one of the supports for its accomplishment, to use these technologies as communication, information and expression means, allowing the students to appropriate them. Another result is to extend to the persons who have not appropriated the technologies, but who are trying to look for means to the realization of their emotions (MATURANA, 2001) / O presente trabalho tem como objetivo mostrar como ocorre a Apropriação das tecnologias digitais pelo sujeito, mais especificamente, desvelar e compreender como se configura esse processo. Inicialmente foi feito um estudo do termo Apropriação em diversas áreas do conhecimento. Como parte prática, foi estudado o curso de formação do "Projeto Gestão Escolar e Tecnologias", e os dados utilizados foram os extratos textuais dos Memoriais Reflexivos, elaborados pelos gestores educacionais, participantes do curso. Esses extratos foram analisados, categorizados,compilados e submetidos a uma nova análise, utilizando-se o método estatístico multidimensional viabilizado pelo software CHIC - Classificação Hierárquica, Implicativa e Coercitiva - que gerou as árvores de similaridade e os números de ocorrências das categorias e a partir delas, utilizando-se o Excel, os gráficos de barras foram elaborados. Com base nessas informações o resultado das análises mostrou que: a presença de princípios norteadores do Pensamento Complexo que apontam o processo de Apropriação tecnológica como um processo Complexo; as relações estabelecidas entre o sujeito, objeto e o "outro", sinalizando que Apropriação tecnológica não está nem no sujeito e nem nas próprias tecnologias,mas nas relações estabelecidas entre eles; e que a Apropriação se configura em espiral, num movimento ascendente, realizado com a mediação do computador, pares e professores. Confirma, portanto, que Apropriação das tecnologias digitais é um processo Relacional, Complexo e em Espiral, que se constituem níveis, que mesmo singulares em suas identidades, fazem parte de um único movimento. Na base desse processo está o nível Emocional, que potencializa a existência dos níveis: Imitação, Relação-Comunicação, Relação-Informação, Relação/Expressão-Reflexiva e Autoformação. O nível Emocional só não está relacionado com o nível Técnico-Operacional. A identificação, a compreensão e o entendimento dos níveis, poderão contribuir para que as ações de formação de educadores ou outros segmentos, que têm nas tecnologias digitais um dos suportes para a sua realização, utilizem-nas como forma de comunicação, informação e expressão, possibilitando aos cursistas delas se apropriarem; e, num desdobramento estende-se a todos os sujeitos que não se apropriaram das tecnologias, mas tentam-no buscando meios para a realização de suas emoções. (MATURANA, 2001)
18

L'enseignement de la proportionnalité en segpa : contraintes, spécificités, situations / The teaching of proportionality in special-needs secondary schools : constraints, specificities, situations

Voisin, Samuel 17 December 2013 (has links)
Cette thèse questionne l'enseignement de la proportionnalité à des élèves de 11 à 16 ans relevant de l'adaptation scolaire et de la scolarisation des élèves handicapés. Les travaux de didactique des mathématiques ont montré l'inaboutissement fréquent du projet d'appropriation de la proportionnalité auprès des élèves jusqu'au collège, et tout particulièrement en ASH.Afin de savoir si une adaptation peut se faire sans dénaturer le savoir, nous proposons donc une progression sur l'enseignement de la proportionnalité en classe de Quatrième SEGPA.Nous insistons sur l'importance de l'organisation des savoirs au sein de cette progression et sur la pertinence des contextes et des valeurs des variables didactiques numériques. Les analyses de nos observations se font dans le cadre de l'analyse statistique implicative, de la Théorie des Situations Didactiques ainsi que de la double approche utilisée dans l'analyse des pratiques des enseignants.La mise en œuvre de la progression construite nécessite pour les enseignants des connaissances mathématiques. Afin de réactiver ces connaissances, nous proposons des représentations symboliques qui illustrent les techniques de résolution de problèmes relevant de la proportionnalité simple. / The purpose of this thesis is to investigate the teaching of proportionality to 11 to 16-year old pupils registered in special-needs schools including pupils with more severe learning disabilities.Studies related to the teaching of mathematics have shown that the understanding of proportionality by pupils up to middle school age and more particularly by children with significant learning difficulties is often inappropriate. In order to find out if an adjustment can be made without any impact on the knowledge requirements, we experimented a teaching plan concerning the learning of proportionality by children with special-needs in the context of our study. We insist on the importance of the organization of the different types of knowledge within this teaching plan and also on the relevance of backgrounds and values of numerical didactical parameters. Analysis of our observations is carried out with statistical implicative analysis, Theory of Didactical Situations and with the frame of the double approach used to analyse the practices of teachers.The implementation of such a teaching plan requires, for teachers, mathematical knowledge. In order to reactivate this knowledge, we propose a symbolic scheme for each resolving technique applied to problems involving direct proportionality.
19

Monitoring of large-scale Cluster Computers

Worm, Stefan 13 April 2007 (has links) (PDF)
The constant monitoring of a computer is one of the essentials to be up-to-date about its state. This may seem trivial if one is sitting right in front of it but when monitoring a computer from a certain distance it is not as simple anymore. It gets even more difficult if a large number of computers need to be monitored. Because the process of monitoring always causes some load on the network and the monitored computer itself, it is important to keep these influences as low as possible. Especially for a high-performance cluster that was built from a lot of computers, it is necessary that the monitoring approach works as efficiently as possible and does not influence the actual operations of the supercomputer. Thus, the main goals of this work were, first of all, analyses to ensure the scalability of the monitoring solution for a large computer cluster as well as to prove the functionality of it in practise. To achieve this, a classification of monitoring activities in terms of the overall operation of a large computer system was accomplished first. Thereafter, methods and solutions were presented which are suitable for a general scenario to execute the process of monitoring as efficient and scalable as possible. During the course of this work, conclusions from the operation of an existing cluster for the operation of a new, more powerful system were drawn to ensure its functionality as good as possible. Consequently, a selection of applications from an existing pool of solutions was made to find one that is most suitable for the monitoring of the new cluster. The selection took place considering the special situation of the system like the usage of InfiniBand as the network interconnect. Further on, an additional software was developed which can read and process the different status information of the InfiniBand ports, unaffected by the vendor of the hardware. This functionality, which so far had not been available in free monitoring applications, was exemplarily realised for the chosen monitoring software. Finally, the influence of monitoring activities on the actual tasks of the cluster was of interest. To examine the influence on the CPU and the network, the self-developed plugin as well as a selection of typical monitoring values were used exemplarily. It could be proven that no impact on the productive application for typical monitoring intervals can be expected and only for atypically short intervals a minor influence could be determined. / Die ständige Überwachung eines Computers gehört zu den essentiellen Dingen, die zu tun sind um immer auf dem Laufenden zu sein, wie der aktuelle Zustand des Rechners ist. Dies ist trivial, wenn man direkt davor sitzt, aber wenn man einen Computer aus der Ferne beobachten soll ist dies schon nicht mehr so einfach möglich. Schwieriger wird es dann, wenn es eine große Anzahl an Rechnern zu überwachen gilt. Da der Vorgang der Überwachung auch immer etwas Netzwerklast und Last auf dem zu überwachenden Rechner selber verursacht, ist es wichtig diese Einflüsse so gering wie möglich zu halten. Gerade dann, wenn man viele Computer zu einem leistungsfähigen Cluster zusammen geschalten hat ist es notwendig, dass diese Überwachungslösung möglichst effizient funktioniert und die eigentliche Arbeit des Supercomputers nicht stört. Die Hauptziele dieser Arbeit sind deshalb Analysen zur Sicherstellung der Skalierbarkeit der Überwachungslösung für einen großen Computer Cluster, sowie der praktische Nachweis der Funktionalität dieser. Dazu wurde zuerst eine Einordnung des Monitorings in den Gesamtbetrieb eines großen Computersystems vorgenommen. Danach wurden Methoden und Lösungen aufgezeigt, welche in einem allgemeinen Szenario geeignet sind, um den ganzheitlichen Vorgang der Überwachung möglichst effizient und skalierbar durchzuführen. Im weiteren Verlauf wurde darauf eingegangen welche Lehren aus dem Betrieb eines vorhandenen Clusters für den Betrieb eines neuen, leistungsfähigeren Systems gezogen werden können um dessen Funktion möglichst gut gewährleisten zu können. Darauf aufbauend wurde eine Auswahl getroffen, welche Anwendung aus einer Menge existierende Lösungen heraus, zur Überwachung des neuen Clusters besonders geeignet ist. Dies fand unter Berücksichtigung der spezielle Situation, zum Beispiel der Verwendung von InfiniBand als Verbindungsnetzwerk, statt. Im Zuge dessen wurde eine zusätzliche Software entwickelt, welche die verschiedensten Statusinformationen der InfiniBand Anschlüsse auslesen und verarbeiten kann, unabhängig vom Hersteller der Hardware. Diese Funktionalität, welche im Bereich der freien Überwachungsanwendungen bisher ansonsten noch nicht verfügbar war, wurde beispielhaft für die gewählte Monitoring Software umgesetzt. Letztlich war der Einfluss der Überwachungsaktivitäten auf die eigentlichen Anwendungen des Clusters von Interesse. Dazu wurden exemplarisch das selbst entwickelte Plugin sowie eine Auswahl an typischen Überwachungswerten benutzt, um den Einfluss auf die CPU und das Netzwerk zu untersuchen. Dabei wurde gezeigt, dass für typische Überwachungsintervalle keine Einschränkungen der eigentlichen Anwendung zu erwarten sind und dass überhaupt nur für untypisch kurze Intervalle ein geringer Einfluss festzustellen war.
20

Mitteilungen des URZ 1/2004

Richter,, Riedel,, Grunewald,, Schier, 04 March 2004 (has links) (PDF)
Informationen des Universitätsrechenzentrums

Page generated in 0.0757 seconds