• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1918
  • 597
  • 576
  • 417
  • 240
  • 177
  • 57
  • 53
  • 40
  • 26
  • 26
  • 25
  • 24
  • 23
  • 20
  • Tagged with
  • 4803
  • 533
  • 503
  • 497
  • 429
  • 421
  • 375
  • 362
  • 354
  • 345
  • 340
  • 336
  • 318
  • 318
  • 316
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

A case study of child-directed speech (CDS) a Cantonese child living in Australia /

Wong, Shuk-wai, Connie Waikiki, January 2006 (has links)
Thesis (M. A.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
292

Code Inspection

Krishnamoorthy, Shyaamkumaar January 2009 (has links)
<p>Real time systems, used in most of the day-to-day applications, require time critical exection of tasks. Worst Case Execution Time Analysis (WCET) is performed to ensure the upper bound on the time they can take to execute. This work aims to perform a static analysis of the industry standard code segments to provide valuable information to aid in choosing the right apporach towards WCET analysis. Any code segment can be analyzed syntactically, to gain some insights to the effects that a particular coding syntax format may have. With focus on the functions and looping statements, vaulable information regarding the code segments inspected can be obtained. For this purpose, the code segments from CC systems, Vasteras , were inspected. Scope graphs generated by SWEET, the Swedish Execution Time tool were used extensively to aid this work. It was found that syntactical analysis could be performed effectively for the code segments that were analysed as a part of this task.</p>
293

Att vara tvåspråkig : En studie av gymnasieelever med turkisk bakgrund och deras syn på att vara tvåspråkig

Arisoy, Fatma January 2009 (has links)
<p>The purpose of the thesis is to see how Turkish students understand their bilingualism. I have tried to explain bilingualism as a phenomenon and give an insight in national steering documents on the basis of different concepts used by researchers.</p><p>The method consists of qualitative interviews with standardized character. Five upper-secondary school students participated and independently discussed the answers.</p><p>The result from the interviews is the participators view on bilingualism. The answers were varying. I have got the answer of my question through the interviews and researches. The result is also connected to relevant theories.</p>
294

Code optimization and detection of script conflicts in video games

Yang, Yi 11 1900 (has links)
Scripting languages have gained popularity in video games for specifying the interactive content in a story. Game designers do not necessarily possess programming skills and often demand code-generating tools that can transform textual or graphical descriptions of interactions into scripts interpreted by the game engine. However, in event-based games, this code generation process may lead to potential inefficiencies and conflicts if there are multiple independent sources generating scripts for the same event. This thesis presents solutions to both perils: transformations to eliminate redundancies in the generated scripts and an advisory tool to provide assistance in detecting unintended conflicts. By incorporating traditional compiler techniques with an original code-redundancy-elimination approach, the code transformation is able to reduce code size by 25% on scripts and 14% on compiled byte-codes. With the proposed alternative view, the advisory tool is suitable for offering aid to expose potential script conflicts.
295

Interference cancellation for shot-code DS-CDMA in the presence of channel fading

Dutta, Amit K. 21 August 1997 (has links)
Interference from other adjacent users in wireless applications is a major problem in direct-sequence code-division multiple-access (DS-CDMA). This is also known as the near-far problem where a strong signal from one user interferes with other users. The current approach to deal with the near-far problem in DS-CDMA systems is to use strict transmitter power control. An alternative approach is to use near-far resistant receivers. The practical near-far resistance receiver structure is the adaptive decorrelating detectors since it avoids complex matrix inversion. The existing CDMA standard known as IS-95 uses a long signature code sequence. However for simplicity, the adaptive multi-user receiver uses short signature code sequence. The problem is that adaptive receivers lose near-far resistance as the number of users increases in the system. This thesis describes a novel method of multistage decision feedback cancellation (DFC) scheme immune from the near-far problem. The performance of the new DFC structure is constructed using three different adaptive algorithms: the least mean squared (LMS), the recursive least squared (RLS) and the linearly constraint constant modulus (LCCM) adaptive algorithms. It is found that LMS adaptive algorithm provides the best result considering its simple hardware complexity. It is also found that the LMS adaptive receiver along with the DFC structure provides a better bit synchronization capability to the over all system. Since the receiver is near-far resistant, the LMS adaptive receiver along with the decision feedback cancellation structure also performs better in the presence of Rayleigh fading. / Graduation date: 1998
296

Joint convolutional and orthogonal decoding of interleaved-data frames for IS-95 CDMA communications

Rabinowitz, David 29 February 1996 (has links)
IS-95, an interim standard proposed for future digital personal communications systems, uses two levels of encoding of digital data for error control and compatibility with code-division multiple access (CDMA) transmission. The data is first convolutionally encoded and the resulting symbols are interleaved and then groups are encoded as orthogonal Walsh sequences. Decoding these two separate encodings is traditionally done in separate sequential steps. By combining the decoding and applying feedback of the final decision of the second level of decoding to the first level decoder it is possible to reduce the error rate of the decoder. Each Walsh sequence encodes six non-adjacent symbols of the convolutional code. The receiver computes an estimate of the probability that each of the sixty-four possible Walsh sequences has been sent, and uses this estimate as an estimate for each of the convolution symbols which specified the Walsh sequence. Since the convolution symbols are non-adjacent, it is likely that the actual value of some of the earlier symbols will have been determined by the final decoder before later symbols specifying the same Walsh sequence are used by the convolution decoder. The knowledge of the values of these symbols can be used to adjust the probability estimates for that Walsh sequence, improving the likelihood that future convolutional symbols will be correctly decoded. Specific metrics for estimating probabilities that each convolutional symbol was sent were tested with and without the proposed feedback, and error rates were estimated based on extensive computer simulations. It was found that applying feedback does improve error rates. Analytical methods were also applied to help explain the effects. / Graduation date: 1996
297

Code Inspection

Krishnamoorthy, Shyaamkumaar January 2009 (has links)
Real time systems, used in most of the day-to-day applications, require time critical exection of tasks. Worst Case Execution Time Analysis (WCET) is performed to ensure the upper bound on the time they can take to execute. This work aims to perform a static analysis of the industry standard code segments to provide valuable information to aid in choosing the right apporach towards WCET analysis. Any code segment can be analyzed syntactically, to gain some insights to the effects that a particular coding syntax format may have. With focus on the functions and looping statements, vaulable information regarding the code segments inspected can be obtained. For this purpose, the code segments from CC systems, Vasteras , were inspected. Scope graphs generated by SWEET, the Swedish Execution Time tool were used extensively to aid this work. It was found that syntactical analysis could be performed effectively for the code segments that were analysed as a part of this task.
298

Language and Identity: Bilingual Code-switching in Spanish-English Interviews

Velasquez, Maria Cecilia 01 January 2011 (has links)
The relationship in a bilingual conversation between language choice and identity has been the subject of research in different disciplines such as sociolinguistics, psycholinguistics, and second language acquisition among others. The purpose of this research was to understand why and how language alternation occurs in bilingual interviews and its potential connection with identity. The data analyzed was from interviews from Proyecto Latino@, a previous research on Latin@ high school students’ experiences in schools and their academic engagement and/or disengagement. Participants’ narratives of their experiences indicated that code-switching is a result and a process of cultural adaptation. Code-switching in this research presented ways in which participants re-created their own concept of identity. Bilinguals of the Proyecto Latin@ portrayed a multiple identities construction –Spanish- English – when code-switching.
299

Language and Identity: Bilingual Code-switching in Spanish-English Interviews

Velasquez, Maria Cecilia 01 January 2011 (has links)
The relationship in a bilingual conversation between language choice and identity has been the subject of research in different disciplines such as sociolinguistics, psycholinguistics, and second language acquisition among others. The purpose of this research was to understand why and how language alternation occurs in bilingual interviews and its potential connection with identity. The data analyzed was from interviews from Proyecto Latino@, a previous research on Latin@ high school students’ experiences in schools and their academic engagement and/or disengagement. Participants’ narratives of their experiences indicated that code-switching is a result and a process of cultural adaptation. Code-switching in this research presented ways in which participants re-created their own concept of identity. Bilinguals of the Proyecto Latin@ portrayed a multiple identities construction –Spanish- English – when code-switching.
300

Manipulation de code et avant-garde : pour une littérature hackée

Legault, Jean-François 01 1900 (has links) (PDF)
Dans le cyberespace, les distinctions entre les différentes acceptions du mot code deviennent poreuses : le code juridique cède le pas au code informatique dans son rôle coercitif, le code informatique possède la même étoffe qu'un code secret pour l'utilisateur moyen, etc. L'hypothèse principale de ce mémoire est qu'on doit laisser de côté la représentation traditionnelle du hackeur en tant que pirate informatique pour n'adopter que la stricte définition suivante : le hackeur est un manipulateur de code, quel que soit ce code. Selon André Belleau, « l'institution [...] agit comme le code des codes. » En conséquence, il devient possible de considérer les mouvements d'avant-garde du siècle dernier comme des hackeurs d'avant l'heure puisqu' ils ont relevé le pari qu'en contestant et en renouvelant les codes esthétiques institutionnels, ils transformeraient dans la foulée les codes politiques de leur société. À la suite de l'analyse des multiples manifestes produits par le hackeur au cours de son histoire, on peut rétrospectivement émanciper sa praxis hors de l'étroite sphère informatique où on l'avait relégué pour lui faire investir l'ensemble des champs de l'activité humaine. Prospectivement, on peut affirmer que si le transvasement de l'institution culturelle vers le cyberespace s'effectue sur un mode conflictuel, c'est en raison d'une difficulté pour le code institutionnel de s'amalgamer au code informatique. Là où l'avant-garde artistique au sens traditionnel s'essouffle, le hackeur prend le pas et produit quantité d'œuvres qui procèdent de la manipulation d'un code et ce faisant, mettent en tension des enjeux spécifiques à ce code. On pourrait par exemple considérer les œuvres distribuées sous licence Creative Commons comme un hack du langage juridique utilisé pour formuler le droit d'auteur, lequel hack remet en question la relation institutionnalisée entre l'éditeur et l'auteur. Le repliement du code de la langue sur le code du langage de programmation dans le poégramme, ou poème-programme, pourra par ailleurs constituer la preuve que l'informatique n'est pas qu'un véhicule d'expression artistique, au contraire qu'on y trouve en son cœur l'Art et la Beauté. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : avant-garde, code, cyberespace, hackeur, Internet, institution, manifeste, ordinateur

Page generated in 0.045 seconds