• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 61784
  • 6049
  • 5658
  • 3722
  • 3436
  • 2277
  • 2277
  • 2277
  • 2277
  • 2277
  • 2264
  • 1224
  • 1146
  • 643
  • 535
  • Tagged with
  • 103608
  • 45421
  • 28888
  • 20550
  • 17952
  • 12457
  • 10983
  • 10844
  • 9121
  • 8524
  • 7162
  • 6389
  • 6211
  • 6180
  • 6059
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

An architecture for reliable decentralized systems

Allchin, James Edward January 1983 (has links)
No description available.
82

Active networks : architectures, composition, and applications

Bhattacharjee, Samrat January 1999 (has links)
No description available.
83

Computer animation of multi-legged creatures

Solomon, Gabriel Jerome 05 1900 (has links)
No description available.
84

The design and performance of a parallel computer architecture for simulation

Hamblen, James Ovid 05 1900 (has links)
No description available.
85

Analysis of multi-platform mobile application development

Thaden, Courtney B. 09 September 2014 (has links)
<p> The variety of mobile devices and their operating platforms has rapidly increased. With this increase come separate standards, programming languages, and distribution markets. Typically developers want to deliver their products to a variety of users encompassing various platforms; however choosing to develop using a native program for a platform can delay the development and release on another platform. Multi-platform development applications were created in order to deploy applications to various platforms in a more timely and cost efficient manner by using a single code base. </p><p> The purpose of this study was to investigate the multi-platform development applications MoSync, Appcelerator, and PhoneGap, create a test application using each multi-platform development application to run on the Android emulator and iOS simulator to determine performance, and also determine which multi-platform application was best suited for allowing a developer to create a mobile application that could be utilized on a variety of platforms.</p>
86

Dynamic Pricing in Heterogeneous Wireless Cellular Networks

Shrader, David 28 October 2014 (has links)
<p> Smart communications devices are giving users instant access to applications that consume large amounts of data. These applications have different requirements on the network for delivery of data. In order to support these different applications, operators are required to support multiple service classes. </p><p> Given the regulatory and technology constraints and the relatively high cost associated with wireless spectrum licensing and utilization, demand will exceed supply leading to congestion and overload conditions. In addition to new broadband radio technologies offering higher data rates, operators are looking at deploying alternate heterogeneous technologies, such as WLAN, to provide additional bandwidth for serving customers. It is expected that this will still fall short of providing enough network resources to meet the ITU requirement for 1% new call blocking probability. An economic mechanism that offers incentives to individuals for rational behavior is required in order in order to reduce the demand for network resources and resolve the congestion problem. </p><p> The research in this dissertation demonstrates that the integration of a dynamic pricing with connection admission control mechanism for an operator deploying cooperative heterogeneous networks (e.g., LTE and WLAN) offering multiple QoS service classes reduces the new call blocking probability to the required 1% level. </p><p> The experimental design consisted, first, of an analytical model of the CAC algorithm with dynamic pricing in a heterogeneous environment. The analytical model was subsequently validated through discrete-event simulation using Matlab. </p>
87

HDMI frame grabber

Gu, Xun 31 October 2014 (has links)
<p> The High-Definition Multimedia Interface (HDMI) is widely adopted by the modern media devices, and supporting HDMI source is required in many streaming and broadcasting solutions. This paper introduces an HDMI frame grabber design which will capture the image from an HDMI source, and then display the image on both a local HDMI display and a remote computer screen. As a result, the captured frame will be shared in the different locations across the network. The project design involves the embedded hardware/software development on a Xilinx FPGA board, and GUI/Network programming on the Microsoft .NET framework. The paper describes the embedded design to enable the HDMI and Ethernet peripherals on the FPGA board, analyzes the data format and protocol difference among the network nodes, and then introduces the method to convert and transport the data.</p><p> <i>Keywords:</i> Embedded Design, FPGA, HDMI, lwIP, Network Programming.</p>
88

Machine learning challenges for automated prompting in smart homes

Das, Barnan 23 October 2014 (has links)
<p> As the world's population ages, there is an increased prevalence of diseases related to aging, such as dementia. Caring for individuals with dementia is frequently associated with extreme physical and emotional stress, which often leads to depression. Smart home technology and advances in machine learning techniques can provide innovative solutions to reduce caregiver burden. One key service that caregivers provide is prompting individuals with memory limitations to initiate and complete daily activities. We hypothesize that sensor technologies combined with machine learning techniques can automate the process of providing reminder-based interventions or prompts. This dissertation focuses on addressing machine learning challenges that arise while devising an effective automated prompting system.</p><p> Our first goal is to emulate natural interventions provided by a caregiver to individuals with memory impairments, by using a supervised machine learning approach to classify pre-segmented activity steps into prompt or no-prompt classes. However, the lack of training examples representing prompt situations causes imbalanced class distribution. We proposed two probabilistic oversampling techniques, RACOG and wRACOG, that help in better learning of the "prompt" class. Moreover, there are certain prompt situations where the sensor triggering signature is quite similar to the situations when the participant would probably need no prompt. The absence of sufficient data attributes to differentiate between prompt and no-prompt classes causes class overlap. We propose ClusBUS, a clustering-based under-sampling technique that identifies ambiguous data regions. ClusBUS preprocesses the data in order to give more importance to the minority class during classification.</p><p> Our second goal is to automatically detect activity errors in real time, while an individual performs an activity. We propose a collection of one-class classification-based algorithms, known as DERT, that learns only from the normal activity patterns and without using any training examples for the activity errors. When evaluated on unseen activity data, DERT is able to identify abnormalities or errors, which can be potential prompt situations. We validate the effectiveness of the proposed algorithms in predicting potential prompt situations on the sensor data of ten activities of daily living, collected from 580 participants, who were part of two smart home studies.</p>
89

Introspective pushdown analysis and Nebo

Earl, Christopher 13 August 2014 (has links)
<p> In the static analysis of functional programs, control-flow analysis (&kappa;-CFA) is a classic method of approximating program behavior as a finite state automata. CFA2 and abstract garbage collection are two recent, yet orthogonal improvements, on &kappa;-CFA. CFA2 approximates program behavior as a pushdown system, using summarization for the stack. CFA2 can accurately approximate arbitrarily-deep recursive function calls, whereas &kappa;-CFA cannot. Abstract garbage collection removes unreachable values from the store/heap. If unreachable values are not removed from a static analysis, they can become reachable again, which pollutes the final analysis and makes it less precise. Unfortunately, as these two techniques were originally formulated, they are incompatible. CFA2's summarization technique for managing the stack obscures the stack such that abstract garbage collection is unable to examine the stack for reachable values.</p><p> This dissertation presents introspective pushdown control-flow analysis, which manages the stack explicitly through stack changes (pushes and pops). Because this analysis is able to examine the stack by how it has changed, abstract garbage collection is able to examine the stack for reachable values. Thus, introspective pushdown control-flow analysis merges successfully the benefits of CFA2 and abstract garbage collection to create a more precise static analysis.</p><p> Additionally, the high-performance computing community has viewed functional programming techniques and tools as lacking the efficiency necessary for their applications. Nebo is a declarative domain-specific language embedded in C++ for discretizing partial differential equations for transport phenomena. For efficient execution, Nebo exploits a version of expression templates, based on the C++ template system, which is a type-less, completely-pure, Turing-complete functional language with burdensome syntax. Nebo's declarative syntax supports functional tools, such as point-wise lifting of complex expressions and functional composition of stencil operators. Nebo's primary abstraction is mathematical assignment, which separates what a calculation does from how that calculation is executed. Currently Nebo supports single-core execution, multicore (thread-based) parallel execution, and GPU execution. With single-core execution, Nebo performs on par with the loops and code that it replaces in Wasatch, a pre-existing high-performance simulation project. With multicore (thread-based) execution, Nebo can linearly scale (with roughly 90% efficiency) up to 6 processors, compared to its single-core execution. Moreover, Nebo's GPU execution can be up to 37x faster than its single-core execution. Finally, Wasatch (the pre-existing high-performance simulation project which uses Nebo) can scale up to 262K cores.</p>
90

Optimizing frequency domain contention in wireless network

Abdnoor Al-zurfi, Huda Kadhem 14 August 2014 (has links)
<p> Wireless communication became popular in the last decades, giving the mobility to the users. However with increased number of users and contention, network efficiency can hardly keep up with user needs. This thesis focuses on a new frequency domain contention technique called FICA. In FICA, the channel is assumed to be using Orthogonal Frequency Division Multiplex (OFDM) with multiple sub-carriers. We investigated the use of multiple channels and multiple access points (APs) in the design. First we investigated having one channel that is divided into number of sub-carriers, it shows good result, but only for limited number of users. Therefore we worked on the second scenario of having several sub-channels and each sub-channel is divided into a number of sub-carriers to communicate through one AP. And for efficient result nodes contend on the contention band and winner nodes will have the chance to send their data through the transmission band. In real world, networks have more than one AP, for that reason we investigate the third scenario, which is having more than one AP. In this setup, the result showed significant outcome, that we can divide the channel into several sub-channels to serve more than one AP and hash an ID for each AP. We further investigated optimal number of ID bits that are used to represent the hashed receiver IDs. We summarize the results as following: 1) it is possible to divide the channel bandwidth into several sub-channels that is divided into several sub-carriers to serve large number of users. 2) node contention should be partitioned into contention band and transmission band to reduce the overhead that the contending node cause when contending on the whole channel. 3) AP ID is required when the network has more than one AP. 4) number of sub-carriers in the contention band has to increase at least to the double for higher efficiency, since more AP on the network would make the channel more loaded. 5) AP ID can be anything between 20-40 bits. Decreasing the ID to less than 40bits did not affect the throughput and efficiency of the channel.</p>

Page generated in 0.1172 seconds