• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 549
  • 196
  • 81
  • 72
  • 52
  • 28
  • 12
  • 8
  • 8
  • 8
  • 6
  • 6
  • 4
  • 4
  • 4
  • Tagged with
  • 1176
  • 161
  • 152
  • 140
  • 122
  • 89
  • 87
  • 86
  • 85
  • 74
  • 74
  • 71
  • 70
  • 67
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Rosie - A Recovery-oriented Security System

Chow, Shun Yee 11 July 2013 (has links)
Recovery is a time-consuming and computationally expensive operation. If an attacker can affect heavily-shared objects on the machine, then many other processes and files can be compromised from accessing them. This would greatly increase the recovery effort. Since intrusions start with a network connection, we argue that the integrity of heavily-shared objects should be protected from the network, in order to minimize the recovery effort. We discuss our prototype Rosie, which is designed with incident response and post-intrusion recovery in mind. Rosie predicts how heavily-shared each file or process is, based on the previous system activities observed. Rosie enforces appropriate mandatory access control and uses techniques such as sandboxing, in order to protect heavily-shared objects’ integrity. Rosie provides an important recovery guarantee that the maximum number of files need to be recovered is at most equal to the dependency threshold, a value that can be adjusted by a system administrator.
162

Dependency and self-criticism : individual differences in strategies for negotiating changes in and threats to social rank

Santor, Darcy A. (Darcy Allan) January 1995 (has links)
The two studies reported in this thesis examine the influence of two depressive personality styles, dependency and self-criticism, on how individuals respond to potentially disruptive events, such as a change in or threat to social rank. The studies used an experimental protocol in which participants were allowed to believe firstly that they outperformed a close friend or were outperformed by a close friend and secondly that friends generally agreed or disagreed with them. Findings offer support for the integration of depressive personality styles and interpersonal factors within a social rank framework. Results from the two studies suggest that dependency and self-criticism (a) moderate the impact of interpersonal events, (b) influence how individuals behave towards close friends, (c) affect how individuals remember interpersonal interactions with others, and (d) moderate the manner in which individuals actively structure their social environments. Depressive personality styles may contribute to maladaptive environments and depressive processes in complex ways by influencing the types of strategies individuals adopt to deal with threats to interpersonal relatedness and self-definition.
163

The levels of self-criticism and forms of dependency: their relation to attachment, the working alliance, and outcome

Banack, Kendell D 11 1900 (has links)
This study examined the relationships between attachment style and the levels of self-criticism (comparative and introjective) and forms of dependency (neediness and connectedness) and the working alliance and outcome variables over the course of psychotherapy. Sixty-five adult clients receiving therapy at a mental health clinic completed questionnaires after the first, fifth, and second to last sessions. Strong positive correlations were found between neediness and insecure attachment and negative correlations between neediness and secure attachment. Similar, yet weaker relationships were found between connectedness and attachment. Comparative self-criticism was positively associated with preoccupied and fearful attachment and negatively associated with secure attachment. Similar, yet weaker relationships were found between introjective self-criticism and attachment. Connectedness was associated with a strong working alliance across therapy and comparative self-criticism with a poor working alliance at session five. Although neediness was associated with poor outcome, preoccupied attachment was the best predictor of poor therapeutic outcome. / Counselling Psychology
164

Consumers' Dependency on Media for Information about Food Safety Incidents Related to the Beef Industry

Charanza, Ashley 2011 August 1900 (has links)
Food safety has become an important topic in today's mainstream media. Food safety incidents, specifically related to the beef industry, have the potential to damage the beef industry severely, and negative coverage in the media can alter consumers' perceptions and attitudes toward the beef industry. This study examined consumers' media dependency during normal times when a food safety incident is not occurring or is not expected to occur and during times of a potential food safety incident. This study also compared rural, urban, and suburban respondents' media dependencies and described consumer perceptions of the beef industry. The target population was Texas A & M University former students registered with a valid email address in a database maintained by The Association of Former Students. An online questionnaire was created on surveymonkey.com and sent to respondents over a four-week time period. Most of the respondents were educated, married, 50 years of age, and had some agricultural experiences. Respondents reported using more media during normal times than during a potential food safety incident. There was a level of concern among respondents toward aspects of the beef industry, such as use of antibiotics and growth hormones, and some concerns about respondent's health being affected by a food safety incident. The researcher concluded that respondents use multiple mediums to receive information about any issue; therefore agricultural communicators should target consumer messages to multiple mediums. Messages also should be constructed to address concerns with the beef industry to ensure consumers that the beef food supply is safe. It was recommended that similar research be conducted during or immediately after a national food safety incident, and research could be conducted on a different population.
165

Parallel Data Mining On Cycle Stealing Networks

Robertson, Calum Stewart January 2004 (has links)
In a world where electronic databases are used to store ever-increasing quantities of data it is becoming harder to mine useful information from them. Therefore there is a need for a highly scalable parallel architecture capable of handling the ever-increasing complexity of data mining problems. A cycle stealing network is one possible scalable solution to this problem. A cycle stealing network allows users to donate their idle cycles to form a virtual supercomputer by connecting multiple machines via a network. This research aims to establish whether cycle stealing networks, specifically the G2 system developed at the Queensland University of Technology, are viable for large scale data mining problems. The computationally intensive sequence mining, feature selection and functional dependency mining problems are deliberately chosen to test the usefulness and scalability of G2. Tests have shown that G2 is highly scalable where the ratio of computation to communication is approximately known. However for combinatorial problems where computation times are difficult or impossible to predict, and communication costs can be unpredictable, G2 often provides little or no speedup. This research demonstrates that existing sequence mining and functional dependency mining techniques are not suited to a client-server style cycle stealing network like G2. However the feature selection is well suited to G2, and a new sequence mining algorithm offers comparable performance to other existing, non-cycle stealing, parallel sequence mining algorithms. Furthermore new functional dependency mining algorithms offer substantial benefit over existing serial algorithms.
166

The role of technology attributes, trust and dependency on e-procuremnt adoptions: an empirical analysis of Malaysian manufacturers

Abdullah, Nik Ab Halim Nik January 2009 (has links)
Firms may gain benefit from each other‘s skills and resources when they engaged in a long term supply chain relationship, hence, improving their competitive advantage. Adoption of information technology initiatives such as e-procurement systems may further enhance the effectiveness of the relationship. Trust and dependency factors have been identified as important elements that influence business relationships. The objective of this study is to investigate the role of technology attributes, inter-organizational trust and inter-organizational dependency manufacturer‘s have towards their suppliers and customers when making an e-procurement adoption decision. This study also aims to determine if there is a critical gap between trust and dependency towards suppliers and customers and to identify which trust and dependency constructs have the most critical gap. Data was collected through case study interviews and mail survey questionnaires. It was analysed using the Partial Least Square Regression (PLS) analysis where the results indicate that dependency did have a significant positive influence on e-procurement adoption decisions, while trust did not. Size of the company, which is a control variable, has a significantly negative effect on adoption decision. Hence, this study confirmed that the level of dependency and size of company did influence an e-procurement adoption decision. Three gap analysis methods, namely the T-test analysis, weighted mean gap and the un-weighted Important Performance Analysis (IPA), were adopted and the results indicate that there is a significant gap between trust and dependency towards the supplier and customer, where the level of both variables are higher towards the customer than the supplier. Construct related to communication of problem is identified as trust factor with the most critical gap, while how partners help improve a firm‘s reputation and the level of knowledge transfer have the most critical gap for dependency. This study extends the body of literature related to information technology adoption factors by investigating the effect of trust and dependency in supply chain relationships within a single study. While findings on dependency and size of company are consistent with previous studies, findings on trust provide a new paradigm to trust-related studies as it is identified as not an important factor that influence e-procurement adoption decisions, particularly in a developing country such as Malaysia.
167

Economic development in the Kimberley region of Western Australia: a history and dependency theory perspective

Sharpe, Leslie J. January 2004 (has links)
[Abstract]:The focus of the research undertaken for this dissertation is the economic development of the Kimberley region of Western Australia. The period studied is, approximately, the one hundred years from 1900–2000. The region has many of the characteristics of an underdeveloped area and of a low income economy.This research used dependency theory as a framework for examining the causes of underdevelopment in the Kimberley. The development that occurred in the region during the relevant period has been catalogued by the creation of a database. This has enabled the collected information to be examined and manipulated in many ways. The database has allowed the detail of development in the Kimberley to be studied with respect to time, place and type of activity. This made it possible to examine the five hypotheses proposed by A. G. Frank which he considered likely to lead to fruitful research. The detailed study of these hypotheses would not have been possible in the way described without the database.It was found that dependency theory does help to explain and understand the development experience of the Kimberley region of Western Australia during the twentieth century. This was the clear and positive result of this study.The extension to Frank’s core dependency theory, the five hypotheses, were not found to be applicable to the Kimberley region nor supported by the data. The hypotheses, therefore, do not add to our understanding of the nature of Kimberley development during the period examined. This does not invalidate or devalue the usefulness of dependency theory in this study.
168

Multi-attribute decision making a test on the impact of data attributes dependency /

Li, Wei, January 2007 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2007. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on November 9, 2007) Includes bibliographical references.
169

Dependent Personality Inventory (DPI) : a scale to assess dependent personality subtypes based on DSM-IV-TR criteria

Huber, NIcole M January 2007 (has links)
Thesis (M.A.)--Cleveland State University, 2007. / Abstract. Title from PDF t.p. (viewed on May 8, 2008). Includes bibliographical references (p. 35-39). Available online via the OhioLINK ETD Center. Also available in print.
170

Dependenzgrammatik Tesnières Modell d. Sprachbeschreibung in wiss.-geschichtl. u. krit. Sicht /

Baum, Richard. January 1976 (has links)
Habilitationsschrift--Universität des Saarlandes, Saarbrücken. / Includes indexes. Includes bibliographical references (p. 144-162).

Page generated in 0.0451 seconds