• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 678
  • 144
  • 138
  • 131
  • 26
  • 22
  • 13
  • 13
  • 13
  • 13
  • 13
  • 12
  • 8
  • 7
  • 2
  • Tagged with
  • 1289
  • 1289
  • 1289
  • 468
  • 326
  • 265
  • 265
  • 263
  • 261
  • 261
  • 261
  • 261
  • 261
  • 261
  • 261
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
281

Optimization of machine allocation in RingLeader

King, Jonathan B. 06 December 1996 (has links)
Many different types of distributed batch scheduling systems have been developed in the last decade to take advantage of the decentralization of computers and the enormous investments that many companies and educational institutions have in desktop workstations. Based on the premise that the majority of desktop workstations are significantly underutilized, distributed batch systems allow users to submit and run jobs when these workstations are available. While simpler systems determine machine availability by time of day (e.g., 5:00 p.m. to 8:00 a.m.), more sophisticated systems determine availability dynamically, migrating tasks when the availability changes. Ring Leader is a distributed batch system currently under development at Hewlett Packard. Since meeting the objectives of a distributed system rely on the intelligent use of idle workstations, good resource determination and efficient utilization decisions are a high priority for such a system. System performance will depend heavily on the process of deciding where jobs should be run. This thesis explains the development of Ring Leader's history based resource utilization scheme, and compares its performance to more simplistic algorithms. / Graduation date: 1997
282

Scalability issues in distributed and parallel databases

Gottemukkala, Vibby January 1996 (has links)
No description available.
283

Computer-aided topological analysis of active networks

Tofigh, Farshid. January 1982 (has links)
Thesis (M.S.)--Ohio University, March, 1982. / Title from PDF t.p.
284

Perception of organisational politics and workplace innovation : an investigation of the perceptions and behaviour of staff in an Australian IT services organisation /

Baxter, David. January 2004 (has links)
Thesis (D.B.A.)--Swinburne University of Technology, Australian Graduate School of Entrepreneurship, 2004. / A thesis submitted to the fulfilment of the requirements for the degree of Doctor of Philosophy, Australian Graduate School of Entrepreneurship, Swinburne University of Technology, 2004. Typescript. Includes bibliographical references (p. 229-230).
285

Die Schranken des Urheberrechts im Internet : eine rechtsvergleichende Untersuchung des schweizerischen und chinesischen Urheberrechts /

Bu, Yuanshi. January 2004 (has links)
Thesis (doctoral)--Universität Bern. / Includes bibliographical references (p. xxv-xlvii).
286

Acceptance of technology, quality, and customer satisfaction with information technology department in a community college a case study /

Nwankwo, Charles, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2007. / Vita. Includes bibliographical references.
287

Enabling e-learning 2.0 in information security education: a semantic web approach

Goss, Ryan Gavin January 2009 (has links)
The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
288

A descriptive predictive model for the employment of computer-based management information systems for the government of a developing country: case, Iran

Bidgoli, Hossein 01 January 1983 (has links)
This study was undertaken to identify the most decisive variables in the successful employment of a Computer-Based Management Information System (CBMIS) in a developing country such as Iran. A descriptive model was designed. Using a series of predictive models, several dimensions of successful CBMIS employment were investigated. Data were collected via a questionnaire sent to 79 Iranian governmental computer installations. Questions posed by the study are: (1) Under what conditions should a developing country continue to operate manually? (2) If computerization is feasible, what should the acquisition criteria be? (3) What are the most important variables for optimum utilization of existing computers? (4) What are the most important variables for the timely and efficient implementation of a CBMIS? (5) Should a developing country employ standardization in data collection? In data transmission? In hardware selection? In software selection? (6) How should a developing country choose the manufacturer of computer technology? (7) How can experience-sharing among installations by improved? (8) How can the reliability of the provided information be improved? The usefulness? Responsiveness of the CBMIS? Utilization of the provided information? Adaptability of the existing CBMIS to the growing technology? To answer these questions, a series of multiple regression models were run, using four different methods: forced entry, backward elimination, forward entry, and stepwise selection. Analyses showed that of the 54 variables originally hypothesized to be significant, 24 were, in fact, significant at the 5% level. It also demonstrated seven circumstances under which a change to automation in a developing country would not be advisable.
289

Digital Acoustic Tracking Analysis Program

Ford, George H. 01 April 1981 (has links) (PDF)
The purpose of this report is to investigate the processing of tracking data for acoustic targets. The programs developed for two- and three- dimensional space calculate the target's position via "hyperbolic-fix" navigation (geometric) considerations using the Newton-Raphson algorithm. The computer programs and the tracking solution approach contained herein is based on knowledge of only the sensors' locations and the relative time-difference at which a target's referenced, singular, acoustic pressure wavefronts are received at the sensors. Omnidirectional sensors are found to be sufficient for the two-dimensional space tracking problem. However, it is found that the three-space problem required usage of directional frequency and ranging (DIFAR) sensors. Line printer plots are provided for the target position solutions; also; tabular track position solutions are provided.
290

A critical analysis of school computer studies syllabuses in South Africa with reference to university computer science curricula

Roets, Rina Annette January 1992 (has links)
This thesis analyses the existing and proposed Computer Studies syllabuses in South African schools. Thereafter it compares the South African syllabuses with syllabuses in the United Kingdom. An attempt is made to assess the objectives of the design of the new S.A. syllabus. University Computer Science syllabuses are examined in order to gauge the purported overlap between what is taught at schools and universities. Opinions are obtained on the problems which apparently exist in offering or teaching the subject at schools and universities by conducting surveys on syllabus designers and university Computer Science departments. Finally recommendations are made for future Computer Studies syllabuses.

Page generated in 0.0933 seconds