• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 327
  • 92
  • 70
  • 52
  • 34
  • 31
  • 16
  • 9
  • 8
  • 7
  • 6
  • 5
  • 5
  • 5
  • 5
  • Tagged with
  • 805
  • 340
  • 131
  • 125
  • 124
  • 117
  • 100
  • 69
  • 68
  • 65
  • 63
  • 62
  • 60
  • 60
  • 57
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The End Conscription Campaign, 1983-1988: a study of white extra-parliamentary opposition to apartheid

Phillips, Merran Willis 30 November 2002 (has links)
See file
2

Guidelines for a psycho-educational programme to enhance self-actualisation of retired people

Kerr, Pamela Pearl 30 November 2002 (has links)
See file
3

The relationship between environmental education and science education in the South Africa context

Panday, Salesh 30 June 2002 (has links)
See file
4

Media integration in the teaching of mathematics in the Pre-primary and Primary schools

Seopo-Sengwe, Mmamapalo Elinah 01 January 2002 (has links)
See file
5

The Interpretation of children's drawings: guidelines for teachers

Noqamza, Mtandiwesizwe Patriot 30 January 2002 (has links)
See file
6

Tolerance in multicultural education: development of intervention strategies for educators

Cox, Cheryl Pearl 30 June 2002 (has links)
See file
7

An improved method for register file verification

Quan, Tong 2009 August 1900 (has links)
Register file logic verification historically involves comparing two human generated logic sources such as a VHDL code file and a circuit schematic for logic equivalence. This method is valid for most cases, however it does not account for instances when both logic sources are equivalent but incorrect. This report proposes a method to eliminate this problem by testing logic coherency of various sources with a golden logic source. This golden logic source will be generated by a register file simulation program which has been developed to simulate accurate regfile I/O port data. Implementation of this simulation program for logic verification will eliminate the accuracy problem stated above, in addition the logic simulation time for the new method has also been reduced by 36% compared to the former method. / text
8

Increasing the performance of storage services for local area networks

Wilson, Timothy David January 1992 (has links)
No description available.
9

The Jade File System.

Rao, Herman Chung-Hwa. January 1991 (has links)
File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems such as Unix support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. This thesis recognizes four characteristics of scalability: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. This thesis introduces the Jade File System, which provides a uniform way to name and access files in the internet environment. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: It allows multiple file systems to be mounted under one directory, and it permits one logical name space to mount other logical name spaces. A prototype of Jade has been implemented to examine and validate its design. The prototype consists of interfaces to the Unix File System, the Sun Network File System, and the File Transfer Protocol.
10

A cost analysis of B-trees /

Weiner, Alexandru. January 1978 (has links)
No description available.

Page generated in 0.3377 seconds