• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 113
  • 52
  • Tagged with
  • 165
  • 165
  • 101
  • 101
  • 100
  • 94
  • 64
  • 64
  • 10
  • 10
  • 7
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Graph representation of documents content and its suitability for text mining tasks

Viaño Iglesias, Adrian January 2011 (has links)
Association rules mining is one of the the most relevant techniques of data mining. It has been also applied in the domain of text mining, but the results are hard to interpret. In this matter, an Association Network is an structure to represent as a graph the relationships mined as association rules. The goal of this project was to provide a methodology to build association networks from concepts extracted from a collection of documents, as well as the study of the mathematical properties of the association networks to prove that they are not random graphs and that they exhibit small-world properties.
152

Realtime capture and streaming of gameplay experiences

Amlie, Kristian January 2007 (has links)
Today's games are social on a level that could only be imagined before. With modern games putting a stronger emphasis on social networking than ever before, the identity in the game often becomes on par with the one in real life. Yet many games lack the really strong networking tools, especially when networking regarding players of different games is concerned.Geelix is a project which tries to enhance the social gaming aspect by providing sharing of what has been aptly named: gaming experiences. The motivation for this goal is to enable stronger support for letting friends take part in your online, or even offline, experiences. It is the belief that sharing gaming experiences is a key element in building strong social networks in games. This master thesis was written in relation to the Geelix project, where the focus was on enhancing the Geelix live sharing experience with advanced methods for video compression and streaming.
153

Metric indexing by database techniques

Erlandsen, Stian January 2011 (has links)
Similarity search is very useful in many applications. Because of the complex-ity and expensive nature of such search operations, many existing methods re-quire special access methods and cannot be directly integrated with commercialDBMSs(Database Management Systems). NTNUStore is a framework to aid re-search in this eld and focuses on disk-based metric indexing to keep it compatiblewith commercial DBMSs.This project has implemented and experimented with a version of the LAESA(Linear Approximating and Eliminating Search Algorithm) in NTNUStore. Theresults are close to what was represented in Erik Bagge Ottesen's master thesis. The biggest contribution in this project is that the new algorithm solves KNNsearch without the need of providing a range parameter in the query.
154

Bruk av mellomvare i interaktive produktkataloger / Middleware in interactive product catalogues

Beite, Anders H., Jacobsen, Camilla, Jensen, Christian January 2006 (has links)
Tradisjonelle løsninger for publisering av produktkataloger på CD eller papir innebæ-rer ofte store kostnader knyttet til distribusjon og printing av dokumenter. Dette kanmedføre at aktørene fokuserer mye på dokumenthåndteringen, på bekostning av egnemålsetninger om skape nærmere tilknytning mellom kunde og produkt.Dagens vekst innenfor teknologi skaper muligheter for løsninger man tidligere anså somdrømmetenking. Teknologiveksten i seg selv er også med på å skape et behov eller etønske om å dra nytte av de mulighetene som _nnes innenfor områder som marketing ogeksponeringstjenester. Ved å implementere en distribuert løsning ved bruk av mellomvareteknologi,vil man kunne få en løsning som administreres sentralt. Dette vil bidramed fordeler som alltid oppdatert produktportefølje, mindre krav til klientplattform, liteeller ingen administrasjon på klientsiden, kunde-/forhandlertilpasset innhold og bedrekostnadse_ektivitet. Både ved hyppige oppdateringer av porteføljen og høy grad av markedstilpasning,vil behovet for en distribuert løsning øke.I dagens teknologijungel _nnes det mange former for mellomvare til ulike formål. Noe avproblemet er å vite hvilken mellomvareteknologi som egner seg til hvilket formål. Ved åvelge rett vil man kunne høste frukter som økt e_ektivitet og forbedret brukeropplevelse.Vårt hovedfokus har derfor vært å se på aktuelle mellomvareteknologier som kan benyttesi en distribuert interaktiv produktkatalog, i den hensikt å skulle kunne avgjøre gjennome_ektivitetstester hvilken teknologi som vil være mest e_ektiv. Vi har valgt ut .NET Remoting,Java RMI og Web Service for å benytte i implementasjoner med funksjonalitetsom vi anser som sentral i en slik løsning. Vi har deretter testet funksjonaliteten i deulike implementasjonene ved hjelp av verktøy for enhetstesting.Gjennom en helhetlig vurdering av e_ektivitet basert på våre testresultater og gra_skgrensesnitt konkluderer vi med at .NET Remoting over TCP/BIN er det beste valget.Den har en overlegen tidsbruk på oppretting av et objekt med XML håndtering, oghenter ett bilde raskest av samtlige mellomvarer på en ADSL linje som er reelt for endistribuert produktkatalog. Samtidig viser vår evaluering av de gra_ske grensesnittene at.NET brukergrensesnittene er raskere enn Java grensesnittene.
155

Clustering User Behavior in Scientific Collections

Blixhavn, Øystein Hoel January 2014 (has links)
This master thesis looks at how clustering techniques can be appliedto a collection of scientific documents. Approximately one year of serverlogs from the CERN Document Server (CDS) are analyzed and preprocessed.Based on the findings of this analysis, and a review of thecurrent state of the art, three different clustering methods are selectedfor further work: Simple k-Means, Hierarchical Agglomerative Clustering(HAC) and Graph Partitioning. In addition, a custom, agglomerativeclustering algorithm is made in an attempt to tackle some of the problemsencountered during the experiments with k-Means and HAC. The resultsfrom k-Means and HAC are poor, but the graph partitioning methodyields some promising results.The main conclusion of this thesis is that the inherent clusters withinthe user-record relationship of a scientific collection are nebulous, butexisting. Furthermore, the most common clustering algorithms are notsuitable for this type of clustering.
156

Inputvalideringsbibliotek med integrering mot Eclipse / Input Validation Library with Eclipse Integration

Moghal, Sahdia Fayyaz, Surnflødt, Torunn January 2009 (has links)
<p>Validering av input er et sentralt emne innenfor sikker programvareutvikling. Det er spesielt viktig å validere inputfelter i applikasjoner som bruker input for å prosessere. En ondsinnet bruker kan fort utnytte slike felter. Det viktigste tiltaket for å sikre applikasjoner er tilstrekkelig kunnskap, da mangel på dette ofte resulterer i dårlig sikrede applikasjoner. Det ble i fordypningsprosjektet[33] kommet fram til at det eksisterer for dårlige rutiner blant IT-bedrifter når det kommer til sikkerhet. Utviklere har ikke nok kunnskap om området, og Internett blir stadig mer brukt til tjenester som innebærer sensitiv eller kritisk informasjon. Dette prosjektet tar for seg en rekke inputangrep og faren ved disse, og presenterer en rekke Security Patterner man kan bruke for å beskytte seg mot disse angrepene. Security Patternene beskriver problemet, setter det i en kontekst og gir forslag til løsninger som kan brukes i valideringen. I dette prosjektet er det fokusert på løsninger i form av regex, siden det er en effektiv metode for dette formålet. Alle Security Patternene er presentert i et bibliotek på en webside utviklet i dette prosjektet. Hensikten har vært å gi utviklere en felles kilde hvor de kan søke etter inputangrep, finne løsninger for å beskytte seg mot de og legge til egne forslag til løsninger hvis de ønsker det. Det er også laget en funksjon for at brukere skal kunne gi en positiv eller negativ tilbakemelding på bidragene. Dette vil gi en form for kvalitetssikring, og på sikt bidra til at biblioteket blir mer komplett. Biblioteket er utviklet med tanke på utviklere som ikke har mye kjennskap til inputangrep og regex, men er også egnet for mer erfarne brukere. Det er i tillegg til websiden utviklet en plugin for utviklingsverktøyet Eclipse, hvor man finner igjen Security Patternene fra websiden og en regexgenerator for å få hjelp til å generere egne regex. En appletversjon av generatoren er tilgjengelig på websiden for de som ikke benytter Eclipse. Prosjektet er testet både internt, eksternt av potensielle brukere og det er også sendt ut til bedrifter og mottatt tilbakemeldinger fra dem. Produktene ble sett på som nyttige og brukervennlige av testerne, men de ga også konstruktive tilbakemeldinger på hva som kunne forbedres både på brukervennlighet og funksjonalitet. Testresultatene ble analysert og det er blitt gjort en rekke forbedringer av systemet basert på analysen. I evalueringen er det blitt sett på positive og negative sider ved produktene, basert på egne erfaringer og synspunkter og testpersonenes tilbakemeldinger. Evalueringen har gitt en oversikt over en rekke områder som kan forbedres, både på websiden og i pluginen, og dette er beskrevet i kapittelet "videre arbeid" . Nøkkelord: Programvaresikkerhet, Inputvalidering, Regex, Plugin, Security Pattern.</p>
157

Developing Patient Controlled Access : An Access Control Model for Personal Health Records

Jensen, Torstein, Larsen, Knut Halvor January 2007 (has links)
<p>The health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient with assistance from health care actors, one of the keys to success lies in how the patient can control the access to the record. In this master's thesis we have developed an access control model for the personal health record in a Norwegian setting. The development is based on different studies of existing similar solutions and literature. Some of the topics we present are re-introduced from an earlier project. Interviews with potential users have also been a valuable and important source for ideas and inspiration, especially due to the fact that the access control model sets high demands on user-friendliness. As part of the access control model we have also suggested a set of key roles for the personal health record. Through a conceptual implementation we have further shown that the access control model can be implemented. Three different solutions that show the conceptual implementation in the Indivo personal health record have been suggested, using the Extensible Access Control Markup Language as the foundation.</p>
158

Security in the MIDAS Middleware

Pronstad, Thomas, Westerlund, Vegar January 2008 (has links)
<p>Security in Mobile ad-hoc networks (MANETs) is difficult because of its operating environment and its lack of a central control unit, making classical security measures inapplicable. MIDAS is a project funded by the European Commission which creates a "Middleware platform for developing and deploying advanced mobile services". It is important for MIDAS to find a middle ground where it provides reasonable security, while using little extra processing power and battery and remains easy to use. In this thesis we identify the vulnerabilities and security measures needed to secure MIDAS, while preserving usability. We approach this problem by analysing the MIDAS design and find similarities to other known systems. From the analysis we identify threats and ethical issues, and suggest security mechanisms that solve MIDAS specific problems. The resulting security mechanisms are described in detail and tied together to create four main configurations with increasing levels of security. The configurations can then be used by MIDAS developers to implement security in a consistent way. The results are specific to MIDAS, but issues, requirements and security building blocks can be used by other projects for applicable MANET problems.</p>
159

Introducing New Technologies to Users in User-Centered Design Projects: : An Experimental Study

Klingsheim, Tuva Foldøy, Raae, Benedicte January 2009 (has links)
<p>In user-centered design the users play an important role in the development process. The users are included in near every step of the process and it is often a problem that they do not have the necessary overview of a technology intended used in the end system. They do not need to know all the technical details, but they do need to know what possibilities the technology makes available. To do this one needs to introduce the users to the technical possibilities, but how does one do this? We had two suggestions as to how this could be done. We proposed introducing the possibilities through abstract concepts not tied to the users' domain. The reason being we did not want to lock the users to concrete ideas given by us, but let them use the abstract concepts to come up with ideas in their own domain. The other suggestion was giving the users hands-on experience with the concepts. Human knowledge is usually derived from experience, and we believe touching and trying out the possibilities of a technology would also be helpful in this kind of setting. To test whether hands-on experience and abstract concepts is valuable in an introduction of new technologies we conducted an experiment involving two workshops. Both workshops got a theoretical presentation of the abstract concepts, while one workshop let the participants explore a demonstrator made by us giving them hands-on experience. These workshops were then analyzed both qualitatively and quantitatively. The quantitative analysis showed that the workshop incorporating hands-on experience generated more unique ideas and also ideas in more categories than the other workshop. However due to low comparability between the groups due to factors such as prior experience with the technologies and current work situation, we do not give these findings much significance. Through the qualitative analysis we see that hands-on experience can be valuable. For one participant in particular, the hands-on experience was very valuable. In addition we found it valuable as a motivational exercise in a user-centered design process. The abstract concepts were analyzed qualitatively, and these were not as valuable as hoped. The users found it hard to map the abstract concepts to their domain. We now see the value of examples closer to the users' domain, but they should be kept as small building blocks for the users to combine to solve larger problems. We end this paper with a suggested approach to introducing new technological possibilities. We still recommend using the abstract concepts, but taking care to exemplify them through many small domain-specific examples. Hands-on experience is recommended if it is feasible to do this within the domain. We also recommend for time to mature and revisiting the participant after they've been back in their domain for a while.</p>
160

Developing Patient Controlled Access : An Access Control Model for Personal Health Records

Jensen, Torstein, Larsen, Knut Halvor January 2007 (has links)
The health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient with assistance from health care actors, one of the keys to success lies in how the patient can control the access to the record. In this master's thesis we have developed an access control model for the personal health record in a Norwegian setting. The development is based on different studies of existing similar solutions and literature. Some of the topics we present are re-introduced from an earlier project. Interviews with potential users have also been a valuable and important source for ideas and inspiration, especially due to the fact that the access control model sets high demands on user-friendliness. As part of the access control model we have also suggested a set of key roles for the personal health record. Through a conceptual implementation we have further shown that the access control model can be implemented. Three different solutions that show the conceptual implementation in the Indivo personal health record have been suggested, using the Extensible Access Control Markup Language as the foundation.

Page generated in 0.11 seconds