• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 659
  • 348
  • 294
  • 174
  • 92
  • 74
  • 31
  • 26
  • 23
  • 23
  • 17
  • 14
  • 12
  • 11
  • 9
  • Tagged with
  • 1990
  • 549
  • 292
  • 266
  • 235
  • 222
  • 192
  • 190
  • 184
  • 178
  • 174
  • 174
  • 162
  • 140
  • 124
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
511

3DPOPS : From carbohydrate sequence to 3D structure

Nordström, Rickard January 2002 (has links)
<p>In this project a web-based system called 3DPOPS have been designed, developed and implemented. The system creates initial 3D structures of oligosaccharides according to user input data and is intended to be integrated with an automatized 3D prediction system for saccharides. The web interface uses a novel approach with a dynamically updated graphical representation of the input carbohydrate. The interface is embedded in a web page as a Java applet. Both expert and novice users needs are met by informative messages, a familiar concept and a dynamically updated graphical user interface in which only valid input can be created.</p><p>A set of test sequences was collected from the CarbBank database. An initial structure to each sequence could be created. All contained the information necessary to serve as starting points in a conformation search carried out by a 3D prediction system for carbohydrates.</p>
512

Utveckling av protokoll för bearbetning av / Protocol development to access databases using

Hjälmgården, David, van der Lieth, Jens January 2007 (has links)
<p>This assignment has been performed at location and commissioned by Attendit</p><p>AB in Jönköping. The task has been to develop a client/server system to access</p><p>data stored in SQL databases where the client application is developed to run on</p><p>regular cellular telephones. The importance has been to develop as reliable mobile</p><p>communication as possible. The functionality that is demanded upon the mobile</p><p>communication is:</p><p>• Secured for future versions</p><p>• Interoperability</p><p>• Data should not be bugged, modified or disappear</p><p>unnoticed</p><p>• Resource efficient</p><p>We have achieved these demands by developing our own protocol that is on top of</p><p>the TCP protocol. The difficulty with the development has been to take in mind</p><p>the limited resources of the mobile phones regarding storage, memory and CPU.</p><p>The result of this task is a working system with a belonging database which has</p><p>stable mobile communication as foundation. Server and client is well structure so</p><p>the system easy can be extended with new different calls to the database.</p><p>In hence of confidentiality the real system is not presented in this report. Instead</p><p>we will describe fictitious scenario to exemplify the resolutions to the problems</p><p>that we have identified.</p>
513

Creating a test system for a new era of radios

Toresson, Albin January 2008 (has links)
<p>As communication becomes more and more vital in defending a country’s borders, better radios are needed. When the Swedish armed forces saw that their existing radios took too much bandwidth in their net, they knew that something had to be done.</p><p>The existing radio, called Ra 180 RAP, was modified so that it could send X.25 messages into a network. This significantly reduced the use of bandwidth, as a packet switched network only uses the bandwidth when sending info.</p><p>This final thesis has been aimed to create a system that can test the X.25 function in the upgraded, so called CI-RAP, radio. This system will come in handy both when upgrading and later when performing service on the radios.</p>
514

Spécialisation tardive de systèmes Java embarqués pour petits objets portables et sécurisés

Courbot, Alexandre 20 September 2006 (has links) (PDF)
Java est une technologie attractive pour les équipements embarqués et contraints, de par ses propriétés de sûreté, de portabilité et de faible empreinte mémoire du code. Cependant, la taille imposante d'un environnement Java complet a obligé les producteurs d'équipements embarqués à utiliser des spécifications dégradées de Java aux fonctionnalités limitées, telles que J2ME ou Java Card. Ces spécialisations précoces de Java perdent la compatibilité au niveau applicatif avec l'édition standard, et ne peuvent ainsi s'adresser qu'à des cas d'utilisation particuliers.Notre travail consiste à permettre l'utilisation de l'édition standard de Java sur les systèmes contraints, au travers d'une spécialisation tardive et agressive du système qui intervient après déploiement de ses applications. L'occurrence tardive de la spécialisation permet de mieux déterminer les conditions d'utilisation du système, et donc de le spécialiser « sur mesure » par rapport aux applications qu'il exécute.Nos contributions sont les suivantes : dans un premier temps, nous définissons la notion de « romization », consistant à déployer un système hors-ligne avant de capturer et de transférer son image mémoire vers l'équipement sur lequel il doit s'exécuter. De cette définition, nous proposons une architecture de romization capable de capturer une image mémoire du système à n'importe quel moment de son exécution. Dans un second temps, nous traitons des moyens d'analyse et de spécialisation permettant de rendre cette image mémoire embarquable. L'évaluation effectuée montre que cette spécialisation tardive, appliquée à un environnement Java standard déployé, permet effectivement d'en obtenir une version minimaliste et embarquable sur un équipement contraint.
515

Software Architecture Checker

Bahtiyar, Muhammed Yasin January 2008 (has links)
<p>By the increasing needs of software industry, software systems became more complex constructions than ever before. As a result of increasing complexity in software systems, functional decomposition of these systems gains the status of the most important aspect in the software development process. Dividing problems to sub-problems and producing specific solutions for divided parts makes it easier to solve the main problem.</p><p>Component Based Software Engineering is a way of developing software systems that consists of logically or functionally decomposed components which integrated to each other by the help of well-defined interfaces. CBSE relies on architectural design of a software system.</p><p>Planning phase and implementation of a software project may differ time to time. Because of the complexity of software systems, solving specific problems may affect the architecture of the whole system.</p><p>In spite of sophisticated software engineering processes and CASE tools there is still a large gap between the planned and implemented architecture of software systems. Finding deviations from architecture in source code is a non-trivial task requiring tool support.</p><p>Since, matching operation of designed software architecture and implemented software architecture needs to check design documents against implementation code. This manual checking operation is nearly impossible for major software systems. Software Architecture Checker provides a great approach to check the architecture of any software system.</p><p>This bachelor thesis examines the approach behind the Software Architecture Checker.</p>
516

Downgrading Java 5.0 Projects : An approach based on source-code transformations

Steijger, Tamara January 2008 (has links)
<p>The introduction of Java 5.0 came along with an extension of the language syntax. Several new language features as generic types and enumeration types were added to the language specification. These features cause downward-incompatibilities, code written in Java 5.0 will not work on older versions of the Java runtime environment. For some active projects, however, it is not possible to upgrade to higher Java versions, since some code might not be supported on Java 5.0. If one still wants to use components written in Java 5.0, these must be downgraded. Up to now this has been accomplished mostly by transforming the byte code of these programs.</p><p>In this thesis, we present a set of transformations which transform Java 5.0 source code to Java 1.4 compatible code. We successfully apply these transformations to two larger projects and compare our approach to the up to now common byte-code based tools.</p>
517

Mobile Agenten für den Fernzugriff auf eingebettete Systeme

Renner, Josef 01 August 2006 (has links) (PDF)
In der Automatisierungstechnik sind Fernzugriffe auf Geräte und Anlagen bereits heute eine wesentliche Anwendung der Teleautomation. Zum Einsatz kommen dabei Teleservice-Systeme unter Nutzung analoger oder digitaler Wählleitungen oder in letzter Zeit auch Web-Verbindungen. Diesen konventionellen Systemen gemeinsam ist die Online-Verbindung zum Zielsystem. Mobile Agenten, die ebenfalls zu den Web-Technologien zu zählen sind, können zukünftig die Technologie der Fernzugriffe innerhalb der Automatisierungstechnik deutlich verbessern. Speziell für die Anwendung mobiler Agenten in der Automatisierungstechnik wird in dieser Arbeit ein sogenannter mobiler Fernzugriff-Agent beschrieben. Ein sehr großer Teil der Automatisierungsgeräte und Systeme ist dem Bereich der eingebetteten Systeme zuzurechnen. Die Agenten-Fähigkeit dieser Systeme, d. h. die Anbindung an ein Netzwerk und die Integration einer Agenten-Plattform, wird eingehend diskutiert. Ein Agenten-System für den Fernzugriff wird definiert und dessen Entwurf, die Entwicklung und eine Testmöglichkeit werden eingehend erläutert. Ein derartiges System besteht aus der Benutzer-Schnittstelle, einem Agenten-Portal und entsprechend ausgerüsteten Zielsystemen. Als Programmiersprache des Agenten wird Java mit einer Java Virtual Machine als Ausführungsumgebung als am besten geeignet befunden. Eine große Schwierigkeit besteht darin, für ein bestimmtes eingebettetes System eine passende Java Virtual Machine (JVM) zur Verfügung zu haben. In der Praxis ist in der Regel die Portierung einer vorhandenen JVM notwendig. Für die Untersuchungen im Rahmen dieser Arbeit wurde die Kertasarie-JVM ausgewählt und für den 16-Bit-Mikrocontroller Infineon C167 unter dem Echtzeit-Betriebssystem EUROS® portiert. Abschließend werden vier mögliche Anwendungsgebiete eines Fernzugriff-Agenten für die Automatisierungstechnik näher beschrieben. / In automation technology remote access to single devices or plants is already a significant application for teleautomation today. Systems of teleservice by use of analog or digital switched line and lately web links are applied for these purposes. Common to all these conventional systems is an online link to the destination system. Mobile agents that also belong to web technologies can explicitly improve the techniques of remote access within automation in the very near future. Especially for applications of mobile agents in automation in this scientific treatise a so called „Remote Access Agent“ is defined. The major part of automation devices and systems belongs to the group of embedded systems. The ability of embedded systems to deal and operate with mobile agents is treated in detail also the network link and the integration of an agent operation platform. An agent system for remote access is defined and its design, development and test surrounding are described. Such an agent system is defined to consist of a user interface, an agent control unit and especially equipped destination systems. As a programming language for the agent itself Java and for its execution surrounding a Java Virtual Machine were selected to be suitable best for this agent system. A great problem is to have a suitable Java Virtual Machine available for a given specific embedded system. In practice normally a conversion of an existing JVM is necessary. For the investigations during this work the Kertasarie Java Virtual Machine was selected and converted for the 16 bit microcontroller Infineon C167 and the EUROS® real time operating system. Finally four potential applications in automation technology for a remote access agent are described in detail.
518

Distributed object-oriented architectures : Sockets, Java RMI and CORBA /

Stepisnik, Josef. January 2007 (has links)
Technische Univ., Diplomarbeit--Wien, 2005.
519

Understanding Java applications using frequency of method calls /

Ghadiri, Amirali. January 2007 (has links)
Thesis (M.Sc.)--York University, 2007. Graduate Programme in Computer Science. / Typescript. Includes bibliographical references (leaves 122-124). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:MR31995
520

Conception de systèmes temps réel déterministes en environnement incertain

Bougueroua, Lamine George, Laurent Midonnet, Serge. January 2007 (has links) (PDF)
Thèse de doctorat : Informatique : Paris 12 : 2007. / Titre provenant de l'écran-titre. Pagination : XIV-129 p. Bibliogr. p. 119-127.

Page generated in 0.0575 seconds