• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 96
  • 32
  • 25
  • 20
  • 17
  • 14
  • 11
  • 7
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 232
  • 79
  • 79
  • 51
  • 31
  • 29
  • 28
  • 27
  • 25
  • 25
  • 23
  • 21
  • 19
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

A STUDY OF CLUSTER PAGING METHODS TO BOOST VIRTUAL MEMORY PERFORMANCE

RAMAN, VENKATESH 11 March 2002 (has links)
No description available.
62

A STUDY OF SWAP CACHE BASED PREFETCHING TO IMPROVE VITUAL MEMORY PERFORMANCE

KUNAPULI, UDAYKUMAR 11 March 2002 (has links)
No description available.
63

A Study of a Swap of Information Systems in an Organisation

Halén, Alexander, Mozalewski, Wiktor January 2011 (has links)
Denna studie är en fallstudie som behandlar telekomföretaget Relacoms arbete med att gå från ett affärssystem till ett annat. Vi har med hjälp av intervjuer och flera enkätundersökningar bland personal samt diskussion med företagets ledning erhållit relevant fakta. Den planering och de processer som företaget använts sig av har dokumenterats och analyserat med hjälp av teorier hämtade från diverse akademiska skrifter inom området. Vi avslutar vår studie med en slutsats där vi presenterar vårt resultat samt en rekommendation till Relacom som behandlar fortsättningen av övergångsarbetet. Vårt resultat av Relacoms tillvägagångssätt vid byte av affärssystem är att ledningen skötte sig väl, men vissa kommunikationsbrister uppstod. / This lucubration is a case study which deals with the telecommunications company Relacoms transition from one business system to another. Through interviews and surveys among staff and management we have been able to document and analyze the planning and processes used by Relacom using theories drawn from various academic writings in the field. Our study ends with a conclusion where our results are presented plus a recommendation to Relacom considering the continuation of the transition process.Our result shows that the management did well during Relacom´s transition of business system, but some communications issues emerged.
64

Message Authentication Codes On Ultra-Low SWaP Devices

Liao, Che-Hsien 27 May 2022 (has links)
This thesis focuses on specific crypto algorithms, Message Authentication Codes (MACs), running on ultra-low SWaP devices. The type of MACs we used is hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC). The most important thing about ultra-low SWaP devices is their energy usage. This thesis measures different implementations' execution times on ultra-low SWaP devices. We could understand which implementation is suitable for a specific device. In order to understand the crypto algorithm we used, this thesis briefly introduces the concept of hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC) from a high level, including their usage and advantage. The research method is empirical research. This thesis determines the execution times of different implementations. These two algorithms (HMAC and CBC-MAC) contain three implementations. The result comes from those implementations running on the devices we used. / Master of Science / The deployments of 5G cellular networks are now onboard. The demand increased due to consumers and the availability of more affordable devices. The amount of investment in 5G technology and infrastructure increases market interest in IoT. The 5G network security is essential. How to secure user privacy and their sensitive data while they use 5g network has become a big issue and needs to be solved. However, not all popular crypto algorithms are suited to all devices, especially in those resource-limited microcontrollers. In this thesis, we will deal with Message Authentication Codes that provide the data integrity check. With resource limit devices, energy usage is an important issue. We will identify which implementations have better energy usage depending on the device features. This thesis will use three implementations for each algorithm. The result of our experiment provide a straightforward way that helps people understand which implementation can run more efficiently on specific ultra-low devices.
65

Trh kreditních derivátů / Credit derivatives market

Prokop, Martin January 2010 (has links)
The main objective of this thesis is to acquaint the reader with the main types of credit derivatives, with the methods of functioning and with main valuation principles. The theoretical part focus on description of credit derivatives market developement with more detailed description of subjcts, who are operating on credit derivatives market. The analysis fosus on how the financial crises influenced these subjects and their credit derivatives portfolios. I have also described the new suggested regulation changes. As a conclusion is the estimation of the regulation changes on the credit derivatives market size.
66

Equité d'accès aux ressources dans les systèmes partagés best-effort / Resources access fairness in best-effort shared systems

Goichon, François 16 December 2013 (has links)
Au cours de la dernière décennie, l'industrie du service informatique s'est métamorphosée afin de répondre à des besoins client croissants en termes de disponibilité, de performance ou de capacité de stockage des systèmes informatisés. Afin de faire face à ces demandes, les hébergeurs d'infrastructures ont naturellement adopté le partage de systèmes où les charges de travail de différents clients sont exécutées simultanément. Cette technique, mutualisant les ressources à disposition d'un système entre les utilisateurs, permet aux hébergeurs de réduire le coût de maintenance de leurs infrastructures, mais pose des problèmes d'interférence de performance et d'équité d'accès aux ressources. Nous désignons par le terme systèmes partagés best-effort les systèmes dont la gestion de ressources est centrée autour d'une maximisation de l'usage des ressources à disposition, tout en garantissant une répartition équitable entre les différents utilisateurs. Dans ce travail, nous soulignons la possibilité pour un utilisateur abusif d'attaquer les ressources d'une plateforme partagée afin de réduire de manière significative la qualité de service fournie aux autres utilisateurs concurrents. Le manque de métriques génériques aux différentes ressources, ainsi que le compromis naturel entre équité et optimisation des performances forment les causes principales des problèmes rencontrés dans ces systèmes. Nous introduisons le temps d'utilisation comme métrique générique de consommation des ressources, métrique s'adaptant aux différentes ressources gérées par les systèmes partagés best-effort. Ceci nous amène à la spécification de couches de contrôles génériques, transparentes et automatisées d'application de politiques d'équité garantissant une utilisation maximisée des ressources régulées. Notre prototype, implémenté au sein du noyau Linux, nous permet d'évaluer l'apport de notre approche pour la régulation des surcharges d'utilisation mémoire. Nous observons une amélioration significative de la performance d'applications typiques des systèmes partagés best-effort en temps de contention mémoire. De plus, notre technique borne l'impact d'applications abusives sur d'autres applications légitimes concurrentes, puisque l'incertitude sur les durées d'exécution est naturellement amoindrie. / Over the last ten years, the IT services industry has gone through major transformations, to comply with customers ever-growing needs in terms of availability, performance or storage capabilities of IT infrastructures. In order to cope with this demand, IT service providers tend to use shared systems, executing mutiple workloads from distinct customers simultaneously on the same system. This technique allows service providers to reduce the maintenance cost of their infrastructure, by sharing the resources at their disposal and therefore maximizing their utilization. However, this assumes that the system is able to prevent arbitrary workloads from having significant impact on other workloads' performance. In this scenario, the operating system's resource multiplexing layer tries to maximize resource consumption, as well as enforcing a fair distribution among users. We refer to those systems as best-effort shared systems. In this work, we show that malicious users may attack a shared system's resources, to significantly reduce the quality of service provided to other concurrent users. This issue of resource control layers in shared systems can be linked to the lack of generic accounting metrics, as well as the natural trade-off that such systems have to make between fairness and performance optimization. We introduce the utilization time as a generic accounting metric, which can be applied to the different resources typically managed by best-effort shared systems. This metric allows us to design a generic, transparent and automated resource control layer, which enables the specification of simple resource management policies centered around fairness and resource consumption maximization. We applied this approach to the swap subsystem, a traditional operating system bottleneck, and implemented a prototype within the Linux kernel. Our results show significative performance enhancements under high memory pressure, for typical workloads of best-effort shared systems. Moreover, our technique bounds the impact of abusive applications on other legit applications, as it naturally reduces uncertainties over execution duration.
67

Analýza úrokových swapů po finanční krizi / Analysis of interest rate swaps after the financial crisis

Lukeš, Filip January 2015 (has links)
The goal of this master thesis is to analyze main changes affecting interest rate swaps in the Czech republic, which took place since 2007, in areas of regulation, valuation of interest rate swaps and negative interest rates. The first part defines derivative and describes sort of derivatives and type of swaps. The second part deals with interest rate swaps, pricing and valuation, and contractual documentation. The third part explains the impact of regulation MiFID I, EMIR and MiFID II on interest rate swaps. The fourth part analyzes changes in interest rate swaps valuation and negative interest rates issues.
68

Debt-Equity-Swap – Anwendung im Insolvenzplanverfahren – Rechtliche und praktische Probleme sowie Bewältigung von Hürden

Obendorf, Martin 21 July 2021 (has links)
Die Arbeit behandelt den Debt-Equity-Swap im Insolvenzplanverfahren. Sie geht dabei besonders auf die rechtlichen und praktischen Hürden des Debt-Equity-Swaps im Insolvenzplanverfahren ein und deren mögliche Bewältigung. Aufgrund der mutmaßlichen geringen Praxisrelevanz wird die Motivation der am Insolvenzplan Beteiligten besprochen. Hierfür beschäftigt sich ein der Teil der Arbeit mit einer Umfrage unter Berater*innen und Insolenzverwalter*innen. Die Arbeit schließt mit Vorschlägen zur Bewältigung von Hürden und einer abschließenden Betrachtung.
69

Deepfake detection by humans : Face swap versus lip sync / Människors förmåga att upptäcka deepfakes : Face swap mot lipsync

Sundström, Isak January 2023 (has links)
The term “deepfakes” refers to media content that has been manipulated using deep learning. This thesis project seeks to answer the question of how well humans are able to detect deepfakes. In particular, the project compares people’s ability to detect deepfakes between two different deepfake categories; face swap and lip sync. In order to achieve this, a perceptual user test was performed, in which 30 participants were given a number of lip sync, face swap and unaltered videos and were asked to classify which of them were unaltered and which of them were manipulated using deepfake technology. These results serve to fill in the gap in knowledge regarding perceptual user tests on deepfakes, for which only a small amount of research has been made. The results also serve to shed light on which types of deepfakes pose the biggest threat regarding the problem of malicious impersonation. The main conclusion from this study was that lip sync is likely harder for humans to detect than face swap. The percentage of correct classifications of lip sync videos was 52.7%, and the percentage of correct classifications of face swap videos was 91.3%. / Deepfakes är videor som har blivit manipulerade med hjälp av deep learning. Detta examensarbete utforskar huvudsakligen två olika kategorier av deepfakes, dessa två är: face swap och lip sync. Syftet med projektet är att svara på frågan: Hur bra är människor på att se om en video innehåller deepfakes eller inte? Dessutom ställs frågan: Vilken typ av deepfake mellan face swap och lip sync är svårare för människor att märka av? För att svara på dessa frågor genomfördes en användarsudie där 30 deltagare fick titta på ett antal lip sync, face swap och icke-manipulerade videor, och fick sedan försöka avgöra vilka av dom som var manipulerade och vilka som inte var manipulerade. Resultaten från den här studien hjälper till att fylla kunskapsklyftan som finns angående människors förmåga att upptäcka deepfakes, där bara en väldigt begränsad mängd studier finns. Resulaten kan också användas för att peka ut på vilka typer av deepfakes som utgör större hot angående lurendrejeri. Slutsatsen från studien var att lip sync är troligtvis svårare för människor att märka av än face swap, eller åtminstone för datasetet FakeAVCeleb. Andelen korrekta gissningar för lip sync videorna i studien var 52.7%, medan andelen korrekta gissningar för face swap var 91.3%.
70

Har kvinnor i styrelsen och CSR-arbete en motverkande effekt på uppkomsten av resultatmanipulering? : En kvantitativ studie om relationen mellan ansvarstagande och resultatmanipulering vid företagsförvärv med stock swap

Ekehov, Petra, Lindgren, Julia January 2017 (has links)
Syfte: Resultatmanipulering är ett opportunistiskt beteende som förekommer i samband med företagsförvärv. Incitament för förvärvande företag att resultatmanipulera kan variera beroende på om det finns motverkande mekanismer i bolagsstyrningen. Forskare har tidigare poängterat att ansvarstagande är en motsats till opportunistiskt beteende och att ansvarstagande är en utmärkande egenskap för kvinnor och något som karaktäriserar CSR-arbete. Syftet med aktuell studie är därför att undersöka om CSR-arbete i bolagsstyrningen och andelen kvinnor i styrelser minskar förekomsten av resultatmanipulering ett år innan ett företagsförvärv med stock swap. Metod: Studien antar ett positivistiskt perspektiv med en hypotetisk-deduktiv ansats. Sekundärdata har inhämtats från databasen Thomson Reuters Eikon och Thomson Reuters Datastream genom ett kvantitativt tillvägagångssätt. En tvärsnittsstudie har designats och urvalet har slutligen analyserats i multipla regressionsanalyser med hjälp av Excel och statistikprogrammet IBM SPSS. Resultat och slutsats: Studien visar att CSR-arbete minskar förekomsten av resultatmanipulering inför företagsförvärv, vilket studiens litteraturundersökning givit anledning att förvänta. Däremot finner vi inget signifikant samband mellan andelen kvinnor i styrelser och resultatmanipulering inför företagsförvärv. Förslag till fortsatt forskning: Studier som undersöker samband mellan CSR och andra opportunistiska beteenden än resultatmanipulering. Vi skulle även önska studier som till större grad tar hänsyn till vikten av antalet kvinnor närvarande i styrelser för att påvisa kvinnors utmärkande egenskaper. Allra helst i samband med incitament för resultatmanipulering. Uppsatsens bidrag: Ur ett teoretiskt perspektiv bidrar denna studie genom att diskutera och empiriskt undersöka samband mellan kvinnor, CSR och resultatmanipulering. Studien bidrar även med ett alternativt sätt att undersöka CSR i kontrast till tidigare forskning som främst använt ESG poäng. Ur ett praktiskt perspektiv bidrar studien med information som kan vara viktig för målföretag som står inför att bli uppköpta och intressenter i analyser av aktievärden. / Aim: Earning management is an opportunistic behavior that occurs in conjunction with acquisitions. Earnings management incentives for acquiring companies may vary depending on whether there are counteracting mechanisms in corporate governance. Researchers have previously pointed out that responsibility is a contradiction to opportunistic behavior and that responsibility is a distinctive feature of women and something that characterizes CSR work. The purpose of the current study is therefore to investigate whether CSR work in corporate governance and the proportion of women in boards reduces the incidence of earning management one year beforea company acquisition with stock swap. Method: The study is based on the philosophy of positivism with a hypothetical deductive approach. Secondary data have been retrieved from the Thomson Reuters Eikon database and Thomson Reuters DataStream database through a quantitative approach. A cross-sectional design isused and the sample has been analyzed in multiple regression using Excel and the IBM SPSS statistics program. Result & Conclusions: The study shows that CSR work reduces the incidence of earning manipulation prior to acquisitions, which the study's literature survey gave reason to expect. However, we do not find a significant relation between women in boards and earning management prior to company acquisitions. Suggestions for future research: Studies that investigate the relationship between CSR and other opportunistic behaviors than earning management. We would also liketo see studies that take greater account of the importance of the number of women presented in boards to show women's distinctive qualities. Mainly in connection with incentives for earning management. Contribution of the thesis: From a theoretical perspectivethis study contributes by discussing and empirically investigating relationships between women, CSR and earning management. The study also contributes with an alternative way of investigating CSR in contrast to previous researchthat is primarily using ESG points. From a practical perspective, the study contributes with information that may be important for target companies that are facing acquisitions and stakeholders in stock value analysis.

Page generated in 0.0393 seconds