• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 4
  • 1
  • 1
  • Tagged with
  • 16
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Attentional processes in reading : persistent priming effects from unattended words

Jennings, G. D. J. January 1986 (has links)
No description available.
2

Evaluating Unattended Technology, a Subset of Calm Technology

Levin, Vladimir January 2008 (has links)
Information is a central theme of the twenty-first century. This is evident in the fact that everyday objects are being augmented to provide information. Thus, ubiquitous computing – providing information using everyday objects – becomes increasingly popular. The problem is that information requires attention for acquisition. Hence, ubiq- uitous computing puts a strain on attention, which is limited. There are many innovations that attempt to solve this problem; this thesis focusses on one: calm technology, which was introduced to interface design by Mark Weiser. Calm tech- nology attempts to reduce the attention required to acquire information. Ideally, calm technology would provide information without requiring any attention. I call this technology unattended. Calm technology research, however, typically provides little evidence showing that calm artifacts reduce the amount of attention required. Moreover, evaluations that are conducted on individual artifacts often fail to generalize. That is, evalua- tions only apply to the artifact that is evaluated. They do not identify properties of the artifact that make it calm. In this thesis, I design and conduct a dual task experiment. The results of the experiment indicate that users can perform an attention saturating primary task, and acquire information from a calm artifact not involved in the task, without sacrificing performance on the primary task. Thus, the artifact does not require any attention, as can be measured by the experiment, while providing information. Thus, the artifact is unattended, which provides an existence proof for unattended technology.
3

Evaluating Unattended Technology, a Subset of Calm Technology

Levin, Vladimir January 2008 (has links)
Information is a central theme of the twenty-first century. This is evident in the fact that everyday objects are being augmented to provide information. Thus, ubiquitous computing – providing information using everyday objects – becomes increasingly popular. The problem is that information requires attention for acquisition. Hence, ubiq- uitous computing puts a strain on attention, which is limited. There are many innovations that attempt to solve this problem; this thesis focusses on one: calm technology, which was introduced to interface design by Mark Weiser. Calm tech- nology attempts to reduce the attention required to acquire information. Ideally, calm technology would provide information without requiring any attention. I call this technology unattended. Calm technology research, however, typically provides little evidence showing that calm artifacts reduce the amount of attention required. Moreover, evaluations that are conducted on individual artifacts often fail to generalize. That is, evalua- tions only apply to the artifact that is evaluated. They do not identify properties of the artifact that make it calm. In this thesis, I design and conduct a dual task experiment. The results of the experiment indicate that users can perform an attention saturating primary task, and acquire information from a calm artifact not involved in the task, without sacrificing performance on the primary task. Thus, the artifact does not require any attention, as can be measured by the experiment, while providing information. Thus, the artifact is unattended, which provides an existence proof for unattended technology.
4

Event-Related Potentials in Global-Local Processing: Lateralization, Parallel Processing and the Effect of Unattended Variability / Processing of Global and Local Stimuli: an ERP Study

Evans, Maureen 09 1900 (has links)
An object in the visual field can be perceived as a whole and as the parts from which the whole is composed. Early investigations into whole-part processing led to the hypothesis that the global aspect, the whole, is processed before the local aspects, the parts. However, recent electrophysiological work shows that in the early stages of processing, the global and local levels of an object are processed in parallel. In addition, a processing asymmetry exists in that the right hemisphere is biased for global level processing whereas the left hemisphere is biased for local level processing. In an ERP study, I examined the lateralization and time-course of global-local processing in normal adult humans and found further evidence for lateralized, parallel processing of global-local stimuli. More importantly, I found that task demands affected the latencies at which lateralized differences between the two levels emerged: a condition in which interference from one level on the other was minimal showed very early, lateralized attentional effects (80 ms). In a relatively more demanding condition, lateralization of global and local processing was not evident until 200-350 ms. One possible explanation is that as the influence of distractors at the unattended level increases, resources in both hemispheres are engaged. To corroborate these findings, I included conditions in which subjects were required to switch attention among levels and visual fields: Evidence for lateralization and parallel processing persisted. Moreover, the additional load placed on the system by the switching conditions was apparent at the N1 component and support for right hemisphere attention switching mechanisms was obtained. / Thesis / Master of Science (MSc)
5

Möjligheter att skapa en virtualiserad utvecklingsmiljö för Windows

Norfelt, Erik January 2007 (has links)
<p>Arbetet syftar till att undersöka förutsättningarna för att skapa en virtualiserad utvecklingsmiljö för Windows som installeras och konfigureras utan manuell övervakning. Utvecklare på Sandvik Systems Development (SSD) arbetar ofta med olika utvecklingsverktyg eller använder sig av olika versioner av utvecklingsmiljöer och detta är ett problem. Det är också vanligt att utvecklarna blandar sina kontorsapplikationer med utvecklingsmiljön vilket kan vara en stor säkerhetsrisk. Ett annat stort problem är att tiden kan vara väldigt lång för inhyrda konsulter och nyanställda att få sina utvecklingsmiljöer installerade, vilket resulterar i stora kostnader för SSD. En möjlig lösning till problemen är att använda virtuella maskiner som utvecklingsmiljöer. Arbetet undersöker om det är möjligt att m.h.a. en applikation skapa, installera och konfigurera virtuella maskiner och utvecklingsmiljöer automatiskt. Målmiljön för de virtuella maskinerna är programvarorna WMware Workstation och Virtual PC. Arbetet förklarar även hur virtuella maskiner kan vara till hjälp vid mjukvaruutveckling. Detta arbete visar att det är möjligt att skapa en virtualiserad utvecklingsmiljö som med vissa restriktioner installeras och konfigureras automatiskt.</p>
6

Data Security in Unattended Wireless Sensor Networks

Vepanjeri Lokanadha Reddy, Sasi Kiran 14 January 2013 (has links)
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
7

Data Security in Unattended Wireless Sensor Networks

Vepanjeri Lokanadha Reddy, Sasi Kiran 14 January 2013 (has links)
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
8

Möjligheter att skapa en virtualiserad utvecklingsmiljö för Windows

Norfelt, Erik January 2007 (has links)
Arbetet syftar till att undersöka förutsättningarna för att skapa en virtualiserad utvecklingsmiljö för Windows som installeras och konfigureras utan manuell övervakning. Utvecklare på Sandvik Systems Development (SSD) arbetar ofta med olika utvecklingsverktyg eller använder sig av olika versioner av utvecklingsmiljöer och detta är ett problem. Det är också vanligt att utvecklarna blandar sina kontorsapplikationer med utvecklingsmiljön vilket kan vara en stor säkerhetsrisk. Ett annat stort problem är att tiden kan vara väldigt lång för inhyrda konsulter och nyanställda att få sina utvecklingsmiljöer installerade, vilket resulterar i stora kostnader för SSD. En möjlig lösning till problemen är att använda virtuella maskiner som utvecklingsmiljöer. Arbetet undersöker om det är möjligt att m.h.a. en applikation skapa, installera och konfigurera virtuella maskiner och utvecklingsmiljöer automatiskt. Målmiljön för de virtuella maskinerna är programvarorna WMware Workstation och Virtual PC. Arbetet förklarar även hur virtuella maskiner kan vara till hjälp vid mjukvaruutveckling. Detta arbete visar att det är möjligt att skapa en virtualiserad utvecklingsmiljö som med vissa restriktioner installeras och konfigureras automatiskt.
9

Optical Communication Using Hybrid Micro Electro Mechanical Structures (MEMS) and Commercial Corner Cube Retroreflector (CCR)

Kedia, Sunny 19 November 2015 (has links)
This dissertation presents a free-space, long-range, passive optical communication system that uses electrostatically modulated microelectromechanical systems (MEMS) structures coupled with a glass total internal reflection (TIR)-type corner cube retroreflector (CCR) as a non-emitting data transmitter. A CCR consists of three mirrors orthogonal to each other, so that the incident beam is reflected back to the incident beam, source. The operational concept is to have a MEMS modulator fusion with TIR CCR, such that the modulators are working periodically to disrupt the evanescent waves at the air interface of one of the three back glass faces of a TIR CCR. The MEMS chip has two primary components: (1) an array of movable light scattering silicon structures with nano roughness and (2) a glass lid with a transparent conductive indium tin oxide (ITO) film. The MEMS structures are bonded to a glass lid using flip-chip bonding. Once bonded, the MEMS structures can be modulated either toward or away from the glass lid, thus disrupting evanescent energy delivered from a probing laser beam. The MEMS structure is precisely bonded to the TIR CCR with an accuracy of 10-30 arc-seconds using a Michelson interferometry feedback system. This is a novel step by which an existing passive commercial CCR can be converted into a modulating active CCR. This CCR-MEMS unit acts as the key element of the transmitter. To illustrate the concept of a low-power, unattended, sensor-monitoring system, we developed a sensor board containing temperature, humidity, and magnetic sensors along with a microprocessor and other electronics. The sensor board and CCR board are packed together and act as the transmitter unit. We developed a benchtop system and an improved portable receiver system. The receiver system contains the laser (as source), a collimating lens (to collect retroreflected signal), an optical, narrow band pass filter, and a detector. The detector signal was amplified and filtered and sent either to the oscilloscope, a lock-in-amplifier, or a laptop to display the sensor data. Using the receiver system, a sensor-CCR-based transmitter unit, and receiver with 635 nm as source, we achieved retroreflective communication over a distance of 300 m.
10

Data Security in Unattended Wireless Sensor Networks

Vepanjeri Lokanadha Reddy, Sasi Kiran January 2013 (has links)
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.

Page generated in 0.077 seconds