Auswahl der wissenschaftlichen Literatur zum Thema „Fragmentation (informatique)“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Fragmentation (informatique)" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Fragmentation (informatique)"
Chan, Andy Lung Jan. „Education, Experience and Translator Certification as Signaling Mechanisms“. FORUM / Revue internationale d’interprétation et de traduction / International Journal of Interpretation and Translation 8, Nr. 1 (01.04.2010): 37–54. http://dx.doi.org/10.1075/forum.8.1.02cha.
Der volle Inhalt der QuelleChen, Daniel, und Darrell Duffie. „Market Fragmentation“. American Economic Review 111, Nr. 7 (01.07.2021): 2247–74. http://dx.doi.org/10.1257/aer.20200829.
Der volle Inhalt der Quellevan Veelen, P. A., U. R. Tjaden und J. van der Greef. „Sequence-informative fragmentation in 252Cf-plasma desorption mass-spectrometry“. Journal of Controlled Release 21, Nr. 1-3 (Juli 1992): 201. http://dx.doi.org/10.1016/0168-3659(92)90023-k.
Der volle Inhalt der QuelleHaselmann, K. F., B. A. Budnik, F. Kjeldsen, M. L. Nielsen, J. V. Olsen und R. A. Zubarev. „Electronic Excitation Gives Informative Fragmentation of Polypeptide Cations and Anions“. European Journal of Mass Spectrometry 8, Nr. 2 (April 2002): 117–21. http://dx.doi.org/10.1255/ejms.479.
Der volle Inhalt der QuelleVaidogas, Egidijus Rytas. „Bayesian Processing of Data on Bursts of Pressure Vessels“. Information Technology and Control 50, Nr. 4 (16.12.2021): 607–26. http://dx.doi.org/10.5755/j01.itc.50.4.29690.
Der volle Inhalt der QuelleDong, Yalun, Martina Jelocnik, Amber Gillett, Ludovica Valenza, Gabriel Conroy, Dominique Potvin und Renfu Shao. „Mitochondrial Genome Fragmentation Occurred Multiple Times Independently in Bird Lice of the Families Menoponidae and Laemobothriidae“. Animals 13, Nr. 12 (20.06.2023): 2046. http://dx.doi.org/10.3390/ani13122046.
Der volle Inhalt der Quellevan Veelen, P. A., U. R. Tjaden, J. van der Greef und N. D. de With. „Sequence-Informative fragmentation in an 8.9 kDa oligopeptide using plasma desorption mass spectrometry“. Organic Mass Spectrometry 26, Nr. 4 (April 1991): 345–46. http://dx.doi.org/10.1002/oms.1210260429.
Der volle Inhalt der QuelleZauner, Gerhild, Radoslaw P. Kozak, Richard A. Gardner, Daryl L. Fernandes, André M. Deelder und Manfred Wuhrer. „Protein O-glycosylation analysis“. Biological Chemistry 393, Nr. 8 (01.08.2012): 687–708. http://dx.doi.org/10.1515/hsz-2012-0144.
Der volle Inhalt der QuelleKong, Feng, Shao Sun und Yifei Wang. „Comprehensive Understanding the Disaster-Causing Mechanism, Governance Dilemma and Targeted Countermeasures of Urban Pluvial Flooding in China“. Water 13, Nr. 13 (25.06.2021): 1762. http://dx.doi.org/10.3390/w13131762.
Der volle Inhalt der QuelleNishikaze, Takashi. „Sensitive and Structure-Informative N-Glycosylation Analysis by MALDI-MS; Ionization, Fragmentation, and Derivatization“. Mass Spectrometry 6, Nr. 1 (2017): A0060. http://dx.doi.org/10.5702/massspectrometry.a0060.
Der volle Inhalt der QuelleDissertationen zum Thema "Fragmentation (informatique)"
Ranéa, Pierre-Guy. „La tolérance aux intrusions par fragmentation-dissémination“. Toulouse, INPT, 1989. http://www.theses.fr/1989INPT007H.
Der volle Inhalt der QuelleKapusta, Katarzyna. „Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment“. Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.
Der volle Inhalt der QuelleThis thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and cost-efficient. The main focus is put on increasing data confidentiality without deteriorating the processing performance. The ultimate goal is to provide a user with a set of fast fragmentation methods that could be directly applied inside an industrial context to reinforce the confidentiality of the stored data and/or accelerate the fragmentation processing. First, a rich survey on fragmentation as a way of preserving data confidentiality is presented. Second, the family of all-or-nothing transforms is extended with three new proposals. They all aim at protecting encrypted and fragmented data against the exposure of the encryption key but are designed to be employed in three different contexts: for data fragmentation in a multi-cloud environment, a distributed storage system, and an environment composed of one storage provider and one private device. Third, a way of accelerating fragmentation is presented that achieves better performance than data encryption using the most common symmetric-key encryption algorithm. Fourth, a lightweight fragmentation scheme based on data encoding, permuting, and dispersing is introduced. It totally gets rid of data encryption allowing the fragmentation to be performed even faster; up to twice as fast as data encryption. Finally, fragmentation inside sensor networks is revisited, particularly in the Unattended Wireless Sensor Networks. The main focus in this case is put not solely on the fragmentation performance, but also on the reduction of storage and transmission costs by using data aggregation
Trouessin, Gilles. „Traitements fiables de données confidentielles par fragmentation-redondance-dissémination“. Toulouse 3, 1991. http://www.theses.fr/1991TOU30260.
Der volle Inhalt der QuelleLin, Ping. „Commande adaptative et régulation automatique d'une unité de broyage du cru en cimenterie“. Lyon, INSA, 1992. http://www.theses.fr/1992ISAL0003.
Der volle Inhalt der QuelleIn cement manufactory, the raw material blending process, between prehomogeneization silo and clinker kiln, is a multivariable system (several raw materials in use) and coupled with considerable time delay due toX-ray fluorescence analyser. The main goal of blending control is to maintain close to the standard value and to decrease the variance of chemical composition (in terms of composition moduli) of the raw meal by using correcting products. The proposed control strategy consists of four parts: (1) a multivariable predictive control system based on an internai madel; (2) an adaptive control due to on-line estimation for chemical composition of the raw materials; (3) an optimization unit to minimize a qualitycost cri teri on; ( 4) a self-adjustment function of reference values for the special batch process. In order to improve the control performance, an heuristic adaptive supervision is developped to adjust the regulator parameters in lower level. The proposed control policy bas been applied to cement plants of Lafarge Coppée
Minier, Josselin. „Fragmentation cognitive/informatique de la musique populaire amplifiée : construction d'un système numérique dirigé par une notion de simulacre cinétique“. Paris 1, 2011. http://www.theses.fr/2011PA010678.
Der volle Inhalt der QuelleNicolas, Jean-Christophe. „Machines bases de données parallèles : contribution aux problèmes de la fragmentation et de la distribution“. Lille 1, 1991. http://www.theses.fr/1991LIL10025.
Der volle Inhalt der QuelleQiu, Han. „Une architecture de protection des données efficace basée sur la fragmentation et le cryptage“. Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Der volle Inhalt der QuelleIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Cherrueau, Ronan-Alexandre. „Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage“. Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Der volle Inhalt der QuelleA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Lecler, Philippe. „Une approche de la programmation des systèmes distribués fondée sur la fragmentation des données et des calculs et sa mise en oeuvre dans le système GOTHIC“. Rennes 1, 1989. http://www.theses.fr/1989REN10103.
Der volle Inhalt der QuelleBenkrid, Soumia. „Le déploiement, une phase à part entière dans le cycle de vie des entrepôts de données : application aux plateformes parallèles“. Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2014. http://www.theses.fr/2014ESMA0027/document.
Der volle Inhalt der QuelleDesigning a parallel data warehouse consists of choosing the hardware architecture, fragmenting the data warehouse schema, allocating the generated fragments, replicating fragments to ensure high system performance and defining the treatment strategy and load balancing.The major drawback of this design cycle is its ignorance of the interdependence between subproblems related to the design of PDW and the use of heterogeneous metrics to achieve thesame goal. Our first proposal defines an analytical cost model for parallel processing of OLAP queries in a cluster environment. Our second takes into account the interdependence existing between fragmentation and allocation. In this context, we proposed a new approach to designa PDW on a cluster machine. During the fragmentation process, our approach determines whether the fragmentation pattern generated is relevant to the allocation process or not. The results are very encouraging and validation is done on Teradata. For our third proposition, we presented a design method which is an extension of our work. In this phase, an original method of replication, based on fuzzy logic is integrated
Bücher zum Thema "Fragmentation (informatique)"
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Den vollen Inhalt der Quelle findenCavelty, Myriam Dunn, und Andreas Wenger. Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Den vollen Inhalt der Quelle findenConvergence and Fragmentation: Media Technology and the Information Society (IB-Changing Media, Changing Europe). Intellect Ltd, 2008.
Den vollen Inhalt der Quelle findenAbril, Gonzalo. Cortar Y Pegar/ Cut and Paste: La Fragmentacion Visual En Los Origenes Del Texto Informativo / The Visual Fragmentation in the Origins of Informative Text (Signo E Imagen / Sign and Image). Catedra, 2003.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Fragmentation (informatique)"
van Veelen, P. A., U. R. Tjaden, J. van der Greef, H. J. Vorst und M. W. E. M. van Tilborg. „Sequence Informative Fragmentation in 252Cf Plasma Desorption Mass Spectrometry“. In NATO ASI Series, 67–72. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4684-7926-3_9.
Der volle Inhalt der QuelleMohanty, Srutisudha, Jagabandhu Panda und Sudhansu S. Rath. „Geospatial Technology in Urban Sprawl Assessment“. In Methods and Applications of Geospatial Technology in Sustainable Urbanism, 1–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2249-3.ch001.
Der volle Inhalt der QuelleNetherton, Jason. „Postscript“. In Advances in Social Networking and Online Communities, 395–400. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5206-4.ch023.
Der volle Inhalt der QuelleBrian Langerhans, R., und Elizabeth M. A. Kern. „Urbanization and Evolution in Aquatic Environments“. In Urban Evolutionary Biology, 157–74. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198836841.003.0011.
Der volle Inhalt der Quelle