Dissertationen zum Thema „Programming functions“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Programming functions" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Christiansen, Jan [Verfasser]. „Investigating Minimally Strict Functions in Functional Programming / Jan Christiansen“. Kiel : Universitätsbibliothek Kiel, 2012. http://d-nb.info/1024079805/34.
Der volle Inhalt der QuelleSharifi, Mokhtarian Faranak. „Mathematical programming with LFS functions“. Thesis, McGill University, 1992. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=56762.
Der volle Inhalt der QuelleTrujillo-Cortez, Refugio. „LFS functions in stable bilevel programming“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ37171.pdf.
Der volle Inhalt der QuelleAhluwalia, Manu. „Co-evolving functions in genetic programming“. Thesis, University of the West of England, Bristol, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.322427.
Der volle Inhalt der QuelleStark, Ian David Bede. „Names and higher-order functions“. Thesis, University of Cambridge, 1994. https://www.repository.cam.ac.uk/handle/1810/251879.
Der volle Inhalt der QuelleShapiro, David. „Compiling Evaluable Functions in the Godel Programming Language“. PDXScholar, 1996. https://pdxscholar.library.pdx.edu/open_access_etds/5101.
Der volle Inhalt der QuelleEdwards, Teresa Dawn. „The box method for minimizing strictly convex functions over convex sets“. Diss., Georgia Institute of Technology, 1990. http://hdl.handle.net/1853/30690.
Der volle Inhalt der QuelleChen, Jein-Shan. „Merit functions and nonsmooth functions for the second-order cone complementarity problem /“. Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/5782.
Der volle Inhalt der QuelleFerris, Michael Charles. „Weak sharp minima and penalty functions in mathematical programming“. Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.292969.
Der volle Inhalt der QuelleSchanzer, Emmanuel Tanenbaum. „Algebraic Functions, Computer Programming, and the Challenge of Transfer“. Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:16461037.
Der volle Inhalt der QuelleEducation Policy, Leadership, and Instructional Practice
How, Tia Wah King Sing. „Fault coupling in finite functions“. Thesis, London South Bank University, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.261314.
Der volle Inhalt der QuelleSibson, Keith. „Programming language abstractions for the global network“. Thesis, University of Glasgow, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368587.
Der volle Inhalt der QuelleJones, Julia E. „Microcomputer programming package for the assessment of multiattribute value functions“. Thesis, Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/51893.
Der volle Inhalt der QuelleMaster of Science
Hamdan, Mohammad M. „A combinational framework for parallel programming using algorithmic skeletons“. Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/567.
Der volle Inhalt der QuelleDaniels, Anthony Charles. „A semantics for functions and behaviours“. Thesis, University of Kent, 1999. https://kar.kent.ac.uk/21730/.
Der volle Inhalt der QuelleLewis, Ian. „PrologPF : parallel logic and functions on the Delphi machine“. Thesis, University of Cambridge, 1998. https://www.repository.cam.ac.uk/handle/1810/221792.
Der volle Inhalt der QuelleLin, Chin-Yee. „Interior point methods for convex optimization“. Diss., Georgia Institute of Technology, 1995. http://hdl.handle.net/1853/15044.
Der volle Inhalt der QuelleTanksley, Latriece Y. „Interior point methods and kernel functions of a linear programming problem“. Click here to access thesis, 2009. http://www.georgiasouthern.edu/etd/archive/spring2009/latriece_y_tanksley/tanksley_latriece_y_200901_ms.pdf.
Der volle Inhalt der Quelle"A thesis submitted to the Graduate Faculty of Georgia Southern University in partial fulfillment of the requirements for the degree Master of Science." Directed by Goran Lesaja. ETD. Includes bibliographical references (p. 76) and appendices.
Vorvick, Janet. „Evaluable Functions in the Godel Programming Language: Parsing and Representing Rewrite Rules“. PDXScholar, 1995. https://pdxscholar.library.pdx.edu/open_access_etds/5195.
Der volle Inhalt der QuelleJung, Hoon. „Optimal inventory policies for an economic order quantity models under various cost functions /“. free to MU campus, to others for purchase, 2001. http://wwwlib.umi.com/cr/mo/fullcit?p3012983.
Der volle Inhalt der QuelleMarinósson, Sigurour Freyr. „Stability analysis of nonlinear systems with linear programming a Lyapunov functions based approach /“. [S.l.] : [s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=982323697.
Der volle Inhalt der QuelleOtero, Fernando E. B. „New ant colony optimisation algorithms for hierarchial classification of protein functions“. Thesis, University of Kent, 2010. http://www.cs.kent.ac.uk/pubs/2010/3057.
Der volle Inhalt der QuelleVandenbussche, Dieter. „Polyhedral approaches to solving nonconvex quadratic programs“. Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/23385.
Der volle Inhalt der QuelleGatica, Ricardo A. „A binary dynamic programming problem with affine transitions and reward functions : properties and algorithm“. Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/32839.
Der volle Inhalt der QuelleOlivier, Hannes Friedel. „The expected runtime of the (1+1) evolutionary algorithm on almost linear functions“. Virtual Press, 2006. http://liblink.bsu.edu/uhtbin/catkey/1356253.
Der volle Inhalt der QuelleDepartment of Computer Science
Vargyas, Emese Tünde. „Duality for convex composed programming problems“. Doctoral thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401793.
Der volle Inhalt der QuelleIn dieser Arbeit wird, anhand der sogenannten konjugierten Dualitätstheorie, ein allgemeines Dualitätsverfahren für die Untersuchung verschiedener Optimierungsaufgaben dargestellt. Um dieses Ziel zu erreichen wird zuerst eine allgemeine Optimierungsaufgabe betrachtet, wobei sowohl die Zielfunktion als auch die Nebenbedingungen zusammengesetzte Funktionen sind. Mit Hilfe der konjugierten Dualitätstheorie, die auf der sogenannten Störungstheorie basiert, werden für die primale Aufgabe drei verschiedene duale Aufgaben konstruiert und weiterhin die Beziehungen zwischen deren optimalen Zielfunktionswerten untersucht. Unter geeigneten Konvexitäts- und Monotonievoraussetzungen wird die Gleichheit dieser optimalen Zielfunktionswerte und zusätzlich die Existenz der starken Dualität zwischen der primalen und den entsprechenden dualen Aufgaben bewiesen. In Zusammenhang mit der starken Dualität werden Optimalitätsbedingungen hergeleitet. Die Ergebnisse werden abgerundet durch die Betrachtung zweier Spezialfälle, nämlich die klassische restringierte bzw. unrestringierte Optimierungsaufgabe, für welche sich die aus der Literatur bekannten Dualitätsergebnisse ergeben. Der zweite Teil der Arbeit ist der Dualität bei Standortproblemen gewidmet. Dazu wird ein sehr allgemeines Standortproblem mit konvexer zusammengesetzter Zielfunktion in Form eines Gauges formuliert, für das die entsprechenden Dualitätsaussagen abgeleitet werden. Als Spezialfälle werden Optimierungsaufgaben mit monotonen Normen betrachtet. Insbesondere lassen sich Dualitätsaussagen und Optimalitätsbedingungen für das klassische Weber und Minmax Standortproblem mit Gauges als Zielfunktion herleiten. Das letzte Kapitel verallgemeinert die Dualitätsaussagen, die im zweiten Kapitel erhalten wurden, auf multikriterielle Optimierungsprobleme. Mit Hilfe geeigneter Skalarisierungen betrachten wir zuerst ein zu der multikriteriellen Optimierungsaufgabe zugeordnetes skalares Problem. Anhand der in diesem Fall erhaltenen Optimalitätsbedingungen formulieren wir das multikriterielle Dualproblem. Weiterhin beweisen wir die schwache und, unter bestimmten Annahmen, die starke Dualität. Durch Spezialisierung der Zielfunktionen bzw. Nebenbedingungen resultieren die klassischen konvexen Mehrzielprobleme mit Ungleichungs- und Mengenrestriktionen. Als weitere Anwendungen werden vektorielle Standortprobleme betrachtet, zu denen wir entsprechende duale Aufgaben formulieren
Arvidsson, Staffan. „Actors and higher order functions : A Comparative Study of Parallel Programming Language Support for Bioinformatics“. Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-242739.
Der volle Inhalt der QuelleHall, Bryan, University of Western Sydney und of Science Technology and Environment College. „Energy and momentum conservation in Bohm's Model for quantum mechanics“. THESIS_CSTE_XXX_Hall_B.xml, 2004. http://handle.uws.edu.au:8081/1959.7/717.
Der volle Inhalt der QuelleDoctor of Philosphy (PhD)
Gerard, Ulysse. „Computing with relations, functions, and bindings“. Thesis, Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAX005.
Der volle Inhalt der QuelleThe present document pursues the decades-long study of the interactions between mathematical logic and functional computation, and more specifically of declarative programming. This thesis is divided into two main contributions. Each one of those make use of modern proof theory results to design new ways to compute with relations and with functions. The first contribution of this work is the description and formalization of a new technique that leverages the focusing mechanism (a way to guide proof-search) to reveal functional computation concealed in deductive proofs. To that extent we formulate a focused sequent calculus proof system for Heyting arithmetic where fixed points and term equality are logical connectives and describe a means to always drive singleton predicates into negative phases of the proof, thus identifying them with functional computation. This method does not extend the underlying logic in any way: no choice principle nor equality theory nor rewriting rules are needed. As a result, our logic remains purely relational even when it is computing functions. The second contribution of this thesis is the design of a new functional programming language: MLTS. Again, we make use of recent work in logic: the semantics of MLTS is a theory inside G-logic, the reasoning logic of the Abella interactive theorem prover. G-logic uses a specific operator: Nabla, a fresh-name quantifier which allows for a natural treatment of proofs over structures with bindings based on the natural handling of bindings of the sequent calculus. The syntax of MLTS is based on the programming language OCaml but provides additional sites so that term-level bindings can move to programming level bindings. Moreover, all operations on syntax respect alpha-beta-conversion. Together these two tenets form the lambda-tree syntax approach to bindings. The resulting language was given a prototype implementation that anyone can conveniently try online (https://trymlts.github.io)
Coffin, Lorraine. „The effect of hemisphericity and field dependence on performance on a programming task /“. Thesis, McGill University, 1985. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59249.
Der volle Inhalt der QuelleAltner, Douglas S. „Advancements on problems involving maximum flows“. Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24828.
Der volle Inhalt der QuelleCommittee Chair: Ozlem Ergun; Committee Member: Dana Randall; Committee Member: Joel Sokol; Committee Member: Shabbir Ahmed; Committee Member: William Cook.
Hall, Bryan. „Energy and momentum conservation in Bohm's Model for quantum mechanics“. View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20040507.155043/index.html.
Der volle Inhalt der QuelleLin, Chungping. „The RMT (Recursive multi-threaded) tool: A computer aided software engineeering tool for monitoring and predicting software development progress“. CSUSB ScholarWorks, 1998. https://scholarworks.lib.csusb.edu/etd-project/1787.
Der volle Inhalt der QuelleBarry, Bobbi J. „Needed Narrowing as the Computational Strategy of Evaluable Functions in an Extension of Goedel“. PDXScholar, 1996. https://pdxscholar.library.pdx.edu/open_access_etds/4915.
Der volle Inhalt der QuelleBradley, Jay. „Reinforcement learning for qualitative group behaviours applied to non-player computer game characters“. Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4784.
Der volle Inhalt der QuelleHarper, Robin Thomas Ross Computer Science & Engineering Faculty of Engineering UNSW. „Enhancing grammatical evolution“. Awarded by:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44843.
Der volle Inhalt der QuelleRODRIGUES, JUNIOR ORLANDO. „Aplicacao de modelos metabolicos para a determinacao de funcoes de excrecao e retencao“. reponame:Repositório Institucional do IPEN, 1994. http://repositorio.ipen.br:8080/xmlui/handle/123456789/10344.
Der volle Inhalt der QuelleMade available in DSpace on 2014-10-09T14:03:23Z (GMT). No. of bitstreams: 1 02232.pdf: 3951264 bytes, checksum: dbd0c0050958a2578e3ec58da9f6ac83 (MD5)
Dissertacao (Mestrado)
IPEN/D
Instituto de Pesquisas Energeticas e Nucleares - IPEN/CNEN-SP
Akteke-ozturk, Basak. „New Approaches To Desirability Functions By Nonsmooth And Nonlinear Optimization“. Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612649/index.pdf.
Der volle Inhalt der Quelles desirability functions being used throughout this thesis are still the most preferred ones in practice and many other versions are derived from these. On the other hand, they have a drawback of containing nondifferentiable points and, hence, being nonsmooth. Current approaches to their optimization, which are based on derivative-free search techniques and modification of the functions by higher-degree polynomials, need to be diversified considering opportunities offered by modern nonlinear (global) optimization techniques and related softwares. A first motivation of this work is to develop a new efficient solution strategy for the maximization of overall desirability functions which comes out to be a nonsmooth composite constrained optimization problem by nonsmooth optimization methods. We observe that individual desirability functions used in practical computations are of mintype, a subclass of continuous selection functions. To reveal the mechanism that gives rise to a variation in the piecewise structure of desirability functions used in practice, we concentrate on a component-wise and generically piecewise min-type functions and, later on, max-type functions. It is our second motivation to analyze the structural and topological properties of desirability functions via piecewise max-type functions. In this thesis, we introduce adjusted desirability functions based on a reformulation of the individual desirability functions by a binary integer variable in order to deal with their piecewise definition. We define a constraint on the binary variable to obtain a continuous optimization problem of a nonlinear objective function including nondifferentiable points with the constraints of bounds for factors and responses. After describing the adjusted desirability functions on two well-known problems from the literature, we implement modified subgradient algorithm (MSG) in GAMS incorporating to CONOPT solver of GAMS software for solving the corresponding optimization problems. Moreover, BARON solver of GAMS is used to solve these optimization problems including adjusted desirability functions. Numerical applications with BARON show that this is a more efficient alternative solution strategy than the current desirability maximization approaches. We apply negative logarithm to the desirability functions and consider the properties of the resulting functions when they include more than one nondifferentiable point. With this approach we reveal the structure of the functions and employ the piecewise max-type functions as generalized desirability functions (GDFs). We introduce a suitable finite partitioning procedure of the individual functions over their compact and connected interval that yield our so-called GDFs. Hence, we construct GDFs with piecewise max-type functions which have efficient structural and topological properties. We present the structural stability, optimality and constraint qualification properties of GDFs using that of max-type functions. As a by-product of our GDF study, we develop a new method called two-stage (bilevel) approach for multi-objective optimization problems, based on a separation of the parameters: in y-space (optimization) and in x-space (representation). This approach is about calculating the factor variables corresponding to the ideal solutions of each individual functions in y, and then finding a set of compromised solutions in x by considering the convex hull of the ideal factors. This is an early attempt of a new multi-objective optimization method. Our first results show that global optimum of the overall problem may not be an element of the set of compromised solution. The overall problem in both x and y is extended to a new refined (disjunctive) generalized semi-infinite problem, herewith analyzing the stability and robustness properties of the objective function. In this course, we introduce the so-called robust optimization of desirability functions for the cases when response models contain uncertainty. Throughout this thesis, we give several modifications and extensions of the optimization problem of overall desirability functions.
Lee, Robert. „Teaching Algebra through Functional Programming:An Analysis of the Bootstrap Curriculum“. BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3519.
Der volle Inhalt der QuelleDurier, Adrien. „Unique solution techniques for processes and functions“. Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEN016.
Der volle Inhalt der QuelleThe bisimulation proof method is a landmark of the theory of concurrency and programming languages: it is a proof technique used to establish that two programs, or two distributed protocols, are equal, meaning that they can be freely substituted for one another without modifying the global observable behaviour. Such proofs are often difficult and tedious; hence, many proof techniques have been proposed to enhance this method, simplifying said proofs. We study such a technique based on ’unique solution of equations’. In order to prove that two programs are equal, we show that they are solution of the same recursive equation, as long as the equation has the ’unique solution property’: two of its solutions are always equal. We propose a guarantee to ensure that such equations do have a unique solution. We test this technique against a long- standing open problem: the problem of full abstraction for Milner’s encoding of the call-by-value λ-calculus in the π-calculus
La bisimulazione è una tecnica di prova fondamentale in teoria della concorrenza e dei linguaggi di programmazione. Questa tecnica viene usata per dimostrare che due programmi, o due protocolli distribuiti, sono uguali, nel senso che l’uno puòsostituire l’altro senza modificare il comportamento globale del sistema. Le prove di bisimulazione sono spesso difficili e tecnicamente pesanti. Per questa ragione, varie tecniche di prova sono state introdotte per facilitare le prove di bisimulazione.In questo documento viene studiata tale tecnica, che sfrutta l’unicità delle soluzioni di equazioni. Per dimostrare che due programmi sono uguali, si stabilisce che sono soluzioni della stessa equazione ricorsiva, dal momento in cuil’equazione soddisfa una proprietà di “unicità delle soluzioni”: ogni due soluzioni di questa equazione sono uguali. Questa tecnica viene usata per rispondere alla questione della full abstraction per l’encodaggio del _-calcolo in call-by-value nel_-calcolo, proposto inizialmente da R. Milner
Cheon, Myun-Seok. „Global Optimization of Monotonic Programs: Applications in Polynomial and Stochastic Programming“. Diss., Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-04152005-130317/unrestricted/Cheon%5FMyunSeok%5F200505%5Fphd.pdf.
Der volle Inhalt der QuelleBarnes, Earl, Committee Member ; Shapiro, Alex, Committee Member ; Realff, Matthew, Committee Member ; Al-Khayyal, Faiz, Committee Chair ; Ahmed, Shabbir, Committee Co-Chair. Includes bibliographical references.
Widera, Paweł. „Automated design of energy functions for protein structure prediction by means of genetic programming and improved structure similarity assessment“. Thesis, University of Nottingham, 2010. http://eprints.nottingham.ac.uk/11394/.
Der volle Inhalt der QuellePotaptchik, Marina. „Portfolio Selection Under Nonsmooth Convex Transaction Costs“. Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/2940.
Der volle Inhalt der QuelleDue to the special structure, this problem can be replaced by an equivalent differentiable problem in a higher dimension. It's main drawback is efficiency since the higher dimensional problem is computationally expensive to solve.
We propose several alternative ways to solve this problem which do not require introducing new variables or constraints. We derive the optimality conditions for this problem using subdifferentials. First, we generalize an active set method to this class of problems. We solve the problem by considering a sequence of equality constrained subproblems, each subproblem having a twice differentiable objective function. Information gathered at each step is used to construct the subproblem for the next step. We also show how the nonsmoothness can be handled efficiently by using spline approximations. The problem is then solved using a primal-dual interior-point method.
If a higher accuracy is needed, we do a crossover to an active set method. Our numerical tests show that we can solve large scale problems efficiently and accurately.
Reinke, Claus [Verfasser]. „Functions, Frames, and Interactions-completing a lambda-calculus-based purely functional language with respect to programming-in-the-large and interactions with runtime environments / Claus Reinke“. Kiel : Universitätsbibliothek Kiel, 1998. http://d-nb.info/1080332626/34.
Der volle Inhalt der QuelleBasnayaka, Punya A. „Low-Level Programming of a 9-Degree-of-Freedom Wheelchair-Mounted Robotic Arm with the Application of Different User Interfaces“. Scholar Commons, 2010. https://scholarcommons.usf.edu/etd/1570.
Der volle Inhalt der QuelleSchreiber, Alex Joachim Ernst [Verfasser], Oliver [Akademischer Betreuer] Junge und Matthias [Akademischer Betreuer] Gerdts. „Dynamic programming with radial basis functions and Shepard's method / Alex Joachim Ernst Schreiber. Betreuer: Oliver Junge. Gutachter: Matthias Gerdts ; Oliver Junge“. München : Universitätsbibliothek der TU München, 2016. http://d-nb.info/1096459124/34.
Der volle Inhalt der QuelleVanden, Berghen Frank. „Constrained, non-linear, derivative-free, parallel optimization of continuous, high computing load, noisy objective functions“. Doctoral thesis, Universite Libre de Bruxelles, 2004. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211177.
Der volle Inhalt der QuelleDoctorat en sciences appliquées
info:eu-repo/semantics/nonPublished
Cox, Bruce. „Applications of accuracy certificates for problems with convex structure“. Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39489.
Der volle Inhalt der QuelleFarka, Jan. „Možnosti řídicího systému Heidenhain při programování CNC obráběcích strojů“. Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-444272.
Der volle Inhalt der QuelleLuizelli, Marcelo Caggiani. „Scalable cost-efficient placement and chaining of virtual network functions“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/169337.
Der volle Inhalt der QuelleNetwork Function Virtualization (NFV) is a novel concept that is reshaping the middlebox arena, shifting network functions (e.g. firewall, gateways, proxies) from specialized hardware appliances to software images running on commodity hardware. This concept has potential to make network function provision and operation more flexible and cost-effective, paramount in a world where deployed middleboxes may easily reach the order of hundreds. Despite recent research activity in the field, little has been done towards scalable and cost-efficient placement & chaining of virtual network functions (VNFs) – a key feature for the effective success of NFV. More specifically, existing strategies have neglected the chaining aspect of NFV (focusing on efficient placement only), failed to scale to hundreds of network functions and relied on unrealistic operational costs. In this thesis, we approach VNF placement and chaining as an optimization problem in the context of Inter- and Intra-datacenter. First, we formalize the Virtual Network Function Placement and Chaining (VNFPC) problem and propose an Integer Linear Programming (ILP) model to solve it. The goal is to minimize required resource allocation, while meeting network flow requirements and constraints. Then, we address scalability of VNFPC problem to solve large instances (i.e., thousands of NFV nodes) by proposing a fixand- optimize-based heuristic algorithm for tackling it. Our algorithm incorporates a Variable Neighborhood Search (VNS) meta-heuristic, for efficiently exploring the placement and chaining solution space. Further, we assess the performance limitations of typical NFV-based deployments and the incurred operational costs of commodity servers and propose an analytical model that accurately predict the operational costs for arbitrary service chain requirements. Then, we develop a general service chain intra-datacenter deployment mechanism (named OCM – Operational Cost Minimization) that considers both the actual performance of the service chains (e.g., CPU requirements) as well as the operational incurred cost. Our novel algorithm is based on an extension of the well-known reduction from weighted matching to min-cost flow problem. Finally, we tackle the problem of monitoring service chains in NFV-based environments. For that, we introduce the DNM (Distributed Network Monitoring) problem and propose an optimization model to solve it. DNM allows service chain segments to be independently monitored, which allows specialized network monitoring requirements to be met in a efficient and coordinated way. Results show that the proposed ILP model for the VNFPC problem leads to a reduction of up to 25% in end-to-end delays (in comparison to chainings observed in traditional infrastructures) and an acceptable resource over-provisioning limited to 4%. Also, we provide strong evidences that our fix-and-optimize based heuristic is able to find feasible, high-quality solutions efficiently, even in scenarios scaling to thousands of VNFs. Further, we provide indepth insights on network performance metrics (such as throughput, CPU utilization and packet processing) and its current limitations while considering typical deployment strategies. Our OCM algorithm reduces significantly operational costs when compared to the de-facto standard placement mechanisms used in Cloud systems. Last, our DNM model allows finer grained network monitoring with limited overheads. By coordinating the placement of monitoring sinks and the forwarding of network monitoring traffic, DNM can reduce the number of monitoring sinks and the network resource consumption (54% lower than a traditional method).