To see the other types of publications on this topic, follow the link: Address.

Dissertations / Theses on the topic 'Address'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Address.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Carpenter, Stephanie Elizabeth. "Address." Miami University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=miami1279725857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Currier, Daniel W. "Direct Address." VCU Scholars Compass, 2007. http://scholarscompass.vcu.edu/etd_retro/44.

Full text
Abstract:
"Direct Address" is a document intended to complement a body of artwork, including photographs and digital video. The focus of this text is to discuss my process of creating documentary film. Beginning with my thesis film it traces my development as documentary filmmaker over a two-year period, highlighting shifts in my thinking and activity during that time.
APA, Harvard, Vancouver, ISO, and other styles
3

Alfon, Amy Frances. "The narrative address." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ63486.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grant, Douglas M. "Address generator synthesis." Thesis, University of Edinburgh, 1991. http://hdl.handle.net/1842/14930.

Full text
Abstract:
Increasing complexity of Application Specific Integrated Circuits (ASICs) has demanded a corresponding increase in the power of Computer Aided Design (CAD) tools, so that contemporary design tools can now synthesise an entire silicon architecture, given only a description of its functionality. Specialised automated synthesis techniques have now been applied to almost all parts of the architecture, but one area which remains unresolved is that of memory address generators. Previously combined with other logic synthesis techniques, less than optimal solutions were often found for generating memory address sequences, and this thesis examines address generator synthesis as an individual step in the design process, as part of an investigation into high level synthesis. The synthesis techniques developed for address generators in the AG1 and AG2 tools presented target specific architectural forms including counters, incrementors and ROM look-up tables, and the details of these are gathered within a comprehensive data structure which allows optimisation through hardware sharing to occur. At a slightly higher level, the specification of address sequences as a stage in memory synthesis is also investigated and a behavioural to register-transfer level silicon compiler, MC2 is presented. The data path and memory architectures constructed by this tool are used to produce realistic address generation requirements whose implementations are also presented, synthesised by AG2. It is shown that both array and non-array memory can benefit from more specialised address generator synthesis over the existing, mainly logic synthesis approach.
APA, Harvard, Vancouver, ISO, and other styles
5

Williams, Stacey L. "Notable Woman Address." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/8051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kassai, Alexander. "Web-based address book." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-21181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

North, John. "Identifying memory address disclosures." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11424.

Full text
Abstract:
Software is still being produced and used that is vulnerable to exploitation. As well as being in devices in the homes of many people around the world, programs with these vulnerabilities are maintaining life-critical systems such as power-stations, aircraft and medical devices and are managing the creation and distribution of billions of pounds every year. These systems are actively being exploited by governments, criminals and opportunists and have led to loss of life and a loss of wealth. This dependence on software that is vulnerable to exploitation has led to a society with tangible concerns over cyber-crime, cyber-terrorism and cyber-warfare. As well as attempts to eliminate these vulnerabilities, techniques have been developed to mitigate their effects; these prophylactic techniques do not eliminate the vulnerabilities but make them harder to exploit. As software exploitation is an ever evolving battle between the attackers and the defenders, identifying methods to bypass these mitigations has become a new battlefield in this struggle and the techniques that are used to do this require vulnerabilities of their own. As many of the mitigation techniques are dependent upon secrecy of one form or another, vulnerabilities which allow an attacker to view those secrets are now of importance to attackers and defenders. Leaking of the contents of computer memory has always been considered a vulnerability, but until recently it has not typically been considered a serious one. As this can be used to bypass key mitigation techniques, these vulnerabilities are now considered critical to preventing whole classes of software exploitation. This thesis is about detecting these types of leaks and the information they disclose. It discusses the importance of these disclosures, both currently and in the future. It then introduces the first published technique to be able to reliably identify specific classes of these leaks, particularly address disclosures and canary-disclosures. The technique is tested against a series of applications, across multiple operating systems, using both artificial examples and software that is critical, commonplace and complex.
APA, Harvard, Vancouver, ISO, and other styles
8

Schill, Helena, and Therese Goldring. "Don't address their brains. Address their hearts! : En studie om sinnesmarknadsföring vid restaurangupplevelser." Thesis, Södertörns högskola, Institutionen för naturvetenskap, miljö och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-19502.

Full text
Abstract:
Restaurangbranschen är en del av turistindustrin och viktig för näringens utveckling. Fokus i denna studie har inriktats mot restaurangföretag och deras möjligheter att påverka gäster med hjälp av sinnesmarknadsföring. För att visa på marknadsföringens goda inverkan på företag genomfördes en observation samt intervjuer med marknadsföringsexperter och inredare. Det framkom att sinnesmarknadsföring, som involverar människans fem sinnen, ökar gästens uppehållstid och viljan att spendera pengar i besöksmiljön. Uppsatsen syftar till att belysa hur företag på ett effektivt sätt kan påverka en gästs restaurangupplevelse. Hypotesen utgår från att sinnesmarknadsföring skapar ett ökat välbehag hos gästen vilket gör det till ett effektivt sätt att marknadsföra. Resultatet av studien visar att företag med hjälp av sinnesmarknadsföring kan påverka gästen på ett djupare plan och att användandet av olika sinnesstrategier framkallar positiva känslor.
The restaurant business is part of the tourist industry and vital for the industry's development. The core of this study has been focused on restaurant businesses and their ability to influence their guests with the use of sensory marketing. To demonstrate marketing's good impact on the business, an observation and interviews with marketing experts and interior designers were conducted. It was revealed that sensory marketing, which involves the five senses, increased guest retention and willingness to spend money. This essay aims to highlight how companys effectively can influence a guest's restaurant experience. The hypothesis assumes that sensory marketing creates added pleasure for the guest and make it an effective way of marketing. Results of the study show that companies using sensory marketing can affect the visitor on a deeper level and that the use of different sensory strategies elicit positive emotions.
APA, Harvard, Vancouver, ISO, and other styles
9

Morancho, Llena Enric. "Address Prediction and Recovery Mechanisms." Doctoral thesis, Universitat Politècnica de Catalunya, 2002. http://hdl.handle.net/10803/5970.

Full text
Abstract:
Uno de los mayores retos que debe ser afrontado por los diseñadores de micro-procesadores es el de mitigar la gran latencia de las instrucciones de carga de datos en registros. Esta tesis analiza una de las posibles alternativas para atacar dicho problema: predicción de direcciones y ejecución especulativa.

Varios autores han comprobado que las direcciones efectivas calculadas por las instrucciones de carga son bastante predecibles. En primer lugar, hemos analizado a qué es debida dicha predictabilidad. Este estudio intenta establecer las estructuras típicas presentes en lenguajes de alto nivel que, al ser compiladas, generas instruciones de carga predecibles. También se analizan los predictores convencionales con el objetivo de determinar qué predictores son más adecuados para las típicas aplicaciones.

El estudio continúa con la propuesta de nuevos predictores de direcciones que utilizan sus recursos de almacenamiento de forma más eficiente que los previos predictores. Los predictores alamacenan información respecto al comportamiento de las instrucciones de carga; sin embargo, los requisitos de las instrucciones predecibles son diferentes de los de las instrucciones no predecibles. Consecuentemente, se propone una organización de las tablas de predicción que considere la existencia de ambos tipos de instruciones. También se muestra que existe un cierto grado de redundnacia en las tablas de predicción de los predictores. Este estudio propoen organizar las tablas de predicción de forma que se reduzca dicha redundancia. Todas estas propuestas permiten reducir los requisitos de los predictores referentes a espacio de alamacenamiento, sin causar menoscabo en el rendimiento de los predictores.

Posteriormente, se evalúa el impacto de la predicción de direcciones en el rendimiento de los processadores. Las evaluaciones asumen que las predicciones se utilizan para iniciar de forma especulativa accessos a memoria y para ejecutar de forma especulativa sus instrucciones dependientes. En caso de una predicción correcta, todo el trabajo realizado de forma especulativa puede considerarse como correcto; en caso de error de predicción, el tranajo realizado especulativamente debe ser descartado. El estudio se centra en diversos aspectos como la interacción entre predicción de direcciones y predicción de saltos, la implementación de mecanismods de verification, los mecanismos re recuperación en casos de errores de predicción y la influencia de varios parámetreos del procesador (el tamaño de la ventana de emisión de instrucciones, la latencia de la memora cache, y la anchura de emisión de instrucciones) en le impacto de la predicción de direcciones en el rendimiento de los procesadores.

Finalmente, se han evaluado mechanismos de recuperación para el caso de errores de predicción de latencia. La predicción de latencia es una técnica de ejecución especulativa utilizada por los planificadores de alguncos procesadores superescalares para tratar las instrucciones de latencia variable (por ejemplo, las instrucciones de carga). Nuestras evaluaciones se centran en un mecanismo convencional de recuperación para errores de predicción de latencia y en una nueva propuesta. También se evalúan los mecanismos propuestos en el ámbito de predicción de direcciones. Se concluye con que éstos mecanismos representan una alternativa rentable a los mecanismos de recuperación convencionales utilizados para tratar los errores de predicción de direcciones.
Mitigating the effect of the large latency of load instructions is one of challenges of micro-processor designers. This thesis analyses one of the alternatives for tackling this problem: address prediction and speculative execution.
Several authors have noticed that the effective addresses computed by the load instructions are quite predictable. First of all, we study why this predictability appears; our study tries to detect the high-level language structures that are compiled into predictable load instructions. We also analyse the conventional address predictors in order to determine which address predictors are most appropriate for the typical applications.
Our study continues by proposing address predictors that use their storage structures more efficiently. Address predictors track history information of the load instructions; however, the requirements of the predictable instructions are different from the requirements of the unpredictable instructions. We then propose an organization of the prediction tables considering the existence of both kinds of instructions. We also show that there is a certain degree of redundancy in the prediction tables of the address predictors. We propose organizing the prediction tables in order to reduce this redundancy. These proposals allow us to reduce the area cost of the address predictors without impacting their performance.
After that, we evaluate the impact of address prediction on processor performance. Our evaluations assume that address prediction is used to start speculatively some memory accesses and to execute speculatively their dependent instructions. On a correct prediction, all the speculative work is considered as correct; on a misprediction, the speculative work must be discarded. Our study is focused on several aspects such as the interaction of address prediction and branch prediction, the implementation of verification mechanisms, the recovery mechanism on address mispredictions, and the influence of several processor parameters (the issue-queue size, the cache latency and the issue width) on the performance impact of address prediction.
Finally, we evaluate several recovery mechanisms for latency mispredictions. Latency prediction is a speculative technique used by the schedulers of some superscalar processors to deal with variable-latency instructions (for instance, load instructions). Our evaluations are focused on a conventional recovery mechanism for latency mispredictions and a new proposal. We also evaluate the proposed recovery mechanism in the scope of address prediction; we conclude that it represents a cost-effective alternative to the conventional recovery mechanisms used for address mispredictions.
APA, Harvard, Vancouver, ISO, and other styles
10

Matloga, Eric Matladi. "Forms of address in Tshivenda." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/49729.

Full text
Abstract:
Thesis (MA)--University of Stellenbosch, 2002.
ENGLISH ABSTRACT: This study investigates the use of address form in Tshivenda. Chapter one concentrates on aims of study, data collection and the organisation of study. Chapter two concentrates on various studies which deal with forms of address in different communities. They introduce forms of address as a routine between people who are embedded in the socio-cultural context of society. Chapter three deals with the informal use of forms of address. This includes names, pronouns and kinship terms. Different names deal with Tshivenda names and Non- Tshivenda names, and the way they are used in different context as a form of address. The controversial use of a pronoun as a form of address is also taken into account as well as kinship terms as a form of address in family where forms are applied in informal situation. [Where the place is unstructured and they are applied in the traditional way.] Chapter four investigates the formal use of address in a structured situation, this covers titles, occupations, special address forms and innovations. Titles are used in a more structured situation. They show social rank or official position such as Doctors, Professors etc. Occupational terms are connected with a person's job. These are terms like nurses, teachers etc. The special forms of address are used in certain occasions where the sender uses an unpopular form of address, uses new techniques and they are practised by elite class, who tries to change the status quo. Chapter five gives the main conclusions of the thesis.
AFRIKAANSE OPSOMMING: Hierdie studie ondersoek die gebruik van aanspreekvorme in Tshivenda. Hoofstuk een konsentreer op die doelstellings van die studie, die versameling van data en die organisasie van die studie. Hoofstuk twee konsentreer op verskillende studies wat handel oor aanspreekvorme in verskillende gemeenskappe. Hulle sluit in aanspreekvorme soos gewoonlik gebruik tussen mense wat vas gewortel is in die sosio-kulturele konteks van die gemeenskap. Hoofstuk drie handel oor die gebruik van informele aanspreekvorme. Dit sluit in name, voornaamwoorde en verwantskapsterme. Dit sluit in Venda en nie-Venda name in verskillende kontekste. Die gebruik van 'n voornaamwoord in aanspreekvorme word ook belangrik geag sowel as verwantskapsterme in familie waar vorme gebruik word in informele situasie. Hoofstuk vier ondersoek die formele gebruik van aanspreekvorme in 'n strukturele situasie. Die sluit in titel, beroepe, spesiale vorme en innovasie. Titels word gebruik in In strukturele situasie. Hulle verwys na sosiale posisie of amptelike posisie soos dokters, professors ens. Die spesiale vorme word gebruik in omstandighede waar die sender die ongewone vorm gebruik vir die ontvanger. Innovatiewe vorme gebruik nuwe tegnieke en hulle word beoefen deur die hoer klas, wat probeer om die status quo te verander. Hoofstuk vyf gee die bevindinge van die tesis.
APA, Harvard, Vancouver, ISO, and other styles
11

Barton, Alison L. "ETSU Fall 2014 Commencement Address." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/3436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hughson, Jo-anne. "Diversity and changing values in address Spanish address pronoun usage in an intercultural immigrant context." Frankfurt, M. Berlin Bern Bruxelles New York, NY Oxford Wien Lang, 2009. http://d-nb.info/997134720/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Langer, André, and Tom Kühnert. "Security issues in Address Autoconfiguration Protocols." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700491.

Full text
Abstract:
Dynamic address assignment is one of the most important features in wireless ad hoc networks if nodes should be enabled to join and to work in the network by automatically configuring all necessary settings. Different approaches have been developed throughout the last years to achieve this objective of Dynamic Address Autoconfiguration but research primarily focused on efficiency and correctness, less on security issues. Whereas Duplicate Address Detection has become reliable in commonplace scenarios, it is still relatively easy to suspend the whole network functionality in extraordinary situations within the boundaries of a Dynamic Address Configuration Protocol. In this paper, we therefore want to point out shortcomings and weaknesses in existing protocol solutions which address dynamic IP address assignment. We concentrate on a leader-based approach called ODACP and want to propose several solutions which improve the original protocol in such a way that it is safer against malicious host activities. Finally, we will demonstrate the improvements of our solution in a separate test scenario.
APA, Harvard, Vancouver, ISO, and other styles
14

Fowler, Robert Joseph. "Decentralized object finding using forwarding address /." Thesis, Connect to this title online; UW restricted, 1985. http://hdl.handle.net/1773/6947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bershad, Brian Nathan. "High performance cross-address space communication /." Thesis, Connect to this title online; UW restricted, 1990. http://hdl.handle.net/1773/6939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Orrell, James D. "GIS address-matching and transportation analysis." PDXScholar, 1990. https://pdxscholar.library.pdx.edu/open_access_etds/4133.

Full text
Abstract:
Geographic Information System (GIS) address-matching combined with other GIS processing offers new analytical opportunities in the area of transportation planning and analysis. Address-matching, an automated method for generating geographically-referenced (geocoded) point locations on a map from common tabular databases, can facilitate transportation analysis by providing a planning tool based on individual rather than aggregated spatial distributions more common to transportation issues.
APA, Harvard, Vancouver, ISO, and other styles
17

Amrine, William James. "The plenary address: A rhetorical analysis." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3127.

Full text
Abstract:
In terms of structure, style, content and intended audience, Genre Analysis 58, this thesis presents a rhetorical analysis of the plenary address as a genre. Four examples of the opening plenary were analyzed because they represent the opening plenary lecture-keynote speech type, the most common presented at conferences: Mina Shaughnessy and the teaching of writing, Keynote address, Literacy after the revolution and The uneasy partnership between grammar and writing instruction.
APA, Harvard, Vancouver, ISO, and other styles
18

Robles, Moreno Carmen del Pilar. "On Tax Domicile in Tax Matters and the Condition of Not Been and Not Found." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/119142.

Full text
Abstract:
There are many kinds of legal addresses in the private sphere of a person, having different legal effects and treatments. In that line, the present paper will analyze the concept of tax address. For that purpose, first the concept of address will be introduced, then it’ll focus on tax address, to finally see the treatment of the address in the Tax Code. To finish, both Not Found and Not Been Adress will be analyzed, and so the tax consequences of each one.
Existen muchos tipos de domicilios en la esfera privada de una persona, teniendo diferentes efectos y tratamientos legales. En ese sentido, el presente artículo analizaremos el concepto de domicilio fiscal. Para ello, primero se introducirá el concepto de domicilio, centrándonos luego en el domicilio fiscal, para finalmente ver el tratamiento del domicilio en el Código Tributario. Para finalizar, se analizará el caso del Domicilio No Hallado y No Habido, así como las consecuencias tributarias de cada uno.
APA, Harvard, Vancouver, ISO, and other styles
19

Gustafsson, Henrik. "Behavioral model of an address generation unit." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2106.

Full text
Abstract:

This thesis is a part of a bigger project which goal is to make a DSP that is instruction compatible with the Motorola DSP56002. The goal of this part is to make a behavioural model with timing of the address generation unit in the DSP.

The AGU unit can handle 4 different types of arithmetic’s including linear addressing, modulo addressing, wrap around modulo addressing and reverse carry addressing. It also handles several ways of calculating addresses as post/pre increment/decrement by a number. It can address 3 different memories, where 2 new addresses can be calculated at the same time in different memories.

This model will be used as a golden model for the RTL model of the AGU that is one of the main parts in the DSP.

APA, Harvard, Vancouver, ISO, and other styles
20

Palomo, Isaac. "Implementing Green Infrastructure to Address Urban Flooding." The University of Arizona, 2017. http://hdl.handle.net/10150/626201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Indrayan, Gunjan. "Address autoconfiguration in mobile ad hoc networks." Diss., Connect to online resource, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1435235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Nanbakhsh, Golnaz. "Persian address pronouns and politeness in interaction." Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/6206.

Full text
Abstract:
In this thesis, I aim to investigate the variation of Persian pronominal address system and politeness strategies in contemporary Iranian society from a quantitative and qualitative sociolinguistic perspective. I focus on Persian speakers’ use and perception of pronominal address forms in the light of socio-cultural norms in contemporary Iran. Persian, has two personal pronouns for singular address, to ([to]) the familiar or intimate ‘you’ and šoma ([∫oma:]) the deferential or formal ‘you’ (historically the second person plural but now also used as second person singular). Moreover, Persian is a pro-drop language, so the interaction between address pronouns and agreement marking on the verb must be taken into account. Another significant feature of colloquial Persian is a hybrid usage of the overt deferential second person pronoun and informal agreement forming a mismatch construction (i.e. šoma with 2s verb agreement) and intra-speaker pronominal address switches that occur between the deferential and casual pronominal address forms. Those deviations from the prescribed forms and/or distribution of the address pronouns are very interesting aspects that may show different levels of politeness even in one utterance. Consequently, this research examines spontaneous data looking at the sociolinguistic distributions and the pragmatic functions of pronominal address forms in contemporary Persian language and politeness synchronically. Three types of spontaneous data were collected for the purpose of analysis: a) participant observation, b) natural media conversations and c) sociolinguistic interviews with Persian speakers. In this study, the quantitative analysis investigates the correlation of pronominal address forms with extralinguistic factors such as age and gender of speaker and addressee in the interactional data. The qualitative analysis sheds light on how pronominal address forms and their variation encode communicative strategies in face-to-face interactions. Based on triangulation of quantitative and qualitative results with sociolinguistic interviews, I propose a dynamic model of indexicality for Persian pronominal address forms, which accommodates different forms and functions of address pronouns in interactional stances.
APA, Harvard, Vancouver, ISO, and other styles
23

Tregidgo, R. W. S. "Parallel processing and automatic postal address recognition." Thesis, University of Essex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rowe, Lois. "The address of spirituality in contemporary art." Thesis, University of the Arts London, 2011. http://ualresearchonline.arts.ac.uk/4198/.

Full text
Abstract:
The thesis explores the use of religious themes and the notion of self-design in contemporary art practice. It argues that art today that addresses religion does so primarily for its rhetorical function: for a recognizable pattern of persuasiveness, which is ultimately defined by its established mechanisms of belief. Furthermore, it suggests that it is through an engagement with this secularized rhetoric that the art viewer today can potentially be provoked to re-create oneself in ones own terms; or, in Richard Rorty's terms, to 'revocabularize'.
APA, Harvard, Vancouver, ISO, and other styles
25

Bitter, James. "Experiencing the Process of Change,” Keynote Address." Digital Commons @ East Tennessee State University, 2001. https://dc.etsu.edu/etsu-works/6084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Bitter, James. "Process and Movement in Therapy, Keynote Address." Digital Commons @ East Tennessee State University, 2001. https://dc.etsu.edu/etsu-works/6085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Sibanda, Lawrence. "Social work interventions to address domestic violence." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/72461.

Full text
Abstract:
There is a high rate of domestic violence worldwide and most of the victims of abuse are women. South Africa is no exception to this and it is estimated that one out of three women worldwide experiences domestic violence in her lifetime. Social work plays a role in addressing domestic violence. Therefore, the goal of the study was to explore and describe social work interventions to address domestic violence in Sedibeng District. The researcher conducted this study using a qualitative approach. The study was applied and explorative in nature and utilised an instrumental case study design. Ten social workers employed in different non-profit organisations in Sedibeng District were purposefully selected to participate in the study. Data were collected by means of semi-structured interviews guided by an interview schedule. Findings indicated that some social workers lacked information about domestic violence and requisite interventions, which was a challenge to service rendering to women victims of domestic violence. As, findings indicated that the commonly used strategies among the social workers include counselling, awareness, support groups and referrals. Furthermore, few participants were very elaborate about their roles in helping women victims of domestic violence. These roles are limited to; educator, facilitator and advocacy. Also, findings showed that lack of resources was a major challenge in social work interventions in addressing domestic violence. This study concludes that social workers do not have enough resources at their disposal and lack adequate information on domestic violence. As a result, they do not fully understand their roles and fail to assist women victims of domestic violence. To overcome the challenges faced by social workers when rendering services to victims of domestic violence, it is recommended that the Department of Social Development and other role players should avail enough resources. These include vehicles, office equipment such as telephones and computers, and shelters for the victims. There is also a need for the social workers to be continuously trained on domestic violence and the best intervention strategies.
Mini Dissertation (MSW)--University of Pretoria, 2019.
Social Work and Criminology
MSW (Social Development and Policy)
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
28

Poynton, Cate McKean. "Address and the Semiotics of Social Relations." Thesis, The University of Sydney, 1991. http://hdl.handle.net/2123/2297.

Full text
Abstract:
This thesis is concerned with the realm of the interpersonal: broadly, those linguistic phenomena involved in the negotiation of social relations and the expression of personal attitudes and feelings. The initial contention is that this realm has been consistently marginalised not only within linguistic theory, but more broadly within western culture, for cultural and ideological reasons whose implications extend into the bases of classical linguistic theory. Chapter 1 spells out the grounds for this contention and is followed by two further chapters, constituting Part I: Language and Social Relations. Chapter 2 identifies and critiques the range of ways in which the interpersonal has been conventionally interpreted: as style, as formality, as politeness, as power and solidarity, as the expressive, etc. This chapter concludes with an argument for the need for a stratified model of language in order to deal adequately with these phenomena. Chapter 3 proposes such a model, based on the systemic-functional approach to language as social semiotic. The register category tenor within this model is extended to provide a model of social relations as a semiotic system. The basis for the identification of the three tenor dimensions, power, distance and affect, is the identification of three modes of deployment or realisation of the interpersonal resources of English in everyday discourse: reciprocity, proliferation and amplification. Parts II and III turn their attention to one significant issue in the negotiation of social relations: address. The focus is explicitly on Australian English, but there is considerable evidence that most if not all of the forms discussed in Part II occur in other varieties of English, especially British and American, and that some at least of the practices discussed in Part III involve the same patterns of social relations with respect to the tenor dimensions of power, distance and affect. Because most varieties of contemporary English do not have a set of options for second-person pronominal address, as is the case in many of the world's languages, English speakers use names and other nominal forms which need to be described. Part II is descriptive in orientation, providing an account of the grammar of VOCATION in English, including a detailed description of the nominal forms used. Chapter 4 investigates the identification and functions of vocatives, and includes empirical investigations of vocative position in clauses and vocative incidence in relation to speech function or speech act choices. Chapter 5 presents an account of the grammar of English name forms, organised as a paradigmatic system. This chapter incorporates an account of the processes used to produce the various name-forms used in address, including truncation, reduplication and suffixation. Chapter 6 consists of an account of non-name forms of address, organised in terms of the systemic-functional account of nominal group structure. This chapter deals with single-word non-name forms of address and the range of nominal group structures used particularly to communicate attitude, both positive and negative. Part III is ethnographic in orientation. It describes some aspects of the use of the forms described in Part II in contemporary address practice in Australia and interprets such practice using the model of social relations as semiotic system presented in Part I. The major focuses of attention is on address practice in relation to the negotiation of gender relations, with some comment on generational relations of adults with children, on class relations and on ethnic relations in nation with a diverse population officially committed to a policy of a multiculturalism. Part III functions simultaneously as a coda for this thesis, and a prologue for the kind of ethnographic study that the project was originally intended to be, but which could not be conducted in the absence of an adequate linguistically-based model of social relations and an adequate description of the resources available for address in English.
APA, Harvard, Vancouver, ISO, and other styles
29

Poynton, Cate McKean. "Address and the Semiotics of Social Relations." University of Sydney, 1991. http://hdl.handle.net/2123/2297.

Full text
Abstract:
Doctor of Philosophy
This thesis is concerned with the realm of the interpersonal: broadly, those linguistic phenomena involved in the negotiation of social relations and the expression of personal attitudes and feelings. The initial contention is that this realm has been consistently marginalised not only within linguistic theory, but more broadly within western culture, for cultural and ideological reasons whose implications extend into the bases of classical linguistic theory. Chapter 1 spells out the grounds for this contention and is followed by two further chapters, constituting Part I: Language and Social Relations. Chapter 2 identifies and critiques the range of ways in which the interpersonal has been conventionally interpreted: as style, as formality, as politeness, as power and solidarity, as the expressive, etc. This chapter concludes with an argument for the need for a stratified model of language in order to deal adequately with these phenomena. Chapter 3 proposes such a model, based on the systemic-functional approach to language as social semiotic. The register category tenor within this model is extended to provide a model of social relations as a semiotic system. The basis for the identification of the three tenor dimensions, power, distance and affect, is the identification of three modes of deployment or realisation of the interpersonal resources of English in everyday discourse: reciprocity, proliferation and amplification. Parts II and III turn their attention to one significant issue in the negotiation of social relations: address. The focus is explicitly on Australian English, but there is considerable evidence that most if not all of the forms discussed in Part II occur in other varieties of English, especially British and American, and that some at least of the practices discussed in Part III involve the same patterns of social relations with respect to the tenor dimensions of power, distance and affect. Because most varieties of contemporary English do not have a set of options for second-person pronominal address, as is the case in many of the world's languages, English speakers use names and other nominal forms which need to be described. Part II is descriptive in orientation, providing an account of the grammar of VOCATION in English, including a detailed description of the nominal forms used. Chapter 4 investigates the identification and functions of vocatives, and includes empirical investigations of vocative position in clauses and vocative incidence in relation to speech function or speech act choices. Chapter 5 presents an account of the grammar of English name forms, organised as a paradigmatic system. This chapter incorporates an account of the processes used to produce the various name-forms used in address, including truncation, reduplication and suffixation. Chapter 6 consists of an account of non-name forms of address, organised in terms of the systemic-functional account of nominal group structure. This chapter deals with single-word non-name forms of address and the range of nominal group structures used particularly to communicate attitude, both positive and negative. Part III is ethnographic in orientation. It describes some aspects of the use of the forms described in Part II in contemporary address practice in Australia and interprets such practice using the model of social relations as semiotic system presented in Part I. The major focuses of attention is on address practice in relation to the negotiation of gender relations, with some comment on generational relations of adults with children, on class relations and on ethnic relations in nation with a diverse population officially committed to a policy of a multiculturalism. Part III functions simultaneously as a coda for this thesis, and a prologue for the kind of ethnographic study that the project was originally intended to be, but which could not be conducted in the absence of an adequate linguistically-based model of social relations and an adequate description of the resources available for address in English.
APA, Harvard, Vancouver, ISO, and other styles
30

Chamberlain, Michael Thaddeus. "Address Space Translation for FPGA Accelerated Simulators." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/5475.

Full text
Abstract:
Microarchitectural simulation is needed to help explore the large design space of new computer systems. These simulations are taking increasingly longer amounts of time to run due to the increasing complexity of modern processors. Co-simulation and high level synthesis are promising fields to improve the overall time required for microarchitectural simulators, and can contribute to low design times and fast simulation speeds permitting a larger range of design space exploration. While promising, co-simulation techniques must find effective ways to map the host memory address space to the FPGA memory address space to be able to correctly transfer simulation data between the host and FPGA. Load relations mapping is a new technique that builds upon existing techniques to provide support for the discovery and translation of runtime memory addresses to their equivalent FPGA memory addresses. This is accomplished by storing object reachability information discovered during a memory profiling run and later using it to recreate an object reachability mapping at runtime. This mapping can be traversed to discover needed memory addresses. We demonstrate how this technique can be used by incorporating it into the FAMEbuilder tool flow. Results show that simulation speed is not reduced and that only a small overhead is required to perform the additional memory initialization at the start of simulation. Area increases are also shown and are limited to near 10\% increase on small single core models.
APA, Harvard, Vancouver, ISO, and other styles
31

Williams, Hannah Washington. "Policies and Procedures to Address Respite Care." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3644.

Full text
Abstract:
Hospice services are utilized by more than 1.6 million people yearly, and there are a great number of caregivers who are tasked with caring for these individuals at home. Caregivers are at risk for fatigue, burnout, and decline in their own physical and mental health. While the Centers for Medicare and Medicaid Services (CMS) cover costs of temporary respite care for hospice patients, the caregivers' needs for respite care are often unrecognized and unaddressed. The purpose of this project was to plan a respite program within the hospice agency consisting of revised respite policy and procedures, the Caregiver Reaction Assessment (CRA) tool to routinely assess the caregiver for burnout and/or fatigue, and a detailed outline for the implementation of respite care. Anderson's behavioral model of service was used to guide the project's understanding of the underutilization of respite services. This project was guided by the practice-focused question examining the development of an evidence based caregiver respite program within the hospice agency. The program was developed based on a review of peer reviewed research studies and the input of a project team of local experts. The project team participated in the project that created a respite policy which includes a biweekly caregiver assessment and step-by-step directions on how to implement respite care. A final report was developed and submitted to the Hospice agency. This revised policy and procedure includes a blueprint for implementation and a full set of recommendations on the process, use of the CRA, educational in-services, and evaluative methods. These recommendations have the potential for positive social change by increasing patient and caregiver outcomes, serving as an example for other hospice agencies to follow, and improving care at the end of life.
APA, Harvard, Vancouver, ISO, and other styles
32

Poynton, Cate. "Address and the semiotics of social relations a systemic-functional account of address forms and practices in Australian English /." Connect to full text, 1990. http://hdl.handle.net/2123/2297.

Full text
Abstract:
Thesis (Ph. D.)--University of Sydney, 1991.
Title from title screen (viewed 23 April 2008). Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the Dept. of Linguistics, Faculty of Arts. Degree awarded 1991; thesis submitted 1990. Includes bibliographical references. Also available in print form.
APA, Harvard, Vancouver, ISO, and other styles
33

Hubbard, Stephen J. "A cepstrum-based acoustic echo cancellation technique for improving public address system performance." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/15617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Приходько, Наталія Анатоліївна, Наталия Анатольевна Приходько, Nataliia Anatoliivna Prykhodko, and І. О. Сімонова. "Форми звертання як соціолінгвістичний маркер (на матеріалі англомовної прози останнього десятиліття ХХ ст. - першого десятиліття ХХІ ст.)." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/30796.

Full text
Abstract:
Одним із невід’ємних елементів при мовленні є звертання, що є багатоаспектною одиницею та функціональним елементом спілкування. Звертання є основним вербальним засобом вираження адресованості. Воно може виступати й засобом іменування адресата, управління комунікативним процесом, експлікації емотивних конотацій висловлювання, бути маркером ставлення одного учасника спілкування до іншого. Звертання – це ті елементи мовного етикету, які передусім сигналізують про соціальні відношення, що встановлюються в рамках комунікативного акту. Вживання форм звертання детермінується низкою чинників, які за своєю природою належать до різних аспектів: біологічного, соціального та мовного. При цитуванні документа, використовуйте посилання http://essuir.sumdu.edu.ua/handle/123456789/30796
APA, Harvard, Vancouver, ISO, and other styles
35

Abdul-Nabi, Samih. "Centralized and distributed address correlated network coding protocols." Thesis, Rennes, INSA, 2015. http://www.theses.fr/2015ISAR0032/document.

Full text
Abstract:
Le codage de reseau (CR) est une nouvelle technique reposant, sur la realisation par les noeuds du reseau, des fonctions de codage et de decodage des donnees afin d’ameliorerle debit et reduire les retards. En utilisant des algorithmes algebriques, le codage consiste àcombiner ensemble les paquets transmis et le decodage consiste à restaurer ces paquets. Cette operation permet de reduire le nombre total de transmissions de paquets pour echanger les donnees, mais requiere des traitements additionnels au niveau des noeuds. Le codage de reseau peut etre applique au niveau de differentes couches ISO.Toutefois dans ce travail, sa mise en noeuvre est effectuee au niveau de la couche reseau. Dans ce travail de thèse, nous presentons des techniques de codage de reseau s’appuyantsur de nouveaux protocoles permettant d’optimiser l’utilisation de la bande passante,D’ameliorer la qualite de service et de reduire l’impact de la perte de paquets dans les reseaux a pertes. Plusieurs defis ont ete releves notamment concernant les fonctions de codage/decodage et tous les mecanismes connexes utilises pour livrer les paquets echanges entre les noeuds. Des questions comme le cycle de vie des paquets dans le reseau, lacardinalite des messages codes, le nombre total d’octets transmis et la duree du temps de maintien des paquets ont ete adressees analytiquement, en s’appuyant sur des theoremes, qui ont ete ensuite confirmes par des simulations. Dans les reseaux a pertes, les methodes utilisees pour etudier precisement le comportement du reseau conduisent a la proposition de nouveaux mecanismes pour surmonter cette perte et reduire la charge.Dans la premiere partie de la these, un etat de l’art des techniques de codage de reseauxest presente a partir des travaux de Alshwede et al. Les differentes techniques sont detaillees mettant l’accent sur les codages lineaires et binaires. Ces techniques sont decrites en s’appuyant sur differents scenarios pour aider a comprendre les avantages etles inconvenients de chacune d’elles. Dans la deuxieme partie, un nouveau protocole base sur la correlation des adresses (ACNC) est presente, et deux approches utilisant ce protocole sont introduites ; l’approche centralisee ou le decodage se fait aux noeuds d’extremites et l’approche distribueeou chaque noeud dans le reseau participe au decodage. Le decodage centralise est elabore en presentant d’abord ses modeles de decision et le detail du decodage aux noeuds d’extremites. La cardinalite des messages codes recus et les exigences de mise en mémoire tampon au niveau des noeuds d’extremites sont etudiees et les notions d’age et de maturite sont introduites. On montre que le decodage distribue permet de reduire la charge sur les noeuds d’extremite ainsi que la memoire tampon au niveau des noeuds intermediaires. La perte et le recouvrement avec les techniques de codage de reseau sont examines pour les deux approches proposees. Pour l’approche centralisee, deux mecanismes pour limiter l’impact de la perte sont presentes. A cet effet, le concept de fermetures et le concept dessous-ensembles couvrants sont introduits. Les recouvrements optimaux afin de trouver l’ensemble optimal de paquets a retransmettre dans le but de decoder tous les paquets reçus sont definis. Pour le decodage distribue, un nouveau mecanisme de fiabilite saut a saut est propose tirant profit du codage de reseau et permettant de recuperer les paquets perdus sans la mise en oeuvre d’un mecanisme d’acquittement
Network coding (NC) is a new technique in which transmitted data is encoded and decoded by the nodes of the network in order to enhance throughput and reduce delays. Using algebraic algorithms, encoding at nodes accumulates various packets in one message and decoding restores these packets. NC requires fewer transmissions to transmit all the data but more processing at the nodes. NC can be applied at any of the ISO layers. However, the focus is mainly on the network layer level. In this work, we introduce novelties to the NC paradigm with the intent of building easy to implement NC protocols in order to improve bandwidth usage, enhance QoS and reduce the impact of losing packets in lossy networks. Several challenges are raised by this thesis concerning details in the coding and decoding processes and all the related mechanisms used to deliver packets between end nodes. Notably, questions like the life cycle of packets in coding environment, cardinality of coded messages, number of bytes overhead transmissions and buffering time duration are inspected, analytically counted, supported by many theorems and then verified through simulations. By studying the packet loss problem, new theorems describing the behavior of the network in that case have been proposed and novel mechanisms to overcome this loss have been provided. In the first part of the thesis, an overview of NC is conducted since triggered by the work of Alshwede et al. NC techniques are then detailed with the focus on linear and binary NC. These techniques are elaborated and embellished with examples extracted from different scenarios to further help understanding the advantages and disadvantages of each of these techniques. In the second part, a new address correlated NC (ACNC) protocol is presented and two approaches using ACNC protocol are introduced, the centralized approach where decoding is conducted at end nodes and the distributed decoding approach where each node in the network participates in the decoding process. Centralized decoding is elaborated by first presenting its decision models and the detailed decoding procedure at end nodes. Moreover, the cardinality of received coded messages and the buffering requirements at end nodes are investigated and the concepts of aging and maturity are introduced. The distributed decoding approach is presented as a solution to reduce the overhead on end nodes by distributing the decoding process and buffering requirements to intermediate nodes. Loss and recovery in NC are examined for both centralized and distributed approaches. For the centralized decoding approach, two mechanisms to limit the impact of loss are presented. To this effect, the concept of closures and covering sets are introduced and the covering set discovery is conducted on undecodable messages to find the optimized set of packets to request from the sender in order to decode all received packets. For the distributed decoding, a new hop-to-hop reliability mechanism is proposed that takes advantage of the NC itself and depicts loss without the need of an acknowledgement mechanism
APA, Harvard, Vancouver, ISO, and other styles
36

Al-Mousa, Ahmad, and Ahmad mousa@mac com. "Developing Diversity Strategies to Address Complex Operating Environments." RMIT University. Management, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20090302.122501.

Full text
Abstract:
With the change in the economic structures of Western industrialised countries and the shift of traditional industries towards knowledge and services in recent decades the challenge to stay competitive in increasingly globalised culturally diverse markets continues to be a priority for organisations. Of central importance is the need to acknowledge, utilise and share the diversity of employees' knowledge, particularly tacit knowledge that is ethnically influenced, a resource that is enormously rich yet overlooked, undervalued and under-utilised in the employment market. This PhD dissertation focuses on the implications of the knowledge era for how organisations manage their culturally diverse workforce. The purpose of the research is to explore the organisational strategies required for Australian businesses to support and encourage the development and sharing of knowledge between employees of different cultural and ethnic backgrounds. Arising from an extensive review of the literature on both Diversity and Knowledge Management, a framework for a holistic Diversity Knowledge Management/Sharing (D-KM/S) Strategy was developed. This framework identified the need for organisations to develop a productive diversity management model that consists of a number of elements including a two-way communication strategy, training in cultural intelligence (CQ) and the development of opportunities for social networking through Communities of Practice. A four-phased process for the organisational journey towards a holistic D-KM/S Strategy was proposed. An initial audit of several Australian organisations recognised for their award-winning diversity management strategies confirmed the validity of this framework. The framework was then used to underpin the qualitative interpretive case study of three of the organisations that had been part of the initial audit to determine to what extent these organisations had succeeded in progressing through these phases towards the final holistic D-KM/S Strategy. In so doing, the candidate also focused on the role of the Human Resources Department (traditionally responsible for implementing diversity policy within organisations) in implementing a more holistic approach. From a comparison of the findings from the primary research the candidate concluded that while each organisation had progressed through several of the phases towards a holistic D-KM/S Strategy, they differed in their progress and none had as yet achieved the final phase. The study did identify two additional elements that require further research which relate to the potential of Information Technology to provide opportunities for social networking, and the potential of 'narrative' to be used to share culturally influenced stories. The research concludes that the organisational strategies required for Australian businesses to support and encourage the development and sharing of knowledge between employees of different cultural and ethnic backgrounds includes: first, a productive diversity strategy that acknowledges both the explicit and tacit knowledge that a multicultural workforce brings to an organisation; and, second, processes that embed two-way communication opportunities for employees and managers, training in CQ for an increased number of managers and employees, greater support for social networking opportunities through Communities of Practice (supported by Information Technology tools), and encouragement of opportunities for employees to share cultural narratives. In addition, the thesis proposed an increased role for the Human Resources Department (working closely with line managers) in the achievement of a holistic D-KM/S Strategy.
APA, Harvard, Vancouver, ISO, and other styles
37

Cao, Haian. "Memory address management for digital signal processors (DSPs)." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0007/MQ43147.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Dickey, Eleanor. "Greek forms of address : from Herodotus to Lucian /." Oxford [u.a.] : Clarendon Press, 2003. http://www.loc.gov/catdir/enhancements/fy0606/96013439-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

DUTT, Nikil D., Hiroaki TAKADA, and Hiroyuki TOMIYAMA. "Memory Data Organization for Low-Energy Address Buses." Institute of Electronics, Information and Communication Engineers, 2004. http://hdl.handle.net/2237/15042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ballester, Aristin Pedro. "New computational methods to address nonlinear inverse problems." Thesis, Imperial College London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lomas, David. "Improving automated postal address recognition using neural networks." Thesis, University of York, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.341602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ozel, Selim. "Utilizing Compliance To Address Modern Challenges in Robotics." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-dissertations/494.

Full text
Abstract:
Mechanical compliance will be an essential component for agile robots as they begin to leave the laboratory settings and join our world. The most crucial finding of this dissertation is showing how lessons learned from soft robotics can be adapted into traditional robotics to introduce compliance. Therefore, it presents practical knowledge on how to build soft bodied sensor and actuation modules: first example being soft-bodied curvature sensors. These sensors contain both standard electronic components soldered on flexible PCBs and hyperelastic materials that cover the electronics. They are built by curing multi-material composites inside hyper elastic materials. Then it shows, via precise sensing by using magnets and Hall-effect sensors, how closed-loop control of soft actuation modules can be achieved via proprioceptive feedback. Once curvature sensing idea is verified, the dissertation describes how the same sensing methodology, along with the same multi-material manufacturing technique can be utilized to construct soft bodied tri-axial force sensors. It shows experimentally that these sensors can be used by traditional robotic grippers to increase grasping quality. At this point, I observe that compliance is an important property that robots may utilize for different types of motions. One example being Raibert's 2D hopper mechanism. It uses its leg-spring to store energy while on the ground and release this energy before jumping. I observe that via soft material design, it would be possible to embed compliance directly into the linkage design itself. So I go over the design details of an extremely lightweight compliant five-bar mechanism design that can store energy when compressed via soft ligaments embedded in its joints. I experimentally show that the compliant leg design offers increased efficiency compared to a rigid counterpart. I also utilize the previously mentioned soft bodied force sensors for rapid contact detection (~5-10 Hz) in the hopper test platform. In the end, this thesis connects soft robotics with the traditional body of robotic knowledge in two aspects: a) I show that manufacturing techniques we use for soft bodied sensor/actuator designs can be utilized for creating soft ligaments that add strength and compliance to robot joints; and b) I demonstrate that soft bodied force sensing techniques can be used reliably for robotic contact detection.
APA, Harvard, Vancouver, ISO, and other styles
43

Van, Van C. (Van Christopher). "A defense against address spoofing using active networks." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Choi, Carol Y. (Carol Yunsook) 1976. "System dynamics approach to address urban youth homocide." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80058.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Includes bibliographical references (p. 49-50).
by Carol Y. Choi.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
45

Johnson, Christopher Ryan S. M. Massachusetts Institute of Technology. "Scaling address-space operations on Linux with TSX." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/91032.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
22
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 55-56).
Concurrent programming is important due to increasing core counts, but scalable concurrency control is difficult and error-prone to implement. Hardware Transactional Memory (HTM) addresses this problem by providing hardware support for concurrently executing arbitrary read-modify-write memory transactions. Intel released Transactional Synchronization eXtensions (TSX), a HTM implementation, in select processors to support scalable concurrency control. This thesis contributes a case study in applying TSX to the Linux virtual memory system, which currently serializes address-space operations with a lock. TSX should provide scalability by supporting concurrent address-space operations. Achieving scalability with TSX, however, turned out to be difficult due to transactional aborts. This thesis details how to identify and resolve abort problems, and it describes the necessary modifications to make address-space operations scale in Linux. This thesis also describes a new TLB shootdown algorithm, TxShootDown, which removes TLB shootdown from a transactional critical section while avoiding races due to concurrent address-space operations.
by Christopher Ryan Johnson.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
46

Fisher, Alexander. "Music and modes of address in African Cinema." Thesis, Ulster University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Elfving, Taru. "Thinking aloud on the address of the viewer." Thesis, Goldsmiths College (University of London), 2009. http://research.gold.ac.uk/15809/.

Full text
Abstract:
The thesis examines the viewer's position in relation to contemporary moving image installations, particularly the work of the artist and filmmaker Eija-Liisa Ahtila (b. 1959, Finland). It maps out a shift in research from the analysis, occupation and rethinking of subject positions to the mobilisation and inhabitation of encounters, where the positions are in constant becoming. In dialogue with Luce Irigaray's philosophical thought and related theoretical discourse, it traces a shift from the disruption of dualism with strategic mimesis to the critical inhabitation of a space of mediation opened up by resemblance. In terms of methodologies in the field of visual culture this implies a move from the problematics of representation, and from deconstructive and re-signifying practices, to questions of the viewer's and researcher's implication. The argument is structured around two parts, firstly on the Girl as an unmarked figure that unsettles definitions of centred, identity-based subjectivities and their gendered attributes. The figure emerges here not as a representation but as an event, while the focus is drawn from interiority as the core of a subject to surfaces as sites of contacts. This leads to the second part of the argument, on the notion of the address, which initiates a further shift of attention onto the modes by which the works and the characters in them allow and call for the viewer's involvement. The thesis examines these moves with the use of the concepts of staining, haunting, thinking aloud and witnessing, which all emphasise outward and forward orientation. They focus on boundaries as sites of disruption and production of positions of viewing, thinking and speaking, instead of as their markers. Through close reading of Ahtila's works the thesis argues for active viewership that demands constant critical situated ness in terms of affiliations arising from communication.
APA, Harvard, Vancouver, ISO, and other styles
48

Jacob, Daisey Thalia-Sánchez. "Preparing Community Health Workers to Address Hearing Loss." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/613158.

Full text
Abstract:
Objective: To expand the access to culturally relevant hearing health services in a rural U.S. border community with already limited healthcare resources, community health workers (Promotoras de Salud) were trained to provide peer-facilitated hearing education classes. Design: A specialized three-phase training process for community health workers was developed, implemented, and evaluated. The training process included: 1) Focus groups with community health workers and residents from the community to raise awareness of hearing loss among community health workers and the community; 2) A 3-hour workshop training to introduce basic topics to prepare community health workers to identify signs of hearing loss among community members and utilize effective communication strategies; and 3) A 24-hour multi-session, interactive training over 6 weeks for community health workers who would become facilitators of educational and peer-support groups for individuals with hearing loss and family members. Study Sample: Twelve Spanish-speaking local community health workers employed by a federally qualified health center participated in a focus group, 12 received the general training, and four individuals with prior experience as health educators received further in-person training as facilitators of peer-education groups on hearing loss and communication. Results: Community health workers increased their knowledge base and confidence in effective communication strategies and developed skills in facilitating hearing education and peer support groups. Through case study practice, community health workers demonstrated competencies and applied their learning to specific situations related to effective communication with hearing loss, family support, assistive technology, use of hearing protection, and making referrals for hearing health care. Needs were identified for ongoing training in the area of assistive technology and addressing situations of more severe hearing loss. Conclusions: It is feasible to train community health workers to begin to address hearing loss and facilitate peer health education and support groups for individuals with hearing loss and their family members. In efforts to increase access to audiologic services in rural or hard-to-reach areas, application of the community health worker model with a partnership of audiologists deserves further consideration as a viable approach.
APA, Harvard, Vancouver, ISO, and other styles
49

Bitter, James. "Am I an Adlerian?” Ansbacher Lecture (Keynote Address)." Digital Commons @ East Tennessee State University, 2006. https://dc.etsu.edu/etsu-works/6083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Chugh, Sarabjeet Singh. "Impact of Network Address Translation on Router Performance." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/35307.

Full text
Abstract:
Network Address Translation (NAT) is a method by which Internet Protocol (IP) addresses are ranslated from one group to another, in a manner transparent to the end users. It translates the source and destination addresses and ports in the Internet Protocol datagram. There are several benefits for using NAT. NAT can be installed without changes to hosts or routers, it allows reuse of globally routable addresses, it facilitates easy migration or addition of new networks and it provides a method to keep private network addresses hidden from the outside world.

NAT, however, is a processor- and memory-intensive activity for any device that implements it. This is because NAT involves reading from and writing to the header and payload information of every IP packet to do the address translation, a performance-intensive activity. It causes an increase in Central Processing Unit (CPU) and memory utilization and may impair throughput and increase the latency experienced by a packet. Thus, understanding the performance impact of NAT on a network device (in particular, a router) becomes an important factor when implementing NAT in any live network.

This thesis aims to understand and quantify the impact of Network Address Translation on a network router by doing a series of performance tests after specifying the performance parameters to measure and, then, clearly defining the performance testing methodology that is used to study each of the performance parameters. After a discussion of previous research, the measurement system and subsequent measurement results are described.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography