Academic literature on the topic 'Analyse de la trace d'exécution'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Analyse de la trace d'exécution.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Analyse de la trace d'exécution":

1

Moisan, Pierre. "Technique contractuelle et gestion des risques dans les contrats internationaux : les cas de force majeure et d'imprévision." Les Cahiers de droit 35, no. 2 (April 12, 2005): 281–334. http://dx.doi.org/10.7202/043281ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Une multitude d'événements peut perturber le déroulement d'une transaction internationale. La prévention et la répartition des risques revêtent donc une importance primordiale pour les parties au contrat. Les praticiens ont élaboré des clauses sophistiquées permettant d'adapter la relation contractuelle aux circonstances nouvelles. Parmi ces clauses, l'auteur analyse celles qui s'attachent à résoudre les problèmes d'exécution engendrés par les situations de force majeure et d'imprévision. L'insertion de telles clauses apparaît essentielle devant l'inadéquation des solutions juridiques nationales et internationales en la matière.
2

Nélisse, Claude, and Isabelle Uribé. "Analyse des évaluations médicales et psychosociales requises par la nouvelle Loi sur le Curateur public." Santé mentale au Québec 17, no. 2 (June 17, 2008): 265–83. http://dx.doi.org/10.7202/502081ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
RÉSUMÉ La nouvelle Loi sur le Curateur public requiert systématiquement des évaluations médicales et psychosociales. Comparant le texte et l’esprit de la Loi à ses procédures et ses formulaires d'opération le présent texte explique les diverses tâches qui incomberont aux professionnels de la santé et des services sociaux. Après une présentation succincte de cette Loi, le texte montre que le rôle de ces professionnels y est limité à de l'évaluation pour fin d'expertise et que cela ne va pas sans créer certains malaises. Ensuite, les deux notions clefs d'« inaptitude » et de « besoin » sont présentées dans leur sens juridique, avec leurs conséquences du point de vue de l'évaluation médicale d'abord et psychosociale ensuite. Cette dernière en particulier sera analysée dans ses difficultés d'exécution. La conclusion est une remarque générale susceptible de donner un sens à ce geste simple et quelquefois routinier qu'est celui de « remplir un formulaire ».
3

Umamahewari, E., Krishnaveni S, and Xiao-Zhi Gao. "Trace Crawler." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 371. http://dx.doi.org/10.14419/ijet.v7i4.10.20939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Object Request Broker (ORB) manages the interaction between clients and servers using the Internet InterORB Protocol (IIOP). The ORB trace file comprises of messages, trace points, and wire tracing. These trace files are usually large and at times they can grow to 1-2 GBs. For debugging an ORB problem, the developer must determine whether the problem is in the client or in the server of the distributed application. Typically during debugging process, developer have to switch between source codes and trace logs back and forth multiple times. Often browsing the right source code file, opening it in the IDE and then moving to the line from where the trace is originated. This work proposes a tool which will help developers and service engineers to browse through source code and corresponding trace by providing integrated framework. The Aim of the tool is to build an application to parse and analyse ORB trace files. The application will fetch relevant details for the failing entries, and will perform the preliminary analysis. In this way a lot of time and human effort can be saved. The customers such as defense, military organizations can themselves view relevant details about the failures of their application by this tool, without having to compromise on confidentiality with minimal effort and time.
4

Courts, Cornelius. "Forensische RNA-Analyse–Möglichkeiten und Perspektiven." BIOspektrum 30, no. 3 (May 2024): 277–81. http://dx.doi.org/10.1007/s12268-024-2178-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractRNA analysis is used to contextualize biological traces in forensic investigations by assigning biological trace material and components of mixed stains containing different body fluids to particular tissues. While RNA based forensic body fluid and organ tissue identification is already a mature and robust method that is routinely used in forensic casework, there is still active ongoing research exploring the potential of forensic RNA analysis to investigate even more contextual aspects of forensic relevance.
5

Aumeistere, Līva, Alīna Beluško, and Inga Ciproviča. "Assessment of Heavy Metals and Trace Elements in the Human Milk of Women Living in Latvia and an Evaluation of Influencing Factors." Nutrients 16, no. 11 (May 22, 2024): 1568. http://dx.doi.org/10.3390/nu16111568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
During lactation, heavy metals and trace elements can be mobilised from the maternal body stores and excreted via human milk. A total of 66 mature human milk samples were collected from lactating women in Latvia between 2016 and 2017 to analyse the content of As, Cd, Pb, Al, Sn, and Ni. Additionally, 50 mature human milk samples were collected between 2022 and 2023 to analyse the content of Cd and Pb. The content of heavy metals and trace elements in human milk was determined using ICP-MS. Only two individual human milk samples contained heavy metals above the method’s detection limit—one with an arsenic content of 0.009 mg kg−1 and one with a lead content of 0.047 mg kg−1. The preliminary data show that human milk among lactating women in Latvia contains only insignificant amounts of heavy metals and trace elements. Concern over such content should not be a reason to choose formula feeding over breastfeeding. Nevertheless, heavy metals, trace elements and other pollutants in human milk should be continuously monitored.
6

Ben Amor, Leïla. "Télévision et intégration. Remarques préliminaires sur le rôle joué par la télévision dans les processus d'intégration nationale au Mexique." Revista Trace, no. 40 (September 5, 2018): 26. http://dx.doi.org/10.22134/trace.40.2001.543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La télévision comme objet d'étude a autant de facettes qu'il en existe d'approches. Alors qu'elle est un objet central, obligé et protéiforme des études de communication, elle relève simplement pour le sociologue des lieux ou instruments de socialisation où se produisent et s'internalisent les schémas de perception et d'adéquation à la société. D'où l'importance que revêt l'analyse du discours de la télévision, sous ses multiples formes -analyse de production, analyse linguistique, etc.-; le discours de la télévision est donné comme discours socialisant. C'est à partir de là que rebondit l'anthropologue: puisque la télévision produit de la socialisation, alors quand elle s'adresse à des popu­lations indigènes ou "exogènes"-immigrantes-, elle fait tout naturellement acte d'acculturation. Le postulat étant que la télévision s'adresse d'abord aux individus et groupes "intégrés" à la société concernée ...
7

Pappalardo, Gelsomina. "ACTRIS Aerosol, Clouds and Trace Gases Research Infrastructure." EPJ Web of Conferences 176 (2018): 09004. http://dx.doi.org/10.1051/epjconf/201817609004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Aerosols, Clouds and Trace gases Research Infrastructure (ACTRIS) is a distributed infrastructure dedicated to high-quality observation of aerosols, clouds, trace gases and exploration of their interactions. It will deliver precision data, services and procedures regarding the 4D variability of clouds, short-lived atmospheric species and the physical, optical and chemical properties of aerosols to improve the current capacity to analyse, understand and predict past, current and future evolution of the atmospheric environment.
8

Foulard, Camille. "Sur les traces d’un mexicaniste français, constitution et analyse du fonds François Chevalier." Revista Trace, no. 49 (July 23, 2018): 80. http://dx.doi.org/10.22134/trace.49.2006.472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La grande thèse de François Chevalier, La formation des grand domaines au Mexique, terre et société aux XVI-XVIIIe siècle, publiée en 1952 a, en son temps, très profondement marqué l’historiographie. S’inscrivant résolument dans la mouvance des Annales, François Chevalier fait montre d’une grande originalité quant aux thèmes abordés et aux méthodes utilisées. À ce titre il est, dès les années cinquante, l’un des grands instigateurs du renouvellement des problématiques portant sur l’Amérique latine en sciences sociales. Historien, spécialiste sans conteste du Mexique puis des pays andins, François Chevalier n’a cependant pas eu le parcours classique de l’enseignant-chercheur. Il effectue, en effet, la majeure partie de sa carrière en tant que directeur successif de l’Institut français d’Amérique latine (IFAL) au Mexique, de la Casa Velázquez en Espagne et de l’Institut français d’Études andines (IFEA) au Pérou, institutions au sein desquelles il contribue largement au rayonnement intellectuel français. Lors de ses séjours prolongés en Amérique latine, François Chevalier a constitué une bibliothèque personnelle dont la valeur est inestimable pour nombre d’américanistes puisque de nombreux ouvrages, actuellement épuisés, n’existent plus qu’en unique exemplaire. Ce fonds a, pour partie, été versé au Centre de recherche sur l’Amérique latine et les mondes étrangers (CRALMI) de l’université Paris I Panthéon-Sorbonne.
9

Gürünlüoğlu, Hatice, and Gamze Erdoğdu. "Voltammetric Detection of Trace Elements in Various Biological Matrices." Sensor Letters 18, no. 10 (October 1, 2020): 750–54. http://dx.doi.org/10.1166/sl.2020.4273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The purpose of this work is to analyse Cu, Zn, Pb and Cd simultaneously in biological samples such as serum, hair, tooth and bone using differential pulse stripping voltammetry (DPSV). Therefore, suitable sample preparation and experimental conditions are determined. Trace metal concentrations of biological samples are measured and compared with the literature values. Cu, Zn and Pb are found in hair, tooth and bone samples while Cu and Zn metals is found in serum sample.
10

Ibrahim, Idris Skloul, Peter J. B. King, and Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File." Journal of Intelligent Systems 24, no. 4 (December 1, 2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractNs2 is an open-source communications network simulator primarily used in research and teaching. Ns2 provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless networks. Although Ns2 is a widely used powerful simulator, it lacks a way to measure networks that are used to assess reliability and performance metrics (e.g., the number of packets transferred from source to destination, delay in packets, packet loss, etc.) and it does not analyse the trace files it produces. The data obtained from the simulations are not straightforward to analyse. Ns2 is still unable to provide any data analysis statistics or graphics as requested. Moreover, the analysis of the Ns2 trace file using any software scripts requires further steps by a developer to do data processing and then produce graphical outputs. Lack of standardisation of tools means that results from different users may not be strictly comparable. There are alternative tools; however, most of them are not standalone applications, requiring some additional libraries. Also, they lack a user-friendly interface. This article presents the architecture and development considerations for the NsGTFA (Ns2 GUI Trace File Analyser) tool, which intends to simplify the management and enable the statistical analysis of trace files generated during network simulations. NsGTFA runs under Windows and has a friendly graphical user interface. This tool is a very fast standalone application implemented in VC++, taking as input an Ns2 trace file. It can output two-dimensional (2D) and 3D graphs (points, lines, and bar charts) or data sets, whatever the trace file format (Tagged, Old, or New). It is also possible to specify the output of standard network performance metrics. NsGTFA satisfies most user needs. There is no complex installation process, and no external libraries are needed.

Dissertations / Theses on the topic "Analyse de la trace d'exécution":

1

Vigouroux, Xavier. "Analyse distribuée de traces d'exécution de programmes parallèles." Lyon, École normale supérieure (sciences), 1996. http://www.theses.fr/1996ENSL0016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le monitoring consiste a generer des informations de trace durant une execution d'un programme parallele pour detecter les problemes de performances. La quantite d'information generee par de tres grosses machines paralleles rend les outils d'analyse classiques inutilisables. Cette these resout ce probleme en distribuant l'information de trace sur plusieurs fichiers contenus sur plusieurs sites, les fichiers pouvant etre lus en parallele. La manipulation de ces fichiers afin d'obtenir une information coherente est la base d'un logiciel client-serveur grace auquel des clients demandent de l'information deja filtree sur une execution. Cette architecture client serveur est extensible (l'utilisateur peut creer ses propres clients) et modulable. Nous avons, d'autre part, cree deja plusieurs clients novateurs: client hierarchique, sonore, recherche automatique de problemes, interface filtrante aux outils classique, integration d'outil 3D
2

Amiar, Azzeddine. "Aide à l'Analyse de Traces d'Exécution dans le Contexte des Microcontrôleurs." Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00978227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Souvent, dû a l'aspect cyclique des programmes embarqu és, les traces de microcontrôleurs contiennent beaucoup de donn ées. De plus, dans notre contexte de travail, pour l'analyse du comportement, une seule trace se terminant sur une défaillance est disponible. L'objectif du travail pr esent é dans cette th ese est d'aider à l'analyse de trace de microcontrôleurs. La premi ère contribution de cette th èse concerne l'identifi cation de cycles, ainsi que la g én ération d'une description pertinente de la trace. La d étection de cycles repose sur l'identifi cation du loop- header. La description propos ée à l'ing enieur est produite en utilisant la compression bas ée sur la g én ération d'une grammaire. Cette derni ère permet la d etection de r ép étitions dans la trace. La seconde contribution concerne la localisation de faute(s). Elle est bas ée sur l'analogie entre les ex écutions du programme et les cycles. Ainsi, pour aider dans l'analyse de la trace, nous avons adapt é des techniques de localisation de faute(s) bas ée sur l'utilisation de spectres. Nous avons aussi d éfi ni un processus de filtrage permettant de r éduire le nombre de cycles àa utiliser pour la localisation de faute(s). Notre troisi ème contribution concerne l'aide a l'analyse des cas o ù les multiples cycles d'une même ex écution interagissent entre eux. Ainsi, pour faire de la localisation de faute(s) pour ce type de cas, nous nous int eressons à la recherche de r égles d'association. Le groupement des cycles en deux ensembles (cycles suspects et cycles corrects) pour la recherche de r égles d'association, permet de d e finir les comportements jug és correctes et ceux jug és comme suspects. Ainsi, pour la localisation de faute(s), nous proposons à l'ing enieur un diagnostic bas é sur l'analyse des r égles d'association selon leurs degr és de suspicion. Cette th èse pr esente également les évaluations men ées, permettant de mesurer l'efficacit e de chacune des contributions discut ées, et notre outil CoMET. Les r ésultats de ces évaluations montrent l'e fficacit e de notre travail d'aide à l'analyse de traces de microcontrôleurs.
3

Dosimont, Damien. "Agrégation spatiotemporelle pour la visualisation de traces d'exécution." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM075/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les techniques de visualisation de traces sont fréquemment employées par les développeurs pour comprendre, déboguer, et optimiser leurs applications.La plupart des outils d'analyse font appel à des représentations spatiotemporelles, qui impliquent un axe du temps et une représentation des ressources, et lient la dynamique de l'application avec sa structure ou sa topologie.Toutefois, ces dernières ne répondent pas au problème de passage à l'échelle de manière satisfaisante. Face à un volume de trace de l'ordre du Gigaoctet et une quantité d'évènements supérieure au million, elles s'avèrent incapables de représenter une vue d'ensemble de la trace, à cause des limitations imposées par la taille de l'écran, des performances nécessaires pour une bonne interaction, mais aussi des limites cognitives et perceptives de l'analyste qui ne peut pas faire face à une représentation trop complexe. Cette vue d'ensemble est nécessaire puisqu'elle constitue un point d'entrée à l'analyse~; elle constitue la première étape du mantra de Shneiderman - Overview first, zoom and filter, then details-on-demand -, un principe aidant à concevoir une méthode d'analyse visuelle.Face à ce constat, nous élaborons dans cette thèse deux méthodes d'analyse, l'une temporelle, l'autre spatiotemporelle, fondées sur la visualisation. Elles intègrent chacune des étapes du mantra de Shneiderman - dont la vue d'ensemble -, tout en assurant le passage à l'échelle.Ces méthodes sont fondées sur une méthode d'agrégation qui s'attache à réduire la complexité de la représentation tout en préservant le maximum d'information. Pour ce faire, nous associons à ces deux concepts des mesures issues de la théorie de l'information. Les parties du système sont agrégées de manière à satisfaire un compromis entre ces deux mesures, dont le poids de chacune est ajusté par l'analyste afin de choisir un niveau de détail. L'effet de la résolution de ce compromis est la discrimination de l'hétérogénéité du comportement des entités composant le système à analyser. Cela nous permet de détecter des anomalies dans des traces d'applications multimédia embarquées, ou d'applications de calcul parallèle s'exécutant sur une grille.Nous avons implémenté ces techniques au sein d'un logiciel, Ocelotl, dont les choix de conception assurent le passage à l'échelle pour des traces de plusieurs milliards d'évènements. Nous proposons également une interaction efficace, notamment en synchronisant notre méthode de visualisation avec des représentations plus détaillées, afin de permettre une analyse descendante jusqu'à la source des anomalies
Trace visualization techniques are commonly used by developers to understand, debug, and optimize their applications.Most of the analysis tools contain spatiotemporal representations, which is composed of a time line and the resources involved in the application execution. These techniques enable to link the dynamic of the application to its structure or its topology.However, they suffer from scalability issues and are incapable of providing overviews for the analysis of huge traces that have at least several Gigabytes and contain over a million of events. This is caused by screen size constraints, performance that is required for a efficient interaction, and analyst perceptive and cognitive limitations. Indeed, overviews are necessary to provide an entry point to the analysis, as recommended by Shneiderman's emph{mantra} - Overview first, zoom and filter, then details-on-demand -, a guideline that helps to design a visual analysis method.To face this situation, we elaborate in this thesis several scalable analysis methods based on visualization. They represent the application behavior both over the temporal and spatiotemporal dimensions, and integrate all the steps of Shneiderman's mantra, in particular by providing the analyst with a synthetic view of the trace.These methods are based on an aggregation method that reduces the representation complexity while keeping the maximum amount of information. Both measures are expressed using information theory measures. We determine which parts of the system to aggregate by satisfying a trade-off between these measures; their respective weights are adjusted by the user in order to choose a level of details. Solving this trade off enables to show the behavioral heterogeneity of the entities that compose the analyzed system. This helps to find anomalies in embedded multimedia applications and in parallel applications running on a computing grid.We have implemented these techniques into Ocelotl, an analysis tool developed during this thesis. We designed it to be capable to analyze traces containing up to several billions of events. Ocelotl also proposes effective interactions to fit with a top-down analysis strategy, like synchronizing our aggregated view with more detailed representations, in order to find the sources of the anomalies
4

Emteu, Tchagou Serge Vladimir. "Réduction à la volée du volume des traces d'exécution pour l'analyse d'applications multimédia de systèmes embarqués." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM051/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le marché de l'électronique grand public est dominé par les systèmes embarqués du fait de leur puissance de calcul toujours croissante et des nombreuses fonctionnalités qu'ils proposent.Pour procurer de telles caractéristiques, les architectures des systèmes embarqués sont devenues de plus en plus complexes (pluralité et hétérogénéité des unités de traitements, exécution concurrente des tâches, ...).Cette complexité a fortement influencé leur programmabilité au point où rendre difficile la compréhension de l'exécution d'une application sur ces architectures.L'approche la plus utilisée actuellement pour l'analyse de l'exécution des applications sur les systèmes embarqués est la capture des traces d'exécution (séquences d'événements, tels que les appels systèmes ou les changements de contexte, générés pendant l'exécution des applications).Cette approche est utilisée lors des activités de test, débogage ou de profilage des applications.Toutefois, suivant certains cas d'utilisation, les traces d'exécution générées peuvent devenir très volumineuses, de l'ordre de plusieurs centaines de gigaoctets.C'est le cas des tests d'endurance ou encore des tests de validation, qui consistent à tracer l'exécution d'une application sur un système embarqué pendant de longues périodes, allant de plusieurs heures à plusieurs jours.Les outils et méthodes d'analyse de traces d'exécution actuels ne sont pas conçus pour traiter de telles quantités de données.Nous proposons une approche de réduction du volume de trace enregistrée à travers une analyse à la volée de la trace durant sa capture.Notre approche repose sur les spécificités des applications multimédia, qui sont parmi les plus importantes pour le succès des dispositifs populaires comme les Set-top boxes ou les smartphones.Notre approche a pour but de détecter automatiquement les fragments (périodes) suspectes de l'exécution d'une application afin de n'enregistrer que les parties de la trace correspondant à ces périodes d'activités.L'approche que nous proposons comporte deux étapes : une étape d'apprentissage qui consiste à découvrir les comportements réguliers de l'application à partir de la trace d'exécution, et une étape de détection d'anomalies qui consiste à identifier les comportements déviant des comportements réguliers.Les nombreuses expériences, réalisées sur des données synthétiques et des données réelles, montrent que notre approche permet d'obtenir une réduction du volume de trace enregistrée d'un ordre de grandeur avec d'excellentes performances de détection des comportements suspects
The consumer electronics market is dominated by embedded systems due to their ever-increasing processing power and the large number of functionnalities they offer.To provide such features, architectures of embedded systems have increased in complexity: they rely on several heterogeneous processing units, and allow concurrent tasks execution.This complexity degrades the programmability of embedded system architectures and makes application execution difficult to understand on such systems.The most used approach for analyzing application execution on embedded systems consists in capturing execution traces (event sequences, such as system call invocations or context switch, generated during application execution).This approach is used in application testing, debugging or profiling.However in some use cases, execution traces generated can be very large, up to several hundreds of gigabytes.For example endurance tests, which are tests consisting in tracing execution of an application on an embedded system during long periods, from several hours to several days.Current tools and methods for analyzing execution traces are not designed to handle such amounts of data.We propose an approach for monitoring an application execution by analyzing traces on the fly in order to reduce the volume of recorded trace.Our approach is based on features of multimedia applications which contribute the most to the success of popular devices such as set-top boxes or smartphones.This approach consists in identifying automatically the suspicious periods of an application execution in order to record only the parts of traces which correspond to these periods.The proposed approach consists of two steps: a learning step which discovers regular behaviors of an application from its execution trace, and an anomaly detection step which identifies behaviors deviating from the regular ones.The many experiments, performed on synthetic and real-life datasets, show that our approach reduces the trace size by an order of magnitude while maintaining a good performance in detecting suspicious behaviors
5

Zoor, Maysam. "Latency verification in execution traces of HW/SW partitioning model." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Alors que de nombreux travaux de recherche visent à définir de nouvelles techniques de vérification (formelle) pour vérifier les exigences dans un modèle, la compréhension de la cause profonde de la violation d'une exigence reste un problème ouvert pour les plateformes complexes construites autour de composants logiciels et matériels. Par exemple, la violation d'une exigence de latence est-elle due à un ordonnancement temps réel défavorable, à des conflits sur les bus, aux caractéristiques des algorithmes fonctionnels ou des composants matériels ? Cette thèse introduit une approche d'analyse précise de la latence appelée PLAN. PLAN prend en entrée une instance d'un modèle de partitionnement HW/SW, une trace d'exécution, et une contrainte de temps exprimée sous la forme suivante : la latence entre l'opérateur A et l'opérateur B doit être inférieure à une valeur de latence maximale. PLAN vérifie d'abord si la condition de latence est satisfaite. Si ce n'est pas le cas, l'intérêt principal de PLAN est de fournir la cause première de la non satisfaction en classant les transactions d'exécution en fonction de leur impact sur la latence : transaction obligatoire, transaction induisant une contention, transaction n'ayant aucun impact, etc. Une première version de PLAN suppose une exécution pour laquelle il existe une exécution unique de l'opérateur A et une exécution unique de l'opérateur B. Une seconde version de PLAN peut calculer, pour chaque opérateur A exécuté, l'opérateur B correspondant. Pour cela, notre approche s'appuie sur des techniques de tainting. La thèse formalise les deux versions de PLAN et les illustre par des exemples ludiques. Ensuite, nous montrons comment PLAN a été intégré dans un Framework Dirigé par le Modèle (TTool). Les deux versions de PLAN sont illustrées par deux études de cas tirées du projet H2020 AQUAS. En particulier, nous montrons comment l'altération peut traiter efficacement les multiples et occurrences concurrentes du même opérateur
While many research works aim at defining new (formal) verification techniques to check for requirements in a model, understanding the root cause of a requirement violation is still an open issue for complex platforms built around software and hardware components. For instance, is the violation of a latency requirement due to unfavorable real-time scheduling, to contentions on buses, to the characteristics of functional algorithms or hardware components?This thesis introduces a Precise Latency ANalysis approach called PLAN. PLAN takes as input an instance of a HW/SW partitioning model, an execution trace, and a time constraint expressed in the following format: the latency between operator A and operator B should be less than a maximum latency value. First PLAN checks if the latency requirement is satisfied. If not, the main interest of PLAN is to provide the root cause of the non satisfaction by classifying execution transactions according to their impact on latency: obligatory transaction, transaction inducing a contention, transaction having no impact, etc.A first version of PLAN assumes an execution for which there is a unique execution of operator A and a unique execution of operator B. A second version of PLAN can compute, for each executed operator A, the corresponding operator B. For this, our approach relies on tainting techniques.The thesis formalizes the two versions of PLAN and illustrates them with toy examples. Then, we show how PLAN was integrated into a Model-Driven Framework (TTool). The two versions of PLAN are illustrated with two case studies taken from the H2020 AQUAS project. In particular, we show how tainting can efficiently handle the multiple and concurrent occurrences of the same operator
6

Lesage, Benjamin. "Architecture multi-coeurs et temps d'exécution au pire cas." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00870971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les tâches critiques en systèmes temps-réel sont soumises à des contraintes temporelles et de correction. La validation d'un tel système repose sur l'estimation du comportement temporel au pire cas de ses tâches. Le partage de ressources, inhérent aux architectures multi-cœurs, entrave le calcul de ces estimations. Le comportement temporel d'une tâche dépend de ses rivales du fait de l'arbitrage de l'accès aux ressources ou de modifications concurrentes de leur état. Cette étude vise à l'estimation de la contribution temporelle de la hiérarchie mémoire au pire temps d'exécution de tâches critiques. Les méthodes existantes, pour caches d'instructions, sont étendues afin de supporter caches de données privés et partagés, et permettre l'analyse de hiérarchies mémoires riches. Le court-circuitage de cache est ensuite utilisé pour réduire la pression sur les caches partagés. Nous proposons à cette fin différentes heuristiques basées sur la capture de la réutilisation de blocs de cache entre différents accès mémoire. Notre seconde proposition est la politique de partitionnement Preti qui permet l'allocation d'un espace sans conflits à une tâche. Preti favorise aussi les performances de tâches non critiques concurrentes aux temps-réel dans les systèmes de criticité hybride.
7

Lopez, Cueva Patricia. "Debugging Embedded Multimedia Application Execution Traces through Periodic Pattern Mining." Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-01006213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La conception des systèmes multimédia embarqués présente de nombreux défis comme la croissante complexité du logiciel et du matériel sous-jacent, ou les pressions liées aux délais de mise en marche. L'optimisation du processus de débogage et validation du logiciel peut aider à réduire sensiblement le temps de développement. Parmi les outils de débogage de systèmes embarqués, un puissant outil largement utilisé est l'analyse de traces d'exécution. Cependant, l'évolution des techniques de tra¸cage dans les systèmes embarqués se traduit par des traces d'exécution avec une grande quantité d'information, à tel point que leur analyse manuelle devient ingérable. Dans ce cas, les techniques de recherche de motifs peuvent aider en trouvant des motifs intéressants dans de grandes quantités d'information. Concrètement, dans cette thèse, nous nous intéressons à la découverte de comportements périodiques sur des applications multimédia. Donc, les contributions de cette thèse concernent l'analyse des traces d'exécution d'applications multimédia en utilisant des techniques de recherche de motifs périodiques fréquents. Concernant la recherche de motifs périodiques, nous proposons une définition de motif périodique adaptée aux caractéristiques de la programmation paralléle. Nous proposons ensuite une représentation condensée de l'ensemble de motifs périodiques fréquents, appelée Core Periodic Concepts (CPC), en adoptant une approche basée sur les relations triadiques. De plus, nous définissons quelques propriétés de connexion entre ces motifs, ce qui nous permet de mettre en oeuvre un algorithme efficace de recherche de CPC, appelé PerMiner. Pour montrer l'efficacité et le passage à l'échelle de PerMiner, nous réalisons une analyse rigoureuse qui montre que PerMiner est au moins deux ordres de grandeur plus rapide que l'état de l'art. En plus, nous réalisons un analyse de l'efficacité de PerMiner sur une trace d'exécution d'une application multimédia réelle en présentant l'accélération accompli par la version parallèle de l'algorithme. Concernant les systèmes embarqués, nous proposons un premier pas vers une méthodologie qui explique comment utiliser notre approche dans l'analyse de traces d'exécution d'applications multimédia. Avant d'appliquer la recherche de motifs fréquents, les traces d'exécution doivent ˆetre traitées, et pour cela nous proposons plusieurs techniques de pré-traitement des traces. En plus, pour le post-traitement des motifs périodiques, nous proposons deux outils : un outil qui trouve des pairs de motifs en compétition ; et un outil de visualisation de CPC, appelé CPCViewer. Finalement, nous montrons que notre approche peut aider dans le débogage des applications multimédia à travers deux études de cas sur des traces d'exécution d'applications multimédia réelles.
8

Touzeau, Valentin. "Analyse statique de caches LRU : complexité, analyse optimale, et applications au calcul de pire temps d'exécution et à la sécurité." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Dans le cadre des systèmes critiques, la certification de programmes temps-réel nécessite de borner leur temps d'exécution.Les mémoires caches impactant fortement la latence des accès mémoires, les outils de calcul de pire temps d'exécution incluent des analyses de cache.Ces analyses visent à prédire statiquement si ces accès aboutissent à des cache-hits ou des cache-miss.Ce problème étant indécidable en général, les analyses de caches emploient des abstractions pouvant mener à des pertes de précision.Une hypothèse habituelle pour rendre le problème décidable consiste à supposer que toutes les exécutions du programme sont réalisables.Cette hypothèse est raisonnable car elle ne met pas en cause la validité de l'analyse: tous les véritables chemins d'exécutions du programme sont couverts par l'analyse.Néanmoins, la classification des accès mémoires reste difficile en pratique malgré cette hypothèse, et les analyses de cache efficaces utilisent des approximations supplémentaires.Cette thèse s'intéresse à la possibilité de réaliser des analyses de cache de précision optimale sous l'hypothèse que tous les chemins sont faisables.Les problèmes de classification d'accès mémoires en hits et miss y sont définis formellement et nous prouvons qu'ils sont NP-difficiles, voire PSPACE-difficiles, pour les politiques de remplacement usuelles (LRU, FIFO, NMRU et PLRU).Toutefois, si ces résultats théoriques justifient l'utilisation d'abstractions supplémentaires, ils n'excluent pas l'existence d'un algorithme efficace en pratique pour des instances courantes dans l'industrie.Les abstractions usuelles ne permettent pas, en général, de classifier tous les accès mémoires en Always-Hit et Always-Miss.Certains sont alors classifiés Unknown par l'analyse de cache, et peuvent aboutir à des cache-hits comme à des cache-miss selon le chemin d'exécution emprunté.Cependant, il est aussi possible qu'un accès soit classifié comme Unknown alors qu'il mène toujours à un hit (ou un miss), à cause d'une approximation trop grossière.Nous proposons donc une nouvelle analyse de cache d'instructions LRU, capable de classifier certains accès comme Definitely Unknown, une nouvelle catégorie représentant les accès pouvant mener à un hit ou à un miss.On est alors certain que la classification de ces accès est due au programme et à la configuration du cache, et pas à une approximation peu précise.Par ailleurs, cette analyse réduit le nombre d'accès candidats à une reclassification par des analyses plus précises mais plus coûteuses.Notre principale contribution est une analyse capable de produire une classification de précision optimale.Celle-ci repose sur une méthode appelée block focusing qui permet le passage à l'échelle en analysant les blocs de cache un par un.Nous profitons ainsi de l'analyse de l'analyse Definitely Unknown, qui réduit le nombre de candidats à une classification plus précise.Cette analyse précise produit alors une classification optimale pour un coût raisonnable (proche du coût des analyses usuelles May et Must).Nous étudions également l'impact de notre analyse exacte sur l'analyse de pipeline.En effet, lorsqu'une analyse de cache ne parvient pas à classifier un accès comme Always-Hit ou Always-Miss, les deux cas (hit et miss) sont envisagés par l'analyse de pipeline.En fournissant une classification plus précise des accès mémoires, nous réduisons donc la taille de l'espace d'états de pipeline exploré, et donc le temps de l'analyse.Par ailleurs, cette thèse étudie la possibilité d'utiliser l'analyse Definitely Unknown dans le domaine de la sécurité.Les mémoires caches peuvent être utilisées comme canaux cachés pour extraire des informations de l'exécution d'un programme.Nous proposons une variante de l'analyse Definitely Unknown visant à localiser la source de certaines fuites d'information
The certification of real-time safety critical programs requires bounding their execution time.Due to the high impact of cache memories on memory access latency, modern Worst-Case Execution Time estimation tools include a cache analysis.The aim of this analysis is to statically predict if memory accesses result in a cache hit or a cache miss.This problem is undecidable in general, thus usual cache analyses perform some abstractions that lead to precision loss.One common assumption made to remove the source of undecidability is that all execution paths in the program are feasible.Making this hypothesis is reasonable because the safety of the analysis is preserved when adding spurious paths to the program model.However, classifying memory accesses as cache hits or misses is still hard in practice under this assumption, and efficient cache analysis usually involve additional approximations, again leading to precision loss.This thesis investigates the possibility of performing an optimally precise cache analysis under the common assumption that all execution paths in the program are feasible.We formally define the problems of classifying accesses as hits and misses, and prove that they are NP-hard or PSPACE-hard for common replacement policies (LRU, FIFO, NRU and PLRU).However, if these theoretical complexity results legitimate the use of additional abstraction, they do not preclude the existence of algorithms efficient in practice on industrial workloads.Because of the abstractions performed for efficiency reasons, cache analyses can usually classify accesses as Unknown in addition to Always-Hit (Must analysis) or Always-Miss (May analysis).Accesses classified as Unknown can lead to both a hit or a miss, depending on the program execution path followed.However, it can also be that they belong to one of the Always-Hit or Always-Miss category and that the cache analysis failed to classify them correctly because of a coarse approximation.We thus designed a new analysis for LRU instruction that is able to soundly classify some accesses into a new category, called Definitely Unknown, that represents accesses that can lead to both a hit or a miss.For those accesses, one knows for sure that their classification does not result from a coarse approximation but is a consequence of the program structure and cache configuration.By doing so, we also reduce the set of accesses that are candidate for a refined classification using more powerful and more costly analyses.Our main contribution is an analysis that can perform an optimally precise analysis of LRU instruction caches.We use a method called block focusing that allows an analysis to scale by only analyzing one cache block at a time.We thus take advantage of the low number of candidates for refinement left by our Definitely Unknown analysis.This analysis produces an optimal classification of memory accesses at a reasonable cost (a few times the cost of the usual May and Must analyses).We evaluate the impact of our precise cache analysis on the pipeline analysis.Indeed, when the cache analysis is not able to classify an access as Always-Hit or Always-Miss, the pipeline analysis must consider both cases.By providing a more precise memory access classification, we thus reduce the state space explored by the pipeline analysis and hence the WCET analysis time.Aside from this application of precise cache analysis to WCET estimation, we investigate the possibility of using the Definitely Unknown analysis in the domain of security.Indeed, caches can be used as side-channel to extract some sensitive data from a program execution, and we propose a variation of our Definitely Unknown analysis to help a developer finding the source of some information leakage
9

Jahier, Erwan. "Analyse dynamique de programme : Mise en oeuvre automatisée d'analyseurs performants et spécifications de modèles d'exécution." Rennes, INSA, 2000. http://www.theses.fr/2000ISAR0009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
De nombreuses études montrent que la plus grande partie du coût de production d'un logiciel est générée lors de la phase de maintenance. Lors de cette phase, pour corriger des erreurs, pour optimiser des programmes, ou pour ajouter des fonctionnalités, il est essentiel de comprendre les programmes, et en particulier de comprendre leur comportement. Les analyseurs dynamiques d'exécutions tels que les profileurs, les moniteurs, ou les débogueurs, sont alors des outils indispensables. Cependant, ces outils d'analyse dynamique sont extrêmement coûteux à mettre en oeuvre : (1) d'abord, parce qu'il est généralement nécessaire de modifier le système de compilation utilisé, ce qui est fastidieux et pas toujours envisageable ; (2) en outre, les besoins en outils d'analyse de programmes varient d'un utilisateur à l'autre, en fonction de sa compétence, de son expérience du système de programmation utilisé, ainsi que de sa connaissance du code à maintenir ; (3) et enfin, parce que ces outils sont difficilement réutilisables. Il est donc souhaitable que chaque utilisateur puisse spécifier facilement les analyses dynamiques dont il a besoin. C'est pourquoi nous proposons dans cette thèse une architecture qui permet de faciliter leur mise en oeuvre. Cette architecture est basée : (1) sur une instrumentation systématique du programme qui produit une image très détaillée de l'exécution, la trace ; (2) sur un ensemble de primitives qui permettent d'analyser cette trace efficacement. Les analyseurs résultants ont des performances du même ordre de grandeur que leurs équivalents implémentés <<à la main>> par modification du système de compilation. Ils peuvent être mis en oeuvre par des utilisateurs sans connaissance particulière du système de compilation, qu'ils n'ont pas à modifier. Cette architecture leur permet d'implémenter les outils qui leur conviennent, adaptés à leur niveau de compréhension du code qu'ils sont chargés de maintenir. De plus, la structure modulaire de l'architecture proposée devrait permettre de faciliter la réutilisation de ces analyseurs pour d'autres systèmes. Notre propos est illustré dans le cadre du langage de programmation logique et fonctionnelle Mercury. Cependant, les concepts utilisés sont indépendants du paradigme de programmation. La trace sur laquelle nous basons la mise en oeuvre de nos analyseurs se doit de refléter le plus fidèlement possible la sémantique opérationnelle du langage. C'est pourquoi nous proposons également dans cette thèse un cadre de modélisation des traces d'exécutions basé sur une sémantique opérationnelle du langage à analyser. Cette spécification formelle de la trace nous permet de valider expérimentalement les traceurs et de prouver leur correction. Cette étude a été menée dans le cadre du langage de programmation logique Prolog
Several studies show that most of the software production cost is spent during the maintenance phase. During that phase, to locate bugs, to optimize programs, or to add new functionalities, it is essential to understand programs, and in particular to understand their runtime behavior. Dynamic analysis tools such as debuggers, profilers, or monitors, are very useful in that respect. However, such tools are expensive to implement because: (1) it generally requires to modify the compiling system, which is tedious and not always possible; (2) the needs in dynamic analysis tools vary from one user to another, depending on its competence, on its experience of the programming system, and on its knowledge of the code to maintain; (3) such tools are generally difficult to reuse. It is therefore desirable that each user is able to specify easily the dynamic analyses he needs. Hence, we propose an architecture that eases dynamic analysis tools implementation. This architecture is based on: (1) a systematic instrumentation of the program which gives a detailed image of the execution, the trace; (2) a set of trace processing primitives that lets one analyse the trace efficiently. The resulting analysers have performance of the same order of magnitude that their equivalent implemented ``by hand'' by modifying the compiling system. They can be implemented by programmers without any knowledge of the compiling system. This architecture let them implement the tools they need, adapted to their level of comprehension of the code they are in charge to maintain. Furthermore, the modular structure of the proposed architecture should ease the analysers reuse. This work has been held within the context of the logical and functional programming language Mercury. However, the concepts we used do not depend on the programming paradigm. The trace on which we base the implementation of our dynamic analysis tools should reflect as much as possible the runtime behavior of programs. Therefore, we also propose a framework to specify execution traces. This framework is based on an operational semantics of the language to analyse. Such formal specifications of the trace let us experimentally validate tracers, and prove their correctness. This work have been held within the context of the logical programming language Prolog
10

Bourgade, Roman. "Analyse du temps d'exécution pire-cas de tâches temps-réel exécutées sur une architecture multi-cœurs." Phd thesis, Université Paul Sabatier - Toulouse III, 2012. http://tel.archives-ouvertes.fr/tel-00746073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les défaillances des applications embarquées dans les systèmes temps-réel strict peuvent avoir des conséquences graves (catastrophes industrielles, mise en danger de vies humaines). La vérification des contraintes temporelles d'un système temps-réel strict dépend de la connaissance du temps d'exécution pire-cas des tâches constituant l'application embarquée. L'utilisation de processeurs multi-cœurs est l'un des moyens actuellement mis en œuvre afin d'améliorer le niveau de performances des systèmes embarqués. Cependant, la détermination du temps d'exécution pire-cas d'une tâche sur ce type d'architecture est rendue difficile par le partage de certaines ressources par les cœurs, et notamment le bus d'interconnexion permettant l'accès à la mémoire centrale. Ce document propose un nouveau mécanisme d'arbitrage de bus à deux niveaux permettant d'améliorer les performances des ensembles de tâches exécutés tout en garantissant le respect des contraintes temporelles. Les méthodes décrites permettent d'établir un niveau de priorité d'accès au bus optimal pour chacune des tâches exécutées. Elles permettent également de trouver une allocation optimale des tâches aux cœurs lorsqu'il y a plus de tâches à exécuter que de cœurs disponibles. Les résultats expérimentaux montrent une diminution significative des estimations de temps d'exécution pire-cas et de l'utilisation du processeur.

Books on the topic "Analyse de la trace d'exécution":

1

gouvernementale, Observatoire de l'action. Analyse de l'état d'exécution du budget général de l'État, exercice 2011 au 30 juin 2011. Bujumbura: Observatoire de l'action gouvernementale, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kuttler, Wilhelm. Raum-zeitliche Analyse atmosphärischer Spurenstoffeinträge in Mitteleuropa. Paderborn: F. Schöningh, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1940-, Krull Ira S., and Eastern Analytical Symposium (1987 : New York, N.Y.), eds. Trace metal analysis and speciation. Amsterdam: Elsevier, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

E, Prichard, MacKay G. M, and Points J, eds. Trace analysis: A structured approach to obtaining reliable results. Cambridge: published for the Laboratory of the Government Chemist by the Royal Society of Chemistry, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

F, Keefer Robert, and Sajwan Kenneth S, eds. Trace elements in coal and coal combustion residues. Boca Raton: Lewis Publishers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Howard, A. G. Inorganic trace analysis: Philosophy and practice. Chichester: Wiley, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Loconto, Paul R. Trace environmental quantitative analysis: Principles, techniques, and applications. 2nd ed. Boca Raton, FL: Taylor & Francis/CRC Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

gouvernementale, Observatoire de l'action. Analyse de l'état d'exécution du budget général de l'État, exercice 2012 au 30 juin 2012: Améliorer les dépenses de croissance et de lutte contre la pauvreté. Bujumbura: Observatoire de l'action gouvernementale (O.A.G.) asbl, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mah, Ebenezer Paul. Aperçu sur la pratique des voies d'exécution au Cameroun: Les procédures et exploits élaborés au cours de l'exécution forcée des titres exécutoires analyse, commentaires et application. Yaoundé: Mah E.P., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

gouvernementale, Observatoire de l'action. Analyse de l'état d'exécution du budget général de l'État, exercice 2013 au 30 juin 2013: Des prévisions économiques et budgétaires impossibles à réaliser avant la fin de l'année 2013. Bujumbura: Observatoire de l'action gouvernementale, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Analyse de la trace d'exécution":

1

Neele, Thomas, Antti Valmari, and Tim A. C. Willemse. "The Inconsistent Labelling Problem of Stutter-Preserving Partial-Order Reduction." In Lecture Notes in Computer Science, 482–501. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45231-5_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractIn model checking, partial-order reduction (POR) is an effective technique to reduce the size of the state space. Stubborn sets are an established variant of POR and have seen many applications over the past 31 years. One of the early works on stubborn sets shows that a combination of several conditions on the reduction is sufficient to preserve stutter-trace equivalence, making stubborn sets suitable for model checking of linear-time properties. In this paper, we identify a flaw in the reasoning and show with a counter-example that stutter-trace equivalence is not necessarily preserved. We propose a solution together with an updated correctness proof. Furthermore, we analyse in which formalisms this problem may occur. The impact on practical implementations is limited, since they all compute a correct approximation of the theory.
2

Wubs-Mrozewicz, Justyna. "Maritime Networks and Premodern Conflict Management on Multiple Levels. The Example of Danzig and the Giese Family." In Atti delle «Settimane di Studi» e altri Convegni, 385–405. Florence: Firenze University Press, 2019. http://dx.doi.org/10.36253/978-88-6453-857-0.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article argues that a novel way to analyse maritime networks in premodern northern Europe is to trace the activities of people involved in conflict management. These people were traders, magistrates, judges, urban diplomats: sometimes all comprised in one person or a family. Specifically, if we take the Hanseatic city of Danzig and the Giese family as an example, it becomes apparent that these ‘conflict managers’ operated on various levels: the city, the region, the state, the Hanse and on the level of politics and economic policy between states and cities. Economic interests and conflicts were intertwined with political, social and cultural matters, and should be investigated together.
3

Niemann, Dennis, David Krogmann, and Kerstin Martens. "Between Economics and Education: How International Organisations Changed the View on Education." In International Impacts on Social Policy, 189–200. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86645-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractIn this chapter, we examine international organizations (IOs) that work in the educational sector and analyse how education as a field of activity has spread across and within IOs. We show how the vertical interdependence regarding the dissemination of ideas by IOs is increasingly manifested. We trace the general development of the IO population in the policy field of education to underscore that IOs whose mandates were not originally concerned with education entered the field of education. In this context, particularly IOs with economic policy backgrounds expanded into education policy. We illustrate how these economic IOs changed the way education is viewed today and which ideas regarding education dominate in global discourse, as exemplified by the cases of the World Bank and the Organisation for Economic Co-operation and Development (OECD).
4

Chaker, Sarah, and Axel Petri-Preis. "Musikvermittlung and Its Innovative Potential." In Forum Musikvermittlung - Perspektiven aus Forschung und Praxis, 11–38. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839456811-003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In their introductory article, Sarah Chaker and Axel Petri-Preis aim to contextualise the volume by providing terminological, historical and current sociological approaches to Musikvermittlung. Among other things, they show that the term Musikvermittlung is deeply rooted in German music education and discuss the problems of finding an adequate English translation for the international scientific community. Furthermore, the authors trace the increasing institutionalisation and professionalisation of practices of Musikvermittung and analyse their current significance from the perspective of cultural policy. Finally, they argue that Musikvermittlung has the inherent innovative potential to function as a social bridge builder: through music, people who otherwise would not have met, due to their different social and cultural backgrounds, are brought together and invited to interact with each other. This is how practitioners of Musikvermittlung are »doing universality« in the sense of Andreas Reckwitz (2020), thereby providing »a counterweight to the omnipresent act of doing singularity« (ibid.: 441) in contemporary societies.
5

Arosio, Laura. "What People Leave Behind Online: Digital Traces and Web-Mediated Documents for Social Research." In Frontiers in Sociology and Social Research, 311–23. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11756-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractIndividuals and groups leave evidence of their lives when they are engaged in their activities. In this way, they create a rich amount of material that tells us about their behaviours, opinions and values. This material is not created for research purposes and is different from that solicited by researchers. In recent decades, the spread of new communication technologies has amplified the possibility of creating and disseminating this kind of data outside the research context.In this chapter, what people leave behind (WPLB) online is studied from a strictly methodological point of view. What kind of evidence are researchers dealing with? Is it possible to reconnect it with the traditional methodological framework? We suggest that data left behind by people and groups on the Internet should be divided into three different categories: online found data (digital traces), online retrieved data (web-mediated documents) and online captured data (online behaviours). The phase of contextualization proves essential in understanding the very nature of (online) data.This work leads to rediscovering the potential of classical methodological tools such as simple observation, documentary analysis and trace analysis. These practices provide methodological value to research projects that analyse WPLB in physical and web-mediated environments.
6

Erdal, Marta Bivand, Lubomiła Korzeniewska, and Davide Bertelli. "Becoming Destination(s)? Complex Migration Trajectories, Transnational Lifeworlds and Migration Decisions." In IMISCOE Research Series, 23–43. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12503-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractWe depart from a paradox: migrants’ complex migration trajectories challenge dominant, often destination-oriented, conceptualisations of migration decision-making. This prompted us to raise the issue, in the questions pursued in our 30 semi-structured interviews with nurse migrants, of why Norway was chosen as a destination or a base for onward movement. We draw on this dataset, with specific analytical emphasis on eight of these interviews, in which the nurses shared their experiences of complex migration trajectories between Poland, the Philippines and Norway; others included Belgium, Denmark, the Netherlands, Saudi Arabia, Sweden and the UK. Our contribution builds on the case of professional, predominantly female, often South-North migrants, whose experiences to date have not been formative in migration theory, despite the volume of interdisciplinary research on nurse migration. We argue that a fresh and critical perspective may contribute to the adjustment of prevailing theorisations. We trace the geographical patterns of our interviewees’ complex migration trajectories and analyse the dynamics of onward migration decision-making in the context of transnational lifeworlds. We find actual and potential onward migration is a significant feature of nurse migrants’ trajectories, where the notion of ‘a destination’ is illusive, changes over time and is shaped by multi-sited transnational ties.
7

Larsen, Henrik Gutzon, and Carl Marklund. "Sublimated Expansionism? Living Space Ideas in Nordic Small-State Geopolitics." In Socio-Spatial Theory in Nordic Geography, 15–30. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04234-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractIn intellectual histories of geography as well as in international relations, geopolitics is usually the business of great powers, understood as the expansion of hard power through territorial control. However, the existence of a ‘Geopolitik of the weak’ has also been theorised, premised on the ability of smaller states – such as the Nordic countries – to secure their survival through a wider range of policy instruments. In this chapter, we analyse key themes in the work of two Nordic geographical thinkers deeply concerned with the place and status of their home countries in the era of high modernity – Rudolf Kjellén and Gudmund Hatt. Relying upon their scholarly works as well as relevant public debates circa 1905–1945, we trace the ‘small-state geopoliticking’ of Hatt and Kjellén, identifying three key characteristics of their style of small-state geopolitics: (1) determinism is qualified by voluntarism; (2) space is complemented by future; and (3) external expansion is sublimated into internal progress. In its reconceptualisation of living space as primarily concerned with existential survival as premised upon future progress, rather than outward-oriented territorial expansion, small-state geopolitics emerges as a highly situated, somewhat quaint but nonetheless significant element in Nordic theorising of geography.
8

Hackney, Jeffrey. "More than a trace of the old philosophy." In The Classification of Obligations, 123–56. Oxford University PressOxford, 1997. http://dx.doi.org/10.1093/oso/9780198265986.003.0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract The location of fiduciary obligations is not just a classroom exercise. No doubt every generation feels that it stands at a crossroads, but it is true of ours that as a result of recent developments in the law of restitution and of trusts, a number of paths are open to us, including a return down the path we are already on. Other Commonwealth jurisdictions have already set off on quite different paths, with Canada in particular striking out boldly into new territory.1 The issue is in the first instance analytical-’what is the nature of fiduciary obligations?’-and in particular ‘how do we analyse these obliga tions consistently with the way we analyse other categories like property, contract, tort, trust?’.
9

Rocha, Carolina. "Don Segundo Sombra." In Argentine Cinema and National Identity (1966-1976). Liverpool University Press, 2018. http://dx.doi.org/10.5949/liverpool/9781786940544.003.0007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this chapter, I trace the motivations and trials faced by Manuel Antín in adapting Don Segundo Sombra to the silver screen. I discuss its casting, production and reception. I also analyse the film, paying attention to the coming of age a gaucho.
10

Weiss, Tobias. "The Campaign for Nuclear Power in Japan before and after 2011." In Civil Society and the State in Democratic East Asia. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463723930_ch04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the chapter I analyse the emergence of a countermovement in reaction to the rise of the movement against nuclear power in Japan since the 1970s. I trace the emergence of the countermovement in historical perspective, and analyse the organizational and social basis, the mobilization processes, the framing, and political influence of the groups involved. I then analyse the political impact of the Fukushima 2011 nuclear accident on the movement. I show how the countermovement was able survive a period of intense contestation preserving its resource basis and retaining significant influence on the policymaking process due to support from parts of the national bureaucracy and conservative politicians.

Conference papers on the topic "Analyse de la trace d'exécution":

1

Hedde, Damien, and Frederic Petrot. "A non intrusive simulation-based trace system to analyse Multiprocessor Systems-on-Chip software." In 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). IEEE, 2011. http://dx.doi.org/10.1109/rsp.2011.5929983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Isnard, H., J. Moureau, S. Quidelleur, F. Guegen, M. Granet, G. Favre, A. Nonell, and F. Chartier. "Attractive approach to analyse trace and ultra-trace elements on transmutation targets by direct separation of isobaric interferences using collision reaction cell implanted on MC-ICPMS." In 2009 1st International Conference on Advancements in Nuclear Instrumentation, Measurement Methods and their Applications (ANIMMA). IEEE, 2009. http://dx.doi.org/10.1109/animma.2009.5503707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moeckli, M., and M. W. Sigrist. "Trace-Gas Monitoring with a Mobile CO2-Laser Photoacoustic System." In The European Conference on Lasers and Electro-Optics. Washington, D.C.: Optica Publishing Group, 1996. http://dx.doi.org/10.1364/cleo_europe.1996.cwd3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Laser photoacoustic spectroscopy is a powerful tool for the monitoring of a large number of gaseous substances at concentration levels varying from the ppb to the percent level. We have developed a fully computer controlled mobile CO2 laser photoacoustic spectrometer which has been involved in several field studies [1,2]. Our system will be presented including some recent developments. Owing to the strong absorption, CO2 laser spectroscopy is particularly sensitive to ethene and ammonia, two trace gases that are important for the production of photochemical smog and of acid rain, respectively, and which are both emitted by road traffic and other sources. These compounds are difficult to detect with alternative methods, particularly if a good time resolution and high sensitivity are required. With the widespread introduction of catalytic convenes in cars, the local concentration of traffic-emitted ammonia could have increased substantially in the recent past. We present first results of a field study performed with our system during a five day period in summer 1995 at a freeway tunnel outlet near Zurich. Tunnel air was pumped continuously through the photoacoustic cell. In order to avoid any adverse effects during sampling which could influence the components to be monitored we used neither CO2 nor H2O scrubbers but preferred to analyse the PA spectra by taking these two substances into account in the fitting procedure for the spectral analysis. The measurements were done at atmospheric pressure and simultaneous monitoring of CO2, ethene and ammonia was achieved with a time resolution of 10 minutes by automatic tuning to the appropriate laser transitions. Detection thresholds of a few ppb were obtained for ethene and ammonia. Furthermore, the CO level was monitored independently by a conventional device. The derived concentration profiles could be correlated with the data from an automatic traffic counting system. Rather high gas concentrations were derived, particularly for ethene and ammonia in the range of up to 250 ppb and 400 ppb, respectively. Even at night the ammonia concentrations stayed well above the background level of a few ppb. Based on these data and the calculated air flow through the tunnel, emission factors (mass of an exhausted component per car and km) from road traffic for the four substances could be determined. To our knowledge it is the first time that ammonia emission factors have been derived in Switzerland. An extrapolation with our emission factor of 15 mg ammonia per km and car indicates that traffic contributes approximately 1 % to the total ammonia emission into the air in Switzerland. A similar percentage was estimated for Austria in 1990. Local relative contributions can be much higher and strongly depend on the vehicle composition of the traffic.
4

Grossmann, K. U., and D. Offermann. "CRyogenic Infrared Spectrometers and Telescopes for the Atmosphere - CRISTA." In Optical Remote Sensing of the Atmosphere. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/orsa.1991.oma4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The distribution of trace gases in the middle atmosphere results from the interplay of photochemistry and dynamics. More and more refined 3-D models of the atmosphere as well as local soundings by balloons and rockets reveal an atmosphere which is highly structured horizonatally, vertically, and in time. The spatial dimensions of such structures span the wide range from global scale planetary waves to local turbulence. Today's remote sensing satellites generally exhibit a good spatial resolution when vertical scales are considered. In the horizontal plane, however, their resolution is limited to the distance between two adjacent orbits. In order to improve the spatial resolution and to detect and analyse small scale structures the experiment CRISTA is planned.
5

Li, Haoxiang, Bin Du, Wei Zheng, Qiuhao Wang, Huaqiang Yin, Xuedong He, Hua Fan, and Tao Ma. "Corrosion Behavior of Superalloys in High Temperature Gas Cooled Reactor in Impure Helium With Corrosion Time." In 2021 28th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/icone28-64351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract There are trace impurities such as CO, CH4, H2, H2O in helium of main cooling loop of high temperature gas cooled reactor, which will cause corrosion of superalloy materials used in steam generator and intermediate heat exchanger at high temperature. Previous experiments and literatures show that the formation of chromium rich protective oxide layer on the surface of superalloy is an important factor to prevent severe corrosion of superalloy. In this paper, the corrosion tests of four candidate materials Inconel 617, Incoloy 800H, Hastelloy X and T-22 for high temperature reactor steam generator were carried out. The four superalloys were exposed at 950 °C for 50, 100, 150 and 200 hours in helium with a certain impurity content. The corrosion results were analyzed by weighing, scanning electron microscopy (SEM) and electron probe microanalysis (EPMA). The corrosion of these four alloys occurred in different degrees. In this paper, we mainly analyse the conclusion of 50h and 200h corrosion of these four kinds of superalloys. On the whole, Hastelloy X and T-22 have good corrosion resistance and low mass gain; Inconel 617 and Incoloy 800H have poor corrosion resistance, obvious internal oxidation and high mass gain.
6

Vasanthakumar, Parthasarathy. "Computation of Aerodynamic Damping for Flutter Analysis of a Transonic Fan." In ASME 2011 Turbo Expo: Turbine Technical Conference and Exposition. ASMEDC, 2011. http://dx.doi.org/10.1115/gt2011-46597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper describes the computational analysis of aerodynamic damping for prediction of flutter characteristics of a transonic fan stage that consists of a highly loaded rotor along with a tandem stator. Three dimensional, linearized Navier-Stokes flow solver TRACE is used to numerically analyse the flutter stability of the fan. The linear flow solver enables the modeling of a single blade passage to simulate the desired inter-blade phase angle. The unsteady aerodynamic load on a vibrating blade is obtained by solving the unsteady Navier-Stokes equations on a dynamically deforming grid and the energy exchange method is used to calculate the aerodynamic damping. The calculation of aerodynamic damping for the prediction of flutter characteristics of the fan rotor is carried out with and without considering the influence of the disk. The blade mode shapes from finite element modal analysis are obtained accordingly and the flutter calculations are carried out for three blade vibration modes at the design speed and at part speeds for all possible inter-blade phase angles. Two operating points, one on the working line and the other near stall are investigated at every rotational speed. Different aspects that affect the aerodynamic damping behaviour like part speed operation, variation in unsteady blade surface pressure fluctuation between operating points on the working line and at near stall and the corresponding variation in aerodynamic work, inter-blade phase angle etc., are described. This analysis primarily focuses on the variations in aerodynamic damping of the fan with and without the influence of the disk. In addition, influence and effect of shock wave on the aerodynamic damping is also discussed.
7

Vasanthakumar, Parthasarathy, and Paul-Benjamin Ebel. "Forced Response Analysis of a Transonic Fan." In ASME Turbo Expo 2012: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/gt2012-69867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The forced response of turbomachinery blades is a primary source of high cycle fatigue (HCF) failure. This paper deals with the computational prediction of blade forced response of a transonic fan stage that consists of a highly loaded rotor along with a tandem stator. In the case of a transonic fan, the forced response of the rotor due to the downstream stator assumes significance because of the transonic flow field. The objective of the present work is to determine the forced response of the rotor induced as a result of the unsteady flow field due to the downstream stator vanes. Three dimensional, Navier-Stokes flow solver TRACE is used to numerically analyse the forced response of the fan. A total of 11 resonant crossings as identified in the Campbell diagram are examined and the corresponding modeshapes are obtained from finite element modal analysis. The interaction between fluid and structure is dealt with in a loosely coupled manner based on the assumption of linear aerodynamic damping. The aerodynamic forcing is obtained by a nonlinear unsteady Navier-Stokes computation and the aerodynamic damping is obtained by a time-linearized Navier-Stokes computation. The forced response solution is obtained by the energy method allowing calculations to be performed directly in physical space. Using the modal forcing and damping, the forced response amplitude can be directly computed at the resonance crossings. For forced response solution, the equilibrium amplitude is reached when the work done on the blade by the external forcing function is equal to the work done by the system damping (aerodynamic and structural) force. A comprehensive analysis of unsteady aerodynamic forces on the rotor blade surface as a result of forced response of a highly loaded transonic fan is carried out. In addition, the correspondence between the location of high stress zones identified from the finite element analysis and the regions of high modal force identified from the CFD analysis is also discussed.
8

Manuel Figueiredo, Carlos, Ana Rafaela Diogo, and Joana André Leite. "Adapting Jane Austen to the screen: fashion and costume in Autumn de Wilde’s movie "Emma"." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The visual and behavioral codes prevalent in society at any given moment are part of its social conventions and constitute a framework that rules everyone´s image, dress and the attitudes that society not only tolerates but expects from them. However, it is unquestionable that despite the rigidity and formality imposed on personal appearance and manners, it is still possible to find some room to play with the possibilities afforded to people, albeit conditioned by their social status, so as to manage to express their inner self, mood, and even outlook on life, at any point in time. What is more, it is possible for an individual inserted in such a society to become the center around which everything revolves and trace a path to success, without necessarily trespassing any of the red lines drawn by society's norms. In her novels, Jane Austen chose as protagonists middle to upper class young women that stand out by managing to, in the limited scope of action afforded to them, work society in their favour so as to achieve their perceived notions of fulfillment and personal happiness. Based on one of Austen's novels Emma, and its 2020 movie adaptation directed by Autumn de Wilde, we will assess how Alexandra Byrne’s costumes work in relation to the aesthetics of Emma’s world and surroundings. As well as investigate how they showcase, are impacted and can even be read as symbolic representations of the course of her life, evolution and relationships in this movie, which is considered to be particularly faithful to the novel.Keeping this in mind, we will analyse several scenes that are key both in terms of the plot and the costumes of the main character—Emma. This analysis will consider filmic and design notions of characters, narrative and space, as well as their construction and representation. It will focus on questions of storytelling regarding how the viewer is informed about Emma’s personality and mood, as well as capable of feeling her emotions, in the key events of the plot. As well as try to answer why and how Emma and her costumes remain the main focus in almost every shot of the movie, and how components such as the fictional space, its framing and composition are always in relation and dependent on her and her portrayal.Despite this movie being Autumn de Wilde’s debut, her mastery of notions of visual hierarchies, aesthetics and cinematic techniques that keep Emma highlighted and the focus of the action at all times, in the foreground of the shot, is undeniable. This translates to impeccably shot spaces that are completely in tune with the costumes, providing a sense of ease or contrast to the characters' relation to the space, further highlighting the subjects in the main action.In such an aesthetically developed piece, it is then also unavoidable that Emma’s every interaction and the development of her relationships will have a direct impact on her inner image, and therefore her outer image, affecting her relation and attachments to her costumes.

Reports on the topic "Analyse de la trace d'exécution":

1

Anderson, Sharron, Antony Lloyd, Malcom Baxter, Michael Walls, and Victoria Bailey-Horne. Turmeric survey – Final report. Food Standards Agency, July 2022. http://dx.doi.org/10.46756/sci.fsa.ojv940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The consumption of turmeric supplements is increasingly popular and is reported to provide numerous health benefits including antioxidant, analgesic, anti-inflammatory, antiseptic, anticarcinogenic, chemopreventive, chemotherapeutic, antiviral, antibacterial, antifungal and antiplatelet activities [1]. However, in recent months there has been a number of reports of hepatotoxicity linked to the consumption of these supplements. Such reports and scientific publications led to a review of the safety of turmeric and curcumin by the UK Committee on Toxicity of Chemicals in Food, Consumer Products and the Environment (COT). The statement issued by COT in November 2019 concluded “Given past reported contamination issues with turmeric supplements, the Committee concluded that there would be value in commissioning a chemical analysis of turmeric supplements and raw/powdered turmeric available on the UK market”. To address this conclusion the FSA requested Fera to: develop and validate in-house method(s) for measuring curcumin in turmeric containing supplements, ground/powdered turmeric and raw/fresh turmeric develop and validate in-house a method for measuring piperine in turmeric containing supplements purchase turmeric containing supplements (n=15), ground/powdered turmeric (n=10) and raw/fresh turmeric (n=5) from a mixture of local outlets and over the internet analyse all 30 samples for trace elements and curcumin analyse all supplement samples for piperine content.
2

Rogers, Amanda. Creative Expression and Contemporary Arts Making Among Young Cambodians. Swansea University, May 2021. http://dx.doi.org/10.23889/sureport.56822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This project analysed the creative practices and concerns of young adult artists (18-35 years old) in contemporary Cambodia. It examined the extent to which the arts are being used to open up new ways of enacting Cambodian identity that encompass, but also move beyond, a preoccupation with the Khmer Rouge (1975-1979). Existing research has focused on how the recuperation and revival of traditional performance is linked to the post-genocidal reconstruction of the nation. In contrast, this research examines if, and how, young artists are moving beyond the revival process to create works that speak to a young Cambodian population.The research used NGO Cambodian Living Arts’ 2020 Cultural Season of performances, workshops, and talks as a case study through which to examine key concerns of young Cambodian artists, trace how these affected their creative process, and analyse how the resulting works were received among audiences. It was funded through the AHRC GCRF Network Plus Grant ‘Changing the Story’ which uses arts and humanities approaches to ‘build inclusive societies with, and for, young people in post-conflict settings.

To the bibliography