Academic literature on the topic 'E CONFIGURATION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E CONFIGURATION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "E CONFIGURATION"

1

Timm, J. David, and Frank Papenmeier. "Processing spatial configurations in visuospatial working memory is influenced by shifts of overt visual attention." PLOS ONE 18, no. 2 (February 9, 2023): e0281445. http://dx.doi.org/10.1371/journal.pone.0281445.

Full text
Abstract:
When memorizing multiple objects, humans process them in relation to each other, proposing a configuration benefit. Shifts in overt visual attention through eye movements might influence the processing of spatial configurations. Whereas some research suggests that overt visual attention aids the processing of spatial representations, other research suggests a snapshot-like processing of spatial configurations, thus likely not relying on eye movements. In the first experiment, we focused on the comparison between an enforced fixation and a free view condition regarding configurational effects. Participants encoded objects’ locations and were asked for changes at retrieval. One object was displaced in half of the trials and was either accompanied by a configuration or was displayed alone. In the second experiment, we expanded this idea by enforcing fixation during different task phases, namely encoding, maintenance and retrieval. We investigated if a fixed gaze during one specific phase drives the influence of eye movements when processing spatial configurations. We observed reliable configuration benefits for the free view conditions. Whereas a fixed gaze throughout the whole trial reduced the effect, enforced fixations during the task phases did not break the configuration benefit. Our findings suggest that whereas the processing of spatial configurations in memory is supported by the ability of performing shifts of overt visual attention, configurational processing does not rely on these shifts occurring throughout the task. Our results indicate a reciprocal relationship of visuospatial working memory and eye movements.
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Zhi Gao, Qian Feng, Yong Shen Li, Feng Ming Zhang, and You Wei Du. "Monte Carlo Simulation of Configurational Anisotropy of Magnetic Cluster." Materials Science Forum 475-479 (January 2005): 3161–64. http://dx.doi.org/10.4028/www.scientific.net/msf.475-479.3161.

Full text
Abstract:
In this paper, the spin configuration and the configurational anisotropy of the clusters were studied by Monte Carlo simulations. An easy magnetization directions and a configurational anisotropy were found for the clusters using the hysteresis and spin configurations in different magnetization processes, and the simulated natural angle and energy distribution. It is considered that the configurational anisotropy is mainly attributed to the non-uniformity in spin configurations.
APA, Harvard, Vancouver, ISO, and other styles
3

Agmon, Eran, Alexander J. Gates, Valentin Churavy, and Randall D. Beer. "Exploring the Space of Viable Configurations in a Model of Metabolism–Boundary Co-construction." Artificial Life 22, no. 2 (May 2016): 153–71. http://dx.doi.org/10.1162/artl_a_00196.

Full text
Abstract:
We introduce a spatial model of concentration dynamics that supports the emergence of spatiotemporal inhomogeneities that engage in metabolism–boundary co-construction. These configurations exhibit disintegration following some perturbations, and self-repair in response to others. We define robustness as a viable configuration's tendency to return to its prior configuration in response to perturbations, and plasticity as a viable configuration's tendency to change to other viable configurations. These properties are demonstrated and quantified in the model, allowing us to map a space of viable configurations and their possible transitions. Combining robustness and plasticity provides a measure of viability as the average expected survival time under ongoing perturbation, and allows us to measure how viability is affected as the configuration undergoes transitions. The framework introduced here is independent of the specific model we used, and is applicable for quantifying robustness, plasticity, and viability in any computational model of artificial life that demonstrates the conditions for viability that we promote.
APA, Harvard, Vancouver, ISO, and other styles
4

Kudsk, Anders, Lars Hvam, and Christian Langhoff Thuesen. "Using a Configuration System to Design Toilets and Place Installation Shafts." Open Construction and Building Technology Journal 7, no. 1 (November 15, 2013): 158–69. http://dx.doi.org/10.2174/1874836801307010158.

Full text
Abstract:
The aim of this research is to discover how configuration systems can support a product’s design process when a high degree of variation is required and a very open or endless space exists for possible configurations. The article is based on an industrial case involving a firm that wishes to offer a bathroom configurator to architects. The aim of the configurator is to help architects design a bathroom according to relevent requirements and norms. In offering the configurator, the firm aims to enable a design that can be coordinated with a prefabricated installation shaft sold by the firm, and also to create customer leads. Four scenarios are developed for how design can be supported by four different types of configuration technologies. The four scenarios are evaluated in relation to a number of functional and technical requirements. The scenarios indicate that a good and varied range of opportunities exist for using configuration systems in the construction industry. They also show that it can be done without fundamentally changing the present process.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Yunwang, Sumei Dai, Lala Zhao, Xucong Yan, and Yong Shi. "Topological Design Methods for Mecanum Wheel Configurations of an Omnidirectional Mobile Robot." Symmetry 11, no. 10 (October 10, 2019): 1268. http://dx.doi.org/10.3390/sym11101268.

Full text
Abstract:
A simple and efficient bottom-roller axle intersections approach for judging the omnidirectional mobility of the Mecanum wheel configuration is proposed and proved theoretically. Based on this approach, a sub-configuration judgment method is derived. Using these methods, on the basis of analyzing the possible configurations of three and four Mecanum wheels and existing Mecanum wheel configurations of robots in practical applications, the law determining wheel configuration is elucidated. Then, the topological design methods of the Mecanum wheel configurations are summarized and refined, including the basic configuration array method, multiple wheels replacement method, and combination method. The first two methods can be used to create suitable multiple-Mecanum-wheel configurations for a single mobile robot based on the basic Mecanum wheel configuration. Multiple single robots can be arranged by combination methods including end-to-end connection, side-by-side connection, symmetrical rectangular connection, and distributed combination, and then, the abundant combination configurations of robots can be obtained. Examples of Mecanum wheel configurations design based on a symmetrical four-Mecanum-wheel configuration and three centripetal configurations using these topological design methods are presented. This work can provide methods and a reference for Mecanum wheel configurations design.
APA, Harvard, Vancouver, ISO, and other styles
6

Ngoc, Hoang Van, Trieu Quynh Trang, Air Xayyadeth, and Chu Viet Ha. "Doping two boron atoms in germanene nanoribbons in an external electric field." Journal of Physics: Conference Series 2070, no. 1 (November 1, 2021): 012130. http://dx.doi.org/10.1088/1742-6596/2070/1/012130.

Full text
Abstract:
Abstract Germanene is a two-dimensional system made of germanium atoms, its configuration is hexagonal honeycomb. Germanene nanoribbons (GNRs) are one-dimensional systems made from germanene with hydrogen-modified edges. The GNRs configuration studied here consists of 12 germanium atoms and 4 hydrogen atoms per unit cell. This work investigated the doping of two boron atoms into the unit cell of GNRs. Changing the different doping sites produces different configurations, the configurations been studied as meta-configuration, para-configuration, and ortho-configuration. By using density functional theory (DFT), the formation energies, energy band structures, and density of states of the configurations are studied. The ortho-configuration for the formation energy is the smallest, so this configuration is the most stable. The appearance of an external electric field changes the band gap and the energy band structure of the system.
APA, Harvard, Vancouver, ISO, and other styles
7

Sobecki, Christopher, Jie Zhang, and Cheng Wang. "Dynamics of a Pair of Paramagnetic Janus Particles under a Uniform Magnetic Field and Simple Shear Flow." Magnetochemistry 7, no. 1 (January 19, 2021): 16. http://dx.doi.org/10.3390/magnetochemistry7010016.

Full text
Abstract:
We numerically investigate the dynamics of a pair of circular Janus microparticles immersed in a Newtonian fluid under a simple shear flow and a uniform magnetic field by direct numerical simulation. Using the COMSOL software, we applied the finite element method, based on an arbitrary Lagrangian-Eulerian approach, and analyzed the dynamics of two anisotropic particles (i.e., one-half is paramagnetic, and the other is non-magnetic) due to the center-to-center distance, magnetic field strength, initial particle orientation, and configuration. This article considers two configurations: the LR-configuration (magnetic material is on the left side of the first particle and on the right side of the second particle) and the RL-configuration (magnetic material is on the right side of the first particle and on the left side of the second particle). For both configurations, a critical orientation determines if the particles either attract (below the critical) or repel (above the critical) under a uniform magnetic field. How well the particles form a chain depends on the comparison between the viscous and magnetic forces. For long particle distances, the viscous force separates the particles, and the magnetic force causes them to repel as the particle orientation increases above the configuration’s critical value. As the initial distance decreases, a chain formation is possible at a steady orientation, but is more feasible for the RL-configuration than the LR-configuration under the same circumstances.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Jinguo, Xin Zhang, Ketao Zhang, Jian S. Dai, Shujun Li, and Qi Sun. "Configuration analysis of a reconfigurable Rubik's snake robot." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 233, no. 9 (October 6, 2018): 3137–54. http://dx.doi.org/10.1177/0954406218805112.

Full text
Abstract:
Versatility and adaptability are the most prominent advantages of reconfigurable modular robotic systems. Unlike integrated robotic systems, reconfigurable modular robots can be rearranged to adapt to unpredictable environments. This paper presents a novel reconfigurable modular robot inspired by the Rubik's snake toy. For this reconfigurable Rubik's snake robot, the special feature is that it can work as not only a mechanism but also as a reconfigurable structure. In this paper, the configuration analysis is the core content. The concept of valid configurations is proposed to describe valid, controllable, and non-interference configurations. The configuration analysis theories are introduced in accordance with the configuration representation, the isomorphism analysis, the interference analysis, and the motion sequence analysis. Here, the configuration representation is proposed to define the position and orientation of two modules by using the adjacency matrix and the binary digital code, respectively. The equivalent digital code and the configuration ring are used to distinguish the same or symmetric configurations for the open and closed isomorphism configurations, respectively. Meanwhile, a case study is conducted to verify the effectiveness of the isomorphism analysis. Furthermore, the working space interference method is introduced to detect the interference issue in the process of forming target configurations. To accomplish a target configuration properly, the motion sequence matrix is defined to describe the motion sequence for achieving a target configuration. Finally, an experiment on the configuration transformation is demonstrated to verify the rationality and correctness of the theories of configuration analysis.
APA, Harvard, Vancouver, ISO, and other styles
9

Van Riel, Allard C. R., Jie J. Zhang, Lee Phillip McGinnis, Mohammad G. Nejad, Milos Bujisic, and Paul A. Phillips. "A framework for sustainable service system configuration." Journal of Service Management 30, no. 3 (August 15, 2019): 349–68. http://dx.doi.org/10.1108/josm-12-2018-0396.

Full text
Abstract:
Purpose While innovative service systems may create substantial value for certain stakeholders, they often destroy value for others. This value paradox frequently leads to unsustainable service systems. The purpose of this paper is to explore the use of multiple theories to pinpoint and explain these value paradoxes, build a framework allowing potentially more sustainable value configuration of service systems and develop an agenda for future research. The framework is illustrated with examples from the hospitality industry. Design/methodology/approach The paper draws on prevalent theories and approaches, including service-dominant logic, business modeling, transaction cost economics, stakeholder theory, configuration theory and set theory, to develop a value configuration framework. Findings In a service system, the configuration of resources and relationships between these resources (i.e. the set of value propositions for various stakeholders of the system) determines which stakeholders will gain and which will lose and to what extent. For that reason, insight into the range of possible service configurations – or business models – will help decision makers consider the effects on various stakeholders, and, where possible, set their priorities right and make their businesses more sustainable. The research produces a rich research agenda. Research limitations/implications Examples from hospitality allow an in-depth examination of a range of dynamic configurational and technological innovations, but some idiosyncratic characteristics of the context may impede the wider applicability of the conceptual framework. Future research could complement this work by studying other service sectors. Practical implications The paper aims to provide decision makers in the service industry with a conceptual tool to explore, diagnose and, if needed, adjust the value configuration of their service operations. In practice, this tool may help explicate the service system configuration, thus helping managers determine their organizations’ desired positioning in terms of value creation and destruction, and to choose strategic directions by adapting configurations. Social implications Legislation and regulations are being adapted to various new service configurations. This paper attempts to – at least conceptually – distinguish different service configurations, allowing policy makers to identify the value trade-offs between stakeholders, including society at large. Originality/value Previous research focused primarily on value creation by innovative services and business models. Value creation for one stakeholder, however, could lead to value destruction for another. Taking this paradox into consideration may result in more open service ecosystems that explicitly consider sustainability and value implications in multiple dimensions and for a broader group of stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
10

Morehouse, Aaron, Kelton C. Ireland, and Gobinda C. Saha. "An Investigation into the Effects of Electric Field Uniformity on Electrospun TPU Fiber Nano-Scale Morphology." Micromachines 14, no. 1 (January 13, 2023): 199. http://dx.doi.org/10.3390/mi14010199.

Full text
Abstract:
ANSYS Maxwell was used to replicate the conditions of two potential electrospinning configurations: a needle–plate and a parallel-plate configuration. Simulations showed that the electric field generated within the parallel-plate configuration was much more uniform than that within the needle–plate configuration. Both configurations were assembled and used electrospin fibers at three different spinning distances (10 cm, 12 cm, and 15 cm), at a consistent electric field strength of 1.7 kV/cm. Scanning electron microscopy was used to compare the morphologies of the fibers produced in both configurations in order to confirm whether a more uniform electric field yielded thinner fibers. The results show that the needle–plate configuration produced finer fibers than the parallel-plate configuration at all three spinning distances. However, there was no difference in the fiber diameters produced at the 12 and 15 cm spinning distances within the needle–plate configuration, implying thinning may only occur up to a certain distance in this configuration.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "E CONFIGURATION"

1

Chandmare, Kunal. "Automated Configuration of Time-Critical Multi-Configuration AUTOSAR Systems." Master's thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-229308.

Full text
Abstract:
The vision of automated driving demands a highly available system, especially in safety-critical functionalities. In automated driving when a driver is not binding to be a part of the control loop, the system needs to be operational even after failure of a critical component until driver regain the control of vehicle. In pursuit of such a fail-operational behavior, the developed design process with software redundancy in contrast to conventional dedicated backup requires the support of automatic configurator for scheduling relevant parameters to ensure real-time behavior of the system. Multiple implementation methods are introduced to provide an automatic service which also considers task criticality before assigning task to the processor. Also, a generic method is developed to generate adaptation plans automatically for an already monitoring and reconfiguration service to handle fault occurring environment.
APA, Harvard, Vancouver, ISO, and other styles
2

Axelsson, Jonas, and Ahmed Ghassabei. "Supply Chain Configuration : Ens studie av förbättringsarbetet "Supply Chain Configuration." Thesis, KTH, Tillämpad maskinteknik (KTH Södertälje), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zabriskie, Peter William. "High Throughput FPGA Configuration Using a Custom DMA Configuration Controller." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6886.

Full text
Abstract:
SRAM-based Field Programmable Gate Arrays (FPGAs) must be programmed with configuration data every time they are powered on. In addition to initially programming an FPGA, there are many other applications that require access to FPGA configuration memory such as partial reconfiguration, fault injection, and memory scrubbing. This thesis describes a system that provides high-speed, programmable configuration management for Xilinx FPGAs through external interfaces. This system is an improvement upon the JTAG Configuration Manager (JCM) previously created at BYU. The JCM consists of a custom I/O board paired with a MicroZed development board which includes a Xilinx ZYNQ SoC. This platform is used to implement a flexible configuration management system that can communicate with Xilinx FPGAs at high speeds using the JTAG and SelectMAP interfaces.The improved system described in this thesis increases the maximum data transfer rate of the JCM's JTAG and SelectMAP interfaces and dramatically decreases the processor utilization of user programs running on the JCM. This is accomplished by incorporating a Direct Memory Access (DMA) engine and interrupts into the system. In addition to faster data rates, these changes and the decrease in processor utilization also allow the JCM to manage up to eight JTAG chains simultaneously with the use of a special I/O card.
APA, Harvard, Vancouver, ISO, and other styles
4

Sadownick, Ronald 1960. "Helicopter configuration optimization." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/82683.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design & Management Program, February 2001.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaf 102).
by Ronald Sadownick.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
5

Atoui, Wassim Sellil. "Toward auto-configuration in software networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS015.

Full text
Abstract:
Les réseaux logiciels ont le potentiel de porter l'infrastructure réseau à un niveau plus avancé, un niveau qui peut rendre la configuration autonome. Cette capacité peut surmonter la complexité croissante des réseaux actuels et permettre aux entités de gestion d'activer un comportement efficace dans le réseau pour une amélioration globale des performances sans aucune intervention humaine. Les paramètres de configuration peuvent être sélectionnés automatiquement pour les ressources réseau afin de faire face à diverses situations que les réseaux rencontrent, comme les erreurs et la dégradation des performances. Malheureusement, certains défis doivent être relevés pour atteindre ce niveau avancé de réseaux. Actuellement, la configuration est encore souvent générée manuellement par des experts du domaine dans d'énormes fichiers semi-structurés écrits en XML, JSON et YAML. C'est une tâche complexe, sujette aux erreurs et fastidieuse à accomplir par les humains. De plus, il n'y a pas de stratégie formelle, à part l'expérience et les meilleures pratiques des experts du domaine pour concevoir les fichiers de configuration. Différents experts peuvent choisir une configuration différente pour le même objectif de performances. Cette situation rend plus difficile l'extraction des fonctionnalités des fichiers de configuration et l'apprentissage des modèles susceptibles de générer ou de recommander automatiquement la configuration. De plus, il n'y a toujours pas de consensus sur un modèle de données de configuration commun dans les réseaux logiciels, qui a abouti à des solutions hétérogènes, telles que: TOSCA, YANG, Hot, etc. qui rendent la gestion de réseau de bout en bout difficile. Dans cette thèse, nous présentons nos contributions qui abordent les défis susmentionnés liés à l'automatisation de la configuration dans les réseaux logiciels. Pour aborder le problème de l'hétérogénéité entre les fichiers de configuration, nous proposons un cadre sémantique basé sur des ontologies qui peuvent fédérer des éléments communs à partir de différents fichiers de configuration
Software networks have the potential to take the network infrastructure to a more advanced level, a level that can make the configuration autonomic. This ability can overcome the rapidly growing complexity of current networks, and allow management entities to enable an effective behavior in the network for overall performance improvement without any human intervention. Configuration parameters can be automatically selected for network resources to cope with various situations that networks encounter like errors and performance degradation. Unfortunately, some challenges need to be tackled to reach that advanced level of networks. Currently, the configuration is still often generated manually by domain experts in huge semi-structured files written in XML, JSON, and YAML. This is a complex, error-prone, and tedious task to do by humans. Also, there is no formal strategy except experience and best practices of domain experts to design the configuration files. Different experts may choose different configurations for the same performance goal. This situation makes it harder to extract features from the configuration files and learn models that could generate or recommend automatic configuration. Moreover, there is still no consensus on a common configuration data model in software networks, which resulted in heterogeneous solutions, such as TOSCA, YANG, Hot, etc. that make the end-to-end network management difficult. In this thesis, we present our contributions that tackle the aforementioned challenges related to automating the configuration in software networks. To tack the problem of heterogeneity between the configuration files we propose a semantic framework based ontologies that can federate common elements from different configuration files. And, to tackle the problem of generating automatically the configuration, we propose two contributions, one contribution that considers deep neural networks to learn from configuration files models for recommending the configuration and another contribution based on a model-driven approach to assist automatically the design of the configuration files
APA, Harvard, Vancouver, ISO, and other styles
6

Ababneh, Mohammad. "Network configuration using XML." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384258.

Full text
Abstract:
Thesis (M.S. in Information Technology Management and M.S. in Computer Science) Naval Postgraduate School, September 2000.
Thesis advisor(s): Xie, Geoffrey ; Dolk, Daniel. "September 2000." Includes bibliographical references (p. 115). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Siu, Joao Baptista. "Network configuration management systems." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1447841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McCrindle, Rachel Jane. "Inverse software configuration management." Thesis, Durham University, 1998. http://etheses.dur.ac.uk/5013/.

Full text
Abstract:
Software systems are playing an increasingly important role in almost every aspect of today’s society such that they impact on our businesses, industry, leisure, health and safety. Many of these systems are extremely large and complex and depend upon the correct interaction of many hundreds or even thousands of heterogeneous components. Commensurate with this increased reliance on software is the need for high quality products that meet customer expectations, perform reliably and which can be cost-effectively and safely maintained. Techniques such as software configuration management have proved to be invaluable during the development process to ensure that this is the case. However, there are a very large number of legacy systems which were not developed under controlled conditions, but which still, need to be maintained due to the heavy investment incorporated within them. Such systems are characterised by extremely high program comprehension overheads and the probability that new errors will be introduced during the maintenance process often with serious consequences. To address the issues concerning maintenance of legacy systems this thesis has defined and developed a new process and associated maintenance model, Inverse Software Configuration Management (ISCM). This model centres on a layered approach to the program comprehension process through the definition of a number of software configuration abstractions. This information together with the set of rules for reclaiming the information is stored within an Extensible System Information Base (ESIB) via, die definition of a Programming-in-the- Environment (PITE) language, the Inverse Configuration Description Language (ICDL). In order to assist the application of the ISCM process across a wide range of software applications and system architectures, die PISCES (Proforma Identification Scheme for Configurations of Existing Systems) method has been developed as a series of defined procedures and guidelines. To underpin the method and to offer a user-friendly interface to the process a series of templates, the Proforma Increasing Complexity Series (PICS) has been developed. To enable the useful employment of these techniques on large-scale systems, the subject of automation has been addressed through the development of a flexible meta-CASE environment, the PISCES M4 (MultiMedia Maintenance Manager) system. Of particular interest within this environment is the provision of a multimedia user interface (MUI) to die maintenance process. As a means of evaluating the PISCES method and to provide feedback into die ISCM process a number of practical applications have been modelled. In summary, this research has considered a number of concepts some of which are innovative in themselves, others of which are used in an innovative manner. In combination these concepts may be considered to considerably advance the knowledge and understanding of die comprehension process during the maintenance of legacy software systems. A number of publications have already resulted from the research and several more are in preparation. Additionally a number of areas for further study have been identified some of which are already underway as funded research and development projects.
APA, Harvard, Vancouver, ISO, and other styles
9

Selby, A. P. "Homology of configuration spaces." Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

ZARRAS, APOSTOLOS. "Configuration systematique de middleware." Rennes 1, 2000. http://www.theses.fr/2000REN10010.

Full text
Abstract:
Le traitement de problemes rencontres dans la construction de differentes familles d'applications a donne lieu a la definition et a la standardisation d'une couche logicielle qui se situe entre l'application et le systeme d'exploitation sous-jacent. Cette couche est connue sous le nom de middleware, et fournit des solutions reutilisables aux problemes recurrents dans la construction de logiciels complexes, comme l'heterogeneite, l'interoperabilite, la securite, la tolerance aux fautes ou encore l'execution de transactions. Un middleware est typiquement construit a partir de services fournis par une infrastructure. Des exemples connus de telles infrastructures sont celles conformes au standard corba, dcom ou encore ejb. L'implementation d'un logiciel s'appuyant sur des solutions reutilisables, fournies par les infrastructures middleware, simplifie de maniere evidente le processus de developpement du logiciel. Les developpeurs de logiciels se trouvent affranchis de l'implementation de protocoles de gestion des communications, de la securite ou encore de modeles transactionnels. Etant donnee une infrastructure middleware, le travail du developpeur quant a la mise en uvre d'un systeme d'execution (ou middleware) pour une application donnee est la combinaison de services middleware disponibles de telle sorte que le systeme resultant satisfasse les exigences de l'application. L'effort a fournir porte donc sur la conception d'architectures middleware qui satisfont les exigences particulieres des applications. Notre travail de these a porte sur l'exploitation de la notion d'architecture logicielle pour la construction systematique de middleware, adaptes aux applications. Plus precisement, nous proposons l'utilisation d'un langage de description d'architectures et d'un ensemble d'outils associes pour systematiser : la conception d'une architecture middleware qui reponde aux besoins d'une application donnee, l'integration de cette architecture au sein de l'application, et la maintenance de cette architecture au regard des evolutions relatives aux exigences de l'application ou a la disponibilite des services middleware. La solution proposee a la construction systematique de middleware adaptes aux besoins des applications comprend un systeme de stockage qui garde trace de l'historique des conceptions d'architectures middleware. Ce systeme de stockage contient en outre les implementations d'architectures concretes qui resultent des etapes de conceptions memorisees. Nous introduisons par ailleurs une methode pour la localisation systematique de chemins de conceptions, i. E. Sequences d'etapes de conceptions, qui conduisent eventuellement a des architectures concretes de middleware, satisfaisant les exigences d'une application donnee. Cette facilite est completee par une methode de developpement d'implementations d'architectures concretes de middleware, qui peuvent etre aisement integrees au sein d'une application. Enfin, nous donnons une solution a l'adaptation dynamique d'un middleware construit suivant notre methode, qui preserve l'execution coherente de l'application s'appuyant sur celui-ci. Une telle fonctionnalite est essentielle pour la maintenance d'une architecture middleware au regard de l'evolution des exigences de l'application et de l'infrastructure middleware.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "E CONFIGURATION"

1

F, Tichy Walter, ed. Configuration management. Chichester: Wiley, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

C, Hewson A., and Zlatić Veljko, eds. Concepts in electron correlation: Proceedings of the NATO Advanced Research Workshop on Concepts in Electron Correlation, Hvar, Croatia, September 29-October 3, 2002. Dordrecht: Kluwer Academic Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Quigley, Jon M., and Kim L. Robertson. Configuration Management. Second edition. | Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2019.: Auerbach Publications, 2019. http://dx.doi.org/10.1201/9780429318337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shaik, Baji. PostgreSQL Configuration. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5663-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Callegaro, Filippo, Frederick Cohen, Corrado De Concini, Eva Maria Feichtner, Giovanni Gaiffi, and Mario Salvetti, eds. Configuration Spaces. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31580-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bjorner, A., F. Cohen, C. De Concini, C. Procesi, and M. Salvetti, eds. Configuration Spaces. Pisa: Scuola Normale Superiore, 2012. http://dx.doi.org/10.1007/978-88-7642-431-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Educational Research Service (Arlington, Va.), ed. Grade configuration. Arlington, VA: Educational Research Service, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anderson, Paul. System configuration. Berkley, Calif: Usenix, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Configuration management principles and practice. Boston, MA: Addison-Wesley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

wheelchair selection and configuration Wheelchair selection and configuration. New York: Demos, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "E CONFIGURATION"

1

Strobel, Stefan, and Volker Elling. "Configuration." In Linux, 111–34. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-1856-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Strobel, Stefan, and Thomas Uhl. "Configuration." In Linux Universe, 31–74. New York, NY: Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4757-2415-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gooch, Jan W. "Configuration." In Encyclopedic Dictionary of Polymers, 166. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_2821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krogh, Jesper Wisborg. "Configuration." In MySQL 8 Query Performance Tuning, 761–91. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5584-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yao, Jiewen, and Vincent Zimmer. "Configuration." In Building Secure Firmware, 383–431. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Späth, Peter. "Configuration." In Advanced Audio Visualization Using ThMAD, 219–22. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3504-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Putrady, Ecky. "Configuration." In Practical Web Development with Haskell, 209–17. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3739-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Leonard, Andy, Tim Mitchell, Matt Masson, Jessica Moss, and Michelle Ufford. "Configuration." In SQL Server Integration Services Design Patterns, 305–29. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0082-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nahler, Gerhard. "configuration." In Dictionary of Pharmaceutical Medicine, 37. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Freeman, Adam. "Configuration." In Pro ASP.NET MVC 5 Platform, 179–216. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6542-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "E CONFIGURATION"

1

Dart, S. "Tool configuration assistant." In SCM: 2nd Intl Workshop on Software Configuration Mgmt. New York, NY, USA: ACM, 1989. http://dx.doi.org/10.1145/72910.73354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Erdmann, John H., Slobodan Zumer, Brian G. Wagner, and J. William Doane. "Director configurations and configuration transitions in PDLC material." In SC - DL tentative, edited by J. William Doane and Zvi Yaniv. SPIE, 1990. http://dx.doi.org/10.1117/12.19928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaiser, G. W. "Modeling configuration as transactions." In SCM: 2nd Intl Workshop on Software Configuration Mgmt. New York, NY, USA: ACM, 1989. http://dx.doi.org/10.1145/72910.73359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thomson, R., and I. Sommerville. "Configuration management using SySL." In SCM: 2nd Intl Workshop on Software Configuration Mgmt. New York, NY, USA: ACM, 1989. http://dx.doi.org/10.1145/72910.73353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ambriola, V., and L. Bendix. "Object-oriented configuration control." In SCM: 2nd Intl Workshop on Software Configuration Mgmt. New York, NY, USA: ACM, 1989. http://dx.doi.org/10.1145/72910.73360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Akue, Ludi, Emmanuel Lavinal, and Michelle Sibilla. "A dynamic configuration validation language." In 2011 Symposium on Configuration Analytics and Automation (SAFECONFIG). IEEE, 2011. http://dx.doi.org/10.1109/safeconfig.2011.6111670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Miller, T. C. "A schema for configuration management." In SCM: 2nd Intl Workshop on Software Configuration Mgmt. New York, NY, USA: ACM, 1989. http://dx.doi.org/10.1145/72910.73342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Post, Hendrik, and Carsten Sinz. "Configuration Lifting: Verification meets Software Configuration." In 2008 23rd IEEE/ACM International Conference on Automated Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/ase.2008.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Perera, Nadine. "Automatic Configuration Management - Autodiscovery of Configuration Items and Automatic Configuration Verification." In SpaceOps 2016 Conference. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2016. http://dx.doi.org/10.2514/6.2016-2610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Miller, D. B., R. G. Stockton, and C. W. Krueger. "An inverted approach to configuration management." In SCM: 2nd Intl Workshop on Software Configuration Mgmt. New York, NY, USA: ACM, 1989. http://dx.doi.org/10.1145/72910.73338.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "E CONFIGURATION"

1

Enns, R., ed. NETCONF Configuration Protocol. RFC Editor, December 2006. http://dx.doi.org/10.17487/rfc4741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

A. Linden. Underground Layout Configuration. Office of Scientific and Technical Information (OSTI), September 2003. http://dx.doi.org/10.2172/837520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Karr, Michael. KBSA Configuration Manager. Fort Belvoir, VA: Defense Technical Information Center, February 1995. http://dx.doi.org/10.21236/ada293353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Osborne, Wilma M. Software configuration management. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

A. ALSAED. CONFIGURATION GENERATOR MODEL. Office of Scientific and Technical Information (OSTI), July 2005. http://dx.doi.org/10.2172/862231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

A. Alsaed. CONFIGURATION GENERATOR MODEL. Office of Scientific and Technical Information (OSTI), November 2004. http://dx.doi.org/10.2172/862253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grunau, Daryl. Cielo Configuration management. Office of Scientific and Technical Information (OSTI), June 2012. http://dx.doi.org/10.2172/1042996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harris, J. H., J. L. Cantrell, T. C. Hender, B. A. Carreras, and R. N. Morris. Flexible heliac configuration. Office of Scientific and Technical Information (OSTI), April 1985. http://dx.doi.org/10.2172/5800899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tomayko, James E. Software Configuration Management. Fort Belvoir, VA: Defense Technical Information Center, December 1990. http://dx.doi.org/10.21236/ada235702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Harris, James, Kelly Lechtenberg, and Nikin Patel. GMS Configuration Guide. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1835245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography