Dissertations / Theses on the topic 'Embeddedne'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Embeddedne.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
ALVARADO, VALENZUELA JUAN FRANCISCO. "SOMETHING NEW, SOMETHING USED, SOMETHING BORROWED: INNOVATION OF MIGRANT ENTREPRENEURS IN THE SERVICE SECTOR." Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/633508.
Full textAKBARITABAR, ALIAKBAR. "QUANTITATIVE SOCIOLOGY OF ACADEMIC WORK IN AN ERA OF HYPERCOMPETITION AND RANKINGS." Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/635951.
Full textNell, Phillip C., Björn Ambos, and Bodo B. Schlegelmilch. "The MNC as an Externally Embedded Organization: An Investigation of Embeddedness Overlap in Local Subsidiary Networks." Elsevier, 2011. http://dx.doi.org/10.1016/j.jwb.2010.10.010.
Full textPurdie, Christopher Dennis. "Embedded." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339443969.
Full textVallius, T. (Tero). "An embedded object approach to embedded system development." Doctoral thesis, University of Oulu, 2009. http://urn.fi/urn:isbn:9789514292941.
Full textSvangård, Bo. "Power management in embedded ARM HW integrated with Embedded Linux." Thesis, Linköpings universitet, Datorteknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-63110.
Full textYin, Hang. "Adaptive Embedded Systems." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-10590.
Full textSimmons, Alexander V. "Socially embedded insurgencies." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FSimmons.pdf.
Full textThesis Advisor: Gregg, Heather S. Second Reader: Freeman, Michael E. "December 2009." Description based on title screen as viewed on February 1, 2010. Author(s) subject terms: Hezbollah, Hizbullah, Al Qaeda in Iraq, Insurgency, Counterinsurgency, Socially Embedded Insurgent Groups, Social Movement Theory. Includes bibliographical references (p. 67-72). Also available in print.
Gábor, Tomáš. "Návrh embedded systému." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221248.
Full textПетрушенко, Юрій Миколайович, Юрий Николаевич Петрушенко, and Yurii Mykolaiovych Petrushenko. "Cultural embeddedness of production activity." Thesis, Видавництво СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/8340.
Full textRehman, Faisal. "Heterogeneous Embedded Network Architecture." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2529.
Full textIn this thesis we focused on high performance embedded real-time networks which are designed for systems like radar signalling processing systems, control systems etc. These high performance embedded networks consist of emerging standards like PCI Express, RapidIO, and standard Ethernet. All of these switched embedded networks communicate with each other through common gateway nodes. As these networks have different rate characteristics, maximum packet size (MTU), packet priorities, addressing schemes etc we have therefore defined the gateway nodes for these heterogeneous embedded networks which will allow these heterogeneous embedded networks to communicate with each other with the help of different translation functions. These gateway nodes allow end-to-end transmission across the heterogeneous embedded networks while keeping bound on end-to-end delay and guaranteed throughput. We need to have some flow control mechanism which will shape the traffic flow in the mentioned embedded networks and will avoid from buffer overflow.
Qin, Zheng. "An Embedded Shading Language." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1209.
Full textÖstmark, Åke. "Embedded Internet System Architectures /." Luleå, 2004. http://epubl.luth.se/1402-1757/2004/37.
Full textBergersen, Erik. "Embedded Unit Testing Framework." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22986.
Full textHuang, Qiang. "Distributed embedded control system." Thesis, University of Liverpool, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.400230.
Full textPotts, Gareth Richard. "Towards the embedded university?" Thesis, University of Reading, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.297675.
Full textZhao, Fanzhou. "Embedded blade row flutter." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/51151.
Full textChaffin, Jason Edward. "The Embedded American Artist." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1162.
Full textOrdonez-Delgado, Bartleby. "An Embedded Toeplitz Problem." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/29007.
Full textPh. D.
Zeppettella, David L. "Structurally Integrated Embedded System." University of Dayton / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1324051784.
Full textNovotný, Václav. "Rozpoznání displeje embedded zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376924.
Full textLi, Xueheng. "The socially embedded individual." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/51300/.
Full textGibson, Trish J. "Embedded in These Walls." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5642.
Full textStejskal, Tomáš. "Hlukoměr pro embedded systémy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220380.
Full textFreitag, Melissa E. "Gender Differences in the Relationship Between Gang Sex Composition, Organization and Offending: Understanding the Role of Behavioral and Psychological Embeddedness." Bowling Green State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1491390460994149.
Full textVincent, Tonja S. "From Epistolary Form to Embedded Narratological Device: Embedded Epistles in Austen and Scott." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6444.
Full textGaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.
Full textDen ökade användningen av datorsystem för att lagra privata data eller göra kritiska operationer leder till vissa säkerhetsproblem som samlas i området cybersäkerhet. Denna neologism leder människor att tänka på säkerhetssystemen för informationssystem och allmänt tillgängliga datorer. Men med tillväxten av saker i saken är inbyggda system också berörda av dessa frågor. Utvecklingshastigheten för detta område leder ofta till en underutveckling säkerhetsfunktionerna.Avhandlingen undersöker säkerheten för inbyggda system genom att fokusera på inbyggd programvara. Efter att ha klassificerat de sårbarheter som kan uppstå i det här fältet introducerar en första del av det här arbetet realisationen av ett dokument av riktlinjer om säker utveckling av inbyggd programvara. Denna insikt bygger på en analys av litteraturgranskningen, men också på kunskap om ingenjörer i företaget. Dessa riktlinjer tillämpas på en kunds projekt.Resultatet av deras ansökan gör det möjligt för oss att bevisa deras konsistens och att skriva rekommendationer för att förbättra projektets säkerhet. Avhandlingen presenterar genomförandet av några av dem. Ett sätt införs särskilt patt säkra en interprocesskommunikation (IPC) menande: DBus, genom ett konceptbevis. Resultatet visar att D-Busens säkerhetspolitik är effektiv mot vissa attacker. Det påpekar emellertid också att vissa attacker fortfarande är möjliga. Lösningen implementeras på ett inbyggd kort för att analysera beräkningsoverhead som är relaterad till denna inbyggda aspekt. Som förväntat är en mer komplex och detaljerad politik, desto högr e överhuvudtaget tenderar att vara. Ändå är denna beräkningskostnad proportionell mot antalet av regler av säkerhetspolitiken.
Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Full textDyer, Matthias. "Distributed embedded systems : validation strategies /." Aachen : Shaker Verlag, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17189.
Full textLessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.
Full textSchmidt, Eike. "Power modeling of embedded memories." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967514649.
Full textTewatia, Rohit. "Security in Distributed Embedded Systems." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1379.
Full textCommunication in a sensor network needs guaranteed reception of data without fail and providing security to it. The authenticity and confidentiality of the data has to be ensured as sensors have limited hardware resources as well as the bandwidth. This thesis addresses the security aspects in wireless sensor networks. The main task of the project is to identify the critical security parameters for these distributed embedded systems. The sensors have extremely limited resources: small amount of memory, low computation capability and poor bandwidth. For example, a sensor platform can have 8KB of flash memory, a 4MHz 8-bit Atmel processor, and a 900MHz radio interface. Various security threats posed to these small wireless sensor networks has been made and solutions proposed. Secure communication between these communicating partners is to be achieved using cryptography.
Gong, Shaojie, and Zhongping Deng. "Benchmarks for Embedded Multi-processors." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-660.
Full textDuring the recent years, computer performance has increased dramatically. To measure
the performance of computers, benchmarks are ideal tools. Benchmarks exist in many
areas and point to different applications. For instance, in a normal PC, benchmarks can be
used to test the performance of the whole system which includes the CPU, graphic card,
memory system, etc. For multiprocessor systems, there also exist open source benchmark
programs. In our project, we gathered information about some open benchmark programs
and investigated their applicability for evaluating embedded multiprocessor systems
intended for radar signal processing. During our investigation, parallel cluster systems
and embedded multiprocessor systems were studied. Two benchmark programs, HPL and
NAS Parallel Benchmark were identified as particularly relevant for the application field.
The benchmark testing was done on a parallel cluster system which has an architecture
that is similar to the architecture of embedded multiprocessor systems, used for radar
signal processing.
Larsen, Jarle. "Embedded demonstrator for audio manipulation." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10959.
Full textStein, Alexander. "Porting DotGNU to Embedded Linux." Master's thesis, Universitätsbibliothek Chemnitz, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-66724.
Full textDie Programmierung für SPS-Systeme ist durch die gegebenen Bibliotheken beschränkt, während hardwarenahe Programmierung einen größeren Aufwand durch z.B. Initialisierungen hat. Diese Arbeit bietet eine Grundlage, um die Vorteile beider Entwicklungsseiten zu kombinieren. Dafür wurde Portable.NET des DotGNU-Projekts, eine Implementierung des CLI, bekannter unter dem Namen “.NET”, benutzt. Das Zielsystem ist das PLCcore-5484 Mikrocontrollerboard der SYS TEC electronic GmbH. Aufbauend auf der Portierung wurden zwei Varianten zur Einbindung von Interrupt-Routinen in die Portable.NET Laufzeitumgebung untersucht. Abschließend wurden die Reaktionszeiten zu eintretenden Interrupts analysiert und verglichen
Wilund, Torbjörn. "Robust Distributed Embedded Systems : Communication." Thesis, KTH, Maskinkonstruktion (Inst.), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-100998.
Full textThis thesis tries in its theoretical part to discuss what the term of robustness means for distributed embedded systems. Development of today generally tries to exchange mechanical and electrical solutions for embedded control systems. There are a lot of benefits to gain by designing in a distributed way, this due to internal independencies between nodes for monitoring and error detection. The outcome about robustness suggests that it depends on integrity to achieve availability and reliability, or loss of alternations of information in the different nodes in the distributed system. Reliability depends on how faults in terms of time and value are treated during execution. All studied network protocols have protection of information by different redundancy algorithms such as CRC, which gives the opportunity for fault and error detection. However there are differences in how time is handled, if there is any time handling, and possibility for time synchronization in the hardware. From this perspective the best alternatives are time triggered architectures of current technology. The experimental part tries to evaluate the GAST delivered platform. The work to achieve communication on TTP/C controllers failed due to shortage in the assembled platform. More specifically this is probably the case of bugs in the design of the physical layer of the GAST hardware (not the TTP controllers themselves). By use of recommended backplane, the sent signals are not appearing as expected, and information sent is misinterpreted by external communication devices. A suggestion and recommendation for future work is analysis of the signal in the data bus, and possible design of a filter if current assembly shall be used. The platform has a future for development and research in the field of distributed embedded systems due to its openness, however there is a lack of drivers for the platform integrated network protocols. This must be attended if the platform shall have any significance. The evaluation of TTP Plan generated code shows, that there are possibilities to extract configuration information form tool for configuration of platform. To achieve this some kind of extraction script must be developed.
Dasarathan, Dinesh. "Benchmark Characterization of Embedded Processors." NCSU, 2005. http://www.lib.ncsu.edu/theses/available/etd-05152005-170108/.
Full textKianzad, Vida. "System synthesis for embedded multiprocessors." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3471.
Full textThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Eldh, Erik. "Cloud connectivity for embedded systems." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118746.
Full textAtt använda ett inbyggt system som en kontrollenhet för elektronik är inget nytt. Dessa typer av system finns idag överallt och används i vidt spridda användningsområden medans datormolnet är en ny approach för dator användning i sin helhet. Utforska och skapa en länk mellan dessa två mycket olika platformar för att facilitera nya tillvägagångs sätt att sköta underhåll sparar företag inte tid och pengar när det kommer till inbyggda system utan också när det gäller driften för servrar. Denna examensarbete utforskar denna typ av länk och presenterar för endamålet lämpliga tekniker att koppla dem samman medans lämpligheten för en sådan lösning diskuteras. Att utforska det som inkluderas i konceptet molnet genom att undersöka tillgängliga teknologier för utveckling är viktigt för att få en bild av vad marknaden har att erbjuda. Mer viktigt är hur utveckling går till och vilka fördelarna är. Hur teknologoier som databaser, last distrubutörer och server miljöer har adapterats till molnmiljön och vilka nackdelar och fördelar som kommit ut av detta är av intresse och vidare hur en lösning kan använda sig av dessa fördelar i ett verkliget scenario. Tre olika moln leverantörer och deras produkter har presenterats för att ge en bild av vad som för tillfället erbjuds. För att realisera en lösning har ett sett att kommunicera och utbyta data presenterats och diskuterats. Åter igen för att realisera konceptet i ett verkligt scenario. Denna uppsats presenterar konceptet moln anslutbarhet för inbyggda system för att kunna få en lösning realiserad och använd. En mellanprograms lösning som drar styrka ifrån de tjänster som erbjudas av molnleverantörer för driftsättning hos en leverantor föreslås. Denna mellanprogramslösnings agerar tillståndslöst för att erbjuda kommunikation och funktions sammankoppling mellan de två olika deltagarna som har olika förutsätningar. Denna approach skapar en flexibel gemensam plattform för olika klienter hos slutanvändaren och minskar bördan hos de inbyggdasystemet att behöva göra analyser och distrubuera informationen till klienterna. Denna lösning erbjuder också en abstraktion av de inbyggdasystemen för att erbjuda ytterligare säkerhet när kommunikation sker med de inbyggdasystemet genom att den endast sker med giltiga mellanprogram.
Swere, Erick A. R. "Machine learning in embedded systems." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/4969.
Full textSchmidgall, Ralf. "Automotive embedded systems software reprogramming." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7070.
Full textGroufsky, Michael Edward. "An embedded augmented reality system." Thesis, University of Canterbury. Electrical and Computer Engineer, 2011. http://hdl.handle.net/10092/6259.
Full textConner, Stephen J. "Distributed dispatching for embedded generation." Thesis, University of Strathclyde, 2003. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21513.
Full textvon, Hacht Karl-Johan. "Garden Monitoring with Embedded Systems." Thesis, Linköpings universitet, Datorteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120706.
Full textGhamari, Mohammad. "Reliable communication in embedded systems." Thesis, Lancaster University, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.663247.
Full textP, Joseph Iype. "Accelerating Java on Embedded GPU." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30684.
Full textAlshamali, M. A. M. "Rationalised protection for embedded generation." Thesis, Queen's University Belfast, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368481.
Full textElmikkawy, M. E. A. "Embedded Runge-Kutta-Nystrom methods." Thesis, Teesside University, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.371400.
Full textMoss, Andrew David. "Program transformation of embedded systems." Thesis, University of Bristol, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.432724.
Full textWarkentin, David J. "Embedded electronics for intelligent structures." Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/42514.
Full text