Academic literature on the topic 'Fragmentation (informatique)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fragmentation (informatique).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Fragmentation (informatique)"
Chan, Andy Lung Jan. "Education, Experience and Translator Certification as Signaling Mechanisms." FORUM / Revue internationale d’interprétation et de traduction / International Journal of Interpretation and Translation 8, no. 1 (April 1, 2010): 37–54. http://dx.doi.org/10.1075/forum.8.1.02cha.
Full textChen, Daniel, and Darrell Duffie. "Market Fragmentation." American Economic Review 111, no. 7 (July 1, 2021): 2247–74. http://dx.doi.org/10.1257/aer.20200829.
Full textvan Veelen, P. A., U. R. Tjaden, and J. van der Greef. "Sequence-informative fragmentation in 252Cf-plasma desorption mass-spectrometry." Journal of Controlled Release 21, no. 1-3 (July 1992): 201. http://dx.doi.org/10.1016/0168-3659(92)90023-k.
Full textHaselmann, K. F., B. A. Budnik, F. Kjeldsen, M. L. Nielsen, J. V. Olsen, and R. A. Zubarev. "Electronic Excitation Gives Informative Fragmentation of Polypeptide Cations and Anions." European Journal of Mass Spectrometry 8, no. 2 (April 2002): 117–21. http://dx.doi.org/10.1255/ejms.479.
Full textVaidogas, Egidijus Rytas. "Bayesian Processing of Data on Bursts of Pressure Vessels." Information Technology and Control 50, no. 4 (December 16, 2021): 607–26. http://dx.doi.org/10.5755/j01.itc.50.4.29690.
Full textDong, Yalun, Martina Jelocnik, Amber Gillett, Ludovica Valenza, Gabriel Conroy, Dominique Potvin, and Renfu Shao. "Mitochondrial Genome Fragmentation Occurred Multiple Times Independently in Bird Lice of the Families Menoponidae and Laemobothriidae." Animals 13, no. 12 (June 20, 2023): 2046. http://dx.doi.org/10.3390/ani13122046.
Full textvan Veelen, P. A., U. R. Tjaden, J. van der Greef, and N. D. de With. "Sequence-Informative fragmentation in an 8.9 kDa oligopeptide using plasma desorption mass spectrometry." Organic Mass Spectrometry 26, no. 4 (April 1991): 345–46. http://dx.doi.org/10.1002/oms.1210260429.
Full textZauner, Gerhild, Radoslaw P. Kozak, Richard A. Gardner, Daryl L. Fernandes, André M. Deelder, and Manfred Wuhrer. "Protein O-glycosylation analysis." Biological Chemistry 393, no. 8 (August 1, 2012): 687–708. http://dx.doi.org/10.1515/hsz-2012-0144.
Full textKong, Feng, Shao Sun, and Yifei Wang. "Comprehensive Understanding the Disaster-Causing Mechanism, Governance Dilemma and Targeted Countermeasures of Urban Pluvial Flooding in China." Water 13, no. 13 (June 25, 2021): 1762. http://dx.doi.org/10.3390/w13131762.
Full textNishikaze, Takashi. "Sensitive and Structure-Informative N-Glycosylation Analysis by MALDI-MS; Ionization, Fragmentation, and Derivatization." Mass Spectrometry 6, no. 1 (2017): A0060. http://dx.doi.org/10.5702/massspectrometry.a0060.
Full textDissertations / Theses on the topic "Fragmentation (informatique)"
Ranéa, Pierre-Guy. "La tolérance aux intrusions par fragmentation-dissémination." Toulouse, INPT, 1989. http://www.theses.fr/1989INPT007H.
Full textKapusta, Katarzyna. "Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment." Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.
Full textThis thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and cost-efficient. The main focus is put on increasing data confidentiality without deteriorating the processing performance. The ultimate goal is to provide a user with a set of fast fragmentation methods that could be directly applied inside an industrial context to reinforce the confidentiality of the stored data and/or accelerate the fragmentation processing. First, a rich survey on fragmentation as a way of preserving data confidentiality is presented. Second, the family of all-or-nothing transforms is extended with three new proposals. They all aim at protecting encrypted and fragmented data against the exposure of the encryption key but are designed to be employed in three different contexts: for data fragmentation in a multi-cloud environment, a distributed storage system, and an environment composed of one storage provider and one private device. Third, a way of accelerating fragmentation is presented that achieves better performance than data encryption using the most common symmetric-key encryption algorithm. Fourth, a lightweight fragmentation scheme based on data encoding, permuting, and dispersing is introduced. It totally gets rid of data encryption allowing the fragmentation to be performed even faster; up to twice as fast as data encryption. Finally, fragmentation inside sensor networks is revisited, particularly in the Unattended Wireless Sensor Networks. The main focus in this case is put not solely on the fragmentation performance, but also on the reduction of storage and transmission costs by using data aggregation
Trouessin, Gilles. "Traitements fiables de données confidentielles par fragmentation-redondance-dissémination." Toulouse 3, 1991. http://www.theses.fr/1991TOU30260.
Full textLin, Ping. "Commande adaptative et régulation automatique d'une unité de broyage du cru en cimenterie." Lyon, INSA, 1992. http://www.theses.fr/1992ISAL0003.
Full textIn cement manufactory, the raw material blending process, between prehomogeneization silo and clinker kiln, is a multivariable system (several raw materials in use) and coupled with considerable time delay due toX-ray fluorescence analyser. The main goal of blending control is to maintain close to the standard value and to decrease the variance of chemical composition (in terms of composition moduli) of the raw meal by using correcting products. The proposed control strategy consists of four parts: (1) a multivariable predictive control system based on an internai madel; (2) an adaptive control due to on-line estimation for chemical composition of the raw materials; (3) an optimization unit to minimize a qualitycost cri teri on; ( 4) a self-adjustment function of reference values for the special batch process. In order to improve the control performance, an heuristic adaptive supervision is developped to adjust the regulator parameters in lower level. The proposed control policy bas been applied to cement plants of Lafarge Coppée
Minier, Josselin. "Fragmentation cognitive/informatique de la musique populaire amplifiée : construction d'un système numérique dirigé par une notion de simulacre cinétique." Paris 1, 2011. http://www.theses.fr/2011PA010678.
Full textNicolas, Jean-Christophe. "Machines bases de données parallèles : contribution aux problèmes de la fragmentation et de la distribution." Lille 1, 1991. http://www.theses.fr/1991LIL10025.
Full textQiu, Han. "Une architecture de protection des données efficace basée sur la fragmentation et le cryptage." Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Full textIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Full textA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Lecler, Philippe. "Une approche de la programmation des systèmes distribués fondée sur la fragmentation des données et des calculs et sa mise en oeuvre dans le système GOTHIC." Rennes 1, 1989. http://www.theses.fr/1989REN10103.
Full textBenkrid, Soumia. "Le déploiement, une phase à part entière dans le cycle de vie des entrepôts de données : application aux plateformes parallèles." Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2014. http://www.theses.fr/2014ESMA0027/document.
Full textDesigning a parallel data warehouse consists of choosing the hardware architecture, fragmenting the data warehouse schema, allocating the generated fragments, replicating fragments to ensure high system performance and defining the treatment strategy and load balancing.The major drawback of this design cycle is its ignorance of the interdependence between subproblems related to the design of PDW and the use of heterogeneous metrics to achieve thesame goal. Our first proposal defines an analytical cost model for parallel processing of OLAP queries in a cluster environment. Our second takes into account the interdependence existing between fragmentation and allocation. In this context, we proposed a new approach to designa PDW on a cluster machine. During the fragmentation process, our approach determines whether the fragmentation pattern generated is relevant to the allocation process or not. The results are very encouraging and validation is done on Teradata. For our third proposition, we presented a design method which is an extension of our work. In this phase, an original method of replication, based on fuzzy logic is integrated
Books on the topic "Fragmentation (informatique)"
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Find full textCavelty, Myriam Dunn, and Andreas Wenger. Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Find full textConvergence and Fragmentation: Media Technology and the Information Society (IB-Changing Media, Changing Europe). Intellect Ltd, 2008.
Find full textAbril, Gonzalo. Cortar Y Pegar/ Cut and Paste: La Fragmentacion Visual En Los Origenes Del Texto Informativo / The Visual Fragmentation in the Origins of Informative Text (Signo E Imagen / Sign and Image). Catedra, 2003.
Find full textBook chapters on the topic "Fragmentation (informatique)"
van Veelen, P. A., U. R. Tjaden, J. van der Greef, H. J. Vorst, and M. W. E. M. van Tilborg. "Sequence Informative Fragmentation in 252Cf Plasma Desorption Mass Spectrometry." In NATO ASI Series, 67–72. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4684-7926-3_9.
Full textMohanty, Srutisudha, Jagabandhu Panda, and Sudhansu S. Rath. "Geospatial Technology in Urban Sprawl Assessment." In Methods and Applications of Geospatial Technology in Sustainable Urbanism, 1–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2249-3.ch001.
Full textNetherton, Jason. "Postscript." In Advances in Social Networking and Online Communities, 395–400. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5206-4.ch023.
Full textBrian Langerhans, R., and Elizabeth M. A. Kern. "Urbanization and Evolution in Aquatic Environments." In Urban Evolutionary Biology, 157–74. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198836841.003.0011.
Full text