Dissertations / Theses on the topic 'Overman'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Overman.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
GLIKSMAN, SELMO. "THE ETHICS OF THE OVERMAN." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7756@1.
Full textEsta tese tem como objetivo mostrar que a concepção de sobre-humanidade em Nietzsche não é uma figura de retórica, uma ficção, um ideal e comprovar tal visão através da sua própria obra. Através da análise rigorosa das tipologias morais do nobre e do escravo, pretende-se mostrar que possíveis atributos do sobre-humano tem um parentesco aproximado e uma herança importante com as descrições que Nietzsche empreende acerca do espírito aristocrático. Com tudo isso, quer-se mostrar que Nietzsche pensou o sobre-humano como alternativa radical a isto que chamamos de viver a vida, como resposta a nossos pequenos prazeres, estratégias de sobrevivência, interesses mesquinhos, enfim, mostrar que o sobre-humano vai nos obrigar a pensar sobre nossos conflitos pequeno- burgueses e seus falsos problemas, medos e covardias.
Through a rigourous analysis, this thesis wants to show that the conception of the overman, in Nietzsche, it is not a mere rhetorical or metaphorical figure, na ideal or a fiction. We intend to prove through the conception of the noble and slave morality that the overman has inherited possible attributes and characteristics of the spirit of the aristocrat. After all, we want to demonstrate that Nietzsche conceived the overman as a radical alternative to what we call to live and enjoy life, as an answer to our little pleasures, strategies of survival, petty interests and to show that the overman constrains us to reflect about our littlle bougeois conflicts with it´s false problems, fears and cowardicwe.
Boulding, Jacqueline. "Engendering the Overman: On Woman and Nihilism in Nietzsche." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37196.
Full textBrito, Silvana Perrella. "O diálogo entre os quadrinhos do Superman e do Overman." Universidade Presbiteriana Mackenzie, 2007. http://tede.mackenzie.br/jspui/handle/tede/2221.
Full textThe present study intends to analyze the intertextuality established between the superhero Superman, created by Joe Shuster and Jerry Siegel and the super-hero Overman, created by the Brazilian cartoonist Laerte. Overman was chosen for the analysis of intertextuality with Superman because he is the first "over" superhero whereas Superman was the first "super"; and also because he makes an opposition between an idealized hero in a rich country, the United States, and another idealized one in a developing country, Brazil, presenting, this way, the construction of different realities. From concepts by Mikhail Bakhtin and Linda Hutcheon, the carnivalization and the parody present in the texts are discussed. A comparative analyzis is done to establish the equalities and differences between the texts and the analise purpose is to present the criticism proposed by carnavalization. The Brazilian cartoonist dialogues with Superman, when he creates a superhero whose physical appearance reminds the American hero, this way the original text is mentioned and the intertextuality is established. The aim; however, is not to confirm the mentioned text, but to alter it with the intention of provoking the laughter. Once Overman was built with an antagonistic world view if compared to Superman, he dessacralizes the hero model that had been proposed. As it is possible to perceive, Overman is a carnivalized image of Superman; having been created in a different situation and in a different socioeconomic context, he establishes a parody of Superman wich, besides presenting satirical components, also becomes a homage.
Este trabalho pretende analisar a intertextualidade estabelecida entre os super-heróis Superman, criado por Joe Shuster e Jerry Siegel, e Overman, criado pelo cartunista brasileiro Laerte Coutinho. Essas duas personagens foram escolhidas para serem objetos da análise desta pesquisa por causa, principalmente, de dois motivos: 1) porque o Superman foi o primeiro herói ao qual foi dado o título super , enquanto o Overman foi o primeiro herói ao qual foi dado o título over ; 2) porque há entre eles uma contraposição entre um herói idealizado de um país rico, os Estados Unidos, e outro carnavalizado de um país em desenvolvimento, o Brasil, apresentando, dessa forma, a construção de realidades distintas. A partir de conceitos de Mikhail Bakhtin e Linda Hutcheon, discute-se a carnavalização e a paródia presentes nos textos. Realiza-se uma análise comparativa com base na aparência dos heróis e em seus comportamentos, com a finalidade de estabelecer semelhanças e diferenças entre os mesmos e apresentar a crítica proposta pela carnavalização, pois o cartunista brasileiro, ao criar um super-herói cuja aparência física lembra muito a do Superman, dialoga com ele, citando o texto original e estabelecendo assim a intertextualidade. Como será visto, o objetivo de Laerte, entretanto, não é o de confirmar o texto citado, mas de alterá-lo com a intenção de provocar o riso: ao construir o Overman com uma visão de mundo antagônica à do Superman, Laerte dessacraliza o modelo de herói que havia sido proposto. Dessa forma, Overman constitui uma imagem carnavalizada do Superman; tendo sido criado em situação e contexto sócio-econômico diferente, estabelece com o Superman uma paródia que, embora apresente componentes satíricos, se torna uma homenagem.
Pires, de Oliveira Dias Gustavo. "A Philosophically Appealing Nietzschean Theory of Value." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1252.
Full textValsson, Jökull. "Godot is Dead : Nietzsche and Beckett on Salvation and Suffering in a Godless Universe." Thesis, Stockholms universitet, Engelska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-72254.
Full textWalton, Susan Elaine. "Jew, gentile and Overman in ?renburg's Khulio Khurenito and other works : the role of jewry in ?renburg's internationalist world view /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487951214937821.
Full textChoi, Soon-Young. "Friedrich Nietzsches Moralkritik." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2002. http://dx.doi.org/10.18452/14694.
Full textMy PhD thesis treat mainly deadly battle between Nietzschean philosophy and christian doctrine, in Nietzschean concept, Jew against Rome, Rome against Jew. The source of this battle has been conceptually explained. The incompatibility describes the source of that deadly battle. The seeming inconsistency of Nietzschean concepts has been explained on entire context of Nietzschean philosophy, for example, the critique of the freedom of will and the freedom of free spirit, the seeming contradiction between will to power and eternal recurrence and conceptual relationship between philosophy and science. Just one standpoint can be chosen between Jew against Rome, because this battle doesn't allow any compromise between them.
Akca, Uljana. "Att övervinna det mänskliga : En läsning av återkomsttanken i Nietzsches Så talade Zarathustra i ljuset av Heideggers kritik." Thesis, Södertörns högskola, Institutionen för kultur och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-6272.
Full textVrba, Martin. "DECISIONS." Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2017. http://www.nusl.cz/ntk/nusl-295732.
Full textChan, Patrick Foong, and patrick chan@rmit edu au. "Outside-Singapore: A Practice of Writing: Making Subjects and Spaces yet to come." RMIT University. Architecture and Design, 2007. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080205.164909.
Full textLee, Yonghwa. "Diving Deep for “The Ungraspable Phantom of Life”: Melville’s Philosophical and Aesthetic Inquiries into Human Possibilities in Moby-Dick." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1243629090.
Full textMcNeely, Matthew D. "Overlap." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32221.
Full textMaster of Architecture
Kronstrand, Alexander, and Andreas Holmqvist. "Overlay Network." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119498.
Full textYiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.
Full textIncludes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
Fraiwan, Mohammad Amin. "Overlay networks monitoring." [Ames, Iowa : Iowa State University], 2008.
Find full textAndersen, David G. (David Godbe) 1975. "Resilient overlay networks." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86657.
Full textQazi, Sameer Hashmat Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Scalable resilient overlay networks." Awarded By:University of New South Wales. Electrical Engineering & Telecommunications, 2009. http://handle.unsw.edu.au/1959.4/44536.
Full textSrivastava, Manoj. "SECURITY OVERLAY FOR RMI." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20011106-220340.
Full textDistributed object computing refers to allowing objects to be distributed across a network. These objects may be distributed across a number of different computers and across networks.This thesis presents a popular distributed object architecture, Remote Method Invocation (RMI). As RMI works on a Java framework, it provides the same features Java provides. Its portability, ability to transport objects as a whole, and power to connect to existing as well as legacy systems makes a strong choice amongst other competing technologies. Needless to say, the transport of objects across systems brings along with it the necessity for a strong security framework.The Secure Sockets Layer (SSL) is a widely popular protocol that currently provides the secure framework RMI needs. Most e-commerce applications these days run over SSL. However, SSL may not the right choice for every application requiring a security backbone. The motivation behind this thesis lies in this thought. The Secure Remote Password Protocol (SRP) provides a secure, simple and fast approach for providing client authentication. An attempt has been made to build a new infrastructure using SRP. The infrastructure that has been developed can provide authentication and privacy, as well as maintain message integrity. One such application domain is mobile computing. In this era where data is required to be accessible from anywhere and everywhere, mobile computing is a growing area. Again, due to the use of mobile agents in this area, security plays an important role. The security mechanism provided needs to be fast and simple and at the same time provide strong security. The new security overlay developed has been proposed as a possible solution.
Berns, Andrew David. "Self-stabilizing overlay networks." Diss., University of Iowa, 2012. https://ir.uiowa.edu/etd/3431.
Full textHoefler, Torsten. "Communication/Computation Overlap in MPI." Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200600021.
Full textHuurnink, Jon Egenberg. "Kvantifisering av overvann : Case Brøset." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for vann- og miljøteknikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18427.
Full textWu, Xiao. "SIP on an Overlay Network." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91491.
Full textMed utvecklingen av mobil (specifikt: wide area cellulär telefoni)-teknik, har användarnas krav ändras från den grundläggande röst-tjänst som bygger på krets kopplad teknik till att vilja ha hög-hastighets paket baserade dataöverföringstjänster. Voice over IP (VoIP) som vinner allt mer uppmärksamhet på grund av sin höga prestanda och låga kostnader är en paket baserad telefon tjänst. Däremot fungerar VoIP inte bra i alla situationer. Network address translation (NAT) har blivit det största hinder för en framtida användning av VoIP. I denna avhandling analyserar vi och jämför nuvarande NAT lösningar. Efter detta inför vi en VoIP över IPSec (VOIPSec) lösning (dvs. ett VoIP över IPSec Virtual Private Network (VPN) system) och en utvidgad VOIPSec lösnings mekanism. Dessa två lösningar testas och jämfördes för att mäta prestationer i förhållande till en version av samma SIP User Agent som körs utan IPSec. I den föreslagna lösningen VOIPSec ansluter IPSec en VPN-tunnel till varje SIP-klient och SIP-server, vilket gör att alla de potentiella SIP deltagarna kan nås, dvs eventuella NAT problem löses. All SIP-signalering och media trafik för VoIP-samtal överförs via denna etablerade tunnel. Denna VPN-tunnel ger allmänna medel för VoIP-trafik att passera NAT utrustningen. Dessutom ger IPSec VPN också garanterad säkerheten för VoIP-samtal på IP-nivå. För att förbättra skyddsnivån för mediaströmmar med VOIPSec, skapade vi och utvärderade en utsträckt VOIPSec lösning som innehåller end-to-end skydd av realtids media trafik. I denna utökade VOIPSec lösning, använde vi SRTP stället för RTP för att bära medieinnehåll. Denna utvidgade metod visade sig ge alla fördelar VOIPSec och SRTP kunde erbjuda utan ytterligare dröjsmål för media trafiken (jämfört med VoIPSec lösningen). Observera att den lösning som föreslås i denna avhandling kan vara av begränsad praktisk betydelse i framtiden då fler NAT lösningar blir VoIP kapabla, men lösningen är idag nödvändigt för att underlätta den ökande användningen av VoIP-system i praktiken. För VoIP-samtal som inte behöver end to end säkerhet rekommenderar vi användning av VOIPSec lösningen som ett sätt att lösa NAT problem och för att skydda trafiken på IP-nivå. När end to end säkerhet inte behövs föredrar vi VOIPSec lösningen av följande skäl: (1) våra testresultat visar att tiden för samtal inställning för det förlängda VOIPSec lösningen är dubbelt den tid som krävs för VOIPSec lösningen och den utökade VOIPSec lösningen kräver användning av användarprogram som stödjer SRTP. Medan VOIPSec lösningen inte kräver en speciell användar agent och alla VoIP-klienter på marknaden är kompatibla med denna lösning. Men när fler SIP användaragenter får stöd för SRTP, kommer den förlängda VOIPSec lösning tillämpas för användare av dessa SIP användarprogram.
Wagh, Prasad J. "DiffServ overlay multicast for videoconferencing." Diss., Columbia, Mo. : University of Missouri-Columbia, 2005. http://hdl.handle.net/10355/4301.
Full textThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (January 10 , 2007) Includes bibliographical references.
Junkert, Levi Daniel. "The grid overlay system model." Thesis, Montana State University, 2009. http://etd.lib.montana.edu/etd/2009/junkert/JunkertL0509.pdf.
Full textTrump, Rebecca K. "Self-Brand Overlap and Dissociation." Diss., The University of Arizona, 2010. http://hdl.handle.net/10150/194983.
Full textWatts, Ivor Llewellyn. "Overlap and fractional graph colouring." Thesis, Open University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505353.
Full textParkar, M. A. "Overland flow in urban catchments." Thesis, Nottingham Trent University, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.376095.
Full textTam, W. S. "Pavement evaluation and overlay design." Thesis, University of Nottingham, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.378746.
Full textMiao, Jun. "Load balance in overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20MIAO.
Full textIncludes bibliographical references (leaves 59-62). Also available in electronic version. Access restricted to campus users.
Bhat, Goutam. "Accurate Tracking by Overlap Maximization." Thesis, Linköpings universitet, Datorseende, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-154653.
Full textRashid, Lezan. "Overlay welding of FeCrAl alloys." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-44345.
Full textI detta examensarbete har olika påsvetsningsmetoder som är lämpliga för en pannapplikation undersökts. Syftet med denna studie var att undersöka både för- och nackdelar med påsvetsningsmetoderna och föreslå några utvärderingskriterier på vissa kommersiella och experimentella legeringar som lämpar sig för påsvetsningsmaterial. Många komponenter i en panna är tillverkade av låg legerat stål och miljön där förbränningen sker kan vara väldigt komplex, därför kan det ske korrosion. Påsvetsning är en process där ett eller flera skikt av ett mer korrosionsbeständigt material appliceras på ett basmaterial. De två olika svetsmetoderna som undersöktes i denna studie var TIG-svetsning och MIG-svetsning. Testerna utfördes med FeCrAl legeringar (Kanthal A, Kanthal D och vissa experimentella legeringar). FeCrAl legeringar är i allmänhet ferritiska järnbaserade stål med 20-23% krom och ~5% aluminium. De utvärderingsmetoderna som undersöktes var: visuell undersökning, penetrantprovning, makro/ mikroundersökning, sidobockprovning och korttidskorrosionstest (~50 timmar). Slutsatsen av detta examensarbete är att MIG-svetsning är en mer produktiv metod än TIG, men fler defekter såsom bindfel och sprickor uppkom för MIG-svetsning. Dessa defekter kan ”fixas” genom optimering av svetsparametrar. Om man bara ska reparera ett specifikt område är TIG-svetsning ett bättre alternativ. En slutsats om antal lager är att ett lager med MIG-svetsning är nästan lika tjockt som tre lager med TIG-svetsning med Ø 1mm svetstråd. Tre svetsutvärderingar som är viktiga är visuell undersökning, penetrantprovning och korrosionstest för att välja vilken påsvetsmetod som är lämpligast i pannapplikation.
Ehnert, Jesse. "The Argument from Species Overlap." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34236.
Full textMaster of Arts
Papandreopoulos, Georgios. "Nietzsche's vision of the Overhuman." Thesis, Staffordshire University, 2014. http://eprints.staffs.ac.uk/2407/.
Full textMastour, Eshgh Somayeh Sadat. "Distributed Reinforcement Learning for Overlay Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92131.
Full textKing, Lisa Charmayne. "Stimulus overlap and dual-task performance." Thesis, Georgia Institute of Technology, 1988. http://hdl.handle.net/1853/28752.
Full textLam, Ngok. "Capacity allocation in service overlay networks." Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=103599.
Full textEn raison de son caractere decentralise et le manque de cooperations necessaires entre les l'Internet des systemes autonomes, l'Internet actuel est incapable de fournir de bout en bout QoS garantit a la couche application. L'Overlay Service Network (SON) est une solution proposee a ce QoS de bout-en-bout probleme. Grace a sa structure speciale de recouvrement, l'Overlay Service Network est en mesure de fournir des informations ables de bout en bout la qualite de service support au-dessus de l'infrastructure Internet. En considerant la SON en reseau avec des connexions virtuelles et la bande passante allocations, nous obtenons une serie de nouveaux resultats pour le SON. Tout d'abord, en se referant a la theorie de la abilite, nous obtenons une forme generale pour la fin-en-bout fonction de blocage. Avec l'general fonction de blocage, nous examinons les deux approches d'optimisation pour la conception une SON, soit le maximum Profit (MP) approche qui maximise le profit et le Cout minimum (MC) approche qui minimise l'investissement. Notre etude revele que si les deux approches se sont revelees etre l'equivalent dans de nombreux autres parametres, ils sont differents dans l'environnement SON. Nos resultats montrent que l'approche MP est une approche plus appropriee pour la conception d'un SON, et le resultat est independant de l'algorithme de routage utilise. Deuxiemement, nous developpons un nouvel evenement depend regime de routage qui est assez efficace pour etre incorpores dans le probleme d'allocation de la capacite optimale. Cela permet au probleme de conception Fils pour etre formule et resolu comme un probleme d'optimisation MP. Ensuite, nous avons d'ameliorer la methodologie d'optimisation en decomposant le probleme de conception principale fils dans un certain nombre de sous problemes et nous resolvons le probleme de conception principale en resolvant les problemes sous-qui impliquent la constatation du prix fictifs lien des liens du reseau. C'est justement parce que nous utilisons la recherche du profit maximum, l'idee de prix fictif lien pourrait etre constituee pour resoudre le probleme de conception. Un schema de convolution rapide macro-etat base sur le prix fictif lien est developpe pour fournir une differenciation du trafic module d'optimisation de la formulation. Ce module additionnel permet l'optimisation examiner le cadre des connexions de trafic sur la base des contributions (monetaires), ils offrent au reseau. Comme beaucoup d'autres services de telecommunications, SON est estime a exposer nette positive externalites de travail - une fois que le reseau atteint une "masse critique", il va continuer a croitre dans un auto-renforcement maniere. La tarification optimale des services de SON est donc un autre element crucial de l'information pour le SON pour reussir. Nous etudions une serie de multiplicateurs Lagrange et montrent que les frais de service SON sont etroitement liees a l'ensemble des multiplicateurs. Lorsque les niveaux de service ne sont pas des exigences dur, en utilisant les multiplicateurs que les frais de service, le reseau qui en resulte sera sur la frontiere de Pareto d'un probleme d'optimisation multi-criteres qui maximise la fois l'utilite operateur et l'utilite de l'utilisateur. Ce travail fournit des informations a partir de la formulation du probleme, a l'actuel la conception de processus, de la simplification et l'amelioration du processus de conception, et enfin a l'ensemble des prix optimal o l'operateur peut charger. Il fournit essentiellement des informations completes pour le deploiement du reseau SON. Ce travail fournit des informations a partir de la formulation du probleme, a l'actuel la conception de processus, de la simplification et l'amelioration du processus de conception, et enfn a l'ensemble des prix optimal o l'operateur peut charger. Il fournit essentiellement des informations completes pour le deploiement du reseau SON.
Kandekar, Kunal. "TAO a topology-adaptive overlay framework /." NCSU, 2006. http://www.lib.ncsu.edu/theses/available/etd-05162006-141449/.
Full textStreuer, Thomas. "Simulation der Quantenchromodynamik mit Overlap-Fermionen." [S.l.] : [s.n.], 2006. http://www.diss.fu-berlin.de/2006/395/index.html.
Full textKwan, Tin-man Tony. "Scalable content distribution in overlay networks." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B3847900X.
Full textKwan, Tin-man Tony, and 關天文. "Scalable content distribution in overlay networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3847900X.
Full textPrahatheesan, Vicknarajah. "A lattice filter for CDMA overlay." Thesis, Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20665684.
Full textLiu, Xiaomei. "Building reliable applications in overlay networks." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textTitle from PDF t.p. (viewed on Apr. 8, 2009) Includes bibliographical references (p. 176-184). Also issued in print.
Yip, Alexander Siumann 1979. "NATRON : overlay routing to oblivious destinations." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29724.
Full textIncludes bibliographical references (p. 51-53).
This thesis presents NATRON, a system in which an overlay network of nodes cooperates to improve unicast routing to non-participating hosts. Previous overlay systems have used overlay routing to improve communication between participating hosts; they were unable to exploit overlay routing to non-participating hosts. NATRON uses a combination of IP tunneling and network address translation to allow members of the overlay to communicate with hosts outside the overlay network via other overlay members. In order to estimate the potential performance improvement a system like NATRON might provide, we performed an exhaustive test on a multi-site Internet testbed. Our results show that a system that always guesses the best intermediate node could reduce the average HTTP transfer time by 18% and reduce the number of downloads lasting longer than 30 seconds by 16%. We implemented a working NATRON and a heuristic for choosing intermediate overlay nodes, but we find that our heuristic can only exploit 22% of the potential performance gains. We conclude that overlay routing to oblivious hosts has good potential for performance enhancement but further work is needed to develop a path choice heuristic.
by Alexander Siumann Yip.
M.Eng.
Jannotti, John 1974. "Network layer support for overlay networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29274.
Full textIncludes bibliographical references (p. 98-103).
Overlay networks are virtual networks formed by cooperating nodes that share an underlying physical network. They represent a flexible and deployable approach for applications to obtain new network semantics without modification of the underlying network, but they suffer from efficiency concerns. This thesis presents two new primitives for implementation in the network layer (i.e., the routers of the physical network). These primitives support the efficient operation and construction of overlay networks. Packet Reflection allows end hosts to request that routers perform specialized routing and duplication for certain packets. Path Painting allows multiple end hosts to determine where their disparate paths to a rendezvous point meet, in order to facilitate overlay topology building that reflects the topology of the underlying network. Both primitives can be incrementally deployed for incremental benefit. This thesis describes a variety applications of these primitives: application level multicast systems with various semantics, an extended Internet Indirect Infrastructure with latency benefits over the original proposal, and an extension to Chord which would allows faster lookups. Experimental results on simulated topologies indicate that when all routers support the proposed primitives, less that 5% overhead (in terms of link usage and latency) remains in two common overlay network usage scenarios. In addition, the benefits gained from deployment are significant even at low deployment levels. At approximately 25% deployment, the primitives have reduced overhead by over 50%. When intelligent deployment strategies are used, link usage overhead is less than 30% at less than 10% deployment. Finally, the results indicate that these benefits affect the area local to the deployed routers, providing a deployment incentive to independent networks.
by John Jannotti.
Ph.D.
Zhao, Sherry Yi 1980. "Gestural overlap of stop-consonant sequences." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29728.
Full textIncludes bibliographical references (p. 79).
This study used an analysis-by-synthesis approach to discover possible principles governing the coordination of oral and laryngeal articulators in the production of English stop-consonant sequences. Recorded utterances containing stop-consonant sequences were analyzed acoustically, with focus on formant movements, closure durations, release bursts, and spectrum shape at low frequencies. The results of the acoustic analysis were translated into general gestural timing estimates. From these estimates, a set of possible principles was derived. Both the general gestural estimates and the derived principles were verified and refined through quasi-articulatory synthesis using HLsyn. Perception tests composed of synthetic sequences with varying degrees of overlap were administered. From acoustic analysis, synthesis verification, and perception testing, two principles emerged. First, V1Cl#C2V2 stop-consonant sequences with front-to-back order of place of articulation have more overlap of articulators than those with back-to-front order; this agrees with past research findings (Chitoran, Goldstein, and Byrd, 2002). The extent of the overlapping usually does not go beyond the obliteration of the Cl release burst. Second, gestural overlap involving laryngeal articulators exists but varies from individual to individual. The voicing of C1 usually affects the voicing of C2 in V1CI#C2V2 sequences.
by Sherry Yi Zhao.
M.Eng.
Jackson, Chloe. "Modeling the Hillside Development Overlay Zone." The University of Arizona, 2016. http://hdl.handle.net/10150/622779.
Full textYue, Xi. "Rapid Overlay Builder for Xilinx FPGAs." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/50907.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Zhong, Yiming. "Modelling sediment transportation and overland flow." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:a45eefae-5a0f-4917-9abb-261ae792f2ee.
Full textMaciel, Danilo Leal. "Sherlock N-Overlap: normalization invasive and overlap coefficient for analysis of similarity between source code in programming disciplines." Universidade Federal do CearÃ, 2014. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=12195.
Full textThis work is contextualized in the problem of plagiarism detection among source codes in programming classes. Despite the wide set of tools available for the detection of plagiarism, only few tools are able to effectively identify all lexical and semantic similarities between pairs of codes, because of the complexity inherent to this type of analysis. Therefore to the problem and the scenario in question, it was made a study about the main approaches discussed in the literature on detecting plagiarism in source code and as a main contribution, conceived to be a relevant tool in the field of laboratory practices. The tool is based on Sherlock algorithm, which has been enhanced as of two perspectives: firstly, with changes in the similarity coefficient used by the algorithm in order to improve its sensitivity for comparison of signatures; secondly, proposing intrusive techniques preprocessing that, besides eliminating irrelevant information, are also able to overemphasize structural aspects of the programming language, or gathering separating strings whose meaning is more significant for the comparison or even eliminating sequences less relevant to highlight other enabling better inference about the degree of similarity. The tool, called Sherlock N-Overlap was subjected to rigorous evaluation methodology, both in simulated scenarios as classes in programming, with results exceeding tools currently highlighted in the literature on plagiarism detection.
Este trabalho se contextualiza no problema da detecÃÃo de plÃgio entre cÃdigos-fonte em turmas de programaÃÃo. Apesar da ampla quantidade de ferramentas disponÃveis para a detecÃÃo de plÃgio, poucas sÃo capazes de identificar, de maneira eficaz, todas as semelhanÃas lÃxicas e semÃnticas entre pares de cÃdigos, o que se deve à complexidade inerente a esse tipo de anÃlise. Fez-se, portanto, para o problema e o cenÃrio em questÃo, um estudo das principais abordagens discutidas na literatura sobre detecÃÃo de plÃgio em cÃdigo-fonte e, como principal contribuiÃÃo, concebeu-se uma ferramenta aplicÃvel no domÃnio de prÃticas laboratoriais. A ferramenta tem por base o algoritmo Sherlock, que foi aprimorado sob duas perspectivas: a primeira, com modificaÃÃes no coeficiente de similaridade usado pelo algoritmo, de maneira a melhorar a sua sensibilidade para comparaÃÃo de assinaturas; a segunda, propondo tÃcnicas de prÃ-processamento invasivas que, alÃm de eliminar informaÃÃo irrelevante, sejam tambÃm capazes de sobrevalorizar aspectos estruturais da linguagem de programaÃÃo, reunindo ou separando sequÃncias de caracteres cujo significado seja mais expressivo para a comparaÃÃo ou, ainda, eliminando sequÃncias menos relevantes para destacar outras que permitam melhor inferÃncia sobre o grau de similaridade. A ferramenta, denominada Sherlock N-Overlap, foi submetida a rigorosa metodologia de avaliaÃÃo, tanto em cenÃrios simulados como em turmas de programaÃÃo, apresentando resultados superiores a ferramentas atualmente em destaque na literatura sobre detecÃÃo de plÃgio.
Henke, Petra [Verfasser], and Jörg [Akademischer Betreuer] Overmann. "Mechanisms of bacterial interaction in phototrophic consortia / Petra Henke ; Betreuer: Jörg Overmann." Braunschweig : Technische Universität Braunschweig, 2016. http://d-nb.info/1175818844/34.
Full text