Dissertations / Theses on the topic 'Système des d'exploitation mobile'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Système des d'exploitation mobile.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Konaré, Dougoukolo. "Contribution à un système d'exploitation générique d'infrastructures urbaines avec composantes mobiles." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ65586.pdf.
Full textEl, Hatib Souad. "Une approche sémantique de détection de maliciel Android basée sur la vérification de modèles et l'apprentissage automatique." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/66322.
Full textThe ever-increasing number of Android malware is accompanied by a deep concern about security issues in the mobile ecosystem. Unquestionably, Android malware detection has received much attention in the research community and therefore it becomes a crucial aspect of software security. Actually, malware proliferation goes hand in hand with the sophistication and complexity of malware. To illustrate, more elaborated malware like polymorphic and metamorphic malware, make use of code obfuscation techniques to build new variants that preserve the semantics of the original code but modify it’s syntax and thus escape the usual detection methods. In the present work, we propose a model-checking based approach that combines static analysis and machine learning. Mainly, from a given Android application we extract an abstract model expressed in terms of LNT, a process algebra language. Afterwards, security related Android behaviours specified by temporal logic formulas are checked against this model, the satisfaction of a specific formula is considered as a feature, finally machine learning algorithms are used to classify the application as malicious or not.
Sokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.
Full textNowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
Limam, Bedhiaf Imen. "Virtualisation des infrastructures des opérateurs de réseaux mobiles." Paris 6, 2011. http://www.theses.fr/2011PA066341.
Full textPossemato, Andrea. "A Multidimensional Analysis of The Android Security Ecosystem." Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS455.pdf.
Full textWith more than 2.5 billion active devices based on Android, Google's mobile operating system is now one of the most widely used in the world.Despite all the efforts made by Google to constantly improve the security of the entire Android ecosystem, there are still several problems that remain unresolved. In this thesis, we analyse in detail some of the open problems that affect different components and players that are part of and contribute to the Android ecosystem. We start with the security analysis of the network communication of Android applications, showing how, even if Android provides several techniques to secure network communications, developers sometimes are still forced to use cleartext protocols. Our study continues with the analysis of another issue that puts the security and privacy of the user at risk. We analyze the vulnerabilities exploited by malicious applications to perform phishing attacks and how there is still no system in place to allow applications to protect themselves against these attacks. Last, we analyze what we think may be the perfect representation of how difficult it is to ensure security in a domain as extensive as Android analyzing how customizations, even though beneficial to vendors, can lead to security problems that are lowering down the overall security of the Android system. In this thesis, for each of the problems, we analyze the issue in detail, we measure how widespread it is, and we propose an alternative solution with the aim of solving the problem, making a step towards a more secure Android ecosystem
Gomez, Lacruz Maria. "Towards improving the quality of mobile app by leveraging crowdsourced feedback." Thesis, Lille 1, 2016. http://www.theses.fr/2016LIL10158/document.
Full textThe popularity of smartphones is leading to an ever growing number of mobile apps that are published in official app stores. In fact, previous studies have demonstrated that app users are intolerant to quality issues (e.g., crashes). Users who encounter issues frequently uninstall apps and move to alternative apps. Hence, quickly detecting and preventing issues is crucial for staying competitive in the market. Although developers use emulators and test apps before deployment, many bugs emerge in the wild. Developing apps which run without errors along time remains a primary concern for app developers. The big challenge is that the environment is out of the app developers’ control. More specifically, the mobile ecosystem faces rapid platform evolution, high device fragmentation, and high diversity of execution contexts. This thesis introduces a new generation of app stores which exploit crowdsourced information about apps, devices and users to increase the overall quality of the delivered mobile apps. We claim that app stores can exploit the wisdom of the crowd to distill actionable insights from the feedback returned by the crowds. These actionable insights assist app developers to deal with potential errors and threats that affect their apps prior to publication or even when the apps are in the hands of end-users
Hamzaoui, Khalil Ibrahim. "Contribution à la modélisation de la consommation d'énergie dans un dispositif mobile." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1I030/document.
Full textThe main goal of this thesis is to model the power consumption of a particular application running on a mobile device. We propose a model of energy behavior monitoring, we also describe a methodology to identify the parameters of the model. To this end, we analyzed a collection of experimental data collected during my tour de France in an electric wheelchair. We applied statistical tools to obtain the parameters of the model. Finally, we validate the model by comparing the results with other experimental data.The first case study compares the evolution of the energy cost in the mobile environments of the different components of smartphones based on several energy models.- The second case study deals with the evaluation, the measurements of the energy cost consumed and the problems encountered in the methods used for the evaluation of energy consumption. For a better evaluation, the case study of energy behavior was introduced using the virtual machines.- The third case study is based on the treatment of the results of the measurements obtained during my tour of France in a connected electric wheelchair. The goal is to anticipate resource management, realizing measurements, and then tracking energy behavior in a real and diverse environment. The model can be used to define an optimal frequency in terms of energy consumption for specific situations without degrading the quality of service desired by the user
Achara, Jagdish Prasad. "Unveiling and Controlling Online Tracking." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM069/document.
Full textIt is no surprise, given smartphones convenience and utility, to see their wide adoption worldwide. Smartphones are naturally gathering a lot of personal information as the user communicates, browses the web and runs various Apps. They are equipped with GPS, NFC and digital camera facilities and therefore smartphones generate new personal information as they are used. Since they are almost always connected to the Internet, and are barely turned off, they can potentially reveal a lot of information about the activities of their owners. The close arrival of smart-‐watches and smart-‐glasses will just increase the amount of personal information available and the privacy leakage risks. This subject is closely related to the Mobilitics project that is currently conducted by Inria/Privatics and CNIL, the French data protection authority [1][2][3]. Therefore, the candidate will benefit from the investigations that are on progress in this context, in order to understand the situation and the trends. The candidate will also benefit from all the logging and analysis tools we developed for the iOS and Android Mobile OSes, as well as the experienced gained on the subject. Another question is the arrival of HTML5 based Mobile OSes, like Firefox OS: it clearly opens new directions as it "uses completely open standards and there’s no proprietary software or technology involved" (Andreas Gal, Mozilla). But what are the implications from a Mobile OS privacy point of view? That's an important topic to analyze. Beyond understanding the situation, the candidate will also explore several directions in order to improve the privacy control of mobile devices. First of all, a privacy-‐by-‐design approach, when feasible, is an excellent way to tackle the problem. For instance the current trend is to rely more and more on cloud-‐based services, either directly (e.g., via Dropbox, Instagram, Social Networks, or similar services), or indirectly (e.g., when a backup of the contact, calendar, accounts databases is needed). But pushing data on cloud-‐based systems, somewhere on the Internet, is in total contradiction with our privacy considerations. Therefore, an idea is to analyze and experiment with personal cloud services (e.g., ownCLoud, diaspora) that are fully managed by the user. Here the goal is to understand the possibilities, the opportunities, and the usability of such systems, either as a replacement or in association with commercial cloud services. Another direction is to carry out behavioral analyses. Indeed, in order to precisely control the privacy aspects, at one extreme, the user may have to deeply interact with the device (e.g., through pop-ups each time a potential privacy leak is identified), which negatively impacts the usability of the device. At the other extreme, the privacy control may be oversimplified, in the hope not to interfere too much with the user, as is the case with the Android static authorizations or the one-‐time pop-‐ups of iOS6. This is not appropriate either, since using private information once is not comparable to using it every minute. A better approach could be to perform, with the help of a machine learning system for instance, a dynamic analysis of the Mobile OS or App behavior from a privacy perspective and to interfere with the user only when it is deemed appropriate. This could enable a good tradeoff between privacy control and usability, with user actions only when meaningful. How far such a behavioral analysis can go and what are the limitations of the approach (e.g., either from a CPU/battery drain perspective, or in front of programming tricks to escape the analysis) are open questions. Tainting techniques applied to Mobile OSes (e.g., Taint-Droid) can be used as a basic bloc to build a behavioral analysis tool, but they have limited accuracy are unable to analyze native code and have poor performances
Irolla, Paul. "Formalization of Neural Network Applications to Secure 3D Mobile Applications." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS585/document.
Full textThis thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing(HPC) technology to the biomedical world. This solution will give the opportunity for experts from different fields to navigate intuitivelyin the Big Data imaging with access via 3D light terminals. Biomedicaldata protection against data leaks is of foremost importance. As such,the client environnement and communications with the server must besecured. We focused our work on the development of antimalware solutionon the Android OS. We emphasizes the creation of new algorithms,methods and tools that carry advantages over the current state-of-the-art, but more importantly that can be used effectively ina production context. It is why, what is proposed here is often acompromise between what theoretically can be done and its applicability. Algorithmic and technological choices are motivated by arelation of efficiency and performance results. This thesis contributes to the state of the art in the following areas:Static and dynamic analysis of Android applications, application web crawling.First, to search for malicious activities and vulnerabilities, oneneeds to design the tools that extract pertinent information from Android applications. It is the basis of any analysis. Furthermore,any classifier or detector is always limited by the informative power of underlying data. An important part of this thesis is the designing of efficient static and dynamic analysis tools forapplications, such as an reverse engineering module, a networkcommunication analysis tool, an instrumented Android system, an application web crawlers etc.Neural Network initialization, training and anti-saturation techniques algorithm.Neural Networks are randomly initialized. It is possible to control the underlying random distribution in order to the reduce the saturation effect, the training time and the capacity to reach theglobal minimum. We developed an initialization procedure that enhances the results compared to the state-of-the-art. We also revisited ADAM algorithm to take into account interdependencies with regularization techniques, in particular Dropout. Last, we use anti-saturation techniques and we show that they are required tocorrectly train a neural network.An algorithm for collecting the common sequences in a sequence group.We propose a new algorithm for building the Embedding Antichain fromthe set of common subsequences. It is able to process and represent allcommon subsequences of a sequence set. It is a tool for solving the Systematic Characterization of Sequence Groups. This algorithm is a newpath of research toward the automatic creation of malware familydetection rules
Karam, Louis. "Pseu : prototype d'un système d'exploitation universel." Aix-Marseille 3, 1993. http://www.theses.fr/1993AIX32027.
Full textComputers are making progress so rapidly that concepts and tools primarily defined for medium or large machines are now being applied to microcomputers. It is obvious that it is the case for operating systems which can seem to be an obstacle when someone wishes to use components of a computer other than the machine language. The first objective of this thesis is to povide a proven simple and logical method of a universal operating system prototype. The second objective of this thesis is to allow administrators without an elaborate knowledge of operating systems to remain in control and independent when confronted by counsellors or computer salesmen. The third objective is to attract computer firm' attention on problems during the course of each migration by proposing solutions which can be the centre of a more complex development
Boulanger, Philippe. "Système d'exploitation orienté réseaux et télécoms." Nice, 1990. http://www.theses.fr/1990NICE4396.
Full textTebbal, Hassen. "Réseau local supportant un système d'exploitation distribué." Paris 9, 1986. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1986PA090048.
Full textTo realize a distributed operating system with all problems about the functionalities, we must have good network architecture. This architecture (logical) have to permit to do the integrated services of communication mixing the transmissions of data, voice and animated pictures, texts, with communication functions agreed with standard norms connection norms. The choice of network topologies and the medium are very important, they facility the transmission available in pacquet switching and circuit switching
Hecht, Geoffrey. "Détection et analyse de l'impact des défauts de code dans les applications mobiles." Thesis, Lille 1, 2016. http://www.theses.fr/2016LIL10133/document.
Full textMobile applications are becoming complex software systems that must be developed quickly and evolve continuously to fit new user requirements and execution contexts. However, addressing these constraints may result in poor low-level design choices, known as code smells. The presence of code smells within software systems may incidentally degrade their quality and performance, and hinder their maintenance and evolution. Thus, it is important to know this smells but also to detect and correct them. While code smells are well-known in object-oriented applications, their study in mobile applications is still in their infancy. Moreover there is a lack of tools to detect and correct them. That is why we present a classification of 17 code smells that may appear in Android applications, as well as a tool to detect and correct code smells on Android. We apply and validate our approach on large amounts of applications (over 3000) in two studies evaluating the presence and evolution of the number of code smells in popular applications. In addition, we also present two approaches to assess the impact of the correction of code smells on performance and energy consumption. These approaches have allowed us to observe that the correction of code smells is beneficial in most cases
Langue, Tsobgny Yves Bertrand. "PARX : architecture de noyau de système d'exploitation parallèle." Phd thesis, Grenoble INPG, 1991. http://tel.archives-ouvertes.fr/tel-00340388.
Full textKtata, Ismail. "Réalisation d'un système d'exploitation pour l'architecture reconfigurable dynamiquement OLLAF." Phd thesis, Université de Cergy Pontoise, 2013. http://tel.archives-ouvertes.fr/tel-00917835.
Full textAraujo, Ribeiro João. "Mécanismes du système d'exploitation pour le support du multimédia." Versailles-St Quentin en Yvelines, 1999. http://www.theses.fr/1999VERS0009.
Full textChebili, Mourad. "Une interface intelligente d'assistance à l'utilisation d'un système d'exploitation." Paris 8, 2000. http://www.theses.fr/2000PA081858.
Full textMzouri, Azzeddine. "Les protocoles de communication dans un système d'exploitation réparti." Paris 11, 1988. http://www.theses.fr/1988PA112072.
Full textGrimaud, Gilles. "Camille : un système d'exploitation ouvert pour carte à microprocesseur." Lille 1, 2000. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2000/50376-2000-452.pdf.
Full textAné, David. "Stratégie d'exploitation et architecture de commande du système DEFONTAINE." Nantes, 2008. http://www.theses.fr/2008NANT2136.
Full textThis work, undertaken in collaboration with company DEFONTAINE SA, is within the framework of researches for innovating solutions for the reduction of CO2 car emissions. The studied system, that we will name DEFONTAINE system, was the subject of two other complementary theses, which concern the design of two electric machines : a linear actuator and a permanent magnet synchronous machine. Its goal is to fulfill the principal functions of a thermal engine flywheel, while avoiding its disadvantages. Indeed, if the flywheel reduces the acyclisms of the thermal engine at low speed, it becomes disadvantageous during the vehicle accelerations. Our work has consisted to model and to control the actuators of DEFONTAINE system, in order to supervise its operation. First of all, we characterized the acyclisms of a thermal engine in sight, in particular, to emulate them on test bench. Then, we considered the sensorless control of a traditional synchronous machine based on an improvement of the Matsui estimation method coupled to siliding mode observers. We have implemented a global approach of the identification and the corrector tuning of the various control loops. This approach was transposed to the synchronous machine with trapezoidal distribution of the DEFONTAINE system, within an extended vector control. Two test benches were built and we experimentally validated the control of the synchronous machine with sinusoidal distribution (motor and generator) and the extended vector control of the synchronous machine of DEFONTAINE system
Gagnon, Nicolas. "Développement et étude d'un système d'exploitation tolérant aux défaillances pour système un [sic] multiprocesseur." Thèse, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://constellation.uqac.ca/1071/1/10984005.pdf.
Full textKhemaja, Maha. "Scrables : un système de conception et d'exploitation de documents structurés." Toulouse 3, 1993. http://www.theses.fr/1993TOU30275.
Full textPeltier, Thierry. "La carte blanche : un nouveau système d'exploitation pour objets nomades." Lille 1, 1995. http://www.theses.fr/1995LIL10166.
Full textDeville, Damien. "CamilleRT : un système d'exploitation temps réel extensible pour carte à microprocesseur." Lille 1, 2004. https://ori-nuxeo.univ-lille1.fr/nuxeo/site/esupversions/9f245270-7f66-4a80-842b-e1a2e267e31b.
Full textPan, Zhao-Yang. "Le renouvellement du système d'exploitation : aspects économiques et mise en oeuvre." Université Louis Pasteur (Strasbourg) (1971-2008), 1992. http://www.theses.fr/1992STR1EC05.
Full textHanibeche, Rafik. "La sûreté de fonctionnement dans les systèmes d'exploitation répartis : application dans le système chorus/mix : mécanismes pour la haute disponibilité des données non volatiles." Paris 7, 1993. http://www.theses.fr/1993PA077057.
Full textCard, Rémy. "Masix : Un système d'exploitation multi-environnements utilisant le micro-noyau Mach : Conception et réalisation." Paris 6, 1993. http://www.theses.fr/1993PA066728.
Full textDuquennoy, Simon. "Smews : un système d'exploitation dédié au support d'applications Web en environnement contraint." Thesis, Lille 1, 2010. http://www.theses.fr/2010LIL10184/document.
Full textThe context of this thesis is the extension of Web technologies to ambient computing. The resulting Web of Things allows novel interactions by guaranteeing interoperability at both network and applications levels. We address the design of the software system behaving as a Web server and embedded in strongly constrained devices such as smart cards or sensors. The state of the art solutions allowing to run a lightweight standard protocol stack involve poor performances and sacrifice the system features. The thesis is that by dedicating an operating system to the support of a high-level family of applications, we can produce an efficient software consuming a few resources. We study an architecture based on an macro-kernel integrating the hardware management, the communications stack and the applications container, providing an interface that fits the applications needs
Boule, Ivan. "Fenix : un système multifenêtres intégré à Unix." Grenoble INPG, 1987. http://tel.archives-ouvertes.fr/tel-00324433.
Full textBoukhobza, Jalil. "Etude et analyse des performances et simulation des accès aux fichiers sur PC." Versailles-St Quentin en Yvelines, 2004. http://www.theses.fr/2004VERS0019.
Full textThe evolution of storage subsystems and more particularly disks was considerable this last decade. However, the performance gap between secondary storage and processor is still increasing. It is therefore crucial to well choose the storage subsystem and to know how to use it in an optimal way. In order to resolve this problem, a complete understanding of the software and hardware behaviours of storage systems as well as the interactions between the different modules of the I/O system is required. We are interested in this thesis in the benchmarking, the performance analysis and the simulation of the storage architecture on PCs. We are particularly studying the I/O system under Windows and the file access mechanisms. The use of some parameters in the file opening and creation function CreateFile under Windows decides on the way files are accessed. The choice of a read ahead algorithm, a lazy write strategy, the system data block size and other parameters is done by the system and depends on those function parameters. It is thus very important to understand the impact of those choices on the I/O performance of the system that are of course relative to the injected workload. The realized work consists of finding at first an efficient way to measure the specific Windows storage system performance depending on the parameters like those specified in the CreateFile function and request sizes. We have noticed very important performance fluctuations relative to the file access strategy used. We have then developed a methodology to analyse Windows storage systems. We have identified thanks to this methodology different parameters that helped us to understand the performance fluctuations we obtained. It is the response time analysis step that allowed this understanding. We observed that response times are periodic when the accessed blocks were stored sequentially on the disk, that was the starting point of our analysis. Once the performance study and analysis done, a behavioral simulator of the Windows storage system has been developed. It allows for instance the performance evaluation of a given workload on defined storage architecture for a user to decide of the most effective access strategy to adopt before implementing his application
Bissyandé, Tegawendé F. "Contributions à l'Amélioration du Débogage des Services Noyau dans un Système d'Exploitation Monolithique." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2013. http://tel.archives-ouvertes.fr/tel-00808877.
Full textBécoulet, Alexandre. "Conception d'un système d'exploitation supportant nativement les architectures multiprocesseurs hétérogènes à mémoire partagée." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00814482.
Full textRejela, Michel. "La pêche traditionnelle Vezo du sud-ouest de Madagascar : un système d'exploitation depassé ?" Bordeaux 3, 1993. http://www.theses.fr/1993BOR30037.
Full textThe traditional vezo fishing activity, the main one for this half-nomad fishermen population, who live on the exploitation of the fishing resources of the coastal sea (enriched by the presence of mangroves and of corallian reefs), must develop to face a growing demand of local, national and international origin. Changes of the alimentary habits among some social groups within the country, are due to the general demographic boom, and also to the increasing meat prices ; this partly explains this growth of demand that is hardly satisfied by offer. Yet, the fishing resources of the zee are far from being over exploited because traditional fishermen are unable to go very far from the coast. To this one must add old techniques and methods, the absence of sailing equipment, captures techniques reminding ancient periods, the lack of technical training for the vezo traditional fishermen, who stick to empirism. Is the existing type of fishing is an obsolete exploitation system? we would answer : "far from it", since it retains a major importance insomuch as concurrence from a more efficient industrial system cannot be effective, owing to the lack of large fish concentration to be exploited, and also because the national consumers only have very low incomes. In such conditions, traditional fishing, providing the local populations with marine and fresh water products, must be developped. This qualitative and quantitative development will not take place without
Lebee, Pierre. "Mise en œuvre d'une architecture spécialisée pour l'exécution d'un système d'exploitation réparti : Chorus." Compiègne, 1986. http://www.theses.fr/1986COMPI249.
Full textA new generation of operating systems is born during the last ten years : distributed operating system oriented network. Three key-concepts are strongly developed : standardization, distribution and parallelism. One of these systems is CHORUS (TM). This project launched at INRIA, has elaborated an architecture far distributed systems. CHORUS offers a UNIX compatibility, is independent of the hardware architecture and of networks. This paper describes a complete computer architecture fitted to CHORUS, based on transputers and Clippers. The project is developed at UTC in the IlS department. The major feature of the machine lays on the fact that the operating system is executed by a dedicated processor : the Transputer. User's tasks are executed on a Clipper. These two processors are called a Heterogeneous Parallel Distributed processor (HPD). The HPD Machine (HPDM) is modular and may be composed of rive HPD processors. Transputers are fully connected by their serial links, avoiding bus bottlenecks. Clippers have a local shared memory accessible by their private bus, or by a global bus. A third bus is used by the DMAC supporting l/0 operations (disk, ETHERNET, X2S) and accessing the local shared memories and Clipper's private memories. This bus permits l/O operations without decreasing global bus bandwidth. HPDMs may be connected together by ETHERNET or X25 network
Alkhatib, Bassel. "Etude et réalisation d'un système d'exploitation des connaissances : application au domaine de l'automatique." Bordeaux 1, 1993. http://www.theses.fr/1993BOR10612.
Full textClément, Charles. "Isolation des extensions de systèmes d'exploitation dans une machine virtuelle." Paris 6, 2009. http://www.theses.fr/2009PA066624.
Full textPortolan, Michele. "Conception d'un système embarqué sûr et sécurisé." Grenoble INPG, 2006. http://www.theses.fr/2006INPG0192.
Full textThis PhD researches a global methodology enabling to improve the dependability and security level against transient logic faults (natural or provoked) appearing inside a hardware/software integrated system, like for instance a smart cardo Results can be applied to all systems built around a synthesisable microprocessor core and a set of specialised peripherals. The protection methods operate simultaneously and in complementary manner on hardware, application software and interface layers (most noticeably, the operating system). High level modifications have been favoured for their advantages in terms of generality, configurability, portability and perpetuity. The proposed approach aims at achieving a good trade-off between robustness and overheads, from both hardware and performance point of views. It is applied on a significant system example, representative of an embedded monoprocessor system
Ndoye, Falou. "Ordonnancement temps réel préemptif multiprocesseur avec prise en compte du coût du système d'exploitation." Phd thesis, Université Paris Sud - Paris XI, 2014. http://tel.archives-ouvertes.fr/tel-00978366.
Full textSlim, Farah. "Etude et implémentation d'algorithmes de gestion de ressources pour un système d'exploitation de réseau." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0071.
Full textNetwork programmability is a major issue in the evolution of telecommunication systems. However, the emergence of new initiatives in the context of the internet of the future, such as network function virtualization and specialized tools such as Openstack makes it possible to develop new approaches to control and manage the network infrastructure. This new approach on which telecom operators rely to accelerate their digital transformation will impact not only the way networks are defined but also the main role of the operator, who now hasto manage cloud resources in combination with network resources. The main goal of the thesis is to analyze the modifications that will affect the infrastructure of the operator in order to design resource allocation algorithms adapted to the context of the virtualization of network functions
Garcia, Samuel. "Architecture reconfigurable dynamiquement a grain fin pour le support d'un système d'exploitation temps réel." Paris 6, 2012. http://www.theses.fr/2012PA066495.
Full textMost of anticipated future applications share four major characteristics. They might all require an increased computing capacity, they will implies to take real time into account, they represent a big step in terms of complexity compared with todays typical applications, and will have to deal with the dynamic nature of the real physical world. Fine grained dynamically reconfigurable architecture (FGDRA) can be seen as next evolution of today's FPGA, aiming at dealing with very dynamic and complex real time applications while providing comparable potential computing power due to the possibility to fine tune execution architecture at a fine grain level. To make this kind of devices usable for real application designer complexity has to be abstracted by an operating system layer and adequate tool set. This combination would form an adequate solution to support future applications. This thesis exposes an innovative FGDRA architecture called OLLAF. This architecture answer both technical issues on reconfigurable computing and practical problematics of application designers. The whole architecture is designed to work in symbiosis with an operating system. Studies presented here will more particularly focus on hardware task management mechanisms in a preemptive system. We will first present our work toward trying to implement such mechanisms using existing FPGA and show that those existing architectures have to evolve to efficiently support an operating system in a highly dynamic real time situation. The OLLAF architecture will then be explained and the hardware task management mechanism will be highlighted. We then present two studies that prove this approach to constitute a huge gain compared with existing platforms in terms of resulting operating system overhead even for static application cases where dynamical reconfiguration is used only for computing resource sharing. For highly dynamical real time cases we show that not only it could lower the overhead, but it will also support cases that existing devices just cannot support
Gaillardon, Philippe. "Accès aux fichiers partagés : une réalisation sous le système VM." Lyon 1, 1988. http://www.theses.fr/1988LYO10064.
Full textBourgeois, Florent. "Système de Mesure Mobile Adaptif Qualifié." Thesis, Mulhouse, 2018. http://www.theses.fr/2018MULH8953/document.
Full textMobile devices offer measuring capabilities using embedded or connected sensors. They are more and more used in measuring processes. They are critical because the performed measurements must be reliable because possibly used in rigorous context. Despite a real demand, there are relatively few applications assisting users with their measuring processes that use those sensors. Such assistant should propose methods to visualise and to compute measuring procedures while using communication functions to handle connected sensors or to generate reports. Such rarity of applications arises because of the knowledges required to define correct measuring procedures. Those knowledges are brought by metrology and measurement theory and are rarely found in software development teams. Moreover, every user has specific measuring activities depending on his field of work. That implies many quality applications developments which could request expert certification. These premises bring the research question the presented works answer : What approach enables the conception of applications suitable to specific measurement procedures considering that the measurement procedures could be configured by the final user. The presented works propose a platform for the development of measuring assistant applications. The platform ensure the conformity of measuring processes without involving metrology experts. It is built upon metrology, model driven engineering and first order logic concepts. A study of metrology enables to show the need of applications measuring process expert evaluation. This evaluation encompasses terms and rules that ensure the process integrity and coherence. A conceptual model of the metrology domain is proposed. That model is then employed in the development process of applications. It is encoded into a first order logic knowledge scheme of the metrology concepts. That scheme enables to verify that metrology constraints holds in a given measuring process. The verification is performed by confronting measuring processes to the knowledge scheme in the form of requests. Those requests are described with a request language proposed by the scheme. Measuring assistant applications require to propose to the user a measuring process that sequences measuring activities. This implies to describe a measuring process, and also to define interactive interfaces and sequencing mechanism. An application editor is proposed. That editor uses a domain specific language dedicated to the description of measuring assistant applications. The language is built upon concepts, formalisms and tools proposed by the metamodeling environment : Diagrammatic Predicat Framework (DPF). The language encompasses syntactical constraints that prevent construction errors on the software level while reducing the semantical gap between the software architect using it and a potential metrology expert. Then, mobile platforms need to execute a behaviour conforming to the editor described one. An implementation modelling language is proposed. This language enables to describe measuring procedures as sequences of activities. Activities imply to measure, compute and present values. Quantities are all abstracted by numerical values. This eases their computation and the use of sensors. The implementation model is made up of software agents. A mobile application is also proposed. The application is built upon a framework of agents, an agent network composer and a runtime system. The application is able to consider an implementation model and to build the corresponding agent network in order to propose a behaviour matching the end users needs. This enables to answer to any user needs, considering he can access to the implementation model, without requiring to download several applications
Menneteau, François. "ParObj : un noyau de système parallèle à objets." Grenoble INPG, 1993. http://tel.archives-ouvertes.fr/tel-00005135.
Full textPureur, Michel. "SAINT-EX Système d'Analyse INteractif de Tracé et d'EXploitation A Test Data Analysis Tool Based on FX+." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/608383.
Full textA sophisticated human interface can be developed for Post flight analysis with the technology of UNIX-MOTIF. Tests and measurements demand performance and reliability. SAINT-EX can meet these requirements. This paper describes the results of an appraoch in the development of DASSAULT AVIATION’s SAINT-EX software.
De, Saint-Jean Bertrand. "Étude et développement d'un système de gravimétrie mobile." Phd thesis, Observatoire de Paris, 2008. http://tel.archives-ouvertes.fr/tel-00326276.
Full textCependant, les couvertures spatiale et spectrale des mesures gravimétriques ne sont pas homogène à la surface de la Terre et certaines régions difficiles d'accès sont quasiment vierges de toute mesure. De plus, la gamme des longueurs d'onde intermédiaires (10/100 km) est mal couverte par la gravimétrie terrestre ou spatiale. La gravimétrie mobile depuis un véhicule terrestre, un bateau ou un avion apparaît donc comme la technique complémentaire capable de pallier les insuffisances des techniques gravimétriques actuelles.
C'est dans l'objectif de développer un système de gravimétrie mobile autonome que ce travail a été entrepris. Le système «Limo-G» (LIght MOving Gravimetry system) est un gravimètre vectoriel absolu, composé de trois accéléromètres et d'un système GPS à quatre antennes, embarquable dans toutes sortes de véhicule, fiable, ergonomique et peu onéreux.
Un travail métrologique effectué au laboratoire et sur le terrain a permis de concevoir et de tester une méthode d'étalonnage de l'instrument. Puis, une méthode originale de traitement conjoint des données accélérométriques et des données GPS a été développée et testée à partir de simulations issues de données réelles acquises lors d'un levé expérimental en mer. Les résultats de ces simulations indiquent que les performances du système Limo-G permettent de mesurer la pesanteur au milligal. Les améliorations nécessaires pour accroître la précision ont aussi été mises en évidence et validées par simulation.
Saint, Jean Bertrand de. "Étude et développement d’un système de gravimétrie mobile." Observatoire de Paris (1667-....), 2008. https://theses.hal.science/tel-00326276.
Full textActual measurement techniques of the gravity field, from space to surface observations, cover a wide range of spatial resolutions of the Earth gravity field. Those data are not only used to determine high resolution geoid models, but also help to understand mass transfers inside the Earth. Nevertheless, spatial and spectral extends of gravity measurements are not homogeneous on Earth’s surface and for some isolated areas, measurements are missing. Furthermore, the intermediary spatial resolutions (10/100 km) are still badly covered by the terrestrial and space gravimetry. The mobile gravimetry from a terrestrial vehicle, a boat or a plane, appears to be the complementary technique to compensate for the lack of current gravimetry techniques. The primary objective of this work is the development of an autonomous mobile gravimetry system. The « Limo-G » (LIght MOving Gravimetry) system is an absolute vector gravimeter, consisted of three accelerometers and a GPS system with four antennas. It can be loaded on every kind of vehicles, is reliable, ergonomic and quite cheap. Metrologic surveys have been done in laboratory and on field to design and to test a calibration method of the instrument. Then, an original treatment method combining accelerometers and GPS data has been developed and tested from synthetic data based on real data acquired from an experimental survey at sea. The results of those simulations indicate that the Limo-G system reaches the milligals accuracy. The appropriate changes needed of the system to improve the accuracy of the gravity estimations have been underlined and validated using synthetic data
Lottiaux, Renaud. "Gestion globale de la mémoire physique d'une grappe pour un système à image unique : : mise en oeuvre dans le système Gobelins." Rennes 1, 2001. http://www.theses.fr/2001REN10097.
Full textGuez, Stéphane. "Interix : conception et réalisation d'un système d'aide intelligent sur Unix." Châtenay-Malabry, Ecole centrale de Paris, 1987. http://www.theses.fr/1987ECAP0027.
Full textMorin, Christine. "Protocole d'appel de multiprocédure à distance dans le système Gothic : définition et mise en oeuvre." Phd thesis, Université Rennes 1, 1990. http://tel.archives-ouvertes.fr/tel-00432204.
Full textLeclercq, Claude. "Un problème de système expert temps réel : la gestion de centres informatiques." Lille 1, 1990. http://www.theses.fr/1990LIL10143.
Full text