Tesis sobre el tema "File"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "File".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Rivera, Gabrio. "From file pathnames to file objects /". Zürich, 2001. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=14377.
Texto completoYarovyi, O. "File system". Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40511.
Texto completoGarcía, Moral Daniel Jesús. "Remote File Access System for Generic Ericsson Processor Boards : File transfer service, Random Access Memory-based file system and secure file transfer solution research". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53448.
Texto completoOrdulu, Nizameddin (Nizameddin H. ). "A file system for accessing MySQL tables as CSV files". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62664.
Texto completoCataloged from PDF version of thesis.
Includes bibliographical references (p. 49-50).
In this thesis, we describe the design and implementation of a userspace file system that represents MySQL tables as comma-separated values (CSV) files. The users can access and modify the data through both the file system and MySQL's query interface. In order to transform read and write operations to SQL queries, we maintain a reverse index from file offsets to line numbers. Changes to the database outside of the file system are reflected on the file system by means of MySQL's master-slave replication feature. We evaluate our system by comparing its performance to a regular file system's performance using popular command line tools(grep, sed, awk) and user applications (OpenOffice.org spreadsheets). The choice of the database for this system was MySQL because of its popularity and the availability of its source code, however, the same ideas can be applied to any relational database with replication to create a similar system.
by Nizameddin Ordulu.
M.Eng.
Zhang, Irene Y. (Irene Yun). "Efficient file distribution in a flexible,wide-area file system". Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53188.
Texto completoCataloged from PDF version of thesis.
Includes bibliographical references (p. 63-65).
WheelFS is a wide-area distributed file system designed to help applications cope with the challenges of sharing data over the wide-area network. A wide range of applications can use WheelFS as a storage layer because applications can control various trade-offs in WheelFS, such as consistency versus availability, using semantic cues. One key feature that many applications require from any storage system is efficient file distribution. The storage system needs to be able to serve files quickly, even large or popular ones, and allow users and applications to quickly browse files. Wide-area links with high latency and low throughput make achieving these goals difficult for most distributed storage systems. This thesis explores using pre fetching, a traditional file system optimization technique, in wide-area file systems for more efficient file distribution. This thesis focuses on Tread, a pref etcher for WheelFS. Tread includes several types of pre fetching to improve the performance of reading files and directories in WheelFS: read-ahead pre fetching, whole file prefetching, directory prefetching and a prefetching optimization for WheelFS's built-in cooperative caching. To makes the best use of scarce wide-area resources, Tread adaptively rate-limits prefetching and gives applications control over what and how prefetching is done using WheelFS's semantic cues. Experiments show that Tread can reduce the time to read a 10MB file in WheelFS by 40% and the time to list a directory with 100 entries by more than 80%.
(cont.) In addition, experiments on Planetlab show that using prefetching with cooperative caching to distribute a 10MB file to 270 clients reduces the average latency for each client to read the file by almost 45%.
by Irene Y. Zhang.
M.Eng.
Purdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)". Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.
Texto completoAlsowail, Rakan. "Secure file sharing". Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/63551/.
Texto completoMotara, Yusuf Moosa. "File integrity checking". Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.
Texto completoLee, Hojin. "S1_Scrambled_siRNA [Digital file]". Diss., Temple University Libraries, 2008. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254229.
Texto completoPh.D.;
c-Cbl functions as a multifunctional adaptor and an E3 ubiquitin protein ligase. Several studies have shown that c-Cbl is involved in cytoskeleton-mediated events, but the molecular mechanisms linking c-Cbl to cytoskeletal rearrangements remain to be elucidated. Our previous results indicated that c-Cbl facilitates spreading and migration of v-Abl-transformed NIH 3T3 fibroblasts and suggested that small GTPases play important roles in the cytoskeletal effects of c-Cbl in this system. To elucidate the individual contributions of small GTPases to these effects, we assessed the roles of endogenous Rac1, RhoA and Rap1 in the c-Cbl-dependent spreading and migration of v-Abl-transformed fibroblasts overexpressing c-Cbl, using RNAi. Furthermore, since it has been shown that Rap1 can act as an upstream regulator of Rac1 in inducing cell spreading, we analyzed the interplay between Rap1 and Rac1 in the signaling pathways connecting c-Cbl to the cytoskeletal events. Our results indicate that Rac1 is essential for cell migration and spreading, whereas activation of RhoA exerts a negative effect. We have also shown that Rap1 is essential for cell spreading, although not for migration in our experimental system. Furthermore, we provide evidence that Rap1 is located upstream of Rac1 in one of the signaling pathways that regulate c-Cbl-facilitated cell spreading. Overall, our findings are consistent with the model describing the connection of c-Cbl to the cytoskeletal rearrangements via two pathways, one of which is mediated by PI3K and Rac1, and the other, by CrkL/C3G, Rap1 and Rac1. A major biological feature of glioma is the ability to invade normal brain tissue. The molecular mechanisms of glioma invasion are involved in multiple biological processes which are primarily associated with cytoskeleton-mediated events including adhesion, migration, degradation of extra cellular matrix (ECM). Biological functions of c-Cbl in glioma have not been elucidated. In this study, we examined biological roles of c-Cbl using RNAi-mediated depletion of endogenous c-Cbl and stably c-Cbl expressing glioma cells generated by lentiviral transduction and showed that c-Cbl increases invasion through degradation of ECM by upregulation of MMP2 but not through migration, adhesion, or growth of SNB19, a grade IV glioblastoma cell line.
Temple University--Theses
Lee, Hojin. "S2_RhoA_siRNA [Digital file]". Diss., Temple University Libraries, 2008. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254230.
Texto completoPh.D.;
c-Cbl functions as a multifunctional adaptor and an E3 ubiquitin protein ligase. Several studies have shown that c-Cbl is involved in cytoskeleton-mediated events, but the molecular mechanisms linking c-Cbl to cytoskeletal rearrangements remain to be elucidated. Our previous results indicated that c-Cbl facilitates spreading and migration of v-Abl-transformed NIH 3T3 fibroblasts and suggested that small GTPases play important roles in the cytoskeletal effects of c-Cbl in this system. To elucidate the individual contributions of small GTPases to these effects, we assessed the roles of endogenous Rac1, RhoA and Rap1 in the c-Cbl-dependent spreading and migration of v-Abl-transformed fibroblasts overexpressing c-Cbl, using RNAi. Furthermore, since it has been shown that Rap1 can act as an upstream regulator of Rac1 in inducing cell spreading, we analyzed the interplay between Rap1 and Rac1 in the signaling pathways connecting c-Cbl to the cytoskeletal events. Our results indicate that Rac1 is essential for cell migration and spreading, whereas activation of RhoA exerts a negative effect. We have also shown that Rap1 is essential for cell spreading, although not for migration in our experimental system. Furthermore, we provide evidence that Rap1 is located upstream of Rac1 in one of the signaling pathways that regulate c-Cbl-facilitated cell spreading. Overall, our findings are consistent with the model describing the connection of c-Cbl to the cytoskeletal rearrangements via two pathways, one of which is mediated by PI3K and Rac1, and the other, by CrkL/C3G, Rap1 and Rac1. A major biological feature of glioma is the ability to invade normal brain tissue. The molecular mechanisms of glioma invasion are involved in multiple biological processes which are primarily associated with cytoskeleton-mediated events including adhesion, migration, degradation of extra cellular matrix (ECM). Biological functions of c-Cbl in glioma have not been elucidated. In this study, we examined biological roles of c-Cbl using RNAi-mediated depletion of endogenous c-Cbl and stably c-Cbl expressing glioma cells generated by lentiviral transduction and showed that c-Cbl increases invasion through degradation of ECM by upregulation of MMP2 but not through migration, adhesion, or growth of SNB19, a grade IV glioblastoma cell line.
Temple University--Theses
Lee, Hojin. "S3_Rac1_siRNA [Digital file]". Diss., Temple University Libraries, 2008. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254231.
Texto completoPh.D.;
c-Cbl functions as a multifunctional adaptor and an E3 ubiquitin protein ligase. Several studies have shown that c-Cbl is involved in cytoskeleton-mediated events, but the molecular mechanisms linking c-Cbl to cytoskeletal rearrangements remain to be elucidated. Our previous results indicated that c-Cbl facilitates spreading and migration of v-Abl-transformed NIH 3T3 fibroblasts and suggested that small GTPases play important roles in the cytoskeletal effects of c-Cbl in this system. To elucidate the individual contributions of small GTPases to these effects, we assessed the roles of endogenous Rac1, RhoA and Rap1 in the c-Cbl-dependent spreading and migration of v-Abl-transformed fibroblasts overexpressing c-Cbl, using RNAi. Furthermore, since it has been shown that Rap1 can act as an upstream regulator of Rac1 in inducing cell spreading, we analyzed the interplay between Rap1 and Rac1 in the signaling pathways connecting c-Cbl to the cytoskeletal events. Our results indicate that Rac1 is essential for cell migration and spreading, whereas activation of RhoA exerts a negative effect. We have also shown that Rap1 is essential for cell spreading, although not for migration in our experimental system. Furthermore, we provide evidence that Rap1 is located upstream of Rac1 in one of the signaling pathways that regulate c-Cbl-facilitated cell spreading. Overall, our findings are consistent with the model describing the connection of c-Cbl to the cytoskeletal rearrangements via two pathways, one of which is mediated by PI3K and Rac1, and the other, by CrkL/C3G, Rap1 and Rac1. A major biological feature of glioma is the ability to invade normal brain tissue. The molecular mechanisms of glioma invasion are involved in multiple biological processes which are primarily associated with cytoskeleton-mediated events including adhesion, migration, degradation of extra cellular matrix (ECM). Biological functions of c-Cbl in glioma have not been elucidated. In this study, we examined biological roles of c-Cbl using RNAi-mediated depletion of endogenous c-Cbl and stably c-Cbl expressing glioma cells generated by lentiviral transduction and showed that c-Cbl increases invasion through degradation of ECM by upregulation of MMP2 but not through migration, adhesion, or growth of SNB19, a grade IV glioblastoma cell line.
Temple University--Theses
Malkus, Amy J. "Test Item File". Digital Commons @ East Tennessee State University, 2010. https://dc.etsu.edu/etsu-works/4590.
Texto completoAnne, Aditya. "A WEB BASED MACHINE LEARNING UTILITY". University of Akron / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=akron1196644291.
Texto completoFang, Xin. "Reliable file transfer on the Internet using distributed file transfer, DFT". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57539.pdf.
Texto completoGrusecki, Travis R. "Improving block sharing in the Write Anywhere File Layout file system". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76818.
Texto completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 41).
It is often useful in modern file systems for several files to share one or more data blocks. Block sharing is used to improve storage utilization by storing only one copy of a block shared by multiple files or volumes. This thesis proposes an approach, called Space Maker, which uses garbage collection techniques to simplify the up-front cost of file system operations, moving some of the more difficult block tracking work, such as the work required to clean-up after a file delete, to a back-end garbage collector. Space Maker was developed on top of the WAFL file system used in NetApp hardware. The Space Maker is shown to have fast scan performance, while decreasing the front-end time to delete files. Other operations, like file creates and writes have similar performance to a baseline system. Under Space Maker, block sharing is simplified, making a possible for new file system features that rely on sharing to be implemented more quickly with good performance.
by Travis R. Grusecki.
M.Eng.
Leal, Anamary. "Exploring the effectiveness of 3D file browsing techniques for file searching tasks". Honors in the Major Thesis, University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1285.
Texto completoBachelors
Engineering and Computer Science
Early Childhood Education
Artiaga, Amouroux Ernest. "File system metadata virtualization". Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/133489.
Texto completoConroy, Tracy Michael Buxton Winslow Hurlburt. "Secure distributed file systems /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA285525.
Texto completoThesis advisor(s): Roger Stemp, Kishore Sengupta. "September 1994." Bibliography: p. 106-108. Also available online.
Nadeem, Ashraf Muhammad. "Forensic Multimedia File Carving". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119998.
Texto completoConroy, Tracy Michael y Winslow Hurlburt Buxton. "Secure distributed file systems". Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/30928.
Texto completoDumitran, Octavian-Daniel. "Fixing file descriptor leaks". Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41645.
Texto completoIncludes bibliographical references (p. 89).
We design, implement and test a tool for eliminating file descriptor (FD) leaks in programs at run-time. Our tool monitors FD allocation and use. When the allocation of a new FD would fail because a process's entire pool of FDs is already in use, our tool "recycles" (forcibly closes) an FD. The FD to be recycled is chosen according to three simple rules: 1) do not recycle FDs used within the last second, 2) do not recycle "persistent" FDs (FDs allocated at sites that allocate few FDs) and 3) recycle the FD that was least recently used. We tested our tool with nine applications (HTTP/FTP servers, proxies and clients) that make extensive use of FDs. We first simulated massive leaks by disabling all calls to close. Without recycling (and in the presence of leaks), all applications malfunctioned. With FD recycling, applications continued to execute normally despite massive FD leakage. Throughout our tests, our tool has never attempted to close an FD that was still in use.
by Octavian-Daniel Dumitran.
M.Eng.
Dabek, Frank (Frank Edward) 1977. "A cooperative file system". Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86811.
Texto completoMazières, David (David Folkman) 1972. "Self-certifying file system". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86610.
Texto completoIncludes bibliographical references (p. 137-141) and index.
by David Mazières.
Ph.D.
Vogelsang, Stefan. "Monitoring Tools File Specification". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-199034.
Texto completoSoares, João Paulo da Conceição. "FEW phone file system". Master's thesis, FCT - UNL, 2009. http://hdl.handle.net/10362/2229.
Texto completoThe evolution of mobile phones has made these devices more than just simple mobile communication devices. Current mobile phones include such features as built-in digital cameras, the ability to play and record multimedia contents and also the possibility of playing games. Most of these devices have support for Java developed applications, as well as multiple wireless technologies (e.g. GSM/GPRS, UMTS, Bluetooth, and Wi-Fi). All these features have been made possible due to technological evolution that led to the improvement of computational power, storage capacity, and communication capabilities of these devices. This thesis presents a distributed data management system, based on optimistic replication,named FEW Phone File System. This system takes advantage of the storage capacity and wireless communication capabilities of current mobile phones, by allowing users to carry their personal data “in” their mobile phones, and to access it in any workstation, as if they were files in the local file system. The FEW Phone File System is based on a hybrid architecture that merges the client/server model with peer-to-peer replication, that relies on periodic reconciliation to maintain consistency between replicas. The system’s server side runs on the mobile phone, and the client on a workstation. The communication between the client and the server can be supported by one of multiple network technologies, allowing the FEW Phone File System to dynamically adapt to the available network connectivity. The presented system addresses the mobile phone’s storage and power limitations by allowing multimedia contents to be adapted to the device’s specifications, thus reducing the volume of data transferred to the mobile phone, allowing for more user’s data to be stored. The FEW Phone File System also integrates mechanisms that maintain information about the existence of other copies of the stored files (e.g. WWW), avoiding the transfer of those files from the mobile device whenever accessing those copies is advantageous. Due to the increasing number of on-line storage resources (e.g. CVS/SVN, Picasa), this approach allows for those resources to be used by the FEW Phone File System to obtain the stored copies of the user’s files.
Vidiksis, Adam. "Vidiksis-Transfigurations [Digital File]". Diss., Temple University Libraries, 2013. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/253842.
Texto completoD.M.A.
Transfigurations is a symphonic work in one movement for orchestra and live computer processing utilizing the graphical audio programming language Pure Data. The score and patch for this piece are accompanied by an essay describing the audio processing techniques and the compositional processes employed in this work. Programming methods discussed include strategies for data capture, patch structure, user interface, and processor management. All audio processing in the work is realized in realtime. These sounds are derived directly from the orchestra in performance, except for the last. The processes involved in Transfigurations include pitch and amplitude tracking, pitch-shifting, filtering, frequency and amplitude modulation, granular synthesis, delay, and convolution. The final sounds from the computer employ stochastic processes for synthesis which are derived from the germinal materials of the piece. The essay also discusses the aesthetic philosophy and formal structure of the work, principle themes and motives, and formative pitch materials, as well as the compositional processes in each section. The final discourse of the essay considers microphone and loudspeaker setups, patch preparation and leveling, and strategies for rehearsal and performance.
Temple University--Theses
Bourget, Jean Paul. "Role-based file archiving /". Online version of thesis, 2008. http://hdl.handle.net/1850/8045.
Texto completoMenon, Prasad. "Ubiquitous file system protocol". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000867.
Texto completoRao, Herman Chung-Hwa. "The Jade File System". Diss., The University of Arizona, 1991. http://hdl.handle.net/10150/185569.
Texto completoBuonviri, Nathan. "Audio-OnlyTest [Digital File]". Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254227.
Texto completoPh.D.
The purpose of this study was to determine how pitch and rhythm aspects of melodic memory are affected by aural distractions when melodic stimuli are presented both visually and aurally, as compared to aurally only. The rationale for this research is centered on the need for improved melodic memory skills of students taking melodic dictation, and the possibility that temporary visual imagery storage of target melodies might enhance those skills. The participants in this study were undergraduate and graduate music majors (n=41) at a large northeastern university. All participants had successfully completed the first two semesters of college-level music theory, and none had perfect pitch. Participants progressed through two self-contained experimental tests at the computer. Identical target melodies were presented: 1) aurally only on one test; and 2) aurally, with visual presentation of the matching notation, on the other test. After the target melody, a distraction melody sounded, during which time participants were to maintain the original target melody in memory. Participants then chose which of two aural options matched the original target, with a third choice of "neither." The incorrect answer choice in each item contained either a pitch or rhythm discrepancy. The 2x2 factorial design of this experiment was based on independent variables of test presentation format and answer discrepancy type. The dependent variable was experimental test scores. Each participant took both parts of both tests, yielding 164 total observations. Additional data were collected for exploratory analysis: the order in which each participant took the tests, the major instrument of each participant, and the educational status of each participant (undergraduate or graduate). Results of a 2x2 ANOVA revealed no significant differences in test scores, based on either test format or answer discrepancy type, and no interaction between the factors. The exploratory analyses revealed no significant differences in test scores, based on test order, major instrument, or student status. Results suggest that visual reinforcement of melodies does not affect aural memory for those melodies, in terms of either pitch or rhythm. Suggestions for further research include an aural-visual melodic memory test paired with a learning modalities survey, a longitudinal study of visual imagery applied to aural skills study, and a detailed survey of strategies used by successful and unsuccessful dictation students.
Temple University--Theses
Buonviri, Nathan. "Audio-VisualTest [Digital File]". Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254228.
Texto completoPh.D.
The purpose of this study was to determine how pitch and rhythm aspects of melodic memory are affected by aural distractions when melodic stimuli are presented both visually and aurally, as compared to aurally only. The rationale for this research is centered on the need for improved melodic memory skills of students taking melodic dictation, and the possibility that temporary visual imagery storage of target melodies might enhance those skills. The participants in this study were undergraduate and graduate music majors (n=41) at a large northeastern university. All participants had successfully completed the first two semesters of college-level music theory, and none had perfect pitch. Participants progressed through two self-contained experimental tests at the computer. Identical target melodies were presented: 1) aurally only on one test; and 2) aurally, with visual presentation of the matching notation, on the other test. After the target melody, a distraction melody sounded, during which time participants were to maintain the original target melody in memory. Participants then chose which of two aural options matched the original target, with a third choice of "neither." The incorrect answer choice in each item contained either a pitch or rhythm discrepancy. The 2x2 factorial design of this experiment was based on independent variables of test presentation format and answer discrepancy type. The dependent variable was experimental test scores. Each participant took both parts of both tests, yielding 164 total observations. Additional data were collected for exploratory analysis: the order in which each participant took the tests, the major instrument of each participant, and the educational status of each participant (undergraduate or graduate). Results of a 2x2 ANOVA revealed no significant differences in test scores, based on either test format or answer discrepancy type, and no interaction between the factors. The exploratory analyses revealed no significant differences in test scores, based on test order, major instrument, or student status. Results suggest that visual reinforcement of melodies does not affect aural memory for those melodies, in terms of either pitch or rhythm. Suggestions for further research include an aural-visual melodic memory test paired with a learning modalities survey, a longitudinal study of visual imagery applied to aural skills study, and a detailed survey of strategies used by successful and unsuccessful dictation students.
Temple University--Theses
Frank, Wiewandt Edward. "ARCHIVING THE DIGITAL IMAGE: TODAY'S BEST PRACTICES OF FILE PREPARATION". Bowling Green State University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1131398443.
Texto completoFricker, Christine. "File d'attente à serveur autonome et insensibilité en théorie des files d'attente". Paris 7, 1985. http://www.theses.fr/1985PA07F130.
Texto completoKukkadapu, Sowmya. "Android application for file storage and retrieval over secured and distributed file servers". Kansas State University, 2012. http://hdl.handle.net/2097/13959.
Texto completoDepartment of Computing and Information Sciences
Daniel A. Andresen
Recently, the world has been trending toward the use of Smartphone. Today, almost each and every individual is using Smartphone for various purposes benefited by the availability of large number of applications. The memory on the SD (Secure Digital) memory card is going to be a constraint for the usage of the Smartphone for the user. Memory is used for storing large amounts of data, which include various files and important document. Besides having many applications to fill the free space, we hardly have an application that manages the free memory according to the user’s choice. In order to manage the free space on the SD card, we need an application to be developed. All the important files stored on the Android device cannot be retrieved if we lose the Android device. Targeting the problem of handling the memory issues, we developed an application that can be used to provide the security to the important documents and also store unnecessary files on the distributed file servers and retrieve them back on request.
Wennergren, Oscar, Mattias Vidhall y Jimmy Sörensen. "Transparency analysis of Distributed file systems : With a focus on InterPlanetary File System". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15727.
Texto completoPaleker, Farzana. "Comparison of canal transportation and centering ability of K-files the ProGlider file and G-file : a micro-computed tomography study of curved canals". Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/53037.
Texto completoDissertation (MSc)--University of Pretoria, 2015.
Odontology
MSc
Unrestricted
Ledung, Gabriel y Johan Andersson. "Darknet file sharing : application of a private peer-to-peer distributed file system concept". Thesis, Uppsala universitet, Informationssystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129908.
Texto completoFildelningsapplikationer som använder peer-to-peer teknik har varit en enorm framgång blandslutanvändare och har därmed erhållit mycket uppmärksamhet från akademi och indus- tri, liksom olaglig fildelning fått inom media. Däremot har inte privat fildelning mellan vän- ner, arbetskamrater och kollegor tilldelats samma uppmärksamhet från forskningssamfundet. Nuvarande tillämpningar begränsar användaren genom att inte tillåta naturlig interaktion med användarapplikationer. I denna uppsats utforskar vi hur privat fildelning kan göras snabb, skalbar och säker utan att begränsa användaren ur den aspekten. Vi demonstrerar ett koncept- för privat fildelning som nyttjar decentraliserad peer-to-peer arkitektur m.h.a en prototyp som tagits fram med extreme programming som metodologi. För att maximera användarnas frihet nyttjas ett virtuellt filsystem som gränssnitt. Prototypen visar att vår tillämpning fungerar i praktiken och vi hoppas att läsaren kan använda vårt arbete som en plattform för fortsatt utveckling inom detta område.
Heger, Dominique A. "The Design of a Logarithmic File Data Allocation Algorithm for Extent Based File Systems". NSUWorks, 2001. http://nsuworks.nova.edu/gscis_etd/578.
Texto completoKovac, Timmy. "Jämförelse av File Carving Program och presterande vid fragmentering". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18998.
Texto completoOwais, Fahad. "Capability File Names over HTTP". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-26393.
Texto completoVogelsang, Stefan y Andreas Nicolai. "Delphin 6 Output File Specification". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-70337.
Texto completoGuo, Hong. "Mobile certifying cryptographic file system". Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27249.
Texto completoBladh, Thomas. "StepTree : A File System Visualizer". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5905.
Texto completoEtt 3D visualiseringsverktyg för filsystem presenteras. Visualiseringstekniken är baserad på Tree-maps / Venn diagram och kan visualisera attribut såsom storlek, förändring och filtyp för tusentals noder samtidigt. Storlek visualiseras genom noders bas area, förändringar visualiseras genom ghosting (avfokusering) och hiding (gömning) av oförändrade noder och filtyp visualiseras med färger. Slutligen så föreslås en metod för att förbättra synligheten hos noder genom utjämning.
Tel. 0457-26310 Alt. 044-246025 (annars e-mail)
McGregor, Anthony James. "Block-Based Distributed File Systems". The University of Waikato, 1997. http://hdl.handle.net/10289/2607.
Texto completoRoy, Catherine Karen. "File-based autobiographies after 1989". Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/38062.
Texto completoVogelsang, Stefan, Heiko Fechner y Andreas Nicolai. "Delphin 6 Material File Specification". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-126274.
Texto completoSu, Yang M. Eng Massachusetts Institute of Technology. "File system unification using LatticeFS". Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53145.
Texto completoIncludes bibliographical references (p. 57-58).
LatticeFS is a namespace unification system designed to merge multiple source file systems into a single working file system. atticeFS can be used to merge multiple software package directories, work with multiple file systems as if they are one, and share a single storage medium among multiple machines. On a high level, LatticeFS takes as input an arbitrary number of file system paths, and mounts a new virtual drive that will appear to the user as a union of the input file systems. Of course, attempting to combine multiple file systems will inevitably be met with conflicts. Situations in which multiple input file systems contain files/directories with the same name will be common in large systems; which file/directory should the user be exposed to in this case? Previous work such as UnionFS solved the problem by giving each input file system a strict priority value, and when a conflict occurred, the file/directory with the highest priority was the one shown to the user. In LatticeFS, we have introduced a plug-in system in which different strategies for resolving conflicts can be easily swapped in and out; additionally, handlers for special file types can also be "plugged" into the system. This paper describes and evaluates all aspects of LatticeFS in detail.
by Yang Su.
M.Eng.
Tseng, Jessica Hui-Chun 1977. "Energy-efficient register file design". Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80219.
Texto completoIncludes bibliographical references (p. 69-70).
by Jessica Hui-Chun Tseng.
S.M.
Cuevas, Genevieve T. "SloanSpace- DSpace file transfer component". Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/33118.
Texto completoIncludes bibliographical references (leaf 57).
This thesis demonstrates how to use Web services to integrate course management systems with digital repositories. We present a component that provides interoperation between SloanSpace, a course management system, and DSpace, a digital repository, both developed at MIT. In particular, a file transfer component was created that enables SloanSpace users to search and retrieve DSpace documents while in SloanSpace, and submit SloanSpace documents into DSpace. DSpace's web services provided the means for interaction between the systems. The architecture of the component was designed to handle not only the metadata mappings between SloanSpace and DSpace metadata, but mappings between file metadata of SloanSpace and other systems as well. Two scenarios were then created to test the effectiveness of the component. The test results demonstrate the ability of the component to decrease the amount of time spent in performing file transfers between the two systems. Most importantly, however, the component demonstrates more generally interoperation with digital repositories. It not only integrates SloanSpace with DSpace, but also allows for a more a general integration with any other system.
by Genevieve T. Curvas.
M.Eng.
Goldman, Aaron David. "CCFS cryptographically curated file system". Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54394.
Texto completo