Literatura académica sobre el tema "Fragmentation (informatique)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Fragmentation (informatique)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Fragmentation (informatique)"
Chan, Andy Lung Jan. "Education, Experience and Translator Certification as Signaling Mechanisms". FORUM / Revue internationale d’interprétation et de traduction / International Journal of Interpretation and Translation 8, n.º 1 (1 de abril de 2010): 37–54. http://dx.doi.org/10.1075/forum.8.1.02cha.
Texto completoChen, Daniel y Darrell Duffie. "Market Fragmentation". American Economic Review 111, n.º 7 (1 de julio de 2021): 2247–74. http://dx.doi.org/10.1257/aer.20200829.
Texto completovan Veelen, P. A., U. R. Tjaden y J. van der Greef. "Sequence-informative fragmentation in 252Cf-plasma desorption mass-spectrometry". Journal of Controlled Release 21, n.º 1-3 (julio de 1992): 201. http://dx.doi.org/10.1016/0168-3659(92)90023-k.
Texto completoHaselmann, K. F., B. A. Budnik, F. Kjeldsen, M. L. Nielsen, J. V. Olsen y R. A. Zubarev. "Electronic Excitation Gives Informative Fragmentation of Polypeptide Cations and Anions". European Journal of Mass Spectrometry 8, n.º 2 (abril de 2002): 117–21. http://dx.doi.org/10.1255/ejms.479.
Texto completoVaidogas, Egidijus Rytas. "Bayesian Processing of Data on Bursts of Pressure Vessels". Information Technology and Control 50, n.º 4 (16 de diciembre de 2021): 607–26. http://dx.doi.org/10.5755/j01.itc.50.4.29690.
Texto completoDong, Yalun, Martina Jelocnik, Amber Gillett, Ludovica Valenza, Gabriel Conroy, Dominique Potvin y Renfu Shao. "Mitochondrial Genome Fragmentation Occurred Multiple Times Independently in Bird Lice of the Families Menoponidae and Laemobothriidae". Animals 13, n.º 12 (20 de junio de 2023): 2046. http://dx.doi.org/10.3390/ani13122046.
Texto completovan Veelen, P. A., U. R. Tjaden, J. van der Greef y N. D. de With. "Sequence-Informative fragmentation in an 8.9 kDa oligopeptide using plasma desorption mass spectrometry". Organic Mass Spectrometry 26, n.º 4 (abril de 1991): 345–46. http://dx.doi.org/10.1002/oms.1210260429.
Texto completoZauner, Gerhild, Radoslaw P. Kozak, Richard A. Gardner, Daryl L. Fernandes, André M. Deelder y Manfred Wuhrer. "Protein O-glycosylation analysis". Biological Chemistry 393, n.º 8 (1 de agosto de 2012): 687–708. http://dx.doi.org/10.1515/hsz-2012-0144.
Texto completoKong, Feng, Shao Sun y Yifei Wang. "Comprehensive Understanding the Disaster-Causing Mechanism, Governance Dilemma and Targeted Countermeasures of Urban Pluvial Flooding in China". Water 13, n.º 13 (25 de junio de 2021): 1762. http://dx.doi.org/10.3390/w13131762.
Texto completoNishikaze, Takashi. "Sensitive and Structure-Informative N-Glycosylation Analysis by MALDI-MS; Ionization, Fragmentation, and Derivatization". Mass Spectrometry 6, n.º 1 (2017): A0060. http://dx.doi.org/10.5702/massspectrometry.a0060.
Texto completoTesis sobre el tema "Fragmentation (informatique)"
Ranéa, Pierre-Guy. "La tolérance aux intrusions par fragmentation-dissémination". Toulouse, INPT, 1989. http://www.theses.fr/1989INPT007H.
Texto completoKapusta, Katarzyna. "Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment". Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.
Texto completoThis thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and cost-efficient. The main focus is put on increasing data confidentiality without deteriorating the processing performance. The ultimate goal is to provide a user with a set of fast fragmentation methods that could be directly applied inside an industrial context to reinforce the confidentiality of the stored data and/or accelerate the fragmentation processing. First, a rich survey on fragmentation as a way of preserving data confidentiality is presented. Second, the family of all-or-nothing transforms is extended with three new proposals. They all aim at protecting encrypted and fragmented data against the exposure of the encryption key but are designed to be employed in three different contexts: for data fragmentation in a multi-cloud environment, a distributed storage system, and an environment composed of one storage provider and one private device. Third, a way of accelerating fragmentation is presented that achieves better performance than data encryption using the most common symmetric-key encryption algorithm. Fourth, a lightweight fragmentation scheme based on data encoding, permuting, and dispersing is introduced. It totally gets rid of data encryption allowing the fragmentation to be performed even faster; up to twice as fast as data encryption. Finally, fragmentation inside sensor networks is revisited, particularly in the Unattended Wireless Sensor Networks. The main focus in this case is put not solely on the fragmentation performance, but also on the reduction of storage and transmission costs by using data aggregation
Trouessin, Gilles. "Traitements fiables de données confidentielles par fragmentation-redondance-dissémination". Toulouse 3, 1991. http://www.theses.fr/1991TOU30260.
Texto completoLin, Ping. "Commande adaptative et régulation automatique d'une unité de broyage du cru en cimenterie". Lyon, INSA, 1992. http://www.theses.fr/1992ISAL0003.
Texto completoIn cement manufactory, the raw material blending process, between prehomogeneization silo and clinker kiln, is a multivariable system (several raw materials in use) and coupled with considerable time delay due toX-ray fluorescence analyser. The main goal of blending control is to maintain close to the standard value and to decrease the variance of chemical composition (in terms of composition moduli) of the raw meal by using correcting products. The proposed control strategy consists of four parts: (1) a multivariable predictive control system based on an internai madel; (2) an adaptive control due to on-line estimation for chemical composition of the raw materials; (3) an optimization unit to minimize a qualitycost cri teri on; ( 4) a self-adjustment function of reference values for the special batch process. In order to improve the control performance, an heuristic adaptive supervision is developped to adjust the regulator parameters in lower level. The proposed control policy bas been applied to cement plants of Lafarge Coppée
Minier, Josselin. "Fragmentation cognitive/informatique de la musique populaire amplifiée : construction d'un système numérique dirigé par une notion de simulacre cinétique". Paris 1, 2011. http://www.theses.fr/2011PA010678.
Texto completoNicolas, Jean-Christophe. "Machines bases de données parallèles : contribution aux problèmes de la fragmentation et de la distribution". Lille 1, 1991. http://www.theses.fr/1991LIL10025.
Texto completoQiu, Han. "Une architecture de protection des données efficace basée sur la fragmentation et le cryptage". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Texto completoIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage". Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Texto completoA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Lecler, Philippe. "Une approche de la programmation des systèmes distribués fondée sur la fragmentation des données et des calculs et sa mise en oeuvre dans le système GOTHIC". Rennes 1, 1989. http://www.theses.fr/1989REN10103.
Texto completoBenkrid, Soumia. "Le déploiement, une phase à part entière dans le cycle de vie des entrepôts de données : application aux plateformes parallèles". Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2014. http://www.theses.fr/2014ESMA0027/document.
Texto completoDesigning a parallel data warehouse consists of choosing the hardware architecture, fragmenting the data warehouse schema, allocating the generated fragments, replicating fragments to ensure high system performance and defining the treatment strategy and load balancing.The major drawback of this design cycle is its ignorance of the interdependence between subproblems related to the design of PDW and the use of heterogeneous metrics to achieve thesame goal. Our first proposal defines an analytical cost model for parallel processing of OLAP queries in a cluster environment. Our second takes into account the interdependence existing between fragmentation and allocation. In this context, we proposed a new approach to designa PDW on a cluster machine. During the fragmentation process, our approach determines whether the fragmentation pattern generated is relevant to the allocation process or not. The results are very encouraging and validation is done on Teradata. For our third proposition, we presented a design method which is an extension of our work. In this phase, an original method of replication, based on fuzzy logic is integrated
Libros sobre el tema "Fragmentation (informatique)"
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Buscar texto completoCavelty, Myriam Dunn y Andreas Wenger. Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Buscar texto completoConvergence and Fragmentation: Media Technology and the Information Society (IB-Changing Media, Changing Europe). Intellect Ltd, 2008.
Buscar texto completoAbril, Gonzalo. Cortar Y Pegar/ Cut and Paste: La Fragmentacion Visual En Los Origenes Del Texto Informativo / The Visual Fragmentation in the Origins of Informative Text (Signo E Imagen / Sign and Image). Catedra, 2003.
Buscar texto completoCapítulos de libros sobre el tema "Fragmentation (informatique)"
van Veelen, P. A., U. R. Tjaden, J. van der Greef, H. J. Vorst y M. W. E. M. van Tilborg. "Sequence Informative Fragmentation in 252Cf Plasma Desorption Mass Spectrometry". En NATO ASI Series, 67–72. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4684-7926-3_9.
Texto completoMohanty, Srutisudha, Jagabandhu Panda y Sudhansu S. Rath. "Geospatial Technology in Urban Sprawl Assessment". En Methods and Applications of Geospatial Technology in Sustainable Urbanism, 1–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2249-3.ch001.
Texto completoNetherton, Jason. "Postscript". En Advances in Social Networking and Online Communities, 395–400. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5206-4.ch023.
Texto completoBrian Langerhans, R. y Elizabeth M. A. Kern. "Urbanization and Evolution in Aquatic Environments". En Urban Evolutionary Biology, 157–74. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198836841.003.0011.
Texto completo