Tesis sobre el tema "Systèmes de mise en cache"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Systèmes de mise en cache".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Busseuil, Rémi. "Exploration d'architecture d'accélérateurs à mémoire distribuée". Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20218/document.
Texto completoAlthough the accelerators market is dominated by heterogeneous MultiProcessor Systems-on-Chip (MPSoC), i.e. with different specialized processors, a growing interest is put on another type of MPSoC, composed by an array of identical processors. Even if these processors achieved lower performance to power ratio, the better flexibility and programmability of these homogeneous MPSoC allow an easier adaptation to the load, and offer a wider space of configurations. In this context, this thesis exposes the development of a scalable homogeneous MPSoC – i.e. with linear performance scaling – and different kind of adaptive mechanisms and programming model on it.This architecture is based on an array of MicroBlaze-like processors, each having its own memory, and connected through a 2D NoC. A modular RTOS was build on top of it. Thanks to a complex communication stack, different adaptive mechanisms were made: a “redirected data” task migration mechanism, reducing the impact of the migration mechanism for data-flow applications, and a “remote execution” mechanism. Instead of migrate the instruction code from a memory to another, this last consists in only migrate the execution, keeping the code in its initial memory. The different experiments shows faster reactivity but lower performance of this mechanism compared to migration.This development naturally led to the creation of a shared memory programming model. To achieve this, a scalable hardware/software memory consistency and cache coherency mechanism has been made, through the PThread library development. Experiments show the advantage of using NoC based homogeneous MPSoC with a brand programming model
Zhao, Hui. "High performance cache-aided downlink systems : novel algorithms and analysis". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS366.
Texto completoThe thesis first addresses the worst-user bottleneck of wireless coded caching, which is known to severely diminish cache-aided multicasting gains. We present a novel scheme, called aggregated coded caching, which can fully recover the coded caching gains by capitalizing on the shared side information brought about by the effectively unavoidable file-size constraint. The thesis then transitions to scenarios with transmitters with multi-antenna arrays. In particular, we now consider the multi-antenna cache-aided multi-user scenario, where the multi-antenna transmitter delivers coded caching streams, thus being able to serve multiple users at a time, with a reduced radio frequency (RF) chains. By doing so, coded caching can assist a simple analog beamformer (only a single RF chain), thus incurring considerable power and hardware savings. Finally, after removing the RF-chain limitation, the thesis studies the performance of the vector coded caching technique, and reveals that this technique can achieve, under several realistic assumptions, a multiplicative sum-rate boost over the optimized cacheless multi-antenna counterpart. In particular, for a given downlink MIMO system already optimized to exploit both multiplexing and beamforming gains, our analysis answers a simple question: What is the multiplicative throughput boost obtained from introducing reasonably-sized receiver-side caches?
Hajri, Salah Eddine. "L’amélioration des performances des systèmes sans fil 5G par groupements adaptatifs des utilisateurs". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLC029/document.
Texto completo5G is envisioned to tackle, in addition to a considerable increase in traffic volume, the task of connecting billions of devices with heterogeneous service requirements. In order to address the challenges of 5G, we advocate a more efficient use of the available information, with more service and user awareness, and an expansion of the RAN intelligence. In particular, we focus on two key enablers of 5G, namely massive MIMO and proactive caching. In the third chapter, we focus on addressing the bottleneck of CSI acquisition in TDD Massive MIMO. In order to do so, we propose novel spatial grouping schemes such that, in each group, maximum coverage of the signal’s spatial basis with minimum overlapping between user spatial signatures is achieved. The latter enables to increase connection density while improving spectral efficiency. TDD Massive MIMO is also the focus of the fourth chapter. Therein, based on the different rates of wireless channels aging, CSI estimation periodicity is exploited as an additional DoF. We do so by proposing a dynamic adaptation of the TDD frame based on the heterogeneous channels coherence times. The Massive MIMO BSs are enabled to learn the best uplink training policy for long periods. Since channel changes result primarily from device mobility, location awareness is also included in the learning process. The resulting planning problem was modeled as a two-time scale POMDP and efficient low complexity algorithms were provided to solve it. The fifth chapter focuses on proactive caching. We focus on improving the energy efficiency of cache-enabled networks by exploiting the correlation in traffic patterns in addition to the spatial repartition of requests. We propose a framework that strikes the optimal trade-off between complexity and truthfulness in user behavior modeling through adaptive content popularity-based clustering. It also simplifies the problem of content placement, which results in a rapidly adaptable and energy efficient content allocation framework
Lottiaux, Renaud. "Gestion globale de la mémoire physique d'une grappe pour un système à image unique : : mise en oeuvre dans le système Gobelins". Rennes 1, 2001. http://www.theses.fr/2001REN10097.
Texto completoGiannakas, Theodoros. "Joint modeling and optimization of caching and recommendation systems". Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS317.
Texto completoCaching content closer to the users has been proposed as a win-win scenario in order to offer better rates to the users while saving costs from the operators. Nonetheless, caching can be successful if the cached files manage to attract a lot of requests. To this end, we take advantage of the fact that the internet is becoming more entertainment oriented and propose to bind recommendation systems and caching in order to increase the hit rate. We model a user who requests multiple contents from a network which is equipped with a cache. We propose a modeling framework for such a user which is based on Markov chains and depart from the IRM. We delve into different versions of the problem and derive optimal and suboptimal solutions according to the case we examine. Finally we examine the variation of the Recommendation aware caching problem and propose practical algorithms that come with performance guarantees. For the former, the results indicate that there are high gains for the operators and that myopic schemes without a vision, are heavily suboptimal. While for the latter, we conclude that the caching decisions can significantly improve when taking into consideration the underlying recommendations
Tsigkari, Dimitra. "Algorithms and Cooperation Models in Caching and Recommendation Systems". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS210.
Texto completoIn the context of on-demand video streaming services, both the caching allocation and the recommendation policy have an impact on the user satisfaction, and financial implications for the Content Provider (CP) and the Content Delivery Network (CDN). Although caching and recommendations are traditionally decided independently of each other, the idea of co-designing these decisions can lead to lower delivery costs and to less traffic at the backbone Internet. This thesis follows this direction of exploiting the interplay of caching and recommendations in the setting of streaming services. It approaches the subject through the perspective of the users, and then from a network-economical point of view. First, we study the problem of jointly optimizing caching and recommendations with the goal of maximizing the overall experience of the users. This joint optimization is possible for CPs that simultaneously act as CDN owners in today’s or future architectures. Although we show that this problem is NP-hard, through a careful analysis, we provide the first approximation algorithm for the joint problem. We then study the case where recommendations and caching are decided by two separate entities (the CP and the CDN, respectively) who want to maximize their individual profits. Based on tools from game theory and optimization theory, we propose a novel cooperation mechanism between the two entities on the grounds of recommendations. This cooperation allows them to design a cache-friendly recommendation policy that ensures a fair split of the resulting gains
Kamel, Sarah. "Sécurité pour les réseaux sans fil". Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0011/document.
Texto completoToday, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario
Kamel, Sarah. "Sécurité pour les réseaux sans fil". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0011.
Texto completoToday, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario
Thomas-Chauffin, Solene. "SSII, laboratoire de formes modernes de mise au travail ?" Thesis, Lyon 2, 2013. http://www.theses.fr/2013LYO20122.
Texto completoDefining the concepts of "work" and "job", we observed the importance of "information system " in the reinvention of "work".Noting the loss and modification of „jobs“ ; evidenced by layoffs and reorganization of enterprises , the work does not disappear , however, and invites new forms , such as statutes of freelance and student , but also by positioning the consumer as a worker.Work visible, in the form of wage labor, to work "hidden" , it is the whole society that is reinvented, and calls for new social perspectives.Through the study of two IT compagnies, for a period of 5 years , we are interested in various forms of work activity concerning 152 computer engineers .Understand the context of IT compagnies as a laboratory for modern forms of development work has enabled us to identify these updates in innovative work and valuations.The information system is forming as the undisputed center of this change of work, allows the establishment of normalized and standardized work , draws the new border of work, and open to new rewarding social and economic opportunities.If the information system contributes to the implementation of these new forms of work , managerial decisions are to be at the origin of this use.To what paradigm directs us, this use of information system?
Ben, Ammar Hamza. "On models for performance evaluation and cache resources placement in multi-cache networks". Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S006/document.
Texto completoIn the last few years, Content Providers (CPs) have experienced a high increase in requests for video contents and rich media services. In view of the network scaling limitations and beyond Content Delivery Networks (CDNs), Internet Service Providers (ISPs) are developing their own caching systems in order to improve the network performance. These factors explain the enthusiasm around the Content-Centric Networking (CCN) concept and its in-network caching feature. The analytical quantification of caching performance is, however, not sufficiently explored in the literature. Moreover, setting up an efficient caching system within a network infrastructure is very complex and remains an open problem. To address these issues, we provide first in this thesis a fairly generic and accurate model of caching nodes named MACS (Markov chain-based Approximation of Caching Systems) that can be adapted very easily to represent different caching schemes and which can be used to compute different performance metrics of multi-cache networks. We tackled after that the problem of cache resources allocation in cache-enabled networks. By means of our analytical tool MACS, we present an approach that solves the trade-off between different performance metrics using multi-objective optimization and we propose an adaptation of the metaheuristic GRASP to solve the optimization problem
Van, Assche Vincent. "Etude et mise en oeuvre de commandes distribuées". Nantes, 2002. http://www.theses.fr/2002NANT2015.
Texto completoIn this work, we consider linear systems defined over a ring (such systems can be used for the modelisation of time-delay systems). We put ourselves in the context where distributed delays can be used in the control law. Then we take an interest in the feedback realization of precompensators (with dynamic, static, or distributed feedbacks). We provide several original solutions to this problem, when the models are defined over the ring of polynomials in several variables or over the ring [epsilon]
Averseng, Julien. "Mise en oeuvre et contrôle des systèmes de tenségrité". Montpellier 2, 2004. http://www.theses.fr/2004MON20188.
Texto completoMebsout, Alain. "Inférence d'invariants pour le model checking de systèmes paramétrés". Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112188/document.
Texto completoThis thesis tackles the problem of automatically verifying complexparameterized systems. This approach is important because it can guarantee thatsome properties hold without knowing a priori the number of components in thesystem. We focus in particular on the safety of such systems and we handle theparameterized aspect with symbolic methods. This work is set in the theoreticalframework of the model checking modulo theories and resulted in a new modelchecker: Cubicle.One of the main contribution of this thesis is a novel technique forautomatically inferring invariants. The process of invariant generation isintegrated with the model checking algorithm and allows the verification inpractice of systems which are out of reach for traditional symbolicapproaches. One successful application of this algorithm is the safety analysisof industrial size parameterized cache coherence protocols.Finally, to address the problem of trusting the answer given by the modelchecker, we present two techniques for certifying our tool Cubicle based on theframework Why3. The first consists in producing certificates whose validity canbe assessed independently while the second is an approach by deductiveverification of the heart of Cubicle
Aubert, Olivier. "Patron de conception pour l'analyse et la construction de systèmes à comportements autoadaptatifs". Rennes 1, 2001. http://www.theses.fr/2001REN10140.
Texto completoMabed, Malha. "Evaluation et mise en oeuvre des systèmes de production cyclique". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2005. http://tel.archives-ouvertes.fr/tel-00850443.
Texto completoBallo, Moïse. "Elements pour la mise en place d'un système d'information urbain à Bamako". Aix-Marseille 1, 1999. http://www.theses.fr/1999AIX10050.
Texto completoWu, Yao Kuang Rasoavololona Marie-Blandine. "Robustesse des systèmes auteurs multimédia : contribution théorique et mise en œuvre". Phd thesis, Université Paris VIII Vincennes-Saint Denis, 2000. http://tel.archives-ouvertes.fr/edutice-00000313.
Texto completoMalta, Carmelo. "Les systèmes transactionnels pour environnements d'objets : principes et mise en oeuvre". Montpellier 2, 1993. http://www.theses.fr/1993MON20154.
Texto completoBoher, Laurent. "Etude et mise en oeuvre de récepteurs itéractifs pour systèmes MIMO". Rennes, INSA, 2008. http://www.theses.fr/2008ISAR0017.
Texto completoMIMO systems, associating multiple antennas at transmission and reception, allow a significant gain in capacity thanks to exploitation of spatial diversity. Though they are promising, most of MIMO techniques insert co-antenna interference that must be cancelled to fully exploit the diversity of the channel. Iterative solutions based on turbo-equalization principle allow the interference to be treated but are relatively complex to implement. The aim of this thesis is to study the feasibility and the complexity of the integration of iterative receivers for MIMO systems. Firstly, an analysis of existing iterative solutions leads us to consider a MIMO detector based on linear filters that offers an interesting performance/complexity trade-off. Then, an efficient receiver architecture has been defined. We especially study the integration of matrix calculations for MMSE filtering and the scheduling of the exchanges between detection and decoding. Finally, an integration on FPGA allows the evaluation of proposed architectures
Wu, Yao Kuang Marie-Blandine. "Robustesse des systèmes auteurs multimédias : contribution théorique et mise en oeuvre". Paris 8, 2000. http://www.theses.fr/2000PA081746.
Texto completoAbbas, Laurent. "Mise au point d'un procédé de réticulation retardée de polymères après mise en forme : Systèmes dormants par vectorisation". Université Louis Pasteur (Strasbourg) (1971-2008), 2006. https://publication-theses.unistra.fr/restreint/theses_doctorat/2006/ABBAS_Laurent_2006.pdf.
Texto completoThe subject of this work is the developing of a new crosslinking process of a functionalized polyolefin matrix. This process is called “sleeping systems through vectorization” and is based on the competition between a reaction and diffusion kinetic. This competition is obtained with the temporarily trapping of one of the system constituents in particles named vectors. The latter particles can be envisioned as tanks that provide the controlled liberation of the trapped specie. The two main objectives of this study were to obtain: a limited crosslinking reaction at the end of the melt processing stage at high temperature a fully crosslinked material at moderate temperature after melt processing Several vectors have been tested according to their nature (mineral or organic) and their capacity of trapping/releasing the crosslinker. We show that using particles of polyamide 12 the formation of a macroscopic gel can be avoided during the processing time at high temperature. Besides the material is almost fully crosslinked after hundreds hours at 40°C. In parallel of the experimental study we proposed a numerical model to describe the crosslinking reaction. Using the model, we show that the final structure of the crosslinked material depends on the competition between the reaction and the diffusion kinetic. As a part of the work a new mixer has been developed to answer most of the problems of the existing laboratory scale mixers. This device offers a high distributive and dispersive mixing efficiency and presents in addition important technical features like water-airtightness, possibility of the direct molding of specimens after mixing and easy handling of reactive systems
Kriouile, Abderahman. "Formal methods for functional verification of cache-coherent systems-on-chip". Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM041/document.
Texto completoState-of-the-art System-on-Chip (SoC) architectures integrate many different components, such as processors, accelerators, memories, and I/O blocks. Some of those components, but not all, may have caches. Because the effort of validation with simulation-based techniques, currently used in industry, grows exponentially with the complexity of the SoC, this thesis investigates the use of formal verification techniques in this context. More precisely, we use the CADP toolbox to develop and validate a generic formal model of a heterogeneous cache-coherent SoC compliant with the recent AMBA 4 ACE specification proposed by ARM. We use a constraint-oriented specification style to model the general requirements of the specification. We verify system properties on both the constrained and unconstrained model to detect the cache coherency corner cases. We take advantage of the parametrization of the proposed model to produce a comprehensive set of counterexamples of non-satisfied properties in the unconstrained model. The results of formal verification are then used to improve the industrial simulation-based verification techniques in two aspects. On the one hand, we suggest using the formal model to assess the sanity of an interface verification unit. On the other hand, in order to generate clever semi-directed test cases from temporal logic properties, we propose a two-step approach. One step consists in generating system-level abstract test cases using model-based testing tools of the CADP toolbox. The other step consists in refining those tests into interface-level concrete test cases that can be executed at RTL level with a commercial Coverage-Directed Test Generation tool. We found that our approach helps in the transition between interface-level and system-level verification, facilitates the validation of system-level properties, and enables early detection of bugs in both the SoC and the commercial test-bench
Yu, Shuai. "Multi-user computation offloading in mobile edge computing". Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS462.
Texto completoMobile Edge Computing (MEC) is an emerging computing model that extends the cloud and its services to the edge of the network. Consider the execution of emerging resource-intensive applications in MEC network, computation offloading is a proven successful paradigm for enabling resource-intensive applications on mobile devices. Moreover, in view of emerging mobile collaborative application (MCA), the offloaded tasks can be duplicated when multiple users are in the same proximity. This motivates us to design a collaborative computation offloading scheme for multi-user MEC network. In this context, we separately study the collaborative computation offloading schemes for the scenarios of MEC offloading, device-to-device (D2D) offloading and hybrid offloading, respectively. In the MEC offloading scenario, we assume that multiple mobile users offload duplicated computation tasks to the network edge servers, and share the computation results among them. Our goal is to develop the optimal fine-grained collaborative offloading strategies with caching enhancements to minimize the overall execution delay at the mobile terminal side. To this end, we propose an optimal offloading with caching-enhancement scheme (OOCS) for femto-cloud scenario and mobile edge computing scenario, respectively. Simulation results show that compared to six alternative solutions in literature, our single-user OOCS can reduce execution delay up to 42.83% and 33.28% for single-user femto-cloud and single-user mobile edge computing, respectively. On the other hand, our multi-user OOCS can further reduce 11.71% delay compared to single-user OOCS through users' cooperation. In the D2D offloading scenario, we assume that where duplicated computation tasks are processed on specific mobile users and computation results are shared through Device-to-Device (D2D) multicast channel. Our goal here is to find an optimal network partition for D2D multicast offloading, in order to minimize the overall energy consumption at the mobile terminal side. To this end, we first propose a D2D multicast-based computation offloading framework where the problem is modelled as a combinatorial optimization problem, and then solved using the concepts of from maximum weighted bipartite matching and coalitional game. Note that our proposal considers the delay constraint for each mobile user as well as the battery level to guarantee fairness. To gauge the effectiveness of our proposal, we simulate three typical interactive components. Simulation results show that our algorithm can significantly reduce the energy consumption, and guarantee the battery fairness among multiple users at the same time. We then extend the D2D offloading to hybrid offloading with social relationship consideration. In this context, we propose a hybrid multicast-based task execution framework for mobile edge computing, where a crowd of mobile devices at the network edge leverage network-assisted D2D collaboration for wireless distributed computing and outcome sharing. The framework is social-aware in order to build effective D2D links [...]
Vercouter, Laurent. "Conception et mise en oeuvre de systèmes multi-agents ouverts et distribués". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2000. http://tel.archives-ouvertes.fr/tel-00839604.
Texto completoMéndez, Real Maria. "Spatial Isolation against Logical Cache-based Side-Channel Attacks in Many-Core Architectures". Thesis, Lorient, 2017. http://www.theses.fr/2017LORIS454/document.
Texto completoThe technological evolution and the always increasing application performance demand have made of many-core architectures the necessary new trend in processor design. These architectures are composed of a large number of processing resources (hundreds or more) providing massive parallelism and high performance. Indeed, many-core architectures allow a wide number of applications coming from different sources, with a different level of sensitivity and trust, to be executed in parallel sharing physical resources such as computation, memory and communication infrastructure. However, this resource sharing introduces important security vulnerabilities. In particular, sensitive applications sharing cache memory with potentially malicious applications are vulnerable to logical cache-based side-channel attacks. These attacks allow an unprivileged application to access sensitive information manipulated by other applications despite partitioning methods such as memory protection and virtualization. While a lot of efforts on countering these attacks on multi-core architectures have been done, these have not been designed for recently emerged many-core architectures and require to be evaluated, and/or revisited in order to be practical for these new technologies. In this thesis work, we propose to enhance the operating system services with security-aware application deployment and resource allocation mechanisms in order to protect sensitive applications against cached-based attacks. Different application deployment strategies allowing spatial isolation are proposed and compared in terms of several performance indicators. Our proposal is evaluated through virtual prototyping based on SystemC and Open Virtual Platforms(OVP) technology
Pecci, Isabelle. "Contribution à la définition et à la mise en oeuvre d'un dialogue adaptatif pour la CAO". Metz, 1997. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/1997/Stemart.Isabelle.SMZ9701.pdf.
Texto completoThe field of CAD/CAM concerns every computer helps used to manufacture a product. More precisely, CAD/CAM systems must help to design a virtual prototype of a product. To obtain good results, man/machine dialog must be powerful. We are interested in knowledges that are useful to make adaptative dialog i. E. That dialog comes up to end-users expectations, manages their timeserving nature and proposes various techniques to help them. An analysis of the needs and techniques used to design adaptative dialog shows that various axis of research can improve dialog. In particular, domains like Artificial Intelligence can propose methods to manage knowledges of end-users. To provide for CAD/CAM systems' requirements and give help for development, we propose a dual method of knowledges acquisition from dialog designer. This method allows designer, inexpert in modeling of dialog for CAD/CAM, to define implicity the dialog of an application. Proposed solutions require minimum work for designers. Moreover, to ensure better control on manipulations of end-users, we present a concept to centralize the specification of manipulations tools : the manipulators. The knowledges about end-users don't concern only the manipulations. As a result, a real model dedicated to end-users don't concern only the manipulations. As a result, a real model dedicated to end-users has been defined. This appoach becomes more and more essential to CAD/CAM systems that use Virtual Reality. End-user modeling associated with manipulators allows to consider new kinds of helps in man/machine dialog
Gao, Yang. "Contrôleur de cache générique pour une architecture manycore massivement parallèle à mémoire partagée cohérente". Paris 6, 2011. http://www.theses.fr/2011PA066296.
Texto completoOchs, Magalie. "Modélisation, formalisation et mise en œuvre d'un agent rationnel dialoguant émotionnel empathique". Paris 8, 2007. http://octaviana.fr/document/13337923X#?c=0&m=0&s=0&cv=0.
Texto completoRecent research has shown that virtual agents which express empathic emotions enable to improve the human-machine interaction. Such agents should know in which circumstances which emotion may appear during the interaction. To achieve this goal, an exploratory analysis of real human-machine dialog situations which have lead users to express emotions have been done. The results have been studied in the light of the theoretical descriptions of emotions in cognitive psychology in order to identify the types of emotions that may appear during human-machine dialog and their conditions of elicitation. From this information, a formal model of emotions for a rational dialog agent has been designed. The emotions are defined by their conditions of elicitation represented by particular mental state, i. E. By combinations of beliefs, uncertainties, and intentions. The intensity of these emotions is computed from these mental attitudes. This formalisation enables a rational dialog agent to determine in which dialog situations which empathic emotion it should express. Based on the formal model, a module of emotions for JSA rational dialog agent has been implemented. An evaluation with users of an emotional empathic rational dialog agent has enabled us to highlight the positive effect of such agent on the user's perception
Ouaarab, Salaheddine. "Protection du contenu des mémoires externes dans les systèmes embarqués, aspect matériel". Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0046/document.
Texto completoDuring the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the confidentiality and integrity of data have been proposed in the literature, including Merkle trees, a data structure that can protect the integrity of data including against replay attacks. However, these trees have a large impact on the performances and the memory footprint of the system. In this thesis, we propose a solution based on variants of Merkle trees (hollow trees) and a modified cache management mechanism to greatly reduce the impact of the verification of the integrity. The performances of this solution have been evaluated both theoretically and in practice using simulations. In addition, a proof a security equivalence with regular Merkle treesis given. Finally, this solution has been implemented in the SecBus architecture which aims at protecting the integrity and confidentiality of the content of external memories in an embedded system. A prototype of this architecture has been developed and the results of its evaluation are given
Bhatia, Sapan. "Optimisations de compilateur optimistes pour les systèmes réseaux". Bordeaux 1, 2006. http://www.theses.fr/2006BOR13169.
Texto completoZayati, Ahlem. "Mise en oeuvre des architectures orientées services pour les systèmes d'information industriels". Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00828310.
Texto completoGuillemenet, Jérôme. "Etude expérimentale de la mise en forme de systèmes acier-polymère-acier". Mulhouse, 2000. http://www.theses.fr/2000MULH0626.
Texto completoChoffel, Olivier. "L' esthétique prothétique : apport et mise en oeuvre de nouveaux systèmes céramiques". Strasbourg 1, 2002. http://www.theses.fr/2002STR1D014.
Texto completoGueddana, Sofiane. "Conception, mise en oeuvre et évaluation de systèmes de communication multi-échelles". Paris 11, 2009. http://www.theses.fr/2009PA112175.
Texto completoNon mediated communication can generally take several forms, and the transition from a situation to another is gradual and continuous. By contrast, actual communication tools rarely allow to smoothly adjust the exchanged information flow. This thesis proposes to build multi-scales communication systems that offer several degrees of engagement and allow smooth transition between these services. This approach is illustrated by a video communication system, Pêle-Mêle, which uses computer vision techniques, spatial and temporal filters, and a focus+context layout to allow several degrees of engagement. We have conducted a longitudinal study of the use of Pêle-Mêle, followed by a controlled experiment to evaluate an aspect of the system. The study of this system long-term use showed the importance of providing gradual attention management mechanisms to allow smooth transition between background and foreground communications. Then, we evaluated experimentally the effect of image display pace on attention allocation in dual-task situation. We propose also an original technique to visualize interactively clips recorded by the system, and beyond, sparse temporal data sets. This work concludes on a generalization of formal aspects of this technique, to other types of transformation and other domains, as communication or cartography
Romero, Eduardo Luis. "Mise en oeuvre des protocoles SIP et RTP sur système embarqué". Mémoire, Université de Sherbrooke, 2009. http://savoirs.usherbrooke.ca/handle/11143/1504.
Texto completoFalcone, Yliès Carlo. "Etude et mise en oeuvre de techniques de validation à l'exécution". Université Joseph Fourier (Grenoble), 2009. http://www.theses.fr/2009GRE10239.
Texto completoThis thesis deals with three dynamic validation techniques: runtime verification (monitoring), runtime enforcement, and testing from property. We consider these approaches in the absence of complete behavioral specification of the system under scrutiny. Our study is done in the context of the Safety-Progress classification of properties. This framework offers several advantages for specifying properties on systems. We adapt the results on this classification, initially dedicated to infinite sequences, to take into account finite sequences. Those sequences may be considered as abstract representations of a system execution. Relying on this general framework, we study the applicability of dynamic validation methods. We characterize the classes of monitorable, enforceable, and testable properties. Then, we proposed three generic approaches for runtime verification, enforcement, and testing. We show how it is possible to obtain, from a property expressed in the {\SP} framework, some verification, enforcement, and testing mechanisms for the property under consideration. Finally, we propose the tools j-VETO and j-POST implementing all the aforementioned results on Java programs
Ouaarab, Salaheddine. "Protection du contenu des mémoires externes dans les systèmes embarqués, aspect matériel". Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0046.
Texto completoDuring the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the confidentiality and integrity of data have been proposed in the literature, including Merkle trees, a data structure that can protect the integrity of data including against replay attacks. However, these trees have a large impact on the performances and the memory footprint of the system. In this thesis, we propose a solution based on variants of Merkle trees (hollow trees) and a modified cache management mechanism to greatly reduce the impact of the verification of the integrity. The performances of this solution have been evaluated both theoretically and in practice using simulations. In addition, a proof a security equivalence with regular Merkle treesis given. Finally, this solution has been implemented in the SecBus architecture which aims at protecting the integrity and confidentiality of the content of external memories in an embedded system. A prototype of this architecture has been developed and the results of its evaluation are given
Annichini, Collomb Aurore. "Vérification d'automates étendus : algorithmes d'analyse symbolique et mise en oeuvre". Phd thesis, Université Joseph Fourier (Grenoble), 2001. http://tel.archives-ouvertes.fr/tel-00004334.
Texto completoGuthmuller, Èric. "Architecture adaptative de mémoire cache exploitant les techniques d'empilement tridimensionnel dans le contexte des multiprocesseurs intégrés sur puce". Paris 6, 2013. http://www.theses.fr/2013PA066096.
Texto completoThe parallelization of processors has led to a increased need of external memory bandwidth. As the number of cores grows, it becomes difficult to embed enough memory caches next to processors. The appearance of 3D stacking technologies makes the stacking of memory on top of processors possible. In this thesis, we propose a 3D cache architecture for manycore exploiting 3D stacking technologies to surpass the limitations of existing architectures. This architecture consists of a regular mesh of cache tiles interconnected by 3D networks on chip and form a non uniform distributed cache. This 3D cache is reusable in a lot of contexts in order to reduce the production cost and also adapts itself to the needs of the application running on the processing architecture. At last, this 3D cache is tolerant to permanent faults to reduce the manufacturing cost and lengthen the lifetime of the circuit. We have evaluated the efficiency of adaptive mecanisms implanted in the architecture and showed that these mecanisms improve its efficiency. We have also compared our architecture to the WideIO standard and showed that our architecture performs best both in terms of bandwidth and energy efficiency. At last, we have done its hardware implementation in a 28 nm CMOS process. This hardware implementation has been taken up to the drawing of masks to evaluate the properties of our architecture
Rifi, Omar. "Mise-à-jour des bases de croyances logiques et changement minimal". Toulouse 3, 2000. http://www.theses.fr/2000TOU30082.
Texto completoDupuis, Matthieu. "Processus de mise en place et évolution des systèmes de volcans de boue". Thesis, Lille 1, 2017. http://www.theses.fr/2017LIL10057/document.
Texto completoThis doctoral work studies the mechanisms involved in the growth of mud volcanoes systems and the processes involved with their surface evolution. The study is based on a structural analysis using seismic data acquired on two anticlines located in the NW of the South Caspian Basin and on an extensive structural field work combined with a sub-surface imagery based on electrical resistivity and geochemical analysis on edifices located on the onshore in continuity of the Kura Basin (Azerbaijan). Mud Pie are edifices having a flat morphology induced by the occurrence of a reserve of liquid mud on surface that we call Superficial Chamber. The input of material from a shallow mud source induce the inflation of this chamber which, reaching the equilibrium, induces a compressional stress that deform the edifice and make it grow, following a model named “Pushing Walls”. Conical edifices are linked to deeper storage zones (Secondary Chamber) or even to the source of mud itself (Primary Chamber). The fluid source (water and gas) is clearly disconnected to the source of mud. Sedimentation plays a dominant role on mud volcano systems evolution allowing to seal the fluid migration paths, thus the formation of fluids overpressure, inducing an evolution by successive pulses leading to interlocked mud volcano systems: mud volcano systems complexes
BRYCE, CIARAN. "Etude et mise en oeuvre de propriétés de sécurité dans les systèmes informatiques". Rennes 1, 1994. http://www.theses.fr/1994REN10219.
Texto completoMéaille, Robert. "Les Systèmes d'Information Géographique : structure, mise en oeuvre et utilisation dans différentes études". Phd thesis, Nice, 1988. http://pastel.archives-ouvertes.fr/pastel-00957266.
Texto completoLatiri-Otthoffer, Lamia. "La mise en paysage des systèmes d'irrigation dans les oasis du Sud tunisien". Paris 1, 1999. http://www.theses.fr/1999PA010530.
Texto completoThe aim of this research is an epistemological study of the lanscape concept in arabian moslem culture through five points. The fist point examines the notion of landscape concept in arabic. The second point, through iconography, studies licit and illicit figuring and the importance of landscape in arabian miniatures. The third point analyses geographical description in the arabian literature from the ninth to the eleventh century and samples of landscape featuring emanating from realistic and subjective descriptions of the country : useful, religious, fancy, bucolic. . . Landscapes. The fourth point observing contemporary society -i-e the southern tunisia djerid, aims at setting out social figuring and practice, landscape patterns and sorting out what they have in common with those established by arabian geography : in use in arabian geography : historical, religious, local, touristic. . . Landscapes. Considering the pevailing results, the last point attempts to compare arabian moslem and occidental culture in landscape featuring through iconography, geography, territory discoveries and at last social practice and figuring in landscape
Bonnel, Cédric. "Mise en place des lobes distaux dans les systèmes turbiditiques actuels : analyse comparée des systèmes du Zaïre, Var, et Rhône". Bordeaux 1, 2005. http://www.theses.fr/2005BOR13060.
Texto completoAdmane, Ayaden Farida. "Mise en oeuvre des systèmes d'information géographique pour la prise de décision : démarches et outils". Toulouse 1, 2008. http://www.theses.fr/2008TOU10045.
Texto completoA GIS, in its double role of a ) description and management of geographicla data on a specific space and b) geographicla posotioning of data known as assignees, is a major element of the information system of an organization, and gives way to specific decision making. The present work concerns spatial decision-making, and notably at the strategic level. Spatial dimension adds a complexity to decision-making, and requires a different study and reflection on both the decision situations (i. E. Enterprise management) and the cognitive processes of the decision makers (decision making itself). Our contribution covers methodological and technical solutions to this problem, based on theorical considerations and experimental implementations. These implementations were done within the CERIST (Research Center in Scientific and Technical Information, Algiers), aiming territory development and spatial organisation
Hamel, Philippe. "S. I. G. Du Grand Caen : conception et mise en oeuvre". Caen, 1996. http://www.theses.fr/1996CAEN1199.
Texto completoGreater caen is a complex research field, that requires a suitable research method : a geographic information system (or g. I. S. ). At first, it is necessary to organize this method. It includes usual practices from the scientific method : demonstration, theorization, explanation. It also includes additionnal actions needed by the building of a geographic database, and the use of this database with the help of a spatial database management system, especially for geographic spatial analysis and cartography. Next, a geographic database covering several thematic fields in greater caen is built. Several steps help to design a data structure that fits the structure of the phenomena to be described. Coherence of the database is then put on trial, according to various possibilities : combining several thematic layers, making time comparisons, taking location into account, discovering relations between geographic attributes and items. Finally, the geographic database is used for an analysis of urban evolution inside greater caen between 1991 and 1995. The analysis is made up of several phases : identification of land use types, analysis of types'location, identification of land use changes, analysis of changes'location. This analysis leads both to confirm the great features of land use, and to discover signs of modification of some of these features in next years ; it also enlights the importance of human action in the working of a g. I. S
Epardaud, Stéphane. "Mise en oeuvre d'un langage à mobilité forte". Nice, 2008. http://www.theses.fr/2008NICE4010.
Texto completoIn order to avoid the problems raised by the integration of a growing number of programmable home appliances, we propose a language with mobile agents. These mobile agents are capable of migrating from one appliance or computer to another in order to work on its local resources, which allows us to benefit from each appliance’s capabilities from a single program. This language is called ULM: Un Langage pour la Mobilité. We present in this dissertation its features, its differences with other languages, as well as its implementation. ULM is based on the Scheme language, to which we have added functionality linked with mobility and the communication of mobile agents. ULM has a number of primitives allowing the creation of strongly mobile agents, with a cooperative deterministic scheduling, and control primitives such as suspension or weak preemption. We present in this dissertation the integration of these primitives in the Scheme language, as well as their interaction and the addition of new primitives such as strong preemption and safe migration. We then present the denotational semantics, and its implementation with a bytecode compiler and two virtual machines: one written in Bigloo Scheme for execution on traditional computers, the other in Java ME for mobile phones. We present then the possible use of ULM as a replacement for programs written for event loops, the interfacing of ULM and external languages, a few examples of ULM applications, and future work before we conclude
Hivet, Gilles. "Modélisation mésoscopique pour le comportement bi-axial et la mise en forme des renforts de composites tissés". Orléans, 2002. http://www.theses.fr/2002ORLE2036.
Texto completoSibille, Patrick. "Analyses de la mise en œuvre de méthodes d'estimation paramétrique". Nancy 1, 1990. http://www.theses.fr/1990NAN10043.
Texto completo