Littérature scientifique sur le sujet « Architecture sur mesure »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Architecture sur mesure ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Architecture sur mesure"
Ohr, Karlfriedrich, et Jean-Jacques Malmary. « La genèse de la basilique romaine ». Revue archéologique 77, no 1 (29 avril 2024) : 41–80. http://dx.doi.org/10.3917/arch.241.0041.
Texte intégralde Vittoris, Raphaël, et Sophie Cros. « Le « serious game », un outil pertinent pour la gestion de crise ». Recherches en Sciences de Gestion N° 155, no 2 (19 juin 2023) : 77–104. http://dx.doi.org/10.3917/resg.155.0077.
Texte intégralArbaoui, Saifeddine, et Nadia Jemjami. « Les déterminants de la transformation numérique dans le secteur public : proposition d’une échelle de mesure ». Recherches en Sciences de Gestion N° 155, no 2 (19 juin 2023) : 339–67. http://dx.doi.org/10.3917/resg.155.0339.
Texte intégralIbrahimi, Mohammed, et Fayçal El Baghdadi. « Pertinence de la valeur des informations comptables : Cas des sociétés marocaines cotées ». Recherches en Sciences de Gestion N° 158, no 5 (18 décembre 2023) : 219–41. http://dx.doi.org/10.3917/resg.158.0219.
Texte intégralBelderbos, Marc. « actualité d’Alberti ». Les Pages du laa 1, no 4 (24 août 2023) : 1–56. http://dx.doi.org/10.14428/lpl.v1i4.75473.
Texte intégralFriedrich, Martin. « Power, Institutions and Factions in German Protestantism ». Revue d'histoire du protestantisme 8, no 2-3 (13 juillet 2023) : 255–72. http://dx.doi.org/10.47421/rhp_8.2-3_255-272.
Texte intégralClaeys, Damien. « Discontinuités des processus de conception architecturale : Crises de la représentation ? » Acta Europeana Systemica 8 (9 juillet 2020) : 19–36. http://dx.doi.org/10.14428/aes.v8i1.56203.
Texte intégralOuters, Martin. « Du standard passif à l’architecture météorologique ». lieuxdits, no 21 (6 juillet 2022) : 12–19. http://dx.doi.org/10.14428/ld.vi21.67203.
Texte intégralVanacker, Beatrijs. « Poétique de l’épistolarité romanesque dans l’oeuvre de Jeanne-Marie Leprince de Beaumont1 ». Études françaises 54, no 3 (18 janvier 2019) : 147–66. http://dx.doi.org/10.7202/1055655ar.
Texte intégralBarrette, Jacques. « Architecture de ressources humaines ». Articles 60, no 2 (6 décembre 2005) : 213–43. http://dx.doi.org/10.7202/011720ar.
Texte intégralThèses sur le sujet "Architecture sur mesure"
Cheikho, Karim. « Conception de structures souples élastiques et applications en biomécanique ». Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0147.
Texte intégralThe selection of the most-suitable porous bone scaffold for regenerative medicine applied to a given clinical application is challenging, which has motivated numerous studies especially for the repair of bone defects. Several designs have been proposed over the last decade, including structures with pore size gradients that have been proved to facilitate nutrient transport from the periphery to the core of the scaffold, and therefore to enhance tissue regeneration. The framework used to design such porous scaffolds with pore size gradients is limited by the range of the reachable pore distribution and mechanical properties.In this work, we presented a design framework to generate various three-dimensional porous scaffolds structures including cylindrical graded scaffolds from the transformations of unit cells. We proposed a methodology to generate porous scaffolds by multilayer repetition of circular cross sections, resulting in tunable anisotropy depending on the intended clinical application. We identified the apparent mechanical properties of different porous scaffold configurations using an original numerical method, highlighting the versatility of the design procedure that allows for separate tuning of longitudinal and transverse mechanical properties of porous scaffold.In order to investigate the ability of common additive manufacturing techniques to fabricate the proposed structures, we have elaborated scaffolds using FDM (fused deposition modeling) and SLA (stereolithography) techniques, we have performed experimental mechanical tests to be confronted to the predictions issued from simulations. In spite of the geometrical differences observed between the initial design and the obtained structures, the apparent properties of the structures obtained by the SLA technique agree with those predicted by the proposed computational method.Promising perspectives have been proposed concerning the design of self-fitting scaffolds that can be used for clinical applications, particularly to repair bone defects using mini-invasive surgery
Sebag, Deborah. « Recherches sur l'architecture en Palestine au Bronze ancien ». Phd thesis, Université Panthéon-Sorbonne - Paris I, 2011. http://tel.archives-ouvertes.fr/tel-00781529.
Texte intégralPlouviez, Geoffrey. « Etude, spécification, vérification formelle de mécanismes de virtualisation sécurisés pour architecture many-cores ». Paris 6, 2012. http://www.theses.fr/2012PA066045.
Texte intégralThis thesis presents a co-hosting approach of multiple software stacks within a same multiprocessor system-on-chip. In the field of general purpose multiprocessors, the cores number is continuously increasing and so is the computation capability. But, from the trust side, this growing computer complexity deepens trust issues. This lack of trustworthiness is exacerbated by the increasing information’s value processed by computer systems. Usual isolation techniques, at both user’s or kernel’s levels, do not offer enough protection for the confidentiality, integrity and availability of the running software stacks. In this thesis, we present a trusted many-cores virtualization approach which aims to execute software stacks in trusted virtual machines. Our goal is to provide enough isolation so a malicious virtual machine user will not be able to compromise another virtual machine. We have built hardware protection mechanisms which are under the control of a software formally verified hypervisor
Senat, Claude. « Prise en compte de l'encombrement, au sein d'un modèle de prévision des niveaux de pression, reposant sur l'hypothèse de réflexion diffuse sur les parois ». Toulouse 3, 1992. http://www.theses.fr/1992TOU30056.
Texte intégralBorrel, Nicolas. « Evaluation d'injection de fautes Laser et conception de contre-mesures sur une architecture à faible consommation ». Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4358.
Texte intégralIn many applications such as credit cards, confidential data is used. In this regard, the systems-on-chip used in these applications are often deliberately attacked. This puts the security of our data at a high risk. Furthermore, many SoC devices have become battery-powered and require very low power consumption. In this context, semiconductor manufacturers should propose secured and low-power solutions.This thesis presents a security evaluation and a countermeasures design for a low-power, triple-well architecture dedicated to low-power applications. The security context of this research focuses on a Laser sensitivity evaluation of this architecture.This paper first presents the state of the art of Laser fault injection techniques, focusing on the physical effects induced by a Laser beam. Afterward, we discuss the different dual-and triple-well architectures studied in order to compare their security robustness. Then, a physical study of these architectures as substrate resistor and capacitor modeling highlights their impact on security. This evaluation lets us anticipate the phenomena potentially induced by the Laser inside the biasing well (P-well, N-well) and the MOS transistors.Following the analysis of the physical phenomena resulting from the interaction between the laser and the silicon, electrical modeling of the CMOS gates was developed for dual and triple-well architectures. This enabled us to obtain a good correlation between measurements and electrical simulations.In conclusion, this work enabled us to determine possible design rules for increasing the security robustness of CMOS gates as well as the development of Laser sensors able to detect an attack
Hentati, Raïda. « Implémentation d'algorithmes de reconnaissance biométrique par l'iris sur des architectures dédiées ». Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917955.
Texte intégralRiquet, Damien. « DISCUS : une architecture de détection d'intrusions réseau distribuée basée sur un langage dédié ». Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10207/document.
Texte intégralNowadays, information systems are everywhere and their interconnexion is almost complete. The rise of complex and large computing infrastructures has brought a need for increased security. We need to follow a sound methodology so that one can understand an exploit develop a counter-measure and deploy it as soon as possible. To tackle those issues, we propose DISCUS, a new distributed architecture that takes advantage of existing solutions as well as distributed probes. This approach leads to finer, collaborative analysis where each probe enrich the global knowledge of the architecture as a whole. Our solution introduces two main issues : determine efficient distribution mechanism to implement collaboration and facilitate the developpement of the software that will run on highly heterogeneous hardware. This thesis mainly focuses on the later. The actual development of the software that will run on the probes can not be made by a security special or a system administrator because of the diversity of the probes (in term of memory, computing power, network location…). This would imply that the developer has strong knowledge on security, networking, kernel development, embeded systems, hardware development. Such a developer is hard to find. To overcome this problem, we propose DISCUS, a domain specific language. With this langage, one can implement security rules without the need to take implementation details into account. Our compiler chain takes the rules and is able to build software, or hardware, image specific for each probes of the network. This thesis presents this language, some case studies and its evaluation in term of expressivity, robustness and performances
Kortebi, Abdesselem. « Evaluation d' une architecture IP orientée flot ». Paris 6, 2005. http://www.theses.fr/2005PA066517.
Texte intégralDévigne, Clément. « Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore ». Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066138.
Texte intégralManycore architectures, which comprise a lot of cores, are a way to answer the always growing demand for digital data processing, especially in a context of cloud computing infrastructures. These data, which can belong to companies as well as private individuals, are sensitive by nature, and this is why the isolation problematic is primordial. Yet, since the beginning of cloud computing, virtualization techniques are more and more used to allow different users to physically share the same hardware resources. This is all the more true for manycore architectures, and it partially comes down to the architectures to guarantee that data integrity and confidentiality are preserved for the software it executes. We propose in this thesis a secured virtualization environment for a manycore architecture. Our mechanism relies on hardware components and a hypervisor software to isolate several operating systems running on the same architecture. The hypervisor is in charge of allocating resources for the virtualized operating systems, but does not have the right to access the resources allocated to these systems. Thus, a security flaw in the hypervisor does not imperil data confidentiality and integrity of the virtualized systems. Our solution is evaluated on a cycle-accurate virtual prototype and has been implemented in a coherent shared memory manycore architecture. Our evaluations target the hardware and performance overheads added by our mechanisms. Finally, we analyze the security provided by our solution
Dévigne, Clément. « Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore ». Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066138/document.
Texte intégralManycore architectures, which comprise a lot of cores, are a way to answer the always growing demand for digital data processing, especially in a context of cloud computing infrastructures. These data, which can belong to companies as well as private individuals, are sensitive by nature, and this is why the isolation problematic is primordial. Yet, since the beginning of cloud computing, virtualization techniques are more and more used to allow different users to physically share the same hardware resources. This is all the more true for manycore architectures, and it partially comes down to the architectures to guarantee that data integrity and confidentiality are preserved for the software it executes. We propose in this thesis a secured virtualization environment for a manycore architecture. Our mechanism relies on hardware components and a hypervisor software to isolate several operating systems running on the same architecture. The hypervisor is in charge of allocating resources for the virtualized operating systems, but does not have the right to access the resources allocated to these systems. Thus, a security flaw in the hypervisor does not imperil data confidentiality and integrity of the virtualized systems. Our solution is evaluated on a cycle-accurate virtual prototype and has been implemented in a coherent shared memory manycore architecture. Our evaluations target the hardware and performance overheads added by our mechanisms. Finally, we analyze the security provided by our solution
Livres sur le sujet "Architecture sur mesure"
Architecture sur mesure : ECDM architectes. Santarcangelo di Romagna (RN) [i.e. Rimini, Italy] : Maggioli, 2009.
Trouver le texte intégralTournus, Jacques. La maison sur mesure. 3e éd. Paris : E d. du Moniteur, 1991.
Trouver le texte intégralMichelin, Nicolas. Cinq sur cinq : dix projets sur mesure, architecture et urbanisme = : Five by five : ten custom-made projects architecture and urban planning. Paris : Archibooks, 2008.
Trouver le texte intégralNicolas, Michelin, Pierre Catherine, Agence Nicolas Michelin et Associés. et Arc en rêve centre d'architecture., dir. Cinq sur cinq : dix projets sur mesure, architecture et urbanisme = : Five by five : ten custom-made projects architecture and urban planning. Paris : Archibooks, 2008.
Trouver le texte intégralCinq sur cinq : dix projets sur mesure, architecture et urbanisme = : Five by five : ten custom-made projects architecture and urban planning. Paris : Archibooks, 2008.
Trouver le texte intégralCorbusier, Le. Le modulor : Essai sur une mesure harmonique a l'echelle humaine applicable universellement a l'architecture et `a la mechanique. Birkhauser, 2000.
Trouver le texte intégralChapitres de livres sur le sujet "Architecture sur mesure"
« Mesures anti-corruption visant à endiguer les flux financiers illicites ». Dans Rapport sur la gouvernance économique I : Architecture institutionnelle pour lutter contre les flux financiers illicites, 113–29. United Nations, 2023. http://dx.doi.org/10.18356/9789210010665c009.
Texte intégralLetesson, Quentin, et Carl Knappett. « Processes and Patterns at the Macro-Scale : Crete and Beyond ». Dans Minoan Architecture and Urbanism. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198793625.003.0019.
Texte intégralDERVEAUX, Virginie, et Cécile FRIES-PAIOLA. « L’architecture scolaire face à la pandémie, conséquences spatiales de la gestion de crise ». Dans Les épidémies au prisme des SHS, 205–20. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.6007.
Texte intégralActes de conférences sur le sujet "Architecture sur mesure"
Alison, Aurosa. « Les « Unités » Modulor dans la Philosophie de l’Espace de Gaston Bachelard ». Dans LC2015 - Le Corbusier, 50 years later. Valencia : Universitat Politècnica València, 2015. http://dx.doi.org/10.4995/lc2015.2015.1045.
Texte intégral