Littérature scientifique sur le sujet « Fragmentation (informatique) »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Fragmentation (informatique) ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Fragmentation (informatique)"
Chan, Andy Lung Jan. « Education, Experience and Translator Certification as Signaling Mechanisms ». FORUM / Revue internationale d’interprétation et de traduction / International Journal of Interpretation and Translation 8, no 1 (1 avril 2010) : 37–54. http://dx.doi.org/10.1075/forum.8.1.02cha.
Texte intégralChen, Daniel, et Darrell Duffie. « Market Fragmentation ». American Economic Review 111, no 7 (1 juillet 2021) : 2247–74. http://dx.doi.org/10.1257/aer.20200829.
Texte intégralvan Veelen, P. A., U. R. Tjaden et J. van der Greef. « Sequence-informative fragmentation in 252Cf-plasma desorption mass-spectrometry ». Journal of Controlled Release 21, no 1-3 (juillet 1992) : 201. http://dx.doi.org/10.1016/0168-3659(92)90023-k.
Texte intégralHaselmann, K. F., B. A. Budnik, F. Kjeldsen, M. L. Nielsen, J. V. Olsen et R. A. Zubarev. « Electronic Excitation Gives Informative Fragmentation of Polypeptide Cations and Anions ». European Journal of Mass Spectrometry 8, no 2 (avril 2002) : 117–21. http://dx.doi.org/10.1255/ejms.479.
Texte intégralVaidogas, Egidijus Rytas. « Bayesian Processing of Data on Bursts of Pressure Vessels ». Information Technology and Control 50, no 4 (16 décembre 2021) : 607–26. http://dx.doi.org/10.5755/j01.itc.50.4.29690.
Texte intégralDong, Yalun, Martina Jelocnik, Amber Gillett, Ludovica Valenza, Gabriel Conroy, Dominique Potvin et Renfu Shao. « Mitochondrial Genome Fragmentation Occurred Multiple Times Independently in Bird Lice of the Families Menoponidae and Laemobothriidae ». Animals 13, no 12 (20 juin 2023) : 2046. http://dx.doi.org/10.3390/ani13122046.
Texte intégralvan Veelen, P. A., U. R. Tjaden, J. van der Greef et N. D. de With. « Sequence-Informative fragmentation in an 8.9 kDa oligopeptide using plasma desorption mass spectrometry ». Organic Mass Spectrometry 26, no 4 (avril 1991) : 345–46. http://dx.doi.org/10.1002/oms.1210260429.
Texte intégralZauner, Gerhild, Radoslaw P. Kozak, Richard A. Gardner, Daryl L. Fernandes, André M. Deelder et Manfred Wuhrer. « Protein O-glycosylation analysis ». Biological Chemistry 393, no 8 (1 août 2012) : 687–708. http://dx.doi.org/10.1515/hsz-2012-0144.
Texte intégralKong, Feng, Shao Sun et Yifei Wang. « Comprehensive Understanding the Disaster-Causing Mechanism, Governance Dilemma and Targeted Countermeasures of Urban Pluvial Flooding in China ». Water 13, no 13 (25 juin 2021) : 1762. http://dx.doi.org/10.3390/w13131762.
Texte intégralNishikaze, Takashi. « Sensitive and Structure-Informative N-Glycosylation Analysis by MALDI-MS ; Ionization, Fragmentation, and Derivatization ». Mass Spectrometry 6, no 1 (2017) : A0060. http://dx.doi.org/10.5702/massspectrometry.a0060.
Texte intégralThèses sur le sujet "Fragmentation (informatique)"
Ranéa, Pierre-Guy. « La tolérance aux intrusions par fragmentation-dissémination ». Toulouse, INPT, 1989. http://www.theses.fr/1989INPT007H.
Texte intégralKapusta, Katarzyna. « Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment ». Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.
Texte intégralThis thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and cost-efficient. The main focus is put on increasing data confidentiality without deteriorating the processing performance. The ultimate goal is to provide a user with a set of fast fragmentation methods that could be directly applied inside an industrial context to reinforce the confidentiality of the stored data and/or accelerate the fragmentation processing. First, a rich survey on fragmentation as a way of preserving data confidentiality is presented. Second, the family of all-or-nothing transforms is extended with three new proposals. They all aim at protecting encrypted and fragmented data against the exposure of the encryption key but are designed to be employed in three different contexts: for data fragmentation in a multi-cloud environment, a distributed storage system, and an environment composed of one storage provider and one private device. Third, a way of accelerating fragmentation is presented that achieves better performance than data encryption using the most common symmetric-key encryption algorithm. Fourth, a lightweight fragmentation scheme based on data encoding, permuting, and dispersing is introduced. It totally gets rid of data encryption allowing the fragmentation to be performed even faster; up to twice as fast as data encryption. Finally, fragmentation inside sensor networks is revisited, particularly in the Unattended Wireless Sensor Networks. The main focus in this case is put not solely on the fragmentation performance, but also on the reduction of storage and transmission costs by using data aggregation
Trouessin, Gilles. « Traitements fiables de données confidentielles par fragmentation-redondance-dissémination ». Toulouse 3, 1991. http://www.theses.fr/1991TOU30260.
Texte intégralLin, Ping. « Commande adaptative et régulation automatique d'une unité de broyage du cru en cimenterie ». Lyon, INSA, 1992. http://www.theses.fr/1992ISAL0003.
Texte intégralIn cement manufactory, the raw material blending process, between prehomogeneization silo and clinker kiln, is a multivariable system (several raw materials in use) and coupled with considerable time delay due toX-ray fluorescence analyser. The main goal of blending control is to maintain close to the standard value and to decrease the variance of chemical composition (in terms of composition moduli) of the raw meal by using correcting products. The proposed control strategy consists of four parts: (1) a multivariable predictive control system based on an internai madel; (2) an adaptive control due to on-line estimation for chemical composition of the raw materials; (3) an optimization unit to minimize a qualitycost cri teri on; ( 4) a self-adjustment function of reference values for the special batch process. In order to improve the control performance, an heuristic adaptive supervision is developped to adjust the regulator parameters in lower level. The proposed control policy bas been applied to cement plants of Lafarge Coppée
Minier, Josselin. « Fragmentation cognitive/informatique de la musique populaire amplifiée : construction d'un système numérique dirigé par une notion de simulacre cinétique ». Paris 1, 2011. http://www.theses.fr/2011PA010678.
Texte intégralNicolas, Jean-Christophe. « Machines bases de données parallèles : contribution aux problèmes de la fragmentation et de la distribution ». Lille 1, 1991. http://www.theses.fr/1991LIL10025.
Texte intégralQiu, Han. « Une architecture de protection des données efficace basée sur la fragmentation et le cryptage ». Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Texte intégralIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Cherrueau, Ronan-Alexandre. « Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage ». Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Texte intégralA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Lecler, Philippe. « Une approche de la programmation des systèmes distribués fondée sur la fragmentation des données et des calculs et sa mise en oeuvre dans le système GOTHIC ». Rennes 1, 1989. http://www.theses.fr/1989REN10103.
Texte intégralBenkrid, Soumia. « Le déploiement, une phase à part entière dans le cycle de vie des entrepôts de données : application aux plateformes parallèles ». Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2014. http://www.theses.fr/2014ESMA0027/document.
Texte intégralDesigning a parallel data warehouse consists of choosing the hardware architecture, fragmenting the data warehouse schema, allocating the generated fragments, replicating fragments to ensure high system performance and defining the treatment strategy and load balancing.The major drawback of this design cycle is its ignorance of the interdependence between subproblems related to the design of PDW and the use of heterogeneous metrics to achieve thesame goal. Our first proposal defines an analytical cost model for parallel processing of OLAP queries in a cluster environment. Our second takes into account the interdependence existing between fragmentation and allocation. In this context, we proposed a new approach to designa PDW on a cluster machine. During the fragmentation process, our approach determines whether the fragmentation pattern generated is relevant to the allocation process or not. The results are very encouraging and validation is done on Teradata. For our third proposition, we presented a design method which is an extension of our work. In this phase, an original method of replication, based on fuzzy logic is integrated
Livres sur le sujet "Fragmentation (informatique)"
Cyber Security Politics : Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Trouver le texte intégralCavelty, Myriam Dunn, et Andreas Wenger. Cyber Security Politics : Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Trouver le texte intégralConvergence and Fragmentation : Media Technology and the Information Society (IB-Changing Media, Changing Europe). Intellect Ltd, 2008.
Trouver le texte intégralAbril, Gonzalo. Cortar Y Pegar/ Cut and Paste : La Fragmentacion Visual En Los Origenes Del Texto Informativo / The Visual Fragmentation in the Origins of Informative Text (Signo E Imagen / Sign and Image). Catedra, 2003.
Trouver le texte intégralChapitres de livres sur le sujet "Fragmentation (informatique)"
van Veelen, P. A., U. R. Tjaden, J. van der Greef, H. J. Vorst et M. W. E. M. van Tilborg. « Sequence Informative Fragmentation in 252Cf Plasma Desorption Mass Spectrometry ». Dans NATO ASI Series, 67–72. Boston, MA : Springer US, 1991. http://dx.doi.org/10.1007/978-1-4684-7926-3_9.
Texte intégralMohanty, Srutisudha, Jagabandhu Panda et Sudhansu S. Rath. « Geospatial Technology in Urban Sprawl Assessment ». Dans Methods and Applications of Geospatial Technology in Sustainable Urbanism, 1–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2249-3.ch001.
Texte intégralNetherton, Jason. « Postscript ». Dans Advances in Social Networking and Online Communities, 395–400. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5206-4.ch023.
Texte intégralBrian Langerhans, R., et Elizabeth M. A. Kern. « Urbanization and Evolution in Aquatic Environments ». Dans Urban Evolutionary Biology, 157–74. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198836841.003.0011.
Texte intégral