Rozprawy doktorskie na temat „Architecture sur mesure”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 22 najlepszych rozpraw doktorskich naukowych na temat „Architecture sur mesure”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Cheikho, Karim. "Conception de structures souples élastiques et applications en biomécanique". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0147.
Pełny tekst źródłaThe selection of the most-suitable porous bone scaffold for regenerative medicine applied to a given clinical application is challenging, which has motivated numerous studies especially for the repair of bone defects. Several designs have been proposed over the last decade, including structures with pore size gradients that have been proved to facilitate nutrient transport from the periphery to the core of the scaffold, and therefore to enhance tissue regeneration. The framework used to design such porous scaffolds with pore size gradients is limited by the range of the reachable pore distribution and mechanical properties.In this work, we presented a design framework to generate various three-dimensional porous scaffolds structures including cylindrical graded scaffolds from the transformations of unit cells. We proposed a methodology to generate porous scaffolds by multilayer repetition of circular cross sections, resulting in tunable anisotropy depending on the intended clinical application. We identified the apparent mechanical properties of different porous scaffold configurations using an original numerical method, highlighting the versatility of the design procedure that allows for separate tuning of longitudinal and transverse mechanical properties of porous scaffold.In order to investigate the ability of common additive manufacturing techniques to fabricate the proposed structures, we have elaborated scaffolds using FDM (fused deposition modeling) and SLA (stereolithography) techniques, we have performed experimental mechanical tests to be confronted to the predictions issued from simulations. In spite of the geometrical differences observed between the initial design and the obtained structures, the apparent properties of the structures obtained by the SLA technique agree with those predicted by the proposed computational method.Promising perspectives have been proposed concerning the design of self-fitting scaffolds that can be used for clinical applications, particularly to repair bone defects using mini-invasive surgery
Sebag, Deborah. "Recherches sur l'architecture en Palestine au Bronze ancien". Phd thesis, Université Panthéon-Sorbonne - Paris I, 2011. http://tel.archives-ouvertes.fr/tel-00781529.
Pełny tekst źródłaPlouviez, Geoffrey. "Etude, spécification, vérification formelle de mécanismes de virtualisation sécurisés pour architecture many-cores". Paris 6, 2012. http://www.theses.fr/2012PA066045.
Pełny tekst źródłaThis thesis presents a co-hosting approach of multiple software stacks within a same multiprocessor system-on-chip. In the field of general purpose multiprocessors, the cores number is continuously increasing and so is the computation capability. But, from the trust side, this growing computer complexity deepens trust issues. This lack of trustworthiness is exacerbated by the increasing information’s value processed by computer systems. Usual isolation techniques, at both user’s or kernel’s levels, do not offer enough protection for the confidentiality, integrity and availability of the running software stacks. In this thesis, we present a trusted many-cores virtualization approach which aims to execute software stacks in trusted virtual machines. Our goal is to provide enough isolation so a malicious virtual machine user will not be able to compromise another virtual machine. We have built hardware protection mechanisms which are under the control of a software formally verified hypervisor
Senat, Claude. "Prise en compte de l'encombrement, au sein d'un modèle de prévision des niveaux de pression, reposant sur l'hypothèse de réflexion diffuse sur les parois". Toulouse 3, 1992. http://www.theses.fr/1992TOU30056.
Pełny tekst źródłaBorrel, Nicolas. "Evaluation d'injection de fautes Laser et conception de contre-mesures sur une architecture à faible consommation". Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4358.
Pełny tekst źródłaIn many applications such as credit cards, confidential data is used. In this regard, the systems-on-chip used in these applications are often deliberately attacked. This puts the security of our data at a high risk. Furthermore, many SoC devices have become battery-powered and require very low power consumption. In this context, semiconductor manufacturers should propose secured and low-power solutions.This thesis presents a security evaluation and a countermeasures design for a low-power, triple-well architecture dedicated to low-power applications. The security context of this research focuses on a Laser sensitivity evaluation of this architecture.This paper first presents the state of the art of Laser fault injection techniques, focusing on the physical effects induced by a Laser beam. Afterward, we discuss the different dual-and triple-well architectures studied in order to compare their security robustness. Then, a physical study of these architectures as substrate resistor and capacitor modeling highlights their impact on security. This evaluation lets us anticipate the phenomena potentially induced by the Laser inside the biasing well (P-well, N-well) and the MOS transistors.Following the analysis of the physical phenomena resulting from the interaction between the laser and the silicon, electrical modeling of the CMOS gates was developed for dual and triple-well architectures. This enabled us to obtain a good correlation between measurements and electrical simulations.In conclusion, this work enabled us to determine possible design rules for increasing the security robustness of CMOS gates as well as the development of Laser sensors able to detect an attack
Hentati, Raïda. "Implémentation d'algorithmes de reconnaissance biométrique par l'iris sur des architectures dédiées". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917955.
Pełny tekst źródłaRiquet, Damien. "DISCUS : une architecture de détection d'intrusions réseau distribuée basée sur un langage dédié". Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10207/document.
Pełny tekst źródłaNowadays, information systems are everywhere and their interconnexion is almost complete. The rise of complex and large computing infrastructures has brought a need for increased security. We need to follow a sound methodology so that one can understand an exploit develop a counter-measure and deploy it as soon as possible. To tackle those issues, we propose DISCUS, a new distributed architecture that takes advantage of existing solutions as well as distributed probes. This approach leads to finer, collaborative analysis where each probe enrich the global knowledge of the architecture as a whole. Our solution introduces two main issues : determine efficient distribution mechanism to implement collaboration and facilitate the developpement of the software that will run on highly heterogeneous hardware. This thesis mainly focuses on the later. The actual development of the software that will run on the probes can not be made by a security special or a system administrator because of the diversity of the probes (in term of memory, computing power, network location…). This would imply that the developer has strong knowledge on security, networking, kernel development, embeded systems, hardware development. Such a developer is hard to find. To overcome this problem, we propose DISCUS, a domain specific language. With this langage, one can implement security rules without the need to take implementation details into account. Our compiler chain takes the rules and is able to build software, or hardware, image specific for each probes of the network. This thesis presents this language, some case studies and its evaluation in term of expressivity, robustness and performances
Kortebi, Abdesselem. "Evaluation d' une architecture IP orientée flot". Paris 6, 2005. http://www.theses.fr/2005PA066517.
Pełny tekst źródłaDévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore". Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066138.
Pełny tekst źródłaManycore architectures, which comprise a lot of cores, are a way to answer the always growing demand for digital data processing, especially in a context of cloud computing infrastructures. These data, which can belong to companies as well as private individuals, are sensitive by nature, and this is why the isolation problematic is primordial. Yet, since the beginning of cloud computing, virtualization techniques are more and more used to allow different users to physically share the same hardware resources. This is all the more true for manycore architectures, and it partially comes down to the architectures to guarantee that data integrity and confidentiality are preserved for the software it executes. We propose in this thesis a secured virtualization environment for a manycore architecture. Our mechanism relies on hardware components and a hypervisor software to isolate several operating systems running on the same architecture. The hypervisor is in charge of allocating resources for the virtualized operating systems, but does not have the right to access the resources allocated to these systems. Thus, a security flaw in the hypervisor does not imperil data confidentiality and integrity of the virtualized systems. Our solution is evaluated on a cycle-accurate virtual prototype and has been implemented in a coherent shared memory manycore architecture. Our evaluations target the hardware and performance overheads added by our mechanisms. Finally, we analyze the security provided by our solution
Dévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore". Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066138/document.
Pełny tekst źródłaManycore architectures, which comprise a lot of cores, are a way to answer the always growing demand for digital data processing, especially in a context of cloud computing infrastructures. These data, which can belong to companies as well as private individuals, are sensitive by nature, and this is why the isolation problematic is primordial. Yet, since the beginning of cloud computing, virtualization techniques are more and more used to allow different users to physically share the same hardware resources. This is all the more true for manycore architectures, and it partially comes down to the architectures to guarantee that data integrity and confidentiality are preserved for the software it executes. We propose in this thesis a secured virtualization environment for a manycore architecture. Our mechanism relies on hardware components and a hypervisor software to isolate several operating systems running on the same architecture. The hypervisor is in charge of allocating resources for the virtualized operating systems, but does not have the right to access the resources allocated to these systems. Thus, a security flaw in the hypervisor does not imperil data confidentiality and integrity of the virtualized systems. Our solution is evaluated on a cycle-accurate virtual prototype and has been implemented in a coherent shared memory manycore architecture. Our evaluations target the hardware and performance overheads added by our mechanisms. Finally, we analyze the security provided by our solution
Otshudi, Loma. "Développement d'une approche méthodologique simplifiée basée sur le formalisme d'autocorrélation pour la caractérisation temporelle en acoustique des salles". Toulouse 3, 1989. http://www.theses.fr/1989TOU30195.
Pełny tekst źródłaDedu, Eugen. "Conception d'un modèle de simulation de systèmes multi-agent, et de son algorithmique et implantation parallèle sur architectures MIMD à mémoire partagée : modèle ParSSAP". Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2002. http://tel.archives-ouvertes.fr/tel-00071184.
Pełny tekst źródłaActuellement, il y a un manque de simulateurs parallèles efficaces pour ces systèmes, qui seraient très utiles, compte tenu des temps d'exécution pour des simulations à grande échelle. Dans ce contexte, notre apport se divise en trois parties : (1)~fournir un modèle de simulation de SMAs à grande échelle, appelé ParSSAP, (2)~faire un travail d'algorithmique parallèle dans les SMAs et (3)~fournir une implantation de ce modèle sous la forme d'une bibliothèque parallèle.
Dans cette thèse nous commençons par introduire les SMAs, les problèmes de parallélisation qu'ils posent et l'état de l'art dans la simulation des SMAs. Nous présentons ensuite nos travaux et apports : le modèle de simulation que nous avons conçu, l'algorithmique parallèle utilisée dans deux percepts d'agents fournis dans notre bibliothèque (calcul des champs de visibilité et propagation des champs de potentiel), la documentation sur notre bibliothèque et quelques applications avec leurs performances à l'exécution. Finalement, nous présentons le bilan, positif, de nos travaux.
Notre modèle et son implantation parallèle sont destinés à une utilisation facile et à des exécutions efficaces. Ils peuvent encore être enrichis, néanmoins notre bibliothèque permet déjà de construire rapidement des applications efficaces à l'exécution sur des machines parallèles modernes.
Faour, Ahmad. "Une architecture semi-supervisée et adaptative pour le filtrage d'alarmes dans les systèmes de détection d'intrusions sur les réseaux". Phd thesis, INSA de Rouen, 2007. http://tel.archives-ouvertes.fr/tel-00917605.
Pełny tekst źródłaFofana, Nezo Ibrahim. "Contribution aux architectures protocolaires pour un système de localisation dans un réseau de capteurs sans fil basé sur une couche physique 802.15.4a UWB". Thesis, Toulouse 2, 2017. http://www.theses.fr/2017TOU20049/document.
Pełny tekst źródłaIn recent years, Wireless Sensor Networks has gained an important interest in all fields of activity. One of the expected information is the sensor nodes localization; However, due to the sensors constraints in terms of memory and energy, it is not possible to equip the sensor with specific equipment dedicated to the localization as the GPS receiver. Thus, locating the sensor by using the communication signal is an interesting option. In contrast to Range-Free techniques which use assumptions of network connectivity, the Range-Based techniques are known to reach good localization accuracy and, in our case, they are based on the measurement of the time of flight of the radio signal UWB. Our contributions focus on the choice of an efficient physical layer, on the implementation of tools that promote a good temporal accuracy in radio exchanges, and the development of an original distance evaluation protocol. Research works presented in this manuscript aim to address the global general problem of indoor localization in wireless sensor networks, and particularly the ranging functionality which is the distance evaluation mechanism between nodes. At first we implemented and evaluated the well-known protocols encountered in the literature. Then, we identify and correct errors that may bias the Time of flight metric. We propose the 2M-TWR protocol (2 Messages - Two Way Ranging) as an improvement to the TWR reference protocol. Finally, we propose and implement the BB-TWR (Beacon Based-TWR) protocol, which is able to perform ranging, sequentially and non-sequentially, by including the necessary time information in any existing broadcast native traffic. The proofs of concept were prototyped and evaluated on a real testbed
Pham, Thi-Tuyet-Loan. "Optimisation et conception des réseaux sécurisés : une approche basée sur la décomposition de Benders". Compiègne, 2004. http://www.theses.fr/2004COMP1495.
Pełny tekst źródłaThis thesis aims to study the capacitated survivable network design problem and to propose efficient methods to solve it optimally. Our task consists in determining simultaneously the topology, the dimensioning and the routing of the network, while satisfying a set of traffic demands even in some failure cases (i. E. Simple failure of arc, of node or multiple-arc failure), and respecting a given restoration strategy (link, global, end to end with or without recovery of the released capacities) and the nature of the equipment capacities (continuous or modular). AIl this leads to a series of difficult problems. They combine combinatorial problems such as the choice of the arcs and their dimensioning, and multiflow problems such as routing or rerouting. The introduction of survivability constraints further increases the difficulty, especially due to the big size of the problem induced by the management of a large number of failure states and their interactions with the nominal routing
Karray, Achraf. "Conception, mise en œuvre et validation d’un environnement logiciel pour le calcul sécurisé sur une grille de cartes à puce de type Java". Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13724/document.
Pełny tekst źródłaAbstract
Alata, Eric. "Observation, caractérisation et modélisation de processus d'attaques sur Internet". Phd thesis, INSA de Toulouse, 2007. http://tel.archives-ouvertes.fr/tel-00280126.
Pełny tekst źródłaRaybaud, Blaise. "Evaluation de l’impact des propriétés optiques large-bande de l’environnement sur le productible (énergie incidente) en milieu urbain". Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI126.
Pełny tekst źródłaThe performance of a photovoltaic module is conditioned by the environment in which it is installed. Indeed, the amount of solar energy converted into electricity depends on the incident irradiance on the module. Progress in the integration of photovoltaic modules on buildings and the reduction of their costs leads us to consider the solar potential in urban environments, both on roofs and facades. In an urban environment, the density of buildings limits solar gain on the facade by the presence of masks. Public institutes encourages an increase in the local production of renewable energies. It is therefore necessary to acquire digital tools to accurately assess the solar potential in cities, and thus evaluate the profitability of photovoltaic installations. In particular, it is necessary to evaluate the solar contributions resulting from reflections on the various surfaces that make up the urban scene. Visual integration issues, raising the question of colours and incident spectra on surfaces in different wavelength ranges must also be considered. Finally, these tools must also make it possible to assess the impact of photovoltaic integration in an urban environment in order to avoid reinforcing heat island phenomena. The PhD work is therefore focused on methods for simulating sunshine in an urban environment, through the development of two modelling strategies (radiosity and ray throwing). The simulation models are compared under the hypotheses of equivalent optical reflections, allowing a validation of the hypotheses used in each of the methods. At the same time, a qualification of the optical properties of typical materials from the urban environment allows the construction of optical reflection models based on Bidirectional Reflectivity Distributions Functions (BRDF). These models are integrated into the irradiance models. Therefore, it possible to evaluate the ratio of energy resulting from the different reflection modes. In addition, irradiance measurements are carried out in an external environment. A test bench is designed to measure the irradiances perceived on the facade and on the ground. Different configurations are tested using this mock-up. The measurements obtained are then compared with the numerical results under real conditions, enabling the models to be validated
Embe, Jiague Michel. "Approches formelles de mise en oeuvre de politiques de contrôle d'accès pour des applications basées sur une architecture orientée services". Thèse, Université de Sherbrooke, 2012. http://hdl.handle.net/11143/6683.
Pełny tekst źródłaMeseke, Maurice [Verfasser]. "The role of dendritic architecture of an identified insect motoneuron on behavioral performance : Sub-dendritic synapse targeting and postembryonic dendritic geometry remodeling of an identified neuron subserve its changing behavioral role / Maurice Meseke". Berlin : Freie Universität Berlin, 2008. http://d-nb.info/1023050978/34.
Pełny tekst źródłaRuan, Jinyu Jason. "Analyse et modélisation de l'impact des décharges électrostatiques et des agressions électromagnétiques sur les microcommutateurs". Phd thesis, Université Paul Sabatier - Toulouse III, 2010. http://tel.archives-ouvertes.fr/tel-00512333.
Pełny tekst źródłaBilolo, Augustin Abwankom. "Capacités à l'alignement stratégique des TI : élaboration d'un instrument de mesure basé sur le modèle de Ross". Mémoire, 2010. http://www.archipel.uqam.ca/3630/1/M11545.pdf.
Pełny tekst źródła