Rozprawy doktorskie na temat „Computing and Communication Sciences”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Computing and Communication Sciences.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Computing and Communication Sciences”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Varvarigos, Emmanouel A. "Static and dynamic communication in parallel computing". Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/12868.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1992.
Includes bibliographical references (p. 186-191).
by Emmanouel A. Varvarigos.
Ph.D.
Style APA, Harvard, Vancouver, ISO itp.
2

Barrett, Brian W. "One-sided communication for high performance computing applications". [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3354909.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--Indiana University, Dept. of Computer Science, 2009.
Title from PDF t.p. (viewed on Feb. 4, 2010). Source: Dissertation Abstracts International, Volume: 70-04, Section: B, page: 2379. Adviser: Andrew Lumsdaine.
Style APA, Harvard, Vancouver, ISO itp.
3

Leon, Orlando (Orlando Wing) 1979. "An extensible communication-oriented routing environment for pervasive computing". Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/16848.

Pełny tekst źródła
Streszczenie:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (p. 59-60).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
The realm of pervasive computing is expanding at a fast pace, and the need for more generalized protocols and systems is in high demand. Bluetooth is a technology with great potential, but it runs over specific protocols standardized only for other Bluetooth devices. This limits connectivity and control of these devices. CORE, the communication-oriented routing environment, is a generalized message-based routing and inter-connect system that provides an implementation and framework for platform-independent, device-independent services and applications over TCP/IP. More importantly, CORE exposes a routing mechanism that allows extensions and abstractions through levels of indirection. Our implementation of CORE allows us to design an extension that will allow Bluetooth and non- Bluetooth devices to communicate, use, and control Bluetooth devices through CORE.
by Orlando Leon.
M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
4

Delwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /". ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Cayci, Semih. "Online Learning for Optimal Control of Communication and Computing Systems". The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1595516470389826.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Fourie, Jean Francois. "Reducing communication in distributed model checking". Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2176.

Pełny tekst źródła
Streszczenie:
Thesis (Msc (Mathematical Sciences. Computer Science))--University of Stellenbosch, 2009.
ENGLISH ABSTRACT: Model checkers are programs that automatically verify, without human assistance, that certain user-specified properties hold in concurrent software systems. Since these programs often have expensive time and memory requirements, an active area of research is the development of distributed model checkers that run on clusters. Of particular interest is how the communication between the machines can be reduced to speed up their running time. In this thesis the design decisions involved in an on-the-fly distributed model checker are identified and discussed. Furthermore, the implementation of such a program is described. The central idea behind the algorithm is the generation and distribution of data throughout the nodes of the cluster. We introduce several techniques to reduce the communication among the nodes, and study their effectiveness by means of a set of models.
AFRIKAANSE OPSOMMING: Modeltoetsers is programme wat outomaties bevestig, sonder enige hulp van die gebruiker, dat gelopende sagteware aan sekere gespesifiseerde eienskappe voldoen. Die feit dat hierdie programme dikwels lang looptye en groot geheues benodig, het daartoe aanleiding gegee dat modeltoetsers wat verspreid oor ’n groep rekenaars hardloop, aktief nagevors word. Dit is veral belangrik om vas te stel hoe die kommunikasie tussen rekenaars verminder kan word om sodoende die looptyd te verkort. Hierdie tesis identifiseer en bespreek die ontwerpsbesluite betrokke in die ontwikkeling van ’n verspreide modeltoetser. Verder word die implementasie van so ’n program beskryf. Die kernidee is die generasie en verspreiding van data na al die rekenaars in die groep wat aan die probleem werk. Ons stel verskeie tegnieke voor om die kommunikasie tussen die rekenaar te verminder en bestudeer die effektiwiteit van hierdie tegnieke aan die hand van ’n lys modelle.
Style APA, Harvard, Vancouver, ISO itp.
7

Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.

Pełny tekst źródła
Streszczenie:
Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.
Style APA, Harvard, Vancouver, ISO itp.
8

Li, Xinfeng. "Time-sensitive Information Communication, Sensing, and Computing in Cyber-Physical Systems". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397731767.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ashwell, Douglas James. "Reflecting diversity or selecting viewpoints : an analysis of the GM debate in New Zealand's media 1998-2002 : a thesis presented in partial fulfilment of the requirements for the degree of PhD in Communication at Massey University, Palmerston North, New Zealand". Massey University, 2009. http://hdl.handle.net/10179/1200.

Pełny tekst źródła
Streszczenie:
The advent of genetically modified (GM) food in New Zealand in 1998 saw the beginning of a highly politicised debate about GM use in the country. The concern over GM and the political situation after the 1999 general election saw the Government establish a Royal Commission of Inquiry on Genetic Modification in May, 2000. The Royal Commission and strong public opposition to GM, evident in large public protests and other actions, made the issue highly newsworthy. The aim of this study was to explore how newspapers reported the GM debate, in particular, examining whether the reportage facilitated greater public debate and awareness about GM through journalists adhering to the ideals of the theory of social responsibility and enacting their watchdog role as encapsulated in the Fourth Estate tradition of the media. To achieve these aims the overall tone of the reportage and also which news source types and themes were most frequently reported were examined. In addition, the relationship and perceptions of scientists and journalists involved in the reporting were explored to examine how these relationships may have influenced the reportage. Content analysis showed the reportage had a pro-GM bias with policy-makers, scientists and industry spokespeople the most frequently cited news sources. The themes of Science, Economics and Politics dominated the reportage. Other source types and themes were less represented, especially themes dealing with ethical and environmental arguments. This lack of representation occurred despite the Royal Commission offering a space for all interested parties to speak. The interviews illustrated that scientists believed the quality of newspaper coverage of GM lacked depth and that important issues were unreported. Journalists found the issue complex to report and said they took care not to oversimplify the science and issues surrounding GM. The relationship between scientists and journalists indicated particular tensions existing between the two groups. The thesis concludes that if robust public debate is to occur within New Zealand regarding GM and other scientific developments, then the media should reflect a greater diversity of opinion by citing other potential news sources offering alternative arguments based on, for example, ethical or environmental grounds.
Style APA, Harvard, Vancouver, ISO itp.
10

Mullins, Taariq. "Participatory Cloud Computing: The Community Cloud Management Protocol". Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000999/.

Pełny tekst źródła
Streszczenie:
This thesis work takes an investigative approach into developing a middleware solution for managing services in a community cloud computing infrastructure predominantly made of interconnected low power wireless devices. The thesis extends itself slightly outside of this acute framing to ensure heterogeneity is accounted for. The developed framework, in its draft implementation, provides networks with value added functionality in a way which minimally impacts nodes on the network. Two sub-protocols are developed and successfully implemented in order to achieve efficient discovery and allocation of the community cloud resources. First results are promising as the systems developed show both low resource consumption in its application, but also the ability to effectively transfer services through the network while evenly distributing load amongst computing resources on the network.
Style APA, Harvard, Vancouver, ISO itp.
11

Lloyd, G. Scott. "Accelerated Large-Scale Multiple Sequence Alignment with Reconfigurable Computing". BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/2729.

Pełny tekst źródła
Streszczenie:
Multiple Sequence Alignment (MSA) is a fundamental analysis method used in bioinformatics and many comparative genomic applications. The time to compute an optimal MSA grows exponentially with respect to the number of sequences. Consequently, producing timely results on large problems requires more efficient algorithms and the use of parallel computing resources. Reconfigurable computing hardware provides one approach to the acceleration of biological sequence alignment. Other acceleration methods typically encounter scaling problems that arise from the overhead of inter-process communication and from the lack of parallelism. Reconfigurable computing allows a greater scale of parallelism with many custom processing elements that have a low-overhead interconnect. The proposed parallel algorithms and architecture accelerate the most computationally demanding portions of MSA. An overall speedup of up to 150 has been demonstrated on a large data set when compared to a single processor. The reduced runtime for MSA allows researchers to solve the larger problems that confront biologists today.
Style APA, Harvard, Vancouver, ISO itp.
12

Subramoni, Hari. "Topology-Aware MPI Communication and Scheduling for High Performance Computing Systems". The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1374197659.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Lascano, Jorge Edison. "A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing". DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/6547.

Pełny tekst źródła
Streszczenie:
Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one protocol to the design of new ones. Design patterns can help by gathering and sharing proven and reusable solution to common, reoccurring design problems. The Application-level Communication Protocols Design Patterns language captures this knowledge about application-level protocol design, so developers can create better, more fitting protocols base on these common and well proven solutions. Another aspect of contemporary development technics is the need of distribution of software artifacts. Most of the development companies have started using Cloud Computing services to overcome this need; either public or private clouds are widely used. Future developers need to manage this technology infrastructure, software, and platform as services. These two aspects, communication protocols design and cloud computing represent an opportunity to contribute to the software development community and to the software engineering education curriculum. The Application-level Communication Protocols Design Patterns language aims to help solve communication software design. The use of cloud computing in programming assignments targets on a positive influence on improving the Analysis to Reuse skills of students of computer science careers.
Style APA, Harvard, Vancouver, ISO itp.
14

Sundaram, Madhu, i Kejvan Redjamand. "Strategy of Mobile Communication System Providers in Cloud (Implementation of cloud in telecom by Ericsson)". Thesis, Blekinge Tekniska Högskola, Sektionen för management, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2814.

Pełny tekst źródła
Streszczenie:
The telecom operators are experiencing low revenues due to reduction in voice calls and SMS in their networks mainly driven by communication services like Skype, Google talk, msn and other VOIP (voice over internet protocol) products. Instant messaging services and social networking are also taking away the operator’s customers reducing them to “dumb pipes” with the OTT (Over the Top) players like Google, Microsoft and other content providers making profits at the expense of the operator. The growth of operators’ revenue is not keeping pace with the growth of traffic in their networks creating the perception that the content providers and OTT players do not share their revenue generated using the operator’s infrastructure. The operators are therefore increasingly being reduced to act as “dumb pipes” connecting the content generated by OTT’s with the operator’s subscribers. The operator’s revenue stream in one-sided, only coming from the subscriber usually as a flat data plan. The operator’s are looking at new revenue models and the cloud computing market is a business opportunity which allows them to monetize their network resources with the possibility to earn revenue from both the subscriber and the content providers. The communication system providers who are the communication equipment vendors to the operators are indirectly affected from the shrinking operator revenue. As part of this thesis, we address how Telco’s and system vendors can differentiate in the cloud computing market against other cloud service providers and monetize the network resources which they own. We discuss the roles in the cloud value network and activities in the value chain that could be adopted and the business opportunities they could pursue. We begin by introducing the telecom operator market and the challenges faced by the industry today. The research question we are targeting is then discussed followed by the limitations of the thesis. The lecommunication industry, cloud computing technology and the relevant service delivery models are discussed. A literature review is then done to formulate our theory. Theory on strategy by Porter, Prahalad and other researchers who have contributed to the research on cloud computing are discussed. The method adopted is then proposed. Data collected is first presented and then analyzed before discussing the results of the analysis.
Style APA, Harvard, Vancouver, ISO itp.
15

Mugridge, Warwick Bruce. "Enhancements to an object-oriented programming language". Thesis, University of Auckland, 1990. http://hdl.handle.net/2292/1997.

Pełny tekst źródła
Streszczenie:
The objective of this thesis has been to explore the value and limitations of Class, an object-oriented programming language, in order to further the development of the language. The pivot for this thesis is WallBrace, a code-checking system. The development of the WallBrace system is the basis of a critique of Class, and leads to a number of language extensions being proposed. An important aim in this work has been the careful integration of these enhancements with the rest of the language, avoiding unnecessary additions. A number of functional and object-oriented extensions to the language are proposed. Discrimination functions, which may be higher-order and polymorphic, add considerable functional power. Generic classes allow for abstract data types, such as sets and lists, to be defined within the language. The forms interface proposed will greatly enhance the quality of user interfaces to Class programs. An external interface will allow Class programs to communicate with files, databases, and specialist user-interface programs, such as for plan entry.
Style APA, Harvard, Vancouver, ISO itp.
16

Sluti, Donald George. "Linking process quality with performance: an empirical study of New Zealand manufacturing plants". Thesis, University of Auckland, 1992. http://hdl.handle.net/2292/2028.

Pełny tekst źródła
Streszczenie:
This study was conducted to assess the impacts of quality on operational and business performance in manufacturing firms. Data were provided by 184 diversified New Zealand manufacturing plants- Quality is defined as the degree of conformance to specifications. The first phase of the research was the construction of a theoretical model to incorporate the impacts of quality on manufacturing performance, manufacturing productivity and business performance. The relationships of the model are based on the quality management literature. The second phase of the research was the design and administration of a survey instrument for the collection of empirical performance data. The data were then used to evaluate the relationships represented in the model. The final phase of the research used structural equations modelling in order to evaluate the relationships of the model. Quality was found to have significant and positive impacts on operational performance measures for process utilization, process output, production costs, work-in-process inventory levels and on-time delivery rate. The analysis found that change in quality level was most strongly associated with change in process utilization. The findings for the impacts of quality on operational performance were compatible with the quality management literature. The impacts of quality on business performance given by structural equations analysis were significant and positive for productivity-induced improvements of quality. Generally, the support for the impacts of quality on business performance which occur through other aspects of, operational performance was not significant. The limitations of the study were specified. The implications of the findings of the study for manufacturers were reviewed, along with the directions for future research.
Style APA, Harvard, Vancouver, ISO itp.
17

Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture". Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.

Pełny tekst źródła
Streszczenie:
A cryptographic security architecture constitutes the collection of hardware and software which protects and controls the use of encryption keys and similar cryptovariables. This thesis presents a design for a portable, flexible high-security architecture based on a traditional computer security model. Behind the API it consists of a kernel implementing a reference monitor which controls access to security-relevant objects and attributes based on a configurable security policy. Layered over the kernel are various objects which abstract core functionality such as encryption and digital signature capabilities, certificate management and secure sessions and data enveloping (email encryption). The kernel itself uses a novel design which bases its security policy on a collection of filter rules enforcing a cryptographic module-specific security policy. Since the enforcement mechanism (&e kernel) is completely independent of the policy database (the filter rules), it is possible to change the behaviour of the architecture by updating the policy database without having to make any changes to the kernel itself. This clear separation of policy and mechanism contrasts with current cryptographic security architecture approaches which, if they enforce controls at all, hardcode them into the implementation, making it difficult to either change the controls to meet application-specific requirements or to assess and verify them. To provide assurance of the correctness of the implementation, this thesis presents a design and implementation process which has been selected to allow the implementation to be verified in a manner which can reassure an outsider that it does indeed function as required. In addition to producing verification evidence which is understandable to the average user, the verification process for an implementation needs to be fully automated and capable of being taken down to the level of running code, an approach which is currently impossible with traditional methods. The approach presented here makes it possible to perform verification at this level, something which had previously been classed as "beyond Al" (that is, not achievable using any known technology). The versatility of the architecture presented here has been proven through its use in implementations ranging from l6-bit microcontrollers through to supercomputers, as well as a number of unusual areas such as security modules in ATMs and cryptographic coprocessors for general-purpose computers.
Note: Updated version of the thesis now published as Gutmann, P (2004). Cryptographic security architecture: design and verification. New York: Springer. ISBN 9780387953876.
Style APA, Harvard, Vancouver, ISO itp.
18

Chai, Lei. "High Performance and Scalable MPI Intra-node Communication Middleware for Multi-core Clusters". The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1236639834.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Shafabakhsh, Benyamin. "Research on Interprocess Communication in Microservices Architecture". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277940.

Pełny tekst źródła
Streszczenie:
With the substantial growth of cloud computing over the past decade, microservices has gained significant popularity in the industry as a new architectural pattern. It promises a cloud-native architecture that breaks large applications into a collection of small, independent, and distributed packages. Since microservices-based applications are distributed, one of the key challenges when designing an application is the choice of mechanism by which services communicate with each other. There are several approaches for implementing Interprocess communication (IPC) in microservices, and each comes with different advantages and trade-offs. While theoretical and informal comparison exists between them, this thesis has taken an experimental approach to compare and contrast common forms of IPC communications. In this the- sis, IPC methods have been categorized into Synchronous and Asynchronous categories. The Synchronous type consists of REST API and Google gRPC, while the Asynchronous type is using a message broker known as RabbitMQ. Further, a collection of microservices for an e-commerce scenario has been designed and developed using all the three IPC methods. A load test has been executed against each model to obtain quantitative data related to Performance Efficiency, and Availability of every method. Developing the same set of functionalities using different IPC methods has offered a qualitative data related to Scalability, and Complexity of each IPC model. The evaluation of the experiment indicates that, although there is no universal IPC solution that can be applied in all cases, Asynchronous IPC patterns shall be the preferred option when designing the system. Nevertheless, the findings of this work also suggest there exist scenarios where Synchronous patterns can be more suitable.
Med den kraftiga tillväxten av molntjänster under det senaste decenniet har mikrotjänster fått en betydande popularitet i branschen som ett nytt arkitektoniskt mönster. Det erbjuder en moln-baserad arkitektur som delar stora applikationer i en samling små, oberoende och distribuerade paket. Eftersom microservicebaserade applikationer distribueras och körs på olika maskiner, är en av de viktigaste utmaningarna när man utformar en applikation valet av mekanism med vilken tjänster kommunicerar med varandra. Det finns flera metoder för att implementera Interprocess-kommunikation (IPC) i mikrotjänster och var och en har olika fördelar och nackdelar. Medan det finns teoretisk och in- formell jämförelse mellan dem, har denna avhandling tagit ett experimentellt synsätt för att jämföra och kontrastera vanliga former av IPC-kommunikation. I denna avhandling har IPC-metoder kategoriserats i synkrona och asynkrona kategorier. Den synkrona typen består av REST API och Google gRPC, medan asynkron typ använder en meddelandemäklare känd som RabbitMQ. Dessutom har en samling mikroservice för ett e-handelsscenario utformats och utvecklats med alla de tre olika IPC-metoderna. Ett lasttest har utförts mot var- je modell för att erhålla kvantitativa data relaterade till prestandaeffektivitet, och tillgänglighet för varje metod. Att utveckla samma uppsättning funktionaliteter med olika IPC-metoder har erbjudit en kvalitativ data relaterad till skalbarhet och komplexitet för varje IPC-modell. Utvärderingen av experimentet indikerar att även om det inte finns någon universell IPC-lösning som kan tillämpas i alla fall, ska asynkrona IPC-mönster vara det föredragna alternativet vid utformningen av systemet. Ändå tyder resultaten från detta arbete också på att det finns scenarier där synkrona mönster är mer lämpliga.
Style APA, Harvard, Vancouver, ISO itp.
20

Sridhar, Jaidev Krishna. "Scalable Job Startup and Inter-Node Communication in Multi-Core InfiniBand Clusters". The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1243909406.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Mani, Sindhu. "Empirical Performance Analysis of High Performance Computing Benchmarks Across Variations in Cloud Computing". UNF Digital Commons, 2012. http://digitalcommons.unf.edu/etd/418.

Pełny tekst źródła
Streszczenie:
High Performance Computing (HPC) applications are data-intensive scientific software requiring significant CPU and data storage capabilities. Researchers have examined the performance of Amazon Elastic Compute Cloud (EC2) environment across several HPC benchmarks; however, an extensive HPC benchmark study and a comparison between Amazon EC2 and Windows Azure (Microsoft’s cloud computing platform), with metrics such as memory bandwidth, Input/Output (I/O) performance, and communication computational performance, are largely absent. The purpose of this study is to perform an exhaustive HPC benchmark comparison on EC2 and Windows Azure platforms. We implement existing benchmarks to evaluate and analyze performance of two public clouds spanning both IaaS and PaaS types. We use Amazon EC2 and Windows Azure as platforms for hosting HPC benchmarks with variations such as instance types, number of nodes, hardware and software. This is accomplished by running benchmarks including STREAM, IOR and NPB benchmarks on these platforms on varied number of nodes for small and medium instance types. These benchmarks measure the memory bandwidth, I/O performance, communication and computational performance. Benchmarking cloud platforms provides useful objective measures of their worthiness for HPC applications in addition to assessing their consistency and predictability in supporting them.
Style APA, Harvard, Vancouver, ISO itp.
22

Hakim, Zadok. "Factors That Contribute to The Resistance to Cloud Computing Adoption by Tech Companies vs. Non-Tech Companies". Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1034.

Pełny tekst źródła
Streszczenie:
Cloud computing (CC) may be the most significant development in recent history for businesses seeking to utilize technology. However, the adoption of CC hinges on many factors, and can have a greater positive impact on organizational performance. This study examined the different factors that contribute to the resistance to CC adoption. Anchored in The Theory of Technology-Organization-Environment (TOE), the study used a qualitative, grounded theory approach to develop a theoretical model for the acceptance of CC across firms. CC can have significant effects on efficiency and productivity for firms, but these effects will only be realized if IT usage becomes utilized globally. Thus, it was essential to understand the determinants of IT adoption, which was the goal of this research. The central research question involved understanding and examining the factors of resistance that contribute to cloud computing adoption across firms. Data was collected through semi-structured interviews with 22 chief information officers (CIOs) of various firms, including those considered technology companies (TCs) and those considered non-technology companies (NTCs). Data was analyzed using qualitative thematic analysis to determine what factors influence the adoption of CC systems and, moreover, to determine what factors create resistance to the adoption of CC in firms despite its well-documented advantages and benefits. Additionally, by examinging and focusing on the factors of resistance, the rsults of this study were generalized across a wider array of firms located in the Southeastern region of the US. A total of 12 categories were identified. These were organized into two groups. The core category being financial risks represented the probability of loss inherent in financing methods which may impair the ability to provide adequate return. The categories lack of knowledge, resistance to change, excessive cost to adopt, and cost saving fit under financial risks. Together these categories were indicators of the factors of resistance to adopt cloud computing technology. The core category security risks represented the overall perception of privacy in online environment. The categories process of research, accessing organization fit, perceived security risks, phased deployment, approval to adopt, and increase flexibility fit under security risks. Together these categories were direct indicators of the factors of resistance that contribute to the adoption of cloud computing technology by both TC and NTC. The result of this study showed that the predominant and critical factors of resistance that contribute to cloud computing adoption by TC were financial risks and security risks vs. security risks by NTC. A critical distinction between TC and NTC is that 86.4% of NTC’s participants did not care about cost, they only cared about data security. A model was subsequently developed based on the lived experiences of Chief Information Officers (CIOs) who have been faced with challenges regarding cloud acceptance, and cloud computing adoption. The theoretical model produced by this study may guide future researchers and enhance the understanding and implementation of cloud computing technologies. The results of this study will add to the body of literature and may guide companies attempting to implement cloud computing to do so more successfully.
Style APA, Harvard, Vancouver, ISO itp.
23

Nasim, Robayet. "Architectural Evolution of Intelligent Transport Systems (ITS) using Cloud Computing". Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35719.

Pełny tekst źródła
Streszczenie:
With the advent of Smart Cities, Intelligent Transport System (ITS) has become an efficient way of offering an accessible, safe, and sustainable transportation system. Utilizing advances in Information and Communication Technology (ICT), ITS can maximize the capacity of existing transportation system without building new infrastructure. However, in spite of these technical feasibilities and significant performance-cost ratios, the deployment of ITS is limited in the real world because of several challenges associated with its architectural design. This thesis studies how to design a highly flexible and deployable architecture for ITS, which can utilize the recent technologies such as - cloud computing and the publish/subscribe communication model. In particular, our aim is to offer an ITS infrastructure which provides the opportunity for transport authorities to allocate on-demand computing resources through virtualization technology, and supports a wide range of ITS applications. We propose to use an Infrastructure as a Service (IaaS) model to host large-scale ITS applications for transport authorities in the cloud, which reduces infrastructure cost, improves management flexibility and also ensures better resource utilization. Moreover, we use a publish/subscribe system as a building block for developing a low latency ITS application, which is a promising technology for designing scalable and distributed applications within the ITS domain. Although cloud-based architectures provide the flexibility of adding, removing or moving ITS services within the underlying physical infrastructure, it may be difficult to provide the required quality of service (QoS) which decrease application productivity and customer satisfaction, leading to revenue losses. Therefore, we investigate the impact of service mobility on related QoS in the cloud-based infrastructure. We investigate different strategies to improve performance of a low latency ITS application during service mobility such as utilizing multiple paths to spread network traffic, or deploying recent queue management schemes. Evaluation results from a private cloud testbed using OpenStack show that our proposed architecture is suitable for hosting ITS applications which have stringent performance requirements in terms of scalability, QoS and latency.
Baksidestext: Intelligent Transport System (ITS) can utilize advances in Information and Communication Technology (ICT) and maximize the capacity of existing transportation systems without building new infrastructure. However, in spite of these technical feasibilities and significant performance-cost ratios, the deployment of ITS is limited in the real world because of several challenges associated with its architectural design.  This thesis studies how to design an efficient deployable architecture for ITS, which can utilize the advantages of cloud computing and the publish/subscribe communication model. In particular, our aim is to offer an ITS infrastructure which provides the opportunity for transport authorities to allocate on-demand computing resources through virtualization technology, and supports a wide range of ITS applications. We propose to use an Infrastructure as a Service (IaaS) model to host large-scale ITS applications, and to use a publish/subscribe system as a building block for developing a low latency ITS application. We investigate different strategies to improve performance of an ITS application during service mobility such as utilizing multiple paths to spread network traffic, or deploying recent queue management schemes.

Artikel 4 Network Centric Performance Improvement for Live VM Migration finns i avhandlingen som manuskript. Nu publicerat konferenspaper. 

Style APA, Harvard, Vancouver, ISO itp.
24

Zhang, Jun. "Using computers to facilitate formative assessment of open-ended written assignments : a thesis presented in partial fulfillment of the requirements for the degree of Master of Science in Computer Science at Massey University, Palmerston North, New Zealand". Massey University. Institute of Information Sciences and Technology, 2005. http://hdl.handle.net/10179/245.

Pełny tekst źródła
Streszczenie:
This thesis presents an e-learning solution to facilitate formative assessment of electronically submitted open-ended written assignments.It is widely accepted that formative assessment is highly beneficial to student leaning. A number of researchers are active in developing specialized approaches and software systems for assisting formative assessment of student work. However, no comprehensive e-learning solution exists for facilitating formative assessment of students' open-ended written work. The project presented in this thesis has developed a new approach for using computers to facilitate formative assessment of electronically submitted open-ended written assignments.Based on the literature review of the education theories around formative assessment and current computer software technologies, this project has developed three principles for e-learning support for formative assessment of open-ended written assignments:1. It needs to facilitate all the activities that are potentially required for formative assessment of student assignments (for example, the creation of assessment criteria, the submission of assignments, and the analysis of the assessment results), not only the marking activity to create feedback on assignments.2. It needs to provide an onscreen marking tool which enables human markers to mark open-ended written assignments in an intuitive and efficient way by replicating their paper-based assessment approaches.3. It needs to provide a generic solution for facilitating formative assessment of open-ended written assignments from all disciplines, not a limited solution restricted to some specific domains (for example, computers science or business courses).Based on these principles, a specification of an e-learning system for facilitating formative assessment of open-ended written assignment was developed and a system was implemented accordingly. This system, called the Written Assignment Assessment (WAA) system, has been already used in the assignment marking of several courses at Massey University.
Style APA, Harvard, Vancouver, ISO itp.
25

Wu, Jiesheng. "Communication and memory management in networked storage systems". The Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=osu1095696917.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Sadat, Mohammad Nazmus. "QoE-Aware Video Communication in Emerging Network Architectures". University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin162766498933367.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Chiday, Soumya. "Developing a Kinect based Holoportation System". Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1547564945866049.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Antos, Dimitrios. "Deploying Affect-Inspired Mechanisms to Enhance Agent Decision-Making and Communication". Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10107.

Pełny tekst źródła
Streszczenie:
Computer agents are required to make appropriate decisions quickly and efficiently. As the environments in which they act become increasingly complex, efficient decision-making becomes significantly more challenging. This thesis examines the positive ways in which human emotions influence people’s ability to make good decisions in complex, uncertain contexts, and develops computational analogues of these beneficial functions, demonstrating their usefulness in agent decision-making and communication. For decision-making by a single agent in large-scale environments with stochasticity and high uncertainty, the thesis presents GRUE (Goal Re-prioritization Using Emotion), a decision-making technique that deploys emotion-inspired computational operators to dynamically re-prioritize the agent’s goals. In two complex domains, GRUE is shown to result in improved agent performance over many existing techniques. Agents working in groups benefit from communicating and sharing information that would otherwise be unobservable. The thesis defines an affective signaling mechanism, inspired by the beneficial communicative functions of human emotion, that increases coordination. In two studies, agents using the mechanism are shown to make faster and more accurate inferences than agents that do not signal, resulting in improved performance. Moreover, affective signals confer performance increases equivalent to those achieved by broadcasting agents’ entire private state information. Emotions are also useful signals in agents’ interactions with people, influencing people’s perceptions of them. A computer-human negotiation study is presented, in which virtual agents expressed emotion. Agents whose emotion expressions matched their negotiation strategy were perceived as more trustworthy, and they were more likely to be selected for future interactions. In addition, to address similar limitations in strategic environments, this thesis uses the theory of reasoning patters in complex game-theoretic settings. An algorithm is presented that speeds up equilibrium computation in certain classes of games. For Bayesian games, with and without a common prior, the thesis also discusses a novel graphical formalism that allows agents’ possibly inconsistent beliefs to be succinctly represented, and for reasoning patterns to be defined in such games. Finally, the thesis presents a technique for generating advice from a game’s reasoning patterns for human decision-makers, and demonstrates empirically that such advice helps people make better decisions in a complex game.
Engineering and Applied Sciences
Style APA, Harvard, Vancouver, ISO itp.
29

Senjov-Makohon, Natalie. "Digital immigrant teachers learning for the information age". full-text, 2009. http://eprints.vu.edu.au/2063/1/senjov_makohon.pdf.

Pełny tekst źródła
Streszczenie:
This study investigated how experienced teachers learned Information and Communication Technologies (ICT) during their professional development. With the introduction of ICT, experienced teachers encountered change becoming virtually displaced persons – digital immigrants; new settlers – endeavouring to obtain digital citizenship in order to survive in the information age. In the process, these teachers moved from learning how to push buttons, to applying software, and finally to changing their practice. They learned collectively and individually, in communities and networks, like immigrants and adult learners: by doing, experimenting and reflecting on ICT. Unfortunately, for these teachers-as-pedagogues, their focus on pedagogical theory during the action research they conducted, was not fully investigated or embraced during the year-long study. This study used a participant observation qualitative methodology to follow teachers in their university classroom. Interviews were conducted and documentation collected and verified by the teacher educator. The application of Kolb‘s, Gardner‘s, and Vygotsky‘s work allowed for the observation of these teachers within their sociocultural contexts. Kolb‘s work helped to understand their learning processes and Gardner‘s work indicated the learning abilities that these teachers valued in the new ICT environment. Meanwhile Vygotsky‘s work – and in particular three concepts, uchit, perezhivanija, and mislenija – presented a richer and more informed basis to understand immigration and change. Finally, this research proposes that teachers learn ICT through what is termed a hyperuchit model, consisting of developments; action; interaction; and reflection. The recommendation is that future teacher university ICT professional learning incorporates this hyperuchit model.
Style APA, Harvard, Vancouver, ISO itp.
30

Gibbs, S. F. "An examination of near-graduates' computer self-efficacy in light of business employers' expectations". Diss., Lincoln University, 2009. http://hdl.handle.net/10182/1448.

Pełny tekst źródła
Streszczenie:
The use of computers has become part of every day life. The high prevalence of computer use may lead employers to assume university graduates will have good computing skills. Such assumptions may be the reason that employers use broad terms to advertise the computing tasks required for graduate-level positions. This thesis investigates how well the expectations of employers match the perceptions of near-graduates about their computer skills. Four graduate-level positions were identified from advertisements placed in order to recruit graduates. The employers who placed these advertisements were surveyed by interview and questionnaire. Twenty-one students about to graduate from a university commerce programme were also interviewed and surveyed. It was found that the wording of the advertisements did not satisfactorily portray the requirements and intentions of the employers. It was also found that skills the near-graduates perceived they possessed frequently did not meet the expectations of employers. Results also show that the near-graduates did not fully understand which computing skills would be expected in the workplace. This study highlights implications for three groups: employers, graduates and educators.
Style APA, Harvard, Vancouver, ISO itp.
31

Leemaqz, Kaleb Lee. "Privacy of RFID - models and protocols". Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.
Style APA, Harvard, Vancouver, ISO itp.
32

Hashmi, Jahanzeb Maqbool. "Designing High Performance Shared-Address-Space and Adaptive Communication Middlewares for Next-Generation HPC Systems". The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1588038721555713.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Persson, Mathias. "Communication Protocol for a Cyber-Physical System : Using Bluetooth, NFC and cloud". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175159.

Pełny tekst źródła
Streszczenie:
The focus of this thesis is to utilize many of today’s current technologies to design a communication protocol that allows different devices to be incorporated into a system that can facilitate the flow of information between a user and a world of digital data. The protocol will take advantage of individual benefits from NFC, Bluetooth and cloud computing in its design to make the underlying complexity as transparent to the user as possible. Some of the main problems, such as security and reliability, are discussed and how they are incorporated into the core design of the protocol. The protocol is then applied to a case study to see how it can be utilized to create an integrity preserving system for managing medical records in a healthcare environment. The results from the case study gives merit to guidelines provided by the protocol specifications, making a system implementation based on the protocol theoretically possible. A real system implementation is required to verify the results extracted from the case study.
Denna uppsats fokuserar på att använda många av dagens teknologier för att konstruera ett kommunikationsprotokoll som möjliggör för olika enheter att inkorporeras i ett system som underlättar informationsflödet mellan en användare och en värld av digital data. Protokollet utnyttjar olika individuella fördelar hos NFC, Bluetooth and molntjänster i dess design för att göra den underliggande komplexiteten så transparant som möjligt för användaren. Några av de främsta problemen, så som säkerhet och tillförlitlighet, diskuteras och hur de inkorporeras i hjärtat av protokollet. Protokollet appliceras sedan i en fallstudie för att se hur det kan användas för att skapa ett system för sjukjournaler som bevarar integriteten hos patienter. Resultatet från fallstudien pekar mot att de riktlinjer som gavs av protokollspecifikationerna fungerar för att göra en systemimplementation på en teoretisk nivå. En verklig systemimplementation skulle behövas för att verifiera de resultat som framgår ur fallstudien.
Style APA, Harvard, Vancouver, ISO itp.
34

Mastin, Alan. "Human-Machine Interface for Tactical Air Traffic Control Communications". UNF Digital Commons, 1990. http://digitalcommons.unf.edu/etd/133.

Pełny tekst źródła
Streszczenie:
This thesis proposes the design for a prototype device that would be used by Air Traffic Controllers in the radar environment to input tactical Air Traffic Control (ATC) instructions to be sent to aircraft via the Mode S digital data link network. The purpose of the device is to reduce the time required to issue instructions and to eliminate misunderstandings that occur when instructions are issued over voice transmission frequencies. The purpose of this thesis was to develop the device in the most ergonomically suited manner based on the air traffic controller's communications requirements. Digital communications systems include both airborne and ground based components. This project was concerned with the development of the ground-based aspect of the communications system.
Style APA, Harvard, Vancouver, ISO itp.
35

Cosgrove, Stephen Richard. "Mobile data services adoption in New Zealand future predictions : a thesis submitted to the graduate faculty of Design and Creative Technologies, Auckland University of Technology, School of Computer and Information Sciences in partial fulfilment of the requirements for the degree of Master of Computing Information Systems, Auckland, New Zealand, 2007". Click here to access this resource online, 2007. http://hdl.handle.net/10292/402.

Pełny tekst źródła
Streszczenie:
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2007.
Includes bibliographical references. Also held in print (xii, 100 leaves : ill. ; 30 cm.) in the Archive at the City Campus (T 384.5 COS)
Style APA, Harvard, Vancouver, ISO itp.
36

Mohanarajah, Selvarajah. "Designing CBL systems for complex domains using problem transformation and fuzzy logic : a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at Massey University, Palmerston North, New Zealand". Massey University, 2007. http://hdl.handle.net/10179/743.

Pełny tekst źródła
Streszczenie:
Some disciplines are inherently complex and challenging to learn. This research attempts to design an instructional strategy for CBL systems to simplify learning certain complex domains. Firstly, problem transformation, a constructionist instructional technique, is used to promote active learning by encouraging students to construct more complex artefacts based on less complex ones. Scaffolding is used at the initial learning stages to alleviate the difficulty associated with complex transformation processes. The proposed instructional strategy brings various techniques together to enhance the learning experience. A functional prototype is implemented with Object-Z as the exemplar subject. Both objective and subjective evaluations using the prototype indicate that the proposed CBL system has a statistically significant impact on learning a complex domain. CBL systems include Learner models to provide adaptable support tailored to individual learners. Bayesian theory is used in general to manage uncertainty in Learner models. In this research, a fuzzy logic based locally intelligent Learner model is utilized. The fuzzy model is simple to design and implement, and easy to understand and explain, as well as efficient. Bayesian theory is used to complement the fuzzy model. Evaluation shows that the accuracy of the proposed Learner model is statistically significant. Further, opening Learner model reduces uncertainty, and the fuzzy rules are simple and resemble human reasoning processes. Therefore, it is argued that opening a fuzzy Learner model is both easy and effective. Scaffolding requires formative assessments. In this research, a confidence based multiple test marking scheme is proposed as traditional schemes are not suitable for measuring partial knowledge. Subjective evaluation confirms that the proposed schema is effective. Finally, a step-by-step methodology to transform simple UML class diagrams to Object-Z schemas is designed in order to implement problem transformation. This methodology could be extended to implement a semi-automated translation system for UML to Object Models.
Style APA, Harvard, Vancouver, ISO itp.
37

Duffin, Heidi R. "A Qualitative Method for Dynamic Transport Selection in Heterogeneous Wireless Environments". Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd546.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Preud'Homme, Thomas. "Communication inter-cœurs optimisée pour le parallélisme de flux". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2013. http://tel.archives-ouvertes.fr/tel-00931833.

Pełny tekst źródła
Streszczenie:
Parmi les différents paradigmes de programmation parallèle, le parallélisme de flux présente l'avantage de conserver la séquentialité des algorithmes et d'être ainsi applicable en présence de dépendances de données. De plus, l'extension de calcul par flux pour OpenMP proposée par Pop et Cohen permet de mettre en œuvre cette forme de parallélisme sans requérir de réécriture complète du code, en y ajoutant simplement des annotations. Cependant, en raison de l'importance de la communication nécessaire entre les cœurs de calcul, les performances obtenues en suivant ce paradigme sont très dépendantes de l'algorithme de communication utilisé. Or l'algorithme de communication utilisé dans cette extension repose sur des files gérant plusieurs producteurs et consommateurs alors que les applications mettant en œuvre le parallélisme de flux fonctionnent principalement avec des chaînes de communication linéaires. Afin d'améliorer les performances du parallélisme de flux mis en œuvre par l'extension de calcul par flux pour OpenMP, cette thèse propose d'utiliser, lorsque cela est possible, un algorithme de communication plus spécialisé nommé BatchQueue. En ne gérant que le cas particulier d'une communication avec un seul producteur et un seul consommateur, BatchQueue atteint des débits jusqu'à deux fois supérieurs à ceux des algorithmes existants. De plus, une fois intégré à l'extension de calcul par flux pour OpenMP, l'évaluation montre que BatchQueue permet d'améliorer l'accélération des applications jusqu'à un facteur 2 également. L'étude montre ainsi qu'utiliser des algorithmes de communication spécialisés plus efficaces peut avoir un impact significatif sur les performances générales des applications mettant en œuvre le parallélisme de flux.
Style APA, Harvard, Vancouver, ISO itp.
39

Rountree, Richard John. "Novel technologies for the manipulation of meshes on the CPU and GPU : a thesis presented in partial fulfilment of the requirements for the degree of Masters of Science in Computer Science at Massey University, Palmerston North, New Zealand". Massey University, 2007. http://hdl.handle.net/10179/700.

Pełny tekst źródła
Streszczenie:
This thesis relates to research and development in the field of 3D mesh data for computer graphics. A review of existing storage and manipulation techniques for mesh data is given followed by a framework for mesh editing. The proposed framework combines complex mesh editing techniques, automatic level of detail generation and mesh compression for storage. These methods work coherently due to the underlying data structure. The problem of storing and manipulating data for 3D models is a highly researched field. Models are usually represented by sparse mesh data which consists of vertex position information, the connectivity information to generate faces from those vertices, surface normal data and texture coordinate information. This sparse data is sent to the graphics hardware for rendering but must be manipulated on the CPU. The proposed framework is based upon geometry images and is designed to store and manipulate the mesh data entirely on the graphics hardware. By utilizing the highly parallel nature of current graphics hardware and new hardware features, new levels of interactivity with large meshes can be gained. Automatic level of detail rendering can be used to allow models upwards of 2 million polygons to be manipulated in real time while viewing a lower level of detail. Through the use of pixels shaders the high detail is preserved in the surface normals while geometric detail is reduced. A compression scheme is then introduced which utilizes the regular structure of the geometry image to compress the floating point data. A number of existing compression schemes are compared as well as custom bit packing. This is a TIF funded project which is partnered with Unlimited Realities, a Palmerston North software development company. The project was to design a system to create, manipulate and store 3D meshes in a compressed and easy to manipulate manner. The goal is to create the underlying technologies to allow for a 3D modelling system to become integrated into the Umajin engine, not to create a user interface/stand alone modelling program. The Umajin engine is a 3D engine created by Unlimited Realities which has a strong focus on multimedia. More information on the Umajin engine can be found at www.umajin.com. In this project we propose a method which gives the user the ability to model with the high level of detail found in packages aimed at creating offline renders but create models which are designed for real time rendering.
Style APA, Harvard, Vancouver, ISO itp.
40

Camargo, Michelle. "Modèle de communication affective pour agent conversationnel animé, basé sur des facettes de personnalité et des buts de communication "cachés"". Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00721769.

Pełny tekst źródła
Streszczenie:
Les Agents Conversationnels Animés (ACA) sont des personnages virtuels interactifs et expressifs, dont l'aspect est très souvent " humain ", exploitant différentes modalités telles que la face, le langage, les gestes, le regard ou encore la prosodie de la voix. Le but est qu'ils s'expriment en langage naturel et puissent dialoguer avec des interlocuteurs humains. Pour développer un ACA, il faut d'abord comprendre que des aspects tels que personnalité, les émotions et leur apparence sont extrêmement importants. Le travail qui est présenté dans cette thèse a pour objectif d'augmenter l'acceptabilité et la crédibilité des agents au moyen de la personnalité, considérée comme une notion centrale à l'interaction ACA-humain. On propose un modèle qui dote l'ACA de facettes de personnalité et de buts de communication " cachés " et qui module ainsi ses actions conversationnelles. Ce travail présente également une application de jeu de type "puzzle", intégrant un ACA doté de facettes de personnalité et de buts " cachés ", qui a servi de support à plusieurs expérimentations et à l'évaluation du modèle proposé.
Style APA, Harvard, Vancouver, ISO itp.
41

Dimitrov, Rossen Petkov. "Overlapping of communication and computation and early binding fundamental mechanisms for improving parallel performance on clusters of workstations /". Diss., Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-04092001-231941.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Li, Yingjie. "Information dissemination and routing in communication networks". Columbus, Ohio : Ohio State University, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1132767756.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Thompson, Errol Lindsay. "How do they understand? Practitioner perceptions of an object-oriented program : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Education (Computer Science) at Massey University, Palmerston North, New Zealand". Massey University, 2008. http://hdl.handle.net/10179/854.

Pełny tekst źródła
Streszczenie:
In the computer science community, there is considerable debate about the appropriate sequence for introducing object-oriented concepts to novice programmers. Research into novice programming has struggled to identify the critical aspects that would provide a consistently successful approach to teaching introductory object-oriented programming. Starting from the premise that the conceptions of a task determine the type of output from the task, assisting novice programmers to become aware of what the required output should be, may lay a foundation for improving learning. This study adopted a phenomenographic approach. Thirty one practitioners were interviewed about the ways in which they experience object-oriented programming and categories of description and critical aspects were identified. These critical aspects were then used to examine the spaces of learning provided in twenty introductory textbooks. The study uncovered critical aspects that related to the way that practitioners expressed their understanding of an object-oriented program and the influences on their approach to designing programs. The study of the textbooks revealed a large variability in the cover of these critical aspects.
Style APA, Harvard, Vancouver, ISO itp.
44

Ravi, Nishkam. "Bootstrapping location-aware personal computing". 2008. http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.17218.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Miliszewska, Iwona. "A Multidimensional Model for Transnational Computing Education Programs". 2006. http://eprints.vu.edu.au/579/1/Template.pdf.

Pełny tekst źródła
Streszczenie:
As transnational education is becoming firmly embedded as a part of the distance education landscape, governments and universities are calling for meaningful research on transnational education. This study involved the development and validation of a model for effective transnational education programs. The study used student experience as a key indicator of program effectiveness and, following a holistic approach, took into consideration various dimensions of the transnational education context including student, instructor, curriculum and instruction design, interaction, evaluation and assessment, technology, and program management and organisational support. This selection of dimensions, together with their attributes, formed the proposed model for transnational education programs. The model was applied for validation against three transnational computing education programs currently offered by Australian universities in Hong Kong. Two methods of data collection - a survey, and group interviews with students - were used to validate the model; data was obtained from approximately three hundred subjects. The model was evaluated in terms of the perceived importance, to the students, of the various attributes of each program dimension on program effectiveness. The results of the validation indicated that the students in all the programs participating in the evaluation were in agreement as to the factors they consider most important to the effectiveness of transnational programs. The validation of the model led to its refinement; first, the least important attributes were removed from dimensions; second, a new dimension, pre-enrolment considerations, was introduced to the model; and finally, the attributes within each of the dimensions were ordered in terms of their perceived importance.
Style APA, Harvard, Vancouver, ISO itp.
46

Miliszewska, Iwona. "A Multidimensional Model for Transnational Computing Education Programs". Thesis, 2006. https://vuir.vu.edu.au/579/.

Pełny tekst źródła
Streszczenie:
As transnational education is becoming firmly embedded as a part of the distance education landscape, governments and universities are calling for meaningful research on transnational education. This study involved the development and validation of a model for effective transnational education programs. The study used student experience as a key indicator of program effectiveness and, following a holistic approach, took into consideration various dimensions of the transnational education context including student, instructor, curriculum and instruction design, interaction, evaluation and assessment, technology, and program management and organisational support. This selection of dimensions, together with their attributes, formed the proposed model for transnational education programs. The model was applied for validation against three transnational computing education programs currently offered by Australian universities in Hong Kong. Two methods of data collection - a survey, and group interviews with students - were used to validate the model; data was obtained from approximately three hundred subjects. The model was evaluated in terms of the perceived importance, to the students, of the various attributes of each program dimension on program effectiveness. The results of the validation indicated that the students in all the programs participating in the evaluation were in agreement as to the factors they consider most important to the effectiveness of transnational programs. The validation of the model led to its refinement; first, the least important attributes were removed from dimensions; second, a new dimension, pre-enrolment considerations, was introduced to the model; and finally, the attributes within each of the dimensions were ordered in terms of their perceived importance.
Style APA, Harvard, Vancouver, ISO itp.
47

Abdul, Hamid Nor Asilah Wati. "Communication performance measurement and analysis on commodity clusters". 2008. http://hdl.handle.net/2440/48541.

Pełny tekst źródła
Streszczenie:
Cluster computers have become the dominant architecture in high-performance computing. Parallel programs on these computers are mostly written using the Message Passing Interface (MPI) standard, so the communication performance of the MPI library for a cluster is very important. This thesis investigates several different aspects of performance analysis for MPI libraries, on both distributed memory clusters and shared memory parallel computers. The performance evaluation was done using MPIBench, a new MPI benchmark program that provides some useful new functionality compared to existing MPI benchmarks. Since there has been only limited previous use of MPIBench, some initial work was done on comparing MPIBench with other MPI benchmarks, and improving its functionality, reliability, portability and ease of use. This work included a detailed comparison of results from the Pallas MPI Benchmark (PMB), SKaMPI, Mpptest, MPBench and MPIBench on both distributed memory and shared memory parallel computers, which has not previously been done. This comparison showed that the results for some MPI routines were significantly different between the different benchmarks, particularly for the shared memory machine. A comparison was done between Myrinet and Ethernet network performance on the same machine, an IBM Linux cluster with 128 dual processor nodes, using the MPICH MPI library. The analysis focused mainly on the scalability and variability of communication times for the different networks, making use of the capability of MPIBench to generate distributions of MPI communication times. The analysis provided an improved understanding of the effects of TCP retransmission timeouts on Ethernet networks. This analysis showed anomalous results for some MPI routines. Further investigation showed that this is because MPICH uses different algorithms for small and large message sizes for some collective communication routines, and the message size where this changeover occurs is fixed, based on measurements using a cluster with a single processor per node. Experiments were done to measure the performance of the different algorithms, which demonstrated that for some MPI routines the optimal changeover points were very different between Myrinet and Ethernet networks and for 1 and 2 processors per node. Significant performance improvements can be made by allowing the changeover points to be tuned rather than fixed, particularly for commodity Ethernet networks and for clusters with more than 1 process per node. MPIBench was also used to analyse the MPI performance and scalability of a large ccNUMA shared memory machine, an SGI Altix 3000 with 160 processors. The results were compared with a high-end cluster, an AlphaServer SC with Quadrics QsNet interconnect. For most MPI routines the Altix showed significantly better performance, particularly when non-buffered copy was used. MPIBench proved to be a very capable tool for analyzing MPI performance in a variety of different situations.
http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1331421
Thesis (Ph.D.) -- University of Adelaide, School of Computer Science, 2008
Style APA, Harvard, Vancouver, ISO itp.
48

Tolochko, Igor Aleksandrovich. "Channel Estimation for OFDM Systems With Transmitter Diversity". 2005. http://eprints.vu.edu.au/313/1/313contents.pdf.

Pełny tekst źródła
Streszczenie:
Orthogonal Frequency-Division Multiplexing (OFDM) is now regarded as a feasible alternative to the conventional single carrier modulation techniques for high data rate communication systems, mainly because of its inherent equalisation simplicity. Transmitter diversity can effectively combat multipath channel impairments due to the dispersive wireless channel that can cause deep fades in some subchannels. The combination of the two techniques, OFDM and transmitter diversity, can further enhance the data rates in a frequency-selective fading environment. However, this enhancement requires accurate and computationally efficient channel state information when coherent detection is involved. A good choice for high accuracy channel estimation is the linear minimum mean-squared error (LMMSE) technique, but it requires a large number of processing operations. In this thesis, a deep and thorough study is carried out, based on the mathematical analysis and simulations in MATLAB, to find new and effective channel estimation methods for OFDM in a transmit diversity environment. As a result, three novel LMMSE based channel estimation algorithms are evaluated: real time LMMSE, LMMSE by significant weight catching (SWC) and low complexity LMMSE with power delay profile approximation as uniform. The new techniques and their combinations can significantly reduce the full LMMSE processor complexity, by 50% or more, when the estimation accuracy loss remains within 1-2 dB over a wide range of channel delay spreads and signal-to-noise ratios (SNR). To further enhance the channel estimator performance, pilot symbol structures are investigated and methods for statistical parameter estimation in real time are also presented.
Style APA, Harvard, Vancouver, ISO itp.
49

Grundy, John (John Collis). "Multiple textual and graphical views for interactive software development environments". 1993. http://www.cs.auckland.ac.nz/~john-g/papers/thesis93.pdf.

Pełny tekst źródła
Streszczenie:
Diagram construction can be used to visually analyse and design a complex software system using natural, graphical representations describing high-level structure and semantics. Textual programming can specify detailed documentation and functionality not well expressed at a visual level. Integrating multiple textual and graphical views of software development allows programmers to utilise both representations as appropriate. Consistency management between these views must be automatically maintained by the development environment. MViews, a model for such software development environments, has been developed. MViews supports integrated textual and graphical views of software development with consistency management. MViews provides flexible program and view representation using a novel object dependency graph approach. Multiple views of a program may contain common information and are stored as graphs with textual or graphical renderings and editing. Change propagation between program components and views is supported using a novel update record mechanism. Different editing tools are integrated as views of a common program repository and new program representations and editors can be integrated without affecting existing views. A specification language for program and view state and manipulation semantics, and a visual specification language for view appearance and editing semantics, have been developed. An object-oriented architecture based on MViews abstractions allows environment specifications to be translated into a design for implementing environments. Environment designs are implemented by specialising a framework of object-oriented language classes based on the MViews architecture. A new language is described which provides object-oriented extensions to Prolog. An integrated software development environment for this language is discussed and the specification, design and implementation of this environment using MViews are described. MViews has also been reused to produce a graphical entity-relationship/textual relational database schema modeller, a dialogue painter with a graphical editing view and textual constraints view, and various program visualisation systems.
Style APA, Harvard, Vancouver, ISO itp.
50

Rugis, John. "Digital surface curvature". 2008. http://hdl.handle.net/2292/3105.

Pełny tekst źródła
Streszczenie:
The theoretical basis for this thesis can be found in the subject of differential geometry where both line and surface curvature is a core feature. We begin with a review of curvature basics, establish notational conventions, and contribute new results (on n-cuts) which are of importance for this thesis. A new scale invariant curvature measure is presented. Even though curvature of continuous smooth lines and surfaces is a well-defined property, when working with digital surfaces, curvature can only be estimated. We review the nature of digitized surfaces and present a number of curvature estimators, one of which (the 3-cut mean estimator) is new. We also develop an estimator for our new scale invariant curvature measure, and apply it to digital surfaces. Surface curvature maps are defined and examples are presented. A number of curvature visualization examples are provided. In practical applications, the noise present in digital surfaces usually precludes the possibility of direct curvature calculation. We address this noise problem with solutions including a new 2.5D filter. Combining techniques, we introduce a data processing pipeline designed to generate surface registration markers which can be used to identify correspondences between multiple surfaces. We present a method (projecting curvature maps) in which high resolution detail is merged with a simplified mesh model for visualization purposes. Finally, we present the results of experiments (using texture projection merging and image processing assisted physical measurement) in which we have identified, characterized, and produced visualizations of selected fine surface detail from a digitization of Michelangelo’s David statue.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii