Gotowa bibliografia na temat „Fragmentation (informatique)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Fragmentation (informatique)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Fragmentation (informatique)"
Chan, Andy Lung Jan. "Education, Experience and Translator Certification as Signaling Mechanisms". FORUM / Revue internationale d’interprétation et de traduction / International Journal of Interpretation and Translation 8, nr 1 (1.04.2010): 37–54. http://dx.doi.org/10.1075/forum.8.1.02cha.
Pełny tekst źródłaChen, Daniel, i Darrell Duffie. "Market Fragmentation". American Economic Review 111, nr 7 (1.07.2021): 2247–74. http://dx.doi.org/10.1257/aer.20200829.
Pełny tekst źródłavan Veelen, P. A., U. R. Tjaden i J. van der Greef. "Sequence-informative fragmentation in 252Cf-plasma desorption mass-spectrometry". Journal of Controlled Release 21, nr 1-3 (lipiec 1992): 201. http://dx.doi.org/10.1016/0168-3659(92)90023-k.
Pełny tekst źródłaHaselmann, K. F., B. A. Budnik, F. Kjeldsen, M. L. Nielsen, J. V. Olsen i R. A. Zubarev. "Electronic Excitation Gives Informative Fragmentation of Polypeptide Cations and Anions". European Journal of Mass Spectrometry 8, nr 2 (kwiecień 2002): 117–21. http://dx.doi.org/10.1255/ejms.479.
Pełny tekst źródłaVaidogas, Egidijus Rytas. "Bayesian Processing of Data on Bursts of Pressure Vessels". Information Technology and Control 50, nr 4 (16.12.2021): 607–26. http://dx.doi.org/10.5755/j01.itc.50.4.29690.
Pełny tekst źródłaDong, Yalun, Martina Jelocnik, Amber Gillett, Ludovica Valenza, Gabriel Conroy, Dominique Potvin i Renfu Shao. "Mitochondrial Genome Fragmentation Occurred Multiple Times Independently in Bird Lice of the Families Menoponidae and Laemobothriidae". Animals 13, nr 12 (20.06.2023): 2046. http://dx.doi.org/10.3390/ani13122046.
Pełny tekst źródłavan Veelen, P. A., U. R. Tjaden, J. van der Greef i N. D. de With. "Sequence-Informative fragmentation in an 8.9 kDa oligopeptide using plasma desorption mass spectrometry". Organic Mass Spectrometry 26, nr 4 (kwiecień 1991): 345–46. http://dx.doi.org/10.1002/oms.1210260429.
Pełny tekst źródłaZauner, Gerhild, Radoslaw P. Kozak, Richard A. Gardner, Daryl L. Fernandes, André M. Deelder i Manfred Wuhrer. "Protein O-glycosylation analysis". Biological Chemistry 393, nr 8 (1.08.2012): 687–708. http://dx.doi.org/10.1515/hsz-2012-0144.
Pełny tekst źródłaKong, Feng, Shao Sun i Yifei Wang. "Comprehensive Understanding the Disaster-Causing Mechanism, Governance Dilemma and Targeted Countermeasures of Urban Pluvial Flooding in China". Water 13, nr 13 (25.06.2021): 1762. http://dx.doi.org/10.3390/w13131762.
Pełny tekst źródłaNishikaze, Takashi. "Sensitive and Structure-Informative N-Glycosylation Analysis by MALDI-MS; Ionization, Fragmentation, and Derivatization". Mass Spectrometry 6, nr 1 (2017): A0060. http://dx.doi.org/10.5702/massspectrometry.a0060.
Pełny tekst źródłaRozprawy doktorskie na temat "Fragmentation (informatique)"
Ranéa, Pierre-Guy. "La tolérance aux intrusions par fragmentation-dissémination". Toulouse, INPT, 1989. http://www.theses.fr/1989INPT007H.
Pełny tekst źródłaKapusta, Katarzyna. "Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment". Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.
Pełny tekst źródłaThis thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and cost-efficient. The main focus is put on increasing data confidentiality without deteriorating the processing performance. The ultimate goal is to provide a user with a set of fast fragmentation methods that could be directly applied inside an industrial context to reinforce the confidentiality of the stored data and/or accelerate the fragmentation processing. First, a rich survey on fragmentation as a way of preserving data confidentiality is presented. Second, the family of all-or-nothing transforms is extended with three new proposals. They all aim at protecting encrypted and fragmented data against the exposure of the encryption key but are designed to be employed in three different contexts: for data fragmentation in a multi-cloud environment, a distributed storage system, and an environment composed of one storage provider and one private device. Third, a way of accelerating fragmentation is presented that achieves better performance than data encryption using the most common symmetric-key encryption algorithm. Fourth, a lightweight fragmentation scheme based on data encoding, permuting, and dispersing is introduced. It totally gets rid of data encryption allowing the fragmentation to be performed even faster; up to twice as fast as data encryption. Finally, fragmentation inside sensor networks is revisited, particularly in the Unattended Wireless Sensor Networks. The main focus in this case is put not solely on the fragmentation performance, but also on the reduction of storage and transmission costs by using data aggregation
Trouessin, Gilles. "Traitements fiables de données confidentielles par fragmentation-redondance-dissémination". Toulouse 3, 1991. http://www.theses.fr/1991TOU30260.
Pełny tekst źródłaLin, Ping. "Commande adaptative et régulation automatique d'une unité de broyage du cru en cimenterie". Lyon, INSA, 1992. http://www.theses.fr/1992ISAL0003.
Pełny tekst źródłaIn cement manufactory, the raw material blending process, between prehomogeneization silo and clinker kiln, is a multivariable system (several raw materials in use) and coupled with considerable time delay due toX-ray fluorescence analyser. The main goal of blending control is to maintain close to the standard value and to decrease the variance of chemical composition (in terms of composition moduli) of the raw meal by using correcting products. The proposed control strategy consists of four parts: (1) a multivariable predictive control system based on an internai madel; (2) an adaptive control due to on-line estimation for chemical composition of the raw materials; (3) an optimization unit to minimize a qualitycost cri teri on; ( 4) a self-adjustment function of reference values for the special batch process. In order to improve the control performance, an heuristic adaptive supervision is developped to adjust the regulator parameters in lower level. The proposed control policy bas been applied to cement plants of Lafarge Coppée
Minier, Josselin. "Fragmentation cognitive/informatique de la musique populaire amplifiée : construction d'un système numérique dirigé par une notion de simulacre cinétique". Paris 1, 2011. http://www.theses.fr/2011PA010678.
Pełny tekst źródłaNicolas, Jean-Christophe. "Machines bases de données parallèles : contribution aux problèmes de la fragmentation et de la distribution". Lille 1, 1991. http://www.theses.fr/1991LIL10025.
Pełny tekst źródłaQiu, Han. "Une architecture de protection des données efficace basée sur la fragmentation et le cryptage". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Pełny tekst źródłaIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage". Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Pełny tekst źródłaA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Lecler, Philippe. "Une approche de la programmation des systèmes distribués fondée sur la fragmentation des données et des calculs et sa mise en oeuvre dans le système GOTHIC". Rennes 1, 1989. http://www.theses.fr/1989REN10103.
Pełny tekst źródłaBenkrid, Soumia. "Le déploiement, une phase à part entière dans le cycle de vie des entrepôts de données : application aux plateformes parallèles". Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2014. http://www.theses.fr/2014ESMA0027/document.
Pełny tekst źródłaDesigning a parallel data warehouse consists of choosing the hardware architecture, fragmenting the data warehouse schema, allocating the generated fragments, replicating fragments to ensure high system performance and defining the treatment strategy and load balancing.The major drawback of this design cycle is its ignorance of the interdependence between subproblems related to the design of PDW and the use of heterogeneous metrics to achieve thesame goal. Our first proposal defines an analytical cost model for parallel processing of OLAP queries in a cluster environment. Our second takes into account the interdependence existing between fragmentation and allocation. In this context, we proposed a new approach to designa PDW on a cluster machine. During the fragmentation process, our approach determines whether the fragmentation pattern generated is relevant to the allocation process or not. The results are very encouraging and validation is done on Teradata. For our third proposition, we presented a design method which is an extension of our work. In this phase, an original method of replication, based on fuzzy logic is integrated
Książki na temat "Fragmentation (informatique)"
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Znajdź pełny tekst źródłaCavelty, Myriam Dunn, i Andreas Wenger. Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Taylor & Francis Group, 2022.
Znajdź pełny tekst źródłaConvergence and Fragmentation: Media Technology and the Information Society (IB-Changing Media, Changing Europe). Intellect Ltd, 2008.
Znajdź pełny tekst źródłaAbril, Gonzalo. Cortar Y Pegar/ Cut and Paste: La Fragmentacion Visual En Los Origenes Del Texto Informativo / The Visual Fragmentation in the Origins of Informative Text (Signo E Imagen / Sign and Image). Catedra, 2003.
Znajdź pełny tekst źródłaCzęści książek na temat "Fragmentation (informatique)"
van Veelen, P. A., U. R. Tjaden, J. van der Greef, H. J. Vorst i M. W. E. M. van Tilborg. "Sequence Informative Fragmentation in 252Cf Plasma Desorption Mass Spectrometry". W NATO ASI Series, 67–72. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4684-7926-3_9.
Pełny tekst źródłaMohanty, Srutisudha, Jagabandhu Panda i Sudhansu S. Rath. "Geospatial Technology in Urban Sprawl Assessment". W Methods and Applications of Geospatial Technology in Sustainable Urbanism, 1–33. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2249-3.ch001.
Pełny tekst źródłaNetherton, Jason. "Postscript". W Advances in Social Networking and Online Communities, 395–400. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5206-4.ch023.
Pełny tekst źródłaBrian Langerhans, R., i Elizabeth M. A. Kern. "Urbanization and Evolution in Aquatic Environments". W Urban Evolutionary Biology, 157–74. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198836841.003.0011.
Pełny tekst źródła