You searched for subject:(Access AND usage control)
.
Showing records 1 – 23 of
23 total matches.
No search limiters apply to these results.

University of Pretoria
1.
[No author].
An aspect-oriented approach towards enhancing
optimistic access control with usage control
.
Degree: 2010, University of Pretoria
URL: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/
► With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis…
(more)
▼ With the advent of agile programming, lightweight
software processes are being favoured over the highly formalised
approaches of the 80s and 90s, where the emphasis is on "people,
not processes". Likewise,
access control may benefit from a less
prescriptive approach and an increasing reliance on users to behave
ethically. These ideals correlate with optimistic
access controls.
However, such controls alone may not be adequate as they are
retrospective rather proactive. Optimistic
access controls may
benefit from the stricter enforcement offered by
usage control. The
latter enables finer-grained
control over the
usage of digital
objects than do traditional
access control policies and models, as
trust management concerns are also taken into consideration. This
thesis investigates the possibility of enhancing optimistic
access
controls with
usage control to ensure that users conduct themselves
in a trustworthy manner. Since this kind of approach towards
access
control has limited applicability, the present study investigates
contextualising this approach within a mixed-initiative
access
control framework. A mixed-initiative
access control framework
involves combining a minimum of two
access control models where the
request to information is mediated by a mixture of
access policy
enforcement agents. In order for this type of integration to be
successful, a software development approach was considered that
allows for the seamless augmentation of traditional
access control
with optimistic
access control enhanced with
usage control, namely
the aspect-oriented approach. The aspect-oriented paradigm can
facilitate the implementation of additional security features to
legacy systems without modifying existing code. This study
therefore evaluates the aspect-oriented approach in terms of
implementing security concerns. It is evidently difficult to
implement
access control and in dynamic environments preconfigured
access control policies may often change dramatically, depending on
the context. In unpredicted circumstances, users who are denied
access could often have prevented a catastrophe had they been
allowed
access. The costs of implementing and maintaining complex
preconfigured
access control policies sometimes far outweigh the
benefits. Optimistic controls are retrospective and allow users to
exceed their normal privileges. However, if a user accesses
information unethically, the consequences could be disastrous.
Therefore it is proposed that optimistic
access control be enhanced
with some form of
usage control, which may prevent the user from
engaging in risky behaviour. An initiative towards including
security in the earlier phases of the software life cycle is
gaining momentum, as it is much easier to design with security from
the onset than to use the penetrate-and-patch approach.
Unfortunately, incorporating security into software development
takes time and developers tend to focus more on the features of the
software application. The aspect-oriented paradigm can facilitate
the implementation of additional security…
Advisors/Committee Members: Prof J H P Eloff (advisor).
Subjects/Keywords: Aspect-oriented programming;
Usage control;
Access control;
Optimistic access control;
UCTD
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
author], [. (2010). An aspect-oriented approach towards enhancing
optimistic access control with usage control
. (Doctoral Dissertation). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07262010-142652/
Chicago Manual of Style (16th Edition):
author], [No. “An aspect-oriented approach towards enhancing
optimistic access control with usage control
.” 2010. Doctoral Dissertation, University of Pretoria. Accessed January 25, 2021.
http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.
MLA Handbook (7th Edition):
author], [No. “An aspect-oriented approach towards enhancing
optimistic access control with usage control
.” 2010. Web. 25 Jan 2021.
Vancouver:
author] [. An aspect-oriented approach towards enhancing
optimistic access control with usage control
. [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2021 Jan 25].
Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/.
Council of Science Editors:
author] [. An aspect-oriented approach towards enhancing
optimistic access control with usage control
. [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://upetd.up.ac.za/thesis/available/etd-07262010-142652/

University of Pretoria
2.
Padayachee, Keshnee.
An
aspect-oriented approach towards enhancing optimistic access
control with usage control.
Degree: Computer Science, 2010, University of Pretoria
URL: http://hdl.handle.net/2263/26683
► With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis…
(more)
▼ With the advent of agile programming, lightweight
software processes are being favoured over the highly formalised
approaches of the 80s and 90s, where the emphasis is on "people,
not processes". Likewise,
access control may benefit from a less
prescriptive approach and an increasing reliance on users to behave
ethically. These ideals correlate with optimistic
access controls.
However, such controls alone may not be adequate as they are
retrospective rather proactive. Optimistic
access controls may
benefit from the stricter enforcement offered by
usage control. The
latter enables finer-grained
control over the
usage of digital
objects than do traditional
access control policies and models, as
trust management concerns are also taken into consideration. This
thesis investigates the possibility of enhancing optimistic
access
controls with
usage control to ensure that users conduct themselves
in a trustworthy manner. Since this kind of approach towards
access
control has limited applicability, the present study investigates
contextualising this approach within a mixed-initiative
access
control framework. A mixed-initiative
access control framework
involves combining a minimum of two
access control models where the
request to information is mediated by a mixture of
access policy
enforcement agents. In order for this type of integration to be
successful, a software development approach was considered that
allows for the seamless augmentation of traditional
access control
with optimistic
access control enhanced with
usage control, namely
the aspect-oriented approach. The aspect-oriented paradigm can
facilitate the implementation of additional security features to
legacy systems without modifying existing code. This study
therefore evaluates the aspect-oriented approach in terms of
implementing security concerns. It is evidently difficult to
implement
access control and in dynamic environments preconfigured
access control policies may often change dramatically, depending on
the context. In unpredicted circumstances, users who are denied
access could often have prevented a catastrophe had they been
allowed
access. The costs of implementing and maintaining complex
preconfigured
access control policies sometimes far outweigh the
benefits. Optimistic controls are retrospective and allow users to
exceed their normal privileges. However, if a user accesses
information unethically, the consequences could be disastrous.
Therefore it is proposed that optimistic
access control be enhanced
with some form of
usage control, which may prevent the user from
engaging in risky behaviour. An initiative towards including
security in the earlier phases of the software life cycle is
gaining momentum, as it is much easier to design with security from
the onset than to use the penetrate-and-patch approach.
Unfortunately, incorporating security into software development
takes time and developers tend to focus more on the features of the
software application. The aspect-oriented paradigm can facilitate
the implementation of additional security…
Advisors/Committee Members: Prof J H P Eloff (advisor).
Subjects/Keywords: Aspect-oriented programming; Usage
control; Access
control; Optimistic
access control;
UCTD
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Padayachee, K. (2010). An
aspect-oriented approach towards enhancing optimistic access
control with usage control. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26683
Chicago Manual of Style (16th Edition):
Padayachee, Keshnee. “An
aspect-oriented approach towards enhancing optimistic access
control with usage control.” 2010. Doctoral Dissertation, University of Pretoria. Accessed January 25, 2021.
http://hdl.handle.net/2263/26683.
MLA Handbook (7th Edition):
Padayachee, Keshnee. “An
aspect-oriented approach towards enhancing optimistic access
control with usage control.” 2010. Web. 25 Jan 2021.
Vancouver:
Padayachee K. An
aspect-oriented approach towards enhancing optimistic access
control with usage control. [Internet] [Doctoral dissertation]. University of Pretoria; 2010. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/2263/26683.
Council of Science Editors:
Padayachee K. An
aspect-oriented approach towards enhancing optimistic access
control with usage control. [Doctoral Dissertation]. University of Pretoria; 2010. Available from: http://hdl.handle.net/2263/26683
3.
Katsouraki, Athanasia.
Sharing and Usage Control of Personal Information : Partage et Contrôle d'Usage de Données Personnelles.
Degree: Docteur es, Informatique, 2016, Université Paris-Saclay (ComUE)
URL: http://www.theses.fr/2016SACLV089
► Nous vivons une véritable explosion du volume des données personnelles numériques qui sont générés dans le monde chaque jour (ex. capteurs, web, réseaux sociaux, etc.).…
(more)
▼ Nous vivons une véritable explosion du volume des données personnelles numériques qui sont générés dans le monde chaque jour (ex. capteurs, web, réseaux sociaux, etc.). En conséquence, les particuliers se sentent exposés tandis qu'ils partagent et publient leurs données. Ainsi, il est clair que des outils et des méthodes sont nécessaires pour contrôler la façon dont leurs données sont collectées, gérées et partagées. Les défis sont principalement axées sur le manque d'applications ou de solutions techniques qui assurent la gestion et le partage sécurisés de données personnelles. Le défi principal est de fournir un outil sécurisé et adaptable qui peut être utilisé par tout utilisateur, sans formation technique. Cette thèse fait trois contributions importantes dans le domaine de la protection de la vie privée : (i) Une implémentation du model UCONABC, un modèle de contrôle d'usage, appliqué à un scénario de réseau social, (ii) une extension algébrique de UCON pour contrôler des partages complexes de données (en transformant des données personnelles en données partageable et/ou publiables), et (iii) la conception, l'implémentation et le déploiement sur le terrain d'une plateforme pour la gestion de données sensibles collectées au travers de formulaires d'enquêtes.
We are recently experiencing an unprecedented explosion of available personal data from sensors, web, social networks, etc. and so people feel exposed while they share and publish their data. There is a clear need for tools and methods to control how their data is collected managed and shared. The challenges are mainly focused on the lack of either applications or technical solutions that provide security on how to collect, manage and share personal data. The main challenge is to provide a secure and adaptable tool that can be used by any user, without technical background. This thesis makes three important contributions to the field of privacy: (i) a prototype implementation of the UCONABC model, a usage control model, applied to an online social networks scenario, (ii) an algebraic extension to UCON to control the complex sharing of data (by transforming personal data into sharable and publishable data) and (iii) the design, implementation and field testing of a secure platform to manage sensitive data collected through online forms.
Advisors/Committee Members: Bouganim, Luc (thesis director), Nguyen, Benjamin (thesis director).
Subjects/Keywords: Confidentialité; Sécurité; Contrôle d'accès; Workflows; Opérateurs; Contrôle de l'utilisation; Privacy; Security; Access Control; Workflows; Operators; Usage Control; 005.8
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Katsouraki, A. (2016). Sharing and Usage Control of Personal Information : Partage et Contrôle d'Usage de Données Personnelles. (Doctoral Dissertation). Université Paris-Saclay (ComUE). Retrieved from http://www.theses.fr/2016SACLV089
Chicago Manual of Style (16th Edition):
Katsouraki, Athanasia. “Sharing and Usage Control of Personal Information : Partage et Contrôle d'Usage de Données Personnelles.” 2016. Doctoral Dissertation, Université Paris-Saclay (ComUE). Accessed January 25, 2021.
http://www.theses.fr/2016SACLV089.
MLA Handbook (7th Edition):
Katsouraki, Athanasia. “Sharing and Usage Control of Personal Information : Partage et Contrôle d'Usage de Données Personnelles.” 2016. Web. 25 Jan 2021.
Vancouver:
Katsouraki A. Sharing and Usage Control of Personal Information : Partage et Contrôle d'Usage de Données Personnelles. [Internet] [Doctoral dissertation]. Université Paris-Saclay (ComUE); 2016. [cited 2021 Jan 25].
Available from: http://www.theses.fr/2016SACLV089.
Council of Science Editors:
Katsouraki A. Sharing and Usage Control of Personal Information : Partage et Contrôle d'Usage de Données Personnelles. [Doctoral Dissertation]. Université Paris-Saclay (ComUE); 2016. Available from: http://www.theses.fr/2016SACLV089

Queensland University of Technology
4.
Salim, Farzad.
Approaches to access control under uncertainty.
Degree: 2012, Queensland University of Technology
URL: https://eprints.qut.edu.au/58408/
► The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job -…
(more)
▼ The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary.
This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis.
We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused.
Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse.
Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined.
Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.
Subjects/Keywords: information security; access control model; role based access control; usage control; insider threat; economics; game theory; agency theory; uncertainty; information asymmetry; incentives; audit; accountability; healthcare; data breach
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Salim, F. (2012). Approaches to access control under uncertainty. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/58408/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Salim, Farzad. “Approaches to access control under uncertainty.” 2012. Thesis, Queensland University of Technology. Accessed January 25, 2021.
https://eprints.qut.edu.au/58408/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Salim, Farzad. “Approaches to access control under uncertainty.” 2012. Web. 25 Jan 2021.
Vancouver:
Salim F. Approaches to access control under uncertainty. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2021 Jan 25].
Available from: https://eprints.qut.edu.au/58408/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Salim F. Approaches to access control under uncertainty. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/58408/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
5.
Grompanopoulos, Christos.
Specification and verification of an attribute-based usage control approach for open and dynamic computing environments.
Degree: 2014, Πανεπιστήμιο Μακεδονίας
URL: http://hdl.handle.net/10442/hedi/34804
► Computing systems are always evolving in order to keep pace with the requirements posed by their users. For example, widespread of networking technologies has resulted…
(more)
▼ Computing systems are always evolving in order to keep pace with the requirements posed by their users. For example, widespread of networking technologies has resulted in the transition from the standalone computer model to the client-server computer model. Moreover, social trends as frequent travelling and social networking, led to the creation of small-sized computing devices that are equipped with sensors to recognize their surrounding environment and adapt accordingly to it. Therefore, novel computing environments were emerged, as ubiquitous computing, grid - cloud computing systems and the Internet of Things. The aforementioned computing environments set new requirements in several areas, including the very important area of security. Specifically, from a computer security, and particularly from an access control point of view, the evolution of computing systems induces the creation of Open and Dynamic Computing Environments (ODCE). These environments are characterized as open since there are no boundaries between the legitimate and illegal users of a system. And they are characterized as dynamic since their configuration is constantly changing. Nevertheless, existing access control approaches are not designed for application in ODCE and thus, they cannot fully support the unique requirements posed by ODCE. Consequently, an exhaustive requirements analysis regarding access control models that are targeted to ODCE is required, which will subsequently help in the definition of proper access control approaches for application in ODCE.In this dissertation, we analyze existing access and usage control approaches to identify a number of unique requirements posed by ODCE. Secondly, we formally define an attribute based usage control model for ODCE that is designed based on the identified requirements. Last but not least, we check the proposed model for its correctness, i.e., the adherence of the model to its initially defined specifications.Specifically, we provide information on the RBAC, ABAC and UCON access/usage control models, which are mostly applicable in the examined case of ODCE. Moreover, we present information regarding the modeling of concurrent systems, as the access control systems. The aforementioned information helps in the identification of the demanded specifications in the context of access/usage control models in ODCE. Moreover, state-of-the-art verification techniques are described since it is required to check the correctness of the newly defined models in respect to their initial specifications. In turn, we highlight through representative usage scenarios the challenging issues and limitations that are introduced when attempting to utilize the UCON family of models in modern computing environments. Based on the requirement analysis results of access control in ODCE, we propose a formal specification of UseCON model using the Temporal Logic of Actions (TLA+) formal language. Consequently, we evaluate UseCON, which incorporates a number of significant features compared with existing access/usage…
Subjects/Keywords: Ασφάλεια πληροφοριών; Έλεγχος πρόσβασης; Έλεγχος χρήσης; Μοντελοποίηση; Τεχνικές επαλήθευσης; Ανοιχτά και δυναμικά υπολογιστικά περιβάλλοντα; Έλεγχος πρόσβασης βασιζόμενος σε χαρακτηριστικά; Computer security; Access control; Usage control; Modeling; Verification techniques; Open and dynamic computing environments; Attribute based access control
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Grompanopoulos, C. (2014). Specification and verification of an attribute-based usage control approach for open and dynamic computing environments. (Thesis). Πανεπιστήμιο Μακεδονίας. Retrieved from http://hdl.handle.net/10442/hedi/34804
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Grompanopoulos, Christos. “Specification and verification of an attribute-based usage control approach for open and dynamic computing environments.” 2014. Thesis, Πανεπιστήμιο Μακεδονίας. Accessed January 25, 2021.
http://hdl.handle.net/10442/hedi/34804.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Grompanopoulos, Christos. “Specification and verification of an attribute-based usage control approach for open and dynamic computing environments.” 2014. Web. 25 Jan 2021.
Vancouver:
Grompanopoulos C. Specification and verification of an attribute-based usage control approach for open and dynamic computing environments. [Internet] [Thesis]. Πανεπιστήμιο Μακεδονίας; 2014. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/10442/hedi/34804.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Grompanopoulos C. Specification and verification of an attribute-based usage control approach for open and dynamic computing environments. [Thesis]. Πανεπιστήμιο Μακεδονίας; 2014. Available from: http://hdl.handle.net/10442/hedi/34804
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Universidade Federal de Santa Maria
6.
Ricardo Tombesi Macedo.
UM MODELO DE GESTÃO PARA PREVENÇÃO DA MÁ UTILIZAÇÃO DA WEB.
Degree: 2012, Universidade Federal de Santa Maria
URL: http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=4915
► Atualmente, a utilização da Web no ambiente de trabalho tem proporcionado novos modelos de negócio, redução de custo com comunicação e agilidade nos processos empresariais.…
(more)
▼ Atualmente, a utilização da Web no ambiente de trabalho tem proporcionado novos modelos de negócio, redução de custo com comunicação e agilidade nos processos empresariais. No entanto, a adoção desse recurso por parte das empresas não trouxe apenas benefícios, uma vez que se estima que 30 a 40% dos empregados utilizam de forma indevida essa tecnologia. Dentre as atividades indevidas mais praticadas encontram-se as compras on-line, jogos de poker e acessos a sites de pornografia. Tal comportamento, além de expor a rede da organização à vírus, gera um prejuízo estimado em 54 bilhões de dólares anualmente em perdas de produtividade. Observa-se na literatura, que a abordagem preventiva mais utilizada para tratar este problema consiste no emprego de Políticas de Utilização da Internet (PUI). Tal estratégia trata-se da especificação de diretrizes por parte dos empregadores determinando como a Internet deve ser utilizada no ambiente de trabalho. Apesar de sua larga utilização, o emprego de PUI apresenta dificuldades em relação ao cumprimento das diretrizes especificadas. Para contornar as dificuldades, pesquisadores tem aplicado tais diretrizes diretamente em filtros de acesso à Internet, através de Políticas de Controle de Acesso (PCA). Ao aplicar PCAs, a granularidade é um fator determinante para potencializar a utilização da Web. Visto que, considerando níveis extremos, tanto permissividade quanto restritividade ocasionam a má utilização da Web. Neste contexto é relevante explorar PCAs baseadas em listas, perfis e atributos contextuais, sendo que as baseadas em atributos contextuais apresentaram granularidade mais fina. Entretanto, na mesma proporção que se afina a granularidade, aumenta-se o custo no processo de elaboração das políticas. Além disto, a alta dinamicidade na disponibilização de recursos na Web, com o passar do tempo, pode tornar obsoletas as PCAs, mesmo se especificadas com granularidade fina, possibilitando novamente a utilização indevida da Web. Devido a esses fatores, incrementa-se a complexidade em conceber uma medida preventiva baseada em PCAs. Todavia, agregando os aspectos eficazes das PUIs, esta dissertação propõe um Modelo de Gestão para Prevenção da Má Utilização da Web que utiliza PCAs sensíveis à atributos contextuais. Tal modelo objetiva evitar que as PCAs tornem-se obsoletas ao aplicar um gerenciamento contínuo dessas políticas. Além disso, busca-se reduzir o ônus da elaboração e gestão das PCAs ao propor um software para transpor as necessidades dos gestores para PCAs sensíveis ao contexto, de modo que administradores sem conhecimentos técnicos específicos gerenciem de forma contínua PCAs baseadas em atributos contextuais. Um estudo de caso em uma instituição pública, cuja atividade fim trata-se do ensino superior, comprovou a aplicabilidade do modelo no ambiente de produção. Obteve-se como resultado a potencialização dos acessos à rede Wireless dessa instituição.
Currently, the use of the Web in the workplace has provided new business models, reduced communication cost and agility in…
Advisors/Committee Members: Raul Ceretta Nunes, Roseclea Duarte Medina, Altair Olivo Santin.
Subjects/Keywords: produtividade empresarial; má utilização da internet; informações contextuais; controle de acesso; modelo de gestão; ENGENHARIA DE PRODUCAO; access control; management model; contextual information; internet bad usage; workplace productivity
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Macedo, R. T. (2012). UM MODELO DE GESTÃO PARA PREVENÇÃO DA MÁ UTILIZAÇÃO DA WEB. (Thesis). Universidade Federal de Santa Maria. Retrieved from http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=4915
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Macedo, Ricardo Tombesi. “UM MODELO DE GESTÃO PARA PREVENÇÃO DA MÁ UTILIZAÇÃO DA WEB.” 2012. Thesis, Universidade Federal de Santa Maria. Accessed January 25, 2021.
http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=4915.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Macedo, Ricardo Tombesi. “UM MODELO DE GESTÃO PARA PREVENÇÃO DA MÁ UTILIZAÇÃO DA WEB.” 2012. Web. 25 Jan 2021.
Vancouver:
Macedo RT. UM MODELO DE GESTÃO PARA PREVENÇÃO DA MÁ UTILIZAÇÃO DA WEB. [Internet] [Thesis]. Universidade Federal de Santa Maria; 2012. [cited 2021 Jan 25].
Available from: http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=4915.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Macedo RT. UM MODELO DE GESTÃO PARA PREVENÇÃO DA MÁ UTILIZAÇÃO DA WEB. [Thesis]. Universidade Federal de Santa Maria; 2012. Available from: http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=4915
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
7.
Rakotomalala Harisoa, Ny aina.
Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo : Uses of computers and internet in public access points : a comparative study of Brest, Saint-Denis (La Réunion) and Antananarivo.
Degree: Docteur es, Sciences de l'information et de la communication, 2012, Université de la Réunion
URL: http://www.theses.fr/2012LARE0015
► Les points d'accès public à internet ou au multimédia sont des dispositifs permettant aux usagers qui les fréquentent d'utiliser les équipements numériques et d'avoir un…
(more)
▼ Les points d'accès public à internet ou au multimédia sont des dispositifs permettant aux usagers qui les fréquentent d'utiliser les équipements numériques et d'avoir un accès à internet. Selon les structures qui en sont à l'origine et selon le public cible, plusieurs dénominations existent pour désigner ces lieux : les espaces publics numériques (EPN), les Netpublics, les cyberbases, les cybercases, les espaces culturels multimédias (ECM), les Points-cyb, les cybercommunes, les points d'accès public internet (PAPI) et les cybercafés. En France, les points d'accès public ont un double objectif : permettre à toute personne qui n'a pas les moyens de s'équiper et de se connecter à internet d'avoir accès aux outils numériques et accompagner le public à l'apprentissage et à l'utilisation des TICs. A Madagascar, les points d'accès public proposent un libre accès au public sauf que contrairement aux précédents, leur stratégie est basée sur une logique marchande. L'objectif de cette thèse est de s'interroger sur les rôles des points d'accès public auprès du public qui les fréquente dans l'appropriation de l'ordinateur et d'internet. Du point de vue théorique, la notion d'appropriation des TICs est d'abord questionnée en ayant recours à trois approches : celle de la diffusion, celle de la traduction et celle de l'appropriation. Dans un second temps, une analyse comparée des usages de l'ordinateur et d'internet dans les points d'accès public brestois, réunionnais et tananariviens permet de souligner le rôle important que jouent les facteurs sociétaux, économiques et géographiques sur les trajectoires d'appropriation des TICs. Au-delà de la définition des pratiques effectuées dans ces espaces, ce travail de recherche tente d'identifier les usagers et d'évoquer les raisons pour lesquelles ces espaces sont fréquentés. Il s'appuie sur des observations, des enquêtes par questionnaires dans 18 points d'accès public brestois, réunionnais et tananariviens complétées par des entretiens auprès des usagers sur leurs pratiques de l'ordinateur et d'internet, leur apprentissage, les raisons qui les poussent à fréquenter les points d'accès public, leur dépendance aux TICs et leurs opinions sur ces technologies.
Internet access points are a place where users can access and use digital equipment and connect to internet. Various terms are used to indicate these places : « espaces publics numériques (EPN) », « Netpublics », «cyberbases », « cybercases », « espaces culturels multimédias (ECM) », « Points-cyb », « cybercommunes », « points d’accès public internet (PAPI) » and « cybercafés ». In France, internet access points help people without computer and internet access to use these technologies, to learn and to be assisted in their uses. In Madagascar, internet access points provide access to computer and internet networks but services are fee-based. The objective of this dissertation is to examine the roles of internet access points in ICTs appropriation process by public who visit these places. This research work analyses the theoretical…
Advisors/Committee Members: Watin, Michel (thesis director), Boutet, Annabelle (thesis director).
Subjects/Keywords: Appropriation; Points d'accès public; Internet; Tic; Usage; Appropriation; Internet Access Points; Internet; Ict; Usage
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Rakotomalala Harisoa, N. a. (2012). Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo : Uses of computers and internet in public access points : a comparative study of Brest, Saint-Denis (La Réunion) and Antananarivo. (Doctoral Dissertation). Université de la Réunion. Retrieved from http://www.theses.fr/2012LARE0015
Chicago Manual of Style (16th Edition):
Rakotomalala Harisoa, Ny aina. “Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo : Uses of computers and internet in public access points : a comparative study of Brest, Saint-Denis (La Réunion) and Antananarivo.” 2012. Doctoral Dissertation, Université de la Réunion. Accessed January 25, 2021.
http://www.theses.fr/2012LARE0015.
MLA Handbook (7th Edition):
Rakotomalala Harisoa, Ny aina. “Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo : Uses of computers and internet in public access points : a comparative study of Brest, Saint-Denis (La Réunion) and Antananarivo.” 2012. Web. 25 Jan 2021.
Vancouver:
Rakotomalala Harisoa Na. Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo : Uses of computers and internet in public access points : a comparative study of Brest, Saint-Denis (La Réunion) and Antananarivo. [Internet] [Doctoral dissertation]. Université de la Réunion; 2012. [cited 2021 Jan 25].
Available from: http://www.theses.fr/2012LARE0015.
Council of Science Editors:
Rakotomalala Harisoa Na. Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo : Uses of computers and internet in public access points : a comparative study of Brest, Saint-Denis (La Réunion) and Antananarivo. [Doctoral Dissertation]. Université de la Réunion; 2012. Available from: http://www.theses.fr/2012LARE0015
8.
Hanyama, Nchimunya.
Policies and legislation for internet access and usage in Zambia a.
Degree: 2017, University of Zimbabwe
URL: http://dspace.unza.zm/handle/123456789/6326
► Zambia has a number of Information and Communication Technology (ICT) policies and legislation in place which address internet usage and access such as the Zambia…
(more)
▼ Zambia has a number of Information and Communication Technology (ICT) policies and legislation in place which address internet usage and access such as the Zambia National ICT policy and the ICT Act of 2009 and the Electronic Communication and Transaction Act of 2009.
The aim of the study was to ascertain whether the current policies and legislation are applicable in addressing internet access and usage in Zambia.
The objectives of the study was to investigate policies and legislations implemented for internet access and usage, the roles of ICT regulatory agencies and identify stakeholders in implementation of internet access and usage.
The study used purposive sampling techniques to obtain appropriate respondents. Structured questionnaires were administered to key stakeholders such as ministry tasked with ICT, the regulator, mobile network operators (MNOs) and internet service providers (ISPs). The research revealed that the regulator and other stakeholder acknowledged that Zambia has policies for implementation of internet usage and access. Furthermore, the results showed some lapses in the way the stakeholders understood the role of the regulator and its capacity to regulate the MNOs and ISPs.
The findings revealed that, based on the objectives and the research questions, there is: lack of coordination between the ISPs & MNOs and the regulator; lack of collaborations between the sectors, ISPs, MNOs, Regulator and the line ministry tasked with the responsibility of ICT policy implementation; unclear information as to whether Zambia has specific internet policies and the need for ICT policy awareness and periodic reviews to address the emerging issues. However, there is need to operationalise ICT policies which can lead to the transformation in the technology of the various sectors.
Keywords
Mobile Network Operators, Internet Service Providers, Policies, Legislation, Regulators, Internet Access, Government.
Subjects/Keywords: Information and Communication Technology – Policy and legislation; Internet usage and access – Zambia; Internet Access
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hanyama, N. (2017). Policies and legislation for internet access and usage in Zambia a. (Thesis). University of Zimbabwe. Retrieved from http://dspace.unza.zm/handle/123456789/6326
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hanyama, Nchimunya. “Policies and legislation for internet access and usage in Zambia a.” 2017. Thesis, University of Zimbabwe. Accessed January 25, 2021.
http://dspace.unza.zm/handle/123456789/6326.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hanyama, Nchimunya. “Policies and legislation for internet access and usage in Zambia a.” 2017. Web. 25 Jan 2021.
Vancouver:
Hanyama N. Policies and legislation for internet access and usage in Zambia a. [Internet] [Thesis]. University of Zimbabwe; 2017. [cited 2021 Jan 25].
Available from: http://dspace.unza.zm/handle/123456789/6326.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hanyama N. Policies and legislation for internet access and usage in Zambia a. [Thesis]. University of Zimbabwe; 2017. Available from: http://dspace.unza.zm/handle/123456789/6326
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Georgia
9.
Storm, Kelly.
Improved web usage mining techniques through data mining, user modeling, clustering, and behavioral heuristic methodologies.
Degree: 2014, University of Georgia
URL: http://hdl.handle.net/10724/27609
► As the web has grown and evolved, researchers have developed techniques to extract useful information or knowledge from web resources such as web server access…
(more)
▼ As the web has grown and evolved, researchers have developed techniques to extract useful information or knowledge from web resources such as web server access logs, a collection of techniques known as web usage mining. Web usage mining
includes several techniques capable of identifying, grouping, and classifying online user behavior. We have created a series of methodologies as well as an automated framework capable of providing contextually meaningful usage information with minimal
guidance from evaluators. The techniques discovered through our research have either improved or extended those found in existing data mining, user modeling, and user characterization techniques, and our automated framework assists evaluators in forming
connections among the various aspects comprising the users' online experience.
Subjects/Keywords: Web Usage Mining; User Modeling; Web Server Access Log Analysis; Session Analysis; Behavioral Heuristics; Clustering; Visualizations of Usage Behavior
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Storm, K. (2014). Improved web usage mining techniques through data mining, user modeling, clustering, and behavioral heuristic methodologies. (Thesis). University of Georgia. Retrieved from http://hdl.handle.net/10724/27609
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Storm, Kelly. “Improved web usage mining techniques through data mining, user modeling, clustering, and behavioral heuristic methodologies.” 2014. Thesis, University of Georgia. Accessed January 25, 2021.
http://hdl.handle.net/10724/27609.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Storm, Kelly. “Improved web usage mining techniques through data mining, user modeling, clustering, and behavioral heuristic methodologies.” 2014. Web. 25 Jan 2021.
Vancouver:
Storm K. Improved web usage mining techniques through data mining, user modeling, clustering, and behavioral heuristic methodologies. [Internet] [Thesis]. University of Georgia; 2014. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/10724/27609.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Storm K. Improved web usage mining techniques through data mining, user modeling, clustering, and behavioral heuristic methodologies. [Thesis]. University of Georgia; 2014. Available from: http://hdl.handle.net/10724/27609
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
10.
Hilia, Mohamed.
Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.
Degree: Docteur es, Informatique, 2013, Université Paris-Est
URL: http://www.theses.fr/2013PEST1198
► L'intelligence ambiante est considérée comme l'une des évolutions majeures de l'informatique ubiquitaire. Elle vise la mise en œuvre des environnements ambiants ou des espaces intelligents…
(more)
▼ L'intelligence ambiante est considérée comme l'une des évolutions majeures de l'informatique ubiquitaire. Elle vise la mise en œuvre des environnements ambiants ou des espaces intelligents permettant d'améliorer la vie quotidienne des utilisateurs, leur bien-être et leur sécurité. Un environnement ambiant dispose d'une multitude d'équipements (capteurs, actionneurs), fournissant des services ubiquitaires atomiques qui sont distribués et de nature hétérogène. Ces services atomiques disponibles dans ce type d'environnement, ne répondent pas directement ou complètement à toutes les exigences et les besoins des utilisateurs. Par ailleurs, ces services de haut niveau peuvent impliquer l'interaction de services ubiquitaires appartenant et/ou contrôlés par différentes structures ou domaines (i.e. environnement multi-domaine). Dans ces travaux de thèse, on a étudié les problématiques reliées à l'agrégation des services ubiquitaires atomiques dans des coopérations et des compositions dans un environnement ambiant multi-domaine afin de répondre à des besoins utilisateurs. Cette étude concerne l'interopérabilité sémantique et comportementale des compositions de services ainsi que leurs spécifications dans un modèle formel basé sur la logique constructive BCDL0. Cette thèse a contribuée par la réalisation d'un canevas sémantique permettant la conception et la vérification formelles des processus coopératifs dans l'assistant à la preuve Isabelle/HOL. Le canevas sémantique proposé consiste en une ontologie de coopération extensible et un langage de spécification de services fiable (Sound) ainsi que des modules de mise en correspondance vers des infrastructures cibles
Ambient Intelligence is considered as the major application domain of ubiquitous computing. It aims at implementing intelligent environments to improve the daily activities, the well-being and the safety of users. An ambient environment has a multitude of devices (sensors, actuators), providing atomic ubiquitous services which are distributed and heterogeneous. These atomic services available in these environments, do not directly or fully meet all the requirements and the needs of users. Moreover, these high-level services may involve the interaction of ubiquitous services owned and/or controlled by different structures or domains (i.e. multi-domain environment). In this work, we studied the problems related to the aggregation of atomic ubiquitous services in cooperations and compositions in an ambient multi-domain environment in order to meet users' needs. This study concerns the semantic and behavioral interoperability of high-level composite services and their formal specification. This latter, is based on the Basic Constructive Description Logic, namely, BCDL0 formal model. This work contributes by realizing a semantic framework for the design and formal verification of cooperative processes in the interactive theorem prover Isabelle/HOL. The proposed semantic framework consists of an extensible cooperation ontology, a sound formal specification language of…
Advisors/Committee Members: Djouani, Karim (thesis director).
Subjects/Keywords: Web sémantique; Environnement mutli-Domaines; Contol d'accès et d'usage; Architecture orienté services; Méthodes formelle; Composition de services; Semantic Web; Multi-Domains environnement; Access and usage control; Service oriented architecture; Formal methods; Service composition
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hilia, M. (2013). Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. (Doctoral Dissertation). Université Paris-Est. Retrieved from http://www.theses.fr/2013PEST1198
Chicago Manual of Style (16th Edition):
Hilia, Mohamed. “Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.” 2013. Doctoral Dissertation, Université Paris-Est. Accessed January 25, 2021.
http://www.theses.fr/2013PEST1198.
MLA Handbook (7th Edition):
Hilia, Mohamed. “Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment.” 2013. Web. 25 Jan 2021.
Vancouver:
Hilia M. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. [Internet] [Doctoral dissertation]. Université Paris-Est; 2013. [cited 2021 Jan 25].
Available from: http://www.theses.fr/2013PEST1198.
Council of Science Editors:
Hilia M. Canevas sémantique et méthodologie formelle pour le développement des applications ambiantes multi-domaine : Semantic framework and formal methodology for ambient applications development in multi-domain environment. [Doctoral Dissertation]. Université Paris-Est; 2013. Available from: http://www.theses.fr/2013PEST1198
11.
Papagiannakopoulou, Eugenia.
Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα.
Degree: 2014, National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ)
URL: http://hdl.handle.net/10442/hedi/39508
► A current trend in the evolution of software systems consists in moving from the logic ofvertical integration towards the adoption of more flexible architectures based…
(more)
▼ A current trend in the evolution of software systems consists in moving from the logic ofvertical integration towards the adoption of more flexible architectures based on the dynamicand loosely-coupled interoperation of distributed and heterogeneous entities. However, theinteraction between different actors and heterogeneous systems requires and, at the same time,involves resource sharing and use and handling of sensitive information, while raising issuesregarding the integrity and availability thereof, with a clear consequent impact on privacy.In this context, the goal of the present Thesis is the development of access and usagecontrol technologies tailored for the specific needs of distributed environments, with specialemphasis laid on the protection of privacy. Essentially, it aims at handling security and privacyrequirements for distributed environments in a holistic and comprehensive manner, meaningthat access decisions are not taken considering the actions “in isolation”, but taking also intoaccount the operational and data flows representing the interaction between systems.The proposed system relies on a rich Semantic Information Model that provides abstractrepresentation of the basic entities of distributed systems, as well as the relations between them,while it is ultimately grounded on the requirements stemming from the elaboration of legal andregulatory provisions regarding data protection. On the other hand, the Semantic Policy Modelis leveraged for the specification of rules upon the entities of the information model, which arecharacterized by a high degree of expressiveness and may describe constraints that the existingmodels fail to incorporate. Among others, the proposed model provides flexibility to expressconcepts and rules at any level of abstraction, and it allows for the specification of complexdependencies among actions and entities, as well as sophisticated separation and binding ofduty constraints.Both models are implemented by means of semantic ontologies, which constitute thebasis for knowledge extraction. The latter takes place in two stages. The first phase concernsexhaustive knowledge extraction in an offline manner, including the extraction of metarules andthe subsequent knowledge extraction from the rules set, and it provides for the assessment ofindividual access actions. The second phase, exploiting the results of the first one, refers to realtimedecisions regarding the interaction between distributed systems, the permitted execution scenarios and the extraction of additional instructions to be followed.
Μία σύγχρονη τάση στην εξέλιξη των συστημάτων λογισμικού συνίσταται στηναπομάκρυνση από τη λογική της κάθετης ολοκλήρωσης και την υιοθέτηση πιο ευέλικτωναρχιτεκτονικών που βασίζονται στη δυναμική διασυνεργασία κατανεμημένων και ετερο-γενών οντοτήτων. Ωστόσο, η αλληλεπίδραση διαφορετικών φορέων και ετερογενών συ-στημάτων προϋποθέτει και συνεπάγεται διαμοιρασμό πόρων και χρήση και διακίνηση ευαί-σθητων πληροφοριών, εγείροντας ταυτόχρονα ζητήματα ακεραιότητας και διαθεσιμότη-τας των…
Subjects/Keywords: Έλεγχος πρόσβασης και χρήσης; Κατανεμημένα περιβάλλοντα; Ιδιωτικότητα; Προστασία προσωπικών δεδομένων; Σημασιολογικό μοντέλο; Οντολογία; Διαχωρισμός και σύζευξη καθηκόντων; Access and usage control; Distributed environments; Privacy; Personal data protection; Semantic model; Ontology; Separation and binding of duty
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Papagiannakopoulou, E. (2014). Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα. (Thesis). National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ). Retrieved from http://hdl.handle.net/10442/hedi/39508
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Papagiannakopoulou, Eugenia. “Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα.” 2014. Thesis, National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ). Accessed January 25, 2021.
http://hdl.handle.net/10442/hedi/39508.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Papagiannakopoulou, Eugenia. “Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα.” 2014. Web. 25 Jan 2021.
Vancouver:
Papagiannakopoulou E. Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα. [Internet] [Thesis]. National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ); 2014. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/10442/hedi/39508.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Papagiannakopoulou E. Σημασιολογικό μοντέλο ελέγχου πρόσβασης για κατανεμημένα περιβάλλοντα. [Thesis]. National Technical University of Athens (NTUA); Εθνικό Μετσόβιο Πολυτεχνείο (ΕΜΠ); 2014. Available from: http://hdl.handle.net/10442/hedi/39508
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of South Africa
12.
Kodua-Ntim, Kwame.
Usage of open access institutional repositories in University libraries in Ghana
.
Degree: 2020, University of South Africa
URL: http://hdl.handle.net/10500/26689
► The study investigated the usage of Open Access Institutional Repositories (OAIR) in university libraries in Ghana to develop a strategy on how the usage of…
(more)
▼ The study investigated the
usage of Open
Access Institutional Repositories (OAIR)
in university libraries in Ghana to develop a strategy on how the
usage of OAIR in
university libraries in Ghana may be enhanced. The study adopted the Technology
Acceptance Model (TAM), which was then modified to fit the study. Accessibility,
availability and visibility were proposed in addition to the conventional variables of
TAM to improve the fit between the data and the theoretical model. Pragmatism
paradigm, mixed methods research approach and convergent parallel mixed method
design (survey and case study designs) was used for the study. Simple random
sampling, stratified random sampling, purposive sampling techniques and the
sample size converter were the sampling procedures and methods employed.
A total of nine hundred and ninety-eight (998) respondents completed the
questionnaires distributed, but for the qualitative phase twelve (12) OAIR managers
were purposively selected. The questionnaire and interview guide were used as
research instruments to gather relevant data for the study. Descriptive statistics
(frequencies, percentages, means and standard deviation) and inferential statistics (multinomial logistic regression and CFA using SEM) were used as statistical tools to
analyse quantitative data and thematic analysis was used to analyse qualitative data.
The study revealed that there was a low level of OAIR
usage in universities among
academic staff, notwithstanding the high level of understanding of OAIR. This was
evident in the number of research work uploaded onto the OAIR by the OAIR team.
Inadequate advocacy, ICT connectivity, infrastructure, funding, power supply,
insufficient technological skills, institutional repository policy, absence of incentives,
institutional culture and politics and copyright issues were the challenges facing the
usage of OAIR in university libraries in Ghana.
The study concluded that advocacy, policies, software and staffing enshrined in an
institutional guideline on OAIR would enhance OAIR
usage. The study developed an
OAIR
Usage Model and OAIR User Manual, which would be very instrumental in the
usage of OAIR in university libraries in Ghana. The model will enhance user
satisfaction and intention to reuse the OAIR and making OAIR research outputs
available, accessible and visible. The manual specifies the contents and documentsaccepted by the OAIR and ensuring the quality of documents archived.
Advisors/Committee Members: Fombad, Madeleine C (advisor).
Subjects/Keywords: Academic staff;
Ghana;
Library staff;
Model;
Open Access (OA);
Open Access;
Institutional Repositories (OAIR);
OAIR managers;
Technology Acceptance Model (TAM);
Universities;
University libraries;
Usage
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kodua-Ntim, K. (2020). Usage of open access institutional repositories in University libraries in Ghana
. (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/26689
Chicago Manual of Style (16th Edition):
Kodua-Ntim, Kwame. “Usage of open access institutional repositories in University libraries in Ghana
.” 2020. Doctoral Dissertation, University of South Africa. Accessed January 25, 2021.
http://hdl.handle.net/10500/26689.
MLA Handbook (7th Edition):
Kodua-Ntim, Kwame. “Usage of open access institutional repositories in University libraries in Ghana
.” 2020. Web. 25 Jan 2021.
Vancouver:
Kodua-Ntim K. Usage of open access institutional repositories in University libraries in Ghana
. [Internet] [Doctoral dissertation]. University of South Africa; 2020. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/10500/26689.
Council of Science Editors:
Kodua-Ntim K. Usage of open access institutional repositories in University libraries in Ghana
. [Doctoral Dissertation]. University of South Africa; 2020. Available from: http://hdl.handle.net/10500/26689

University of Zambia
13.
Lombe, Chileshe.
An invesitigation of researchers'perception on access regulations in the usage of archival materials:A case study of the National Archives of Zambia
.
Degree: 2015, University of Zambia
URL: http://dspace.unza.zm:8080/xmlui/handle/123456789/4301
► The aim of this study was to assess researchers’ perception on access regulations in the usage of archival materials at the National Archives of Zambia.…
(more)
▼ The aim of this study was to assess researchers’ perception on access regulations in the usage of archival materials at the National Archives of Zambia. The objectives of the research were: to determine the educational levels of researchers that patronize National Archives of Zambia; to determine the extent to which archival materials are used; to investigate researchers’ perception towards access regulations in the usage of archival materials; and to determine which of the regulations researchers consider to be hampering their research and need to be reviewed. Primary data relating to the research objectives was collected using purposive sampling through a questionnaire and interviews as only fifty questionnaires were distributed to researchers who were available at the time and had a 100% return. Research findings revealed that both male and female have access to archival materials and it also revealed that their educational level had a bearing on research. The majority of these researchers are undergraduates representing 68%. It was also revealed that the majority of the researchers used archival materials once per week representing 48% and that archival materials ensure records are available for various research. It was further revealed that researchers attach great importance to the historical value of archival materials. The majority of researchers representing 68% observed that access regulations safeguard integrity of archival materials and lastly the majority of researchers revealed that restricting them to a certain number of documents at a time is likely to affect the use of archival materials. Archives are unique and rare materials which require regulations to protect and guide their access, as regulations are put in place to protect them and ensure that right procedures and processes are in place. In view of the above, there is need to review some of the conditions under the access regulations in order to enhance research and further sensitize the researchers on the value of archival materials and activities
Subjects/Keywords: An invesitigation of researchers'perception on access regulations in the usage of archival materials:A case study of the National Archives of Zambia;
Privacy, Right of – Zambia;
Archives – Collection management – Zambia
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Lombe, C. (2015). An invesitigation of researchers'perception on access regulations in the usage of archival materials:A case study of the National Archives of Zambia
. (Thesis). University of Zambia. Retrieved from http://dspace.unza.zm:8080/xmlui/handle/123456789/4301
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lombe, Chileshe. “An invesitigation of researchers'perception on access regulations in the usage of archival materials:A case study of the National Archives of Zambia
.” 2015. Thesis, University of Zambia. Accessed January 25, 2021.
http://dspace.unza.zm:8080/xmlui/handle/123456789/4301.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lombe, Chileshe. “An invesitigation of researchers'perception on access regulations in the usage of archival materials:A case study of the National Archives of Zambia
.” 2015. Web. 25 Jan 2021.
Vancouver:
Lombe C. An invesitigation of researchers'perception on access regulations in the usage of archival materials:A case study of the National Archives of Zambia
. [Internet] [Thesis]. University of Zambia; 2015. [cited 2021 Jan 25].
Available from: http://dspace.unza.zm:8080/xmlui/handle/123456789/4301.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lombe C. An invesitigation of researchers'perception on access regulations in the usage of archival materials:A case study of the National Archives of Zambia
. [Thesis]. University of Zambia; 2015. Available from: http://dspace.unza.zm:8080/xmlui/handle/123456789/4301
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of South Africa
14.
Moyo, Mercy.
Awareness and usage of electronic library resources in open distance learning by third-year students in the School of Arts at the University of South Africa
.
Degree: 2017, University of South Africa
URL: http://hdl.handle.net/10500/24807
► During the 21st century, electronic resources have become an important component in every sector of society and the academic sector is no exception. Academic libraries…
(more)
▼ During the 21st century, electronic resources have become an important component in every sector of society and the academic sector is no exception. Academic libraries worldwide have adopted the technologies involved in electronic resources, with some replacing their traditional collections with e-resources, which are more accessible by users.
This study was conducted at the University of South Africa (Unisa) and was aimed at investigating the levels of awareness and
usage of e-resources by third-year students in the School of Arts. The study used the descriptive survey study design, which is quantitative in approach. The target population comprised of 5 377 third-year students enrolled in the seven departments in the School of Arts and a proportional sample of 360 students was drawn from the population by using stratified random sampling. Library staff was also included in the study, in order to determine students’
usage patterns of e-resources and to establish initiatives available at the Unisa Library to increase awareness and use of e-resources. Online questionnaires distributed via Survey Monkey were used as the data collection instrument.
The study established that the Unisa Library subscribes to a wide range of e-resources and has a number of initiatives in place to encourage the awareness and
usage of these resources. However, 50, 3% of the student respondents were unaware of the availability of Unisa e-resources. The study also established that the majority of students use e-resources for study and research and that, although they have basic information and communication technologies (ICTs) skills, the majority of students lack advanced information search and retrieval skills, which are required to utilise e-resources properly. The four main barriers that prevent students from accessing and using e-resources were the cost of
access to the internet, unavailability of relevant literature for studies, lack of time to do online searches and preference for information freely available on the internet.
To encourage increased awareness and use of e-resources, the study recommend the development of an e-resources marketing strategy, the introduction of an information literacy module for all first-year students, the provision of infrastructure and technologies for
access, development of specialised library assistance services, balancing of the electronic library collections across different subjects, tutors including more e-resources references in study guides and tutorial letters and hiring of more library staff.
The study concludes that the Unisa Library has a wide variety of electronic library resources and services needed in academic institutions, but awareness and
usage of the resources is quite low, due to several factors highlighted in the study. Therefore, the Library should step forward and ensure that the resources are fully utilised by following the recommendations suggested in the study.
Advisors/Committee Members: Ngulube, Patrick (advisor), Dube, L (advisor).
Subjects/Keywords: Access to information;
Awareness and usage of e-resources;
Electronic library resources;
Information literacy;
Open distance learning;
Third-year students;
University of South Africa
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Moyo, M. (2017). Awareness and usage of electronic library resources in open distance learning by third-year students in the School of Arts at the University of South Africa
. (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/24807
Chicago Manual of Style (16th Edition):
Moyo, Mercy. “Awareness and usage of electronic library resources in open distance learning by third-year students in the School of Arts at the University of South Africa
.” 2017. Masters Thesis, University of South Africa. Accessed January 25, 2021.
http://hdl.handle.net/10500/24807.
MLA Handbook (7th Edition):
Moyo, Mercy. “Awareness and usage of electronic library resources in open distance learning by third-year students in the School of Arts at the University of South Africa
.” 2017. Web. 25 Jan 2021.
Vancouver:
Moyo M. Awareness and usage of electronic library resources in open distance learning by third-year students in the School of Arts at the University of South Africa
. [Internet] [Masters thesis]. University of South Africa; 2017. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/10500/24807.
Council of Science Editors:
Moyo M. Awareness and usage of electronic library resources in open distance learning by third-year students in the School of Arts at the University of South Africa
. [Masters Thesis]. University of South Africa; 2017. Available from: http://hdl.handle.net/10500/24807

University of Florida
15.
Gudapati, Bhuvaneswari.
A Phenomenological Examination of the Blended Learning Experiences of Anglophone Caribbean Community College Students An Interpretation through the Community of Inquiry Framework.
Degree: EdD, Higher Education Administration - Human Development and Organizational Studies in Education, 2018, University of Florida
URL: https://ufdc.ufl.edu/UFE0053943
► Successful completion of any form of e-Learning courses by community college students is an issue both at the global and national level. The purpose of…
(more)
▼ Successful completion of any form of e-Learning courses by community college students is an issue both at the global and national level. The purpose of this qualitative study was to explore the experiences of Anglophone Caribbean Community College students who were taking a blended learning course for the first time. The study evaluated their skills and abilities in navigating their courses via technology-mediated learning through the framework of the Community of Inquiry (CoI), which describes the way various components of cognitive, social, and teaching presences interact to create a unique educational experience.
Advisors/Committee Members: ORTAGUS,JUSTIN CHARLES (committee chair), ANTONENKO,PAVLO (committee member), PRINGLE,ROSE MARIE (committee member).
Subjects/Keywords: anglophone-caribbean-education – blended-learning-framework – caribbean-community-colleges – coi – community-of-inquiry-framework – digital-access-and-digital-skills – qualitative-phenomenological – social-media-usage
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Gudapati, B. (2018). A Phenomenological Examination of the Blended Learning Experiences of Anglophone Caribbean Community College Students An Interpretation through the Community of Inquiry Framework. (Doctoral Dissertation). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0053943
Chicago Manual of Style (16th Edition):
Gudapati, Bhuvaneswari. “A Phenomenological Examination of the Blended Learning Experiences of Anglophone Caribbean Community College Students An Interpretation through the Community of Inquiry Framework.” 2018. Doctoral Dissertation, University of Florida. Accessed January 25, 2021.
https://ufdc.ufl.edu/UFE0053943.
MLA Handbook (7th Edition):
Gudapati, Bhuvaneswari. “A Phenomenological Examination of the Blended Learning Experiences of Anglophone Caribbean Community College Students An Interpretation through the Community of Inquiry Framework.” 2018. Web. 25 Jan 2021.
Vancouver:
Gudapati B. A Phenomenological Examination of the Blended Learning Experiences of Anglophone Caribbean Community College Students An Interpretation through the Community of Inquiry Framework. [Internet] [Doctoral dissertation]. University of Florida; 2018. [cited 2021 Jan 25].
Available from: https://ufdc.ufl.edu/UFE0053943.
Council of Science Editors:
Gudapati B. A Phenomenological Examination of the Blended Learning Experiences of Anglophone Caribbean Community College Students An Interpretation through the Community of Inquiry Framework. [Doctoral Dissertation]. University of Florida; 2018. Available from: https://ufdc.ufl.edu/UFE0053943
16.
Aborawi, Ahmed.
L'usage des technologies de l'information et de la communication par les professeurs des universités lybiennes : le cas des archives ouvertes et des périodiques électroniques sur le web : Usage of information and communication technologies by the academic staff of Libyan universities : case study about open archive and electronic journals on the web.
Degree: Docteur es, Sciences de l'information et de la communication, 2016, Université Grenoble Alpes (ComUE)
URL: http://www.theses.fr/2016GREAL018
► Cette étude analyse l'accueil et l'usage par les professeurs des universités libyennes des périodiques électroniques et des archives ouvertes. Ainsi, elle a pour objectif d'identifier…
(more)
▼ Cette étude analyse l'accueil et l'usage par les professeurs des universités libyennes des périodiques électroniques et des archives ouvertes. Ainsi, elle a pour objectif d'identifier la relation entre, d’un côté, l’usage des périodiques électroniques et des archives ouvertes et, de l’autre, certains facteurs déterminants des conditions sociodémographiques comme le sexe, le domaine de recherche, l’âge et les années d’exercice.Cela se situe dans un contexte particulier à un pays arabe, pays en voie de développement dont l’environnement sociopolitique constitue, à notre sens, une véritable contrainte objective.Afin de répondre à notre problématique, nous avons été amenés naturellement à l’utilisation de la méthode quantitative par questionnaire. Dès lors, 359 professeurs,répartis sur cinq disciplines, ont répondu à nos questionnements.Il était donc question de comprendre la relation entre la discipline que les enseignants universitaires libyens exercent et leur usage des TIC, les préférences des utilisateurs de périodiques électroniques, leur attitude vis-à-vis des inconvénients et avantages de celles-ci,la connaissance des utilisateurs concernant le libre accès et enfin l'état de l'art sur les bénéfices des sources en libre accès.Enfin, les résultats de cette étude réactualisent nos connaissances sur les pratiques enseignantes des professeurs libyens et débouchent sur des applications intéressantes.
This study analyses mind agreement and use of electronic journals and open archivesmade by Libyan universities teachers. So, it aims identification of relationship between, onone hand, the use of electronic journals and open archives and, on second hand, any very important factors, and parts from socio-demographic conditions as gender, Research domain, age and number of practice years.It was developed in a particular context, i.e. in an Arabic country, in way of development, in which socio-politic environment is constitutive, as we think, of a true limiting factor.In the aim of giving answers to this problem, we naturally were led to use quantitative method based on questionnaire. So, 359 teachers, scattered on five disciplines,gave answers to our questionnaire.So, the subject was to understand relationship between the specialty that Libyan university teachers are operating in and their use of TIC, the preferences of electronic journals users, their comportments when encountering any advantages or disadvantages of these journals they use, the users knowledge about open access, and, last topic, the state of the art about benefits due to open access sources. Finally, the results of this study give us new and recent knowledge on teaching practices of Libyan University teachers and open on interesting appliances.
Advisors/Committee Members: Balicco, Laurence (thesis director).
Subjects/Keywords: Libre accès à l'information scientifique . archive ouvertes . usages des technologies de l'information .; Archives ouvertes; Périodiques électroniques; Périodiques en libre accès; Open archives usage journals electronicsopen . open access to information .; Open archives; Electronic periodics; Open access journals; 020
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Aborawi, A. (2016). L'usage des technologies de l'information et de la communication par les professeurs des universités lybiennes : le cas des archives ouvertes et des périodiques électroniques sur le web : Usage of information and communication technologies by the academic staff of Libyan universities : case study about open archive and electronic journals on the web. (Doctoral Dissertation). Université Grenoble Alpes (ComUE). Retrieved from http://www.theses.fr/2016GREAL018
Chicago Manual of Style (16th Edition):
Aborawi, Ahmed. “L'usage des technologies de l'information et de la communication par les professeurs des universités lybiennes : le cas des archives ouvertes et des périodiques électroniques sur le web : Usage of information and communication technologies by the academic staff of Libyan universities : case study about open archive and electronic journals on the web.” 2016. Doctoral Dissertation, Université Grenoble Alpes (ComUE). Accessed January 25, 2021.
http://www.theses.fr/2016GREAL018.
MLA Handbook (7th Edition):
Aborawi, Ahmed. “L'usage des technologies de l'information et de la communication par les professeurs des universités lybiennes : le cas des archives ouvertes et des périodiques électroniques sur le web : Usage of information and communication technologies by the academic staff of Libyan universities : case study about open archive and electronic journals on the web.” 2016. Web. 25 Jan 2021.
Vancouver:
Aborawi A. L'usage des technologies de l'information et de la communication par les professeurs des universités lybiennes : le cas des archives ouvertes et des périodiques électroniques sur le web : Usage of information and communication technologies by the academic staff of Libyan universities : case study about open archive and electronic journals on the web. [Internet] [Doctoral dissertation]. Université Grenoble Alpes (ComUE); 2016. [cited 2021 Jan 25].
Available from: http://www.theses.fr/2016GREAL018.
Council of Science Editors:
Aborawi A. L'usage des technologies de l'information et de la communication par les professeurs des universités lybiennes : le cas des archives ouvertes et des périodiques électroniques sur le web : Usage of information and communication technologies by the academic staff of Libyan universities : case study about open archive and electronic journals on the web. [Doctoral Dissertation]. Université Grenoble Alpes (ComUE); 2016. Available from: http://www.theses.fr/2016GREAL018

Queensland University of Technology
17.
Tilley, Christine Margaret.
A sense of control : a model of a virtual community for people with mobility impairments.
Degree: 2006, Queensland University of Technology
URL: https://eprints.qut.edu.au/16308/
► This qualitative study develops a model of a virtual community for people with longterm, severe physical or mobility disabilities. The model also has implications for…
(more)
▼ This qualitative study develops a model of a virtual community for people with longterm, severe physical or mobility disabilities. The model also has implications for the wider community of people with disabilities. The study uses the Strauss and Corbin grounded theory methodology to inform the investigation from which a systematic theory has been developed. On the basis of this theory, the study proposes strategies for implementing the virtual community model.
In-depth interviews were conducted with twelve Queenslanders with paraplegia, quadriplegia or other severe, long-term physical or mobility disabilities and with six health care professionals, service providers, information personnel and policy advisers involved in their well-being. The methodology used one interview question to determine their experiences and perceptions regarding virtual communities and the use of Information and Communications Technology (ICT). Each interview explored in detail the elements, enablers and barriers behind the usage of ICT and/or assistive technology.
The personal responses and narratives of the people with disabilities who use the technology and their allied health care professionals were analysed and interpreted for meaning before the transcripts were returned to these participants for validation. Rich explanations were derived. Details of the various response categories of these interviews were analysed as part of the grounded theory, constant comparison methodology, and the relationship to the literature was considered. These de-constructed meanings were compared and contrasted with those in the current literature.
The central theme to emerge from these narratives is that people with long-term disabilities regain a sense of control and independence in their lives through the use of ICT, as they move towards an on-line community. Other major themes that emerged from being on-line indicated that being on-line tended to break down people's isolation, while potentially changing the work paradigm (both vexed issues for people with disabilities). Information and communications technology and on-line communities offer ways to enhance every person's inclusion, participation and empowerment in our society.
The primary outcome of the study is a theory regarding the character of virtual communities for people with long-term, severe mobility impairments that stakeholders may consider whenever such a virtual community is proposed. The theory is represented as a virtual community model.
The model identifies the need for "a sense of control" as the foundational element of virtual communities for the disabled, and distinguishes the key domains in which disabled people participate in virtual communities. The barriers and enablers to their participation are specified within it. The model also provides a framework within which virtual communities can be facilitated. It melds six types of e-communities or sets of well-developed discrete categories (for example, themes, concepts) that the data from this study…
Subjects/Keywords: Access; assistive technology; barriers; control; digital divide; disability; e-commerce; empowerment; grounded theory methodology; ICT usage; information; information and communications technology; information literacy; people with mobility impairments; portals for people with physical disabilities; technological literacy; telecommunications; tele-working; well-being; and virtual community.; ODTA
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Tilley, C. M. (2006). A sense of control : a model of a virtual community for people with mobility impairments. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16308/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tilley, Christine Margaret. “A sense of control : a model of a virtual community for people with mobility impairments.” 2006. Thesis, Queensland University of Technology. Accessed January 25, 2021.
https://eprints.qut.edu.au/16308/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tilley, Christine Margaret. “A sense of control : a model of a virtual community for people with mobility impairments.” 2006. Web. 25 Jan 2021.
Vancouver:
Tilley CM. A sense of control : a model of a virtual community for people with mobility impairments. [Internet] [Thesis]. Queensland University of Technology; 2006. [cited 2021 Jan 25].
Available from: https://eprints.qut.edu.au/16308/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tilley CM. A sense of control : a model of a virtual community for people with mobility impairments. [Thesis]. Queensland University of Technology; 2006. Available from: https://eprints.qut.edu.au/16308/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
18.
Kane, Khardiatou.
Documentation numérique en Afrique francophone subsaharienne : évaluation de l'offre et des usages en sciences humaines à l'Université Cheikh Anta Diop de Dakar : Digital documentation in Africa : evaluation of the offer and uses in the human sciences of the University Cheikh Anta Diop of Dakar.
Degree: Docteur es, Sciences de l'information et de la communication, 2018, Paris, CNAM
URL: http://www.theses.fr/2018CNAM1185
► Les bibliothèques universitaires des pays d’Afrique francophone sont confrontées à un défi en matière d’offre documentaire dans un contexte marqué par un manque de moyens…
(more)
▼ Les bibliothèques universitaires des pays d’Afrique francophone sont confrontées à un défi en matière d’offre documentaire dans un contexte marqué par un manque de moyens financiers, une augmentation des coûts de la documentation, et certaines formes organisationnelles peu efficientes. Cette thèse vise dans un premier temps, à partir d’enquêtes et de recueils de données diversifiées, à dresser l’état de l’offre documentaire papier et numérique à l’Université Cheikh Anta Diop de Dakar, en Sciences humaines et sociales (SHS), tout en soulignant des points de comparaison avec d’autres universités francophones subsahariennes. Les résultats visent à quantifier et à qualifier cette offre, à pointer les nouvelles dynamiques dans le cadre de la documentation numérique avec différents types d’acteurs. Par ailleurs, les bibliothécaires cherchent à s’appuyer pleinement sur l’Open Access tant au niveau de l’accès à des ressources qu’au niveau de la valorisation des fonds locaux. L’information numérique est de plus en plus perçue comme le meilleur moyen de satisfaire les besoins en information de la communauté universitaire de l’Université Cheikh Anta Diop (UCAD) de Dakar. Néanmoins, elle est souvent confrontée à des problèmes d’accès à l’information mais également d’usage des ressources documentaires. Cette recherche s’intéresse, dans une seconde partie, à l’appréciation de l’usage des ressources numériques, une appréciation qui se fera comparativement entre plusieurs disciplines de l’UCAD et entre enseignants et étudiants de ladite université. Des recommandations sont formulées dans la troisième partie pour tenter d’y améliorer les services documentaires.
University libraries in French-speaking African countries face a documentary supply challenge in a context of a lack of financial resources, an increase in the cost of documentation, and some inefficient organizational forms. This thesis aims at first, from surveys and collections of diverse data, to establish the state of the paper and digital documentary offer at the University Cheikh Anta Diop of Dakar, in SHS, highlighting points comparison with other Sub-Saharan Francophone Universities. The results are intended to quantify and qualify this offer, to point out new dynamics in the context of digital documentation with different types of actors. In addition, librarians seek to rely fully on Open Access, both in terms of access to resources and the value of local funds. Digital information is increasingly seen as the best way to meet the information needs of the university community at Dakar's Cheikh Anta Diop University (UCAD). Nevertheless, it is often confronted with problems of access to information but also of use of documentary resources. This research focuses, in a second part, to appreciate the uses of digital resources, in a comparative way between several disciplines at UCAD and between teachers and students. Recommendations are made to try to improve the documentary services in this University.
Advisors/Committee Members: Chartron, Ghislaine (thesis director).
Subjects/Keywords: Documentation numérique; Evaluation de l’offre documentaire; Évaluation des usages; Libre Accès; Afrique subsaharienne; Bibliothèque Universitaire de Dakar; Documentation scientifique et technique; Digital documentation; Evaluation of the documentary offer; Usage evaluation; Open Access; Sub-Saharan Africa; University Library Dakar; Scientific and technical documentation; 025.284; 027.709 663
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kane, K. (2018). Documentation numérique en Afrique francophone subsaharienne : évaluation de l'offre et des usages en sciences humaines à l'Université Cheikh Anta Diop de Dakar : Digital documentation in Africa : evaluation of the offer and uses in the human sciences of the University Cheikh Anta Diop of Dakar. (Doctoral Dissertation). Paris, CNAM. Retrieved from http://www.theses.fr/2018CNAM1185
Chicago Manual of Style (16th Edition):
Kane, Khardiatou. “Documentation numérique en Afrique francophone subsaharienne : évaluation de l'offre et des usages en sciences humaines à l'Université Cheikh Anta Diop de Dakar : Digital documentation in Africa : evaluation of the offer and uses in the human sciences of the University Cheikh Anta Diop of Dakar.” 2018. Doctoral Dissertation, Paris, CNAM. Accessed January 25, 2021.
http://www.theses.fr/2018CNAM1185.
MLA Handbook (7th Edition):
Kane, Khardiatou. “Documentation numérique en Afrique francophone subsaharienne : évaluation de l'offre et des usages en sciences humaines à l'Université Cheikh Anta Diop de Dakar : Digital documentation in Africa : evaluation of the offer and uses in the human sciences of the University Cheikh Anta Diop of Dakar.” 2018. Web. 25 Jan 2021.
Vancouver:
Kane K. Documentation numérique en Afrique francophone subsaharienne : évaluation de l'offre et des usages en sciences humaines à l'Université Cheikh Anta Diop de Dakar : Digital documentation in Africa : evaluation of the offer and uses in the human sciences of the University Cheikh Anta Diop of Dakar. [Internet] [Doctoral dissertation]. Paris, CNAM; 2018. [cited 2021 Jan 25].
Available from: http://www.theses.fr/2018CNAM1185.
Council of Science Editors:
Kane K. Documentation numérique en Afrique francophone subsaharienne : évaluation de l'offre et des usages en sciences humaines à l'Université Cheikh Anta Diop de Dakar : Digital documentation in Africa : evaluation of the offer and uses in the human sciences of the University Cheikh Anta Diop of Dakar. [Doctoral Dissertation]. Paris, CNAM; 2018. Available from: http://www.theses.fr/2018CNAM1185
19.
Feenstra, C. (author).
A Memory Access and Operator Usage Pro?ler Framework for HLS Optimization: Using the Lucas Optical Flow Algorithm as Case Study.
Degree: 2011, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:b4aef4d6-61b1-4dda-9fb3-638e2ec10eb0
► As recon?gurable hardware such as FPGA’s become bigger and bigger, large and complex systems can be implemented in such devices. It becomes a challenge for…
(more)
▼ As recon?gurable hardware such as FPGA’s become bigger and bigger, large and complex systems can be implemented in such devices. It becomes a challenge for engineers to manually convert an algorithm in an HDL, considering the pushing time-to-market constraints. High Level Synthesis tools are developed to make this process less laborious. HLS tools use the original source code and transforms this to a hardware description. The quality of the original source code is of great in?uence for the resulting hardware. In many data intensive applications, memory accesses form a bottleneck. To improve the performance of the hardware implementation, the execution behavoir of these accesses must ?rst be optimized in the software source code. While doing this, an analyzer providing crucial information about the algorithm itself helps reduce engineering time. This thesis work presents a framework which is capable of providing information about memory accesses and operations executed within an algorithm. The reports containing this information can be generated on a per function or per loop basis. This enables the engineer to ?nd loop speci?c information, which can be used to optimize the algorithm and to provide crucial pipeline information to the HLS tool. An Optical Flow algorithm is used as case study to demonstrate the functionality of the framework. A massive speedup of a factor of 13.7 was achieved while the area increased only with a factor of 1.47. This demonstrates the e?ectiveness of the presented framework.
Embedded Systems
Circuits and Systems
Electrical Engineering, Mathematics and Computer Science
Advisors/Committee Members: Van Leuken, T.G.R. (mentor).
Subjects/Keywords: framework; gcc; plugin; parser; analyze; high level synthesis; HLS; memory access; operator usage
…algorithm.
Memory access and operator usage reports provide the option to report only
information… …Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
2.2.1
Passing… …Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
B.4 Log Array Access… …119
B.5 Log Pointer Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
B.6… …55
4.19 Plot of the access pattern of array Ix . . . . . . . . . . . . . . . . . . .
61…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Feenstra, C. (. (2011). A Memory Access and Operator Usage Pro?ler Framework for HLS Optimization: Using the Lucas Optical Flow Algorithm as Case Study. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:b4aef4d6-61b1-4dda-9fb3-638e2ec10eb0
Chicago Manual of Style (16th Edition):
Feenstra, C (author). “A Memory Access and Operator Usage Pro?ler Framework for HLS Optimization: Using the Lucas Optical Flow Algorithm as Case Study.” 2011. Masters Thesis, Delft University of Technology. Accessed January 25, 2021.
http://resolver.tudelft.nl/uuid:b4aef4d6-61b1-4dda-9fb3-638e2ec10eb0.
MLA Handbook (7th Edition):
Feenstra, C (author). “A Memory Access and Operator Usage Pro?ler Framework for HLS Optimization: Using the Lucas Optical Flow Algorithm as Case Study.” 2011. Web. 25 Jan 2021.
Vancouver:
Feenstra C(. A Memory Access and Operator Usage Pro?ler Framework for HLS Optimization: Using the Lucas Optical Flow Algorithm as Case Study. [Internet] [Masters thesis]. Delft University of Technology; 2011. [cited 2021 Jan 25].
Available from: http://resolver.tudelft.nl/uuid:b4aef4d6-61b1-4dda-9fb3-638e2ec10eb0.
Council of Science Editors:
Feenstra C(. A Memory Access and Operator Usage Pro?ler Framework for HLS Optimization: Using the Lucas Optical Flow Algorithm as Case Study. [Masters Thesis]. Delft University of Technology; 2011. Available from: http://resolver.tudelft.nl/uuid:b4aef4d6-61b1-4dda-9fb3-638e2ec10eb0
20.
Rangé, Charline.
Multi-usage des ressources et mobilités : l'intensification dans une zone humide sahélienne. Le lac Tchad vu par sa fenêtre camerounaise : Multi-use of natural resources and mobilities : intensification in a sahelian wetland. The Lake Chad from its Cameroon's shores.
Degree: Docteur es, Géographie, 2016, Paris, AgroParisTech
URL: http://www.theses.fr/2016AGPT0014
► Le lac Tchad étonne par sa singularité. Alors que le développement des autres grandes zones humides sahéliennes a reposé sur les périmètres irrigués, le sien…
(more)
▼ Le lac Tchad étonne par sa singularité. Alors que le développement des autres grandes zones humides sahéliennes a reposé sur les périmètres irrigués, le sien a reposé sur la valorisation du mouvement des eaux par l'agriculture, l'élevage et la pêche, et par les mobilités. Quasi espace vierge dans les années 1940, le Lac est devenu une région densément peuplée et cosmopolite exportant des vivriers diversifiés sur les marchés urbains de la sous-région. À travers l'analyse des dynamiques agraires et territoriales de la fenêtre lacustre camerounaise, ce travail interroge les opportunités qu'offrent, dans un environnement incertain, le multiusage des ressources et les mobilités à l'intensification des processus productifs et à la densification démographique.Le renforcement des complémentarités et synergies entre activités dégage les voies d'une intensification écologique du mode d'exploitation et d'un développement territorial, créateurs de richesse et d'emplois. En favorisant l'émergence de rapports sociaux et d'institutions innovantes assurant l'accès aux ressources productives et aux marchés à une grande diversité de populations, le statut de marge territoriale de la fenêtre lacustre a été déterminant dans la dynamique d'intensification. L'incertitude hydro-écologique, économique et démographique a été intégrée au fonctionnement « normal » du système agraire et à celui de territoires qui se singularisent par leur mobilité. Aujourd'hui, c'est l'incertitude politique qui menace l'avenir du lac Tchad. Elle résulte des conflits de pouvoirs locaux constitutifs du rapport de l'État aux populations, et de l'action publique à travers les politiques agricoles et environnementales.
The Lake Chad is unique in the Sahelian band. Whereas large scale irrigated schemes has characterized the other wetlands, here the development of agriculture, cattle breeding and fishing has been based on the use of the water floods and on mobilities. Almost virgin until the 1940s, the Lake has become a highly populated and cosmopolitan area, exporting diversified foodstuffs to the urban markets of the sub-region. Through the analysis of agrarian and territorial dynamics of the Cameroonian lake shores, this research questions to which extent multi-use of the natural resources and mobilities may allow further agricultural intensification and population increase in such an uncertain environment.Closer complementarity and synergy between activities pave the way for ecological intensification and territorial development inducing wealth and job generation. Due to its marginal nature, the Cameroonian part of the Lake has been the place of continuous social innovations, ensuring to a great diversity of people the access to productive assets and markets. In this sense, it has been actually decisive for the dynamic of intensification. Hydro-ecological, economic and demographic uncertainty has been integrated into the “normal” functioning of the agrarian system and territory. Nowadays, the political uncertainty threatens the future of the Lake Chad. It…
Advisors/Committee Members: Cochet, Hubert (thesis director).
Subjects/Keywords: Multi-Usage des ressources; Mobilités; Incertitude; Intensification écologique; Régulation de l'accès et de l'usage des ressources naturelles; Frontière interne; Espace transfrontalier; Zone humide sahélienne; Lac Tchad; Cmeroun; Multi-Use of natural resources; Mobilities; Uncertainty; Ecological intensification; Regulation to access and use of natural resources; Internal frontier; Cross-border space; Sahelian wetland; Lake Chad; Cameroon; 338.109 13
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Rangé, C. (2016). Multi-usage des ressources et mobilités : l'intensification dans une zone humide sahélienne. Le lac Tchad vu par sa fenêtre camerounaise : Multi-use of natural resources and mobilities : intensification in a sahelian wetland. The Lake Chad from its Cameroon's shores. (Doctoral Dissertation). Paris, AgroParisTech. Retrieved from http://www.theses.fr/2016AGPT0014
Chicago Manual of Style (16th Edition):
Rangé, Charline. “Multi-usage des ressources et mobilités : l'intensification dans une zone humide sahélienne. Le lac Tchad vu par sa fenêtre camerounaise : Multi-use of natural resources and mobilities : intensification in a sahelian wetland. The Lake Chad from its Cameroon's shores.” 2016. Doctoral Dissertation, Paris, AgroParisTech. Accessed January 25, 2021.
http://www.theses.fr/2016AGPT0014.
MLA Handbook (7th Edition):
Rangé, Charline. “Multi-usage des ressources et mobilités : l'intensification dans une zone humide sahélienne. Le lac Tchad vu par sa fenêtre camerounaise : Multi-use of natural resources and mobilities : intensification in a sahelian wetland. The Lake Chad from its Cameroon's shores.” 2016. Web. 25 Jan 2021.
Vancouver:
Rangé C. Multi-usage des ressources et mobilités : l'intensification dans une zone humide sahélienne. Le lac Tchad vu par sa fenêtre camerounaise : Multi-use of natural resources and mobilities : intensification in a sahelian wetland. The Lake Chad from its Cameroon's shores. [Internet] [Doctoral dissertation]. Paris, AgroParisTech; 2016. [cited 2021 Jan 25].
Available from: http://www.theses.fr/2016AGPT0014.
Council of Science Editors:
Rangé C. Multi-usage des ressources et mobilités : l'intensification dans une zone humide sahélienne. Le lac Tchad vu par sa fenêtre camerounaise : Multi-use of natural resources and mobilities : intensification in a sahelian wetland. The Lake Chad from its Cameroon's shores. [Doctoral Dissertation]. Paris, AgroParisTech; 2016. Available from: http://www.theses.fr/2016AGPT0014

University of Victoria
21.
Saarinen, Pauliina.
The Finnish language in post-utopian Sointula: the effects of frequency on consonant gradation.
Degree: Dept. of Linguistics, 2009, University of Victoria
URL: http://hdl.handle.net/1828/1426
► This research investigated the effect of frequency of language use on the production of consonant gradation by non-dominant speakers of Finnish in the immigrant community…
(more)
▼ This research investigated the effect of frequency of language use on the production of consonant gradation by non-dominant speakers of Finnish in the immigrant community of Sointula, BC. Three types of frequency – word-frequency, suffix-frequency, and stem-frequency – were tested. It also investigated whether quantitative or qualitative gradation is more successful in producing gradation than the other and, finally, whether immigrant generation can explain the variation between participants. A translation task was administered to the six participants across three generations.
Based on the framework of exemplar-driven cognitive grammar (Bybee 2001; Pierrehumbert 2001), the frequency-effects were assumed to be contingent upon the mode of lexical
access; frequent complex words, presumably accessed as wholes thanks to frequent
usage, would not exhibit as many gradation errors as infrequent words, which would be accessed via their composite parts due to infrequency.
The anticipated frequency-effects were not found. Both frequent and infrequent words manifested some gradation loss as an analogical change. This suggests that all words are infrequent. While Bybee’s model assumes high-volume language use over time in dominant language contexts, lack of volume appears to suppress the differential behavior between frequent and infrequent words in Sointula. However, correct gradation was predictable based on suffix-use, which in turn was determined partly by semantics of suffixes; those Finnish suffixes that are semantically mappable to equivalent morphemes in English were better preserved than GEN object-markers, which do not have corresponding morpheme in English. With the atrophy of the GEN object-marker also gradation becomes redundant. This may arise from the tendency to mark syntactic constituency with word-order alone in English-influenced Finnish. Thus, semantics of suffixes proves to be a better predictor of gradation than frequency.
Gradation loss increased with each generation born abroad; by G3, it has all but disappeared. Consonant gradation is not preserved through the generations. Qualitative gradation disappears before quantitative gradation. The above findings are sensible in a context of reduced language-functionality.
Against expectation, little evidence for storing sub-word morphemes and decomposed
access was found. Instead, the data suggests that most stored lexical items are whole words and that gradation is associated with whole complex forms.
Advisors/Committee Members: Bird, Sonya (supervisor), Urbanczyk, Suzanne Claire (supervisor).
Subjects/Keywords: Usage-based grammar; Frequency effects; Minority language; Finnish; Lexical access; Morphology; Morphological processing; Language attrition; Language shift; Language variation; UVic Subject Index::Humanities and Social Sciences::Language::Linguistics
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Saarinen, P. (2009). The Finnish language in post-utopian Sointula: the effects of frequency on consonant gradation. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/1426
Chicago Manual of Style (16th Edition):
Saarinen, Pauliina. “The Finnish language in post-utopian Sointula: the effects of frequency on consonant gradation.” 2009. Masters Thesis, University of Victoria. Accessed January 25, 2021.
http://hdl.handle.net/1828/1426.
MLA Handbook (7th Edition):
Saarinen, Pauliina. “The Finnish language in post-utopian Sointula: the effects of frequency on consonant gradation.” 2009. Web. 25 Jan 2021.
Vancouver:
Saarinen P. The Finnish language in post-utopian Sointula: the effects of frequency on consonant gradation. [Internet] [Masters thesis]. University of Victoria; 2009. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/1828/1426.
Council of Science Editors:
Saarinen P. The Finnish language in post-utopian Sointula: the effects of frequency on consonant gradation. [Masters Thesis]. University of Victoria; 2009. Available from: http://hdl.handle.net/1828/1426

University of Alberta
22.
Nikjah, Reza.
Performance evaluation and protocol design of fixed-rate and
rateless coded relaying networks.
Degree: PhD, Department of Electrical and Computer
Engineering, 2010, University of Alberta
URL: https://era.library.ualberta.ca/files/pn89d6834
► The importance of cooperative relaying communication in substituting for, or complementing, multiantenna systems is described, and a brief literature review is presented. Amplify-and-forward (AF) and…
(more)
▼ The importance of cooperative relaying communication
in substituting for, or complementing, multiantenna systems is
described, and a brief literature review is presented.
Amplify-and-forward (AF) and decode-and-forward (DF) relaying are
investigated and compared for a dual-hop relay channel. The optimal
strategy, source and relay optimal power allocation, and maximum
cooperative gain are determined for the relay channel. It is shown
that while DF relaying is preferable to AF relaying for strong
source-relay links, AF relaying leads to more gain for strong
source-destination or relay-destination links. Superimposed and
selection AF relaying are investigated for multirelay, dual-hop
relaying. Selection AF relaying is shown to be globally strictly
outage suboptimal. A necessary condition for the selection AF
outage optimality, and an upper bound on the probability of this
optimality are obtained. A near-optimal power allocation scheme is
derived for superimposed AF relaying. The maximum instantaneous
rates, outage probabilities, and average capacities of multirelay,
dual-hop relaying schemes are obtained for superimposed, selection,
and orthogonal DF relaying, each with parallel channel cooperation
(PCC) or repetition-based cooperation (RC). It is observed that the
PCC over RC gain can be as much as 4 dB for the outage
probabilities and 8.5 dB for the average capacities. Increasing the
number of relays deteriorates the capacity performance of
orthogonal relaying, but improves the performances of the other
schemes. The application of rateless codes to DF relaying networks
is studied by investigating three single-relay protocols, one of
which is new, and three novel, low complexity multirelay protocols
for dual-hop networks. The maximum rate and minimum energy per bit
and per symbol are derived for the single-relay protocols under a
peak power and an average power constraint. The long-term average
rate and energy per bit, and relay-to-source usage ratio (RSUR), a
new performance measure, are evaluated for the single-relay and
multirelay protocols. The new single-relay protocol is the most
energy efficient single-relay scheme in most cases. All the
multirelay protocols exhibit near-optimal rate performances, but
are vastly different in the RSUR. Several future research
directions for fixed-rate and rateless coded cooperative systems,
and frameworks for comparing these systems, are
suggested.
Subjects/Keywords: large SNR approximation; outage probability; energy per bit; cooperative communication; single-hop communication; fixed-rate codes; peak power constraint; average capacity; rateless coding; power allocation schemes; acknowledgment signals; selection relaying; repetition coding; relaying networks; feedback communication; maximum likelihood; cooperative gain; rateless codes; multiple access channels; dual-hop relaying; orthogonal relaying; relay-to-source usage ratio; mutual information; energy per symbol; nonconcave fractional programming; bit error rate; energy efficiency; maximum achievable rates; average power constraint; rateless coded relaying; parallel channel coding; degree of freedom; superimposed relaying; decode-and-forward relaying; numerical optimization; amplify-and-forward relaying; symbol error rate; direct transmission; maximal ratio combining; power fairness; protocol design; distributed space-time coding; Rayleigh fading; rate efficiency; optimal power allocation; outage optimality; fixed-rate coding; fixed-rate coded relaying
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nikjah, R. (2010). Performance evaluation and protocol design of fixed-rate and
rateless coded relaying networks. (Doctoral Dissertation). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/pn89d6834
Chicago Manual of Style (16th Edition):
Nikjah, Reza. “Performance evaluation and protocol design of fixed-rate and
rateless coded relaying networks.” 2010. Doctoral Dissertation, University of Alberta. Accessed January 25, 2021.
https://era.library.ualberta.ca/files/pn89d6834.
MLA Handbook (7th Edition):
Nikjah, Reza. “Performance evaluation and protocol design of fixed-rate and
rateless coded relaying networks.” 2010. Web. 25 Jan 2021.
Vancouver:
Nikjah R. Performance evaluation and protocol design of fixed-rate and
rateless coded relaying networks. [Internet] [Doctoral dissertation]. University of Alberta; 2010. [cited 2021 Jan 25].
Available from: https://era.library.ualberta.ca/files/pn89d6834.
Council of Science Editors:
Nikjah R. Performance evaluation and protocol design of fixed-rate and
rateless coded relaying networks. [Doctoral Dissertation]. University of Alberta; 2010. Available from: https://era.library.ualberta.ca/files/pn89d6834

Université de Montréal
23.
Côté-Lapointe, Simon.
Exploitation des documents audiovisuels numériques d’archives : modèle conceptuel théorique des usages, modalités et moyens d’organisation et de diffusion sur le web.
Degree: 2020, Université de Montréal
URL: http://hdl.handle.net/1866/23394
Subjects/Keywords: accès aux archives; archives audiovisuelles; archivistique; chaîne des usages; diffusion; documents audiovisuels numériques d’archives; exploitation; interfaces web; modèle conceptuel théorique; organisation; composantes et strates documentaires; typologie; usager; access to archives; audiovisual archives; archival science; chain of usage; digital audiovisual archival documents; dissemination; components and strata of documents; theoretical and conceptual model; user; web interface; Communications and the Arts - Information Science / Communications et les arts - Sciences de l’information (UMI : 0723)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Côté-Lapointe, S. (2020). Exploitation des documents audiovisuels numériques d’archives : modèle conceptuel théorique des usages, modalités et moyens d’organisation et de diffusion sur le web. (Thesis). Université de Montréal. Retrieved from http://hdl.handle.net/1866/23394
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Côté-Lapointe, Simon. “Exploitation des documents audiovisuels numériques d’archives : modèle conceptuel théorique des usages, modalités et moyens d’organisation et de diffusion sur le web.” 2020. Thesis, Université de Montréal. Accessed January 25, 2021.
http://hdl.handle.net/1866/23394.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Côté-Lapointe, Simon. “Exploitation des documents audiovisuels numériques d’archives : modèle conceptuel théorique des usages, modalités et moyens d’organisation et de diffusion sur le web.” 2020. Web. 25 Jan 2021.
Vancouver:
Côté-Lapointe S. Exploitation des documents audiovisuels numériques d’archives : modèle conceptuel théorique des usages, modalités et moyens d’organisation et de diffusion sur le web. [Internet] [Thesis]. Université de Montréal; 2020. [cited 2021 Jan 25].
Available from: http://hdl.handle.net/1866/23394.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Côté-Lapointe S. Exploitation des documents audiovisuels numériques d’archives : modèle conceptuel théorique des usages, modalités et moyens d’organisation et de diffusion sur le web. [Thesis]. Université de Montréal; 2020. Available from: http://hdl.handle.net/1866/23394
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
.