Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Limited memory). Showing records 1 – 16 of 16 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Waterloo

1. Borel, Thomas. Top-Contact Lateral Organic Photodetectors for Deep Ultraviolet Applications.

Degree: 2013, University of Waterloo

 Organic semiconductors are very attractive for thin film Organic Photodetectors (OPDs) since they possess a number of desirable attributes for optical sensing including high absorption… (more)

Subjects/Keywords: Top-contact; Lateral; OPD; Space Charge Limited Conduction; Memory; Phosphorescent sensitizer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Borel, T. (2013). Top-Contact Lateral Organic Photodetectors for Deep Ultraviolet Applications. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/7827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Borel, Thomas. “Top-Contact Lateral Organic Photodetectors for Deep Ultraviolet Applications.” 2013. Thesis, University of Waterloo. Accessed May 20, 2019. http://hdl.handle.net/10012/7827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Borel, Thomas. “Top-Contact Lateral Organic Photodetectors for Deep Ultraviolet Applications.” 2013. Web. 20 May 2019.

Vancouver:

Borel T. Top-Contact Lateral Organic Photodetectors for Deep Ultraviolet Applications. [Internet] [Thesis]. University of Waterloo; 2013. [cited 2019 May 20]. Available from: http://hdl.handle.net/10012/7827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Borel T. Top-Contact Lateral Organic Photodetectors for Deep Ultraviolet Applications. [Thesis]. University of Waterloo; 2013. Available from: http://hdl.handle.net/10012/7827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mississippi State University

2. Khaled, Arindam. Solving influence diagrams using branch and bound search.

Degree: PhD, Computer Science and Engineering, 2015, Mississippi State University

  Influence diagrams (ID) are graphical frameworks for decision making in stochastic situations with mathematical models embedded in them. The goal of an optimal algorithm… (more)

Subjects/Keywords: Branch and Bound Search; Limited Memory Influence Diagrams; Influence Diagrams

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khaled, A. (2015). Solving influence diagrams using branch and bound search. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10302015-104108/ ;

Chicago Manual of Style (16th Edition):

Khaled, Arindam. “Solving influence diagrams using branch and bound search.” 2015. Doctoral Dissertation, Mississippi State University. Accessed May 20, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10302015-104108/ ;.

MLA Handbook (7th Edition):

Khaled, Arindam. “Solving influence diagrams using branch and bound search.” 2015. Web. 20 May 2019.

Vancouver:

Khaled A. Solving influence diagrams using branch and bound search. [Internet] [Doctoral dissertation]. Mississippi State University; 2015. [cited 2019 May 20]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10302015-104108/ ;.

Council of Science Editors:

Khaled A. Solving influence diagrams using branch and bound search. [Doctoral Dissertation]. Mississippi State University; 2015. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10302015-104108/ ;


Mississippi State University

3. Wang, Zimin. A MODEL-BASED APPROACH FOR AUTOMATIC RECOVERY FROM MEMORY LEAKS IN ENTERPRISE APPLICATIONS.

Degree: MS, Electrical and Computer Engineering, 2011, Mississippi State University

  Large-scale distributed computing systems such as data centers are hosted on heterogeneous and networked servers that execute in a dynamic and uncertain operating environment,… (more)

Subjects/Keywords: memory leak; limited lookahead control; distributed system; web server; fault management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Z. (2011). A MODEL-BASED APPROACH FOR AUTOMATIC RECOVERY FROM MEMORY LEAKS IN ENTERPRISE APPLICATIONS. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-06182011-172817/ ;

Chicago Manual of Style (16th Edition):

Wang, Zimin. “A MODEL-BASED APPROACH FOR AUTOMATIC RECOVERY FROM MEMORY LEAKS IN ENTERPRISE APPLICATIONS.” 2011. Masters Thesis, Mississippi State University. Accessed May 20, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-06182011-172817/ ;.

MLA Handbook (7th Edition):

Wang, Zimin. “A MODEL-BASED APPROACH FOR AUTOMATIC RECOVERY FROM MEMORY LEAKS IN ENTERPRISE APPLICATIONS.” 2011. Web. 20 May 2019.

Vancouver:

Wang Z. A MODEL-BASED APPROACH FOR AUTOMATIC RECOVERY FROM MEMORY LEAKS IN ENTERPRISE APPLICATIONS. [Internet] [Masters thesis]. Mississippi State University; 2011. [cited 2019 May 20]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06182011-172817/ ;.

Council of Science Editors:

Wang Z. A MODEL-BASED APPROACH FOR AUTOMATIC RECOVERY FROM MEMORY LEAKS IN ENTERPRISE APPLICATIONS. [Masters Thesis]. Mississippi State University; 2011. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06182011-172817/ ;


University of Dayton

4. Bowling, Alexandra J. Emotional Interference: The Impact of Task-relevant Emotional Stimuli on Cognitive Performance.

Degree: MA, Psychology, General, 2015, University of Dayton

 Baddeley’s model of working memory suggests that there are four components used to manipulate and maintain information for a task. According to this model, there… (more)

Subjects/Keywords: Psychology; working memory, emotion, n-back, limited resources theory, central executive, attention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bowling, A. J. (2015). Emotional Interference: The Impact of Task-relevant Emotional Stimuli on Cognitive Performance. (Masters Thesis). University of Dayton. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=dayton1429958352

Chicago Manual of Style (16th Edition):

Bowling, Alexandra J. “Emotional Interference: The Impact of Task-relevant Emotional Stimuli on Cognitive Performance.” 2015. Masters Thesis, University of Dayton. Accessed May 20, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1429958352.

MLA Handbook (7th Edition):

Bowling, Alexandra J. “Emotional Interference: The Impact of Task-relevant Emotional Stimuli on Cognitive Performance.” 2015. Web. 20 May 2019.

Vancouver:

Bowling AJ. Emotional Interference: The Impact of Task-relevant Emotional Stimuli on Cognitive Performance. [Internet] [Masters thesis]. University of Dayton; 2015. [cited 2019 May 20]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1429958352.

Council of Science Editors:

Bowling AJ. Emotional Interference: The Impact of Task-relevant Emotional Stimuli on Cognitive Performance. [Masters Thesis]. University of Dayton; 2015. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=dayton1429958352


Luleå University of Technology

5. Rea, Andrea F. Introducing Acceptably Realistic Variations in Human speech Samples Through Granular Synthesis.

Degree: 2014, Luleå University of Technology

This study investigates whether pitch manipulation of pre-segmented voice samples using a commercially available proprietary granular synthesis engine can produce variations realistic enough to… (more)

Subjects/Keywords: Technology; Teknik; granular synthesis; game audio; speech; prosody; speech modulation; limited memory environment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rea, A. F. (2014). Introducing Acceptably Realistic Variations in Human speech Samples Through Granular Synthesis. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-52196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rea, Andrea F. “Introducing Acceptably Realistic Variations in Human speech Samples Through Granular Synthesis.” 2014. Thesis, Luleå University of Technology. Accessed May 20, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-52196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rea, Andrea F. “Introducing Acceptably Realistic Variations in Human speech Samples Through Granular Synthesis.” 2014. Web. 20 May 2019.

Vancouver:

Rea AF. Introducing Acceptably Realistic Variations in Human speech Samples Through Granular Synthesis. [Internet] [Thesis]. Luleå University of Technology; 2014. [cited 2019 May 20]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-52196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rea AF. Introducing Acceptably Realistic Variations in Human speech Samples Through Granular Synthesis. [Thesis]. Luleå University of Technology; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-52196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

6. -4065-8654. Resource-constrained, scalable learning.

Degree: Electrical and Computer Engineering, 2015, University of Texas – Austin

 Our unprecedented capacity for data generation and acquisition often reaches the limits of our data storage capabilities. Situations when data are generated faster or at… (more)

Subjects/Keywords: Resource contraints; Limited memory; Storage; Network; Principle component analysis; PageRank; Graph engines

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-4065-8654. (2015). Resource-constrained, scalable learning. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/32226

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

-4065-8654. “Resource-constrained, scalable learning.” 2015. Thesis, University of Texas – Austin. Accessed May 20, 2019. http://hdl.handle.net/2152/32226.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

-4065-8654. “Resource-constrained, scalable learning.” 2015. Web. 20 May 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-4065-8654. Resource-constrained, scalable learning. [Internet] [Thesis]. University of Texas – Austin; 2015. [cited 2019 May 20]. Available from: http://hdl.handle.net/2152/32226.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

-4065-8654. Resource-constrained, scalable learning. [Thesis]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/32226

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

7. Kang, Yuhong. Mechanisms, Conditions and Applications of Filament Formation and Rupture in Resistive Memories.

Degree: PhD, Electrical and ComputerEngineering, 2015, Virginia Tech

 Resistive random access memory (RRAM), based on a two-terminal resistive switching device with a switching element sandwiched between two electrodes, has been an attractive candidate… (more)

Subjects/Keywords: Keywords: resistive memory; nonvolatile memory; oxide; conductive filament; oxygen vacancy; graphene; quantum conductance; space charge limited conduction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kang, Y. (2015). Mechanisms, Conditions and Applications of Filament Formation and Rupture in Resistive Memories. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/77593

Chicago Manual of Style (16th Edition):

Kang, Yuhong. “Mechanisms, Conditions and Applications of Filament Formation and Rupture in Resistive Memories.” 2015. Doctoral Dissertation, Virginia Tech. Accessed May 20, 2019. http://hdl.handle.net/10919/77593.

MLA Handbook (7th Edition):

Kang, Yuhong. “Mechanisms, Conditions and Applications of Filament Formation and Rupture in Resistive Memories.” 2015. Web. 20 May 2019.

Vancouver:

Kang Y. Mechanisms, Conditions and Applications of Filament Formation and Rupture in Resistive Memories. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 May 20]. Available from: http://hdl.handle.net/10919/77593.

Council of Science Editors:

Kang Y. Mechanisms, Conditions and Applications of Filament Formation and Rupture in Resistive Memories. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/77593

8. Simon, Bertrand. Ordonnancement de graphes de tâches sur des plates-formes de calcul modernes : Scheduling task graphs on modern computing platforms.

Degree: Docteur es, Informatique, 2018, Lyon

Cette thèse porte sur trois thématiques principales liées à l'ordonnancement de graphes de tâches sur des plates-formes de calcul modernes. Un graphe de tâches est… (more)

Subjects/Keywords: Ordonnancement; Graphe de tâche; Tâches parallèles; Plate-forme hybride; Mémoire limitée; Scheduling; Task graph; Parallel tasks; Hybrid platform; Limited memory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Simon, B. (2018). Ordonnancement de graphes de tâches sur des plates-formes de calcul modernes : Scheduling task graphs on modern computing platforms. (Doctoral Dissertation). Lyon. Retrieved from http://www.theses.fr/2018LYSEN022

Chicago Manual of Style (16th Edition):

Simon, Bertrand. “Ordonnancement de graphes de tâches sur des plates-formes de calcul modernes : Scheduling task graphs on modern computing platforms.” 2018. Doctoral Dissertation, Lyon. Accessed May 20, 2019. http://www.theses.fr/2018LYSEN022.

MLA Handbook (7th Edition):

Simon, Bertrand. “Ordonnancement de graphes de tâches sur des plates-formes de calcul modernes : Scheduling task graphs on modern computing platforms.” 2018. Web. 20 May 2019.

Vancouver:

Simon B. Ordonnancement de graphes de tâches sur des plates-formes de calcul modernes : Scheduling task graphs on modern computing platforms. [Internet] [Doctoral dissertation]. Lyon; 2018. [cited 2019 May 20]. Available from: http://www.theses.fr/2018LYSEN022.

Council of Science Editors:

Simon B. Ordonnancement de graphes de tâches sur des plates-formes de calcul modernes : Scheduling task graphs on modern computing platforms. [Doctoral Dissertation]. Lyon; 2018. Available from: http://www.theses.fr/2018LYSEN022


University of Alabama

9. Miesse, Sarah E. The influence of risky and sexy video game content on motivational activation, emotional responding and cognition.

Degree: 2009, University of Alabama

 Humans are limited in what they can encode, store and retrieve. Humans also enjoy media such as video games, and usually video games contain the… (more)

Subjects/Keywords: Electronic Thesis or Dissertation;  – thesis; Mass Communications; Psychology, Cognitive; Limited Capacity; Memory; Risky; Sexy; Video Games

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miesse, S. E. (2009). The influence of risky and sexy video game content on motivational activation, emotional responding and cognition. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/110

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miesse, Sarah E. “The influence of risky and sexy video game content on motivational activation, emotional responding and cognition.” 2009. Thesis, University of Alabama. Accessed May 20, 2019. http://purl.lib.ua.edu/110.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miesse, Sarah E. “The influence of risky and sexy video game content on motivational activation, emotional responding and cognition.” 2009. Web. 20 May 2019.

Vancouver:

Miesse SE. The influence of risky and sexy video game content on motivational activation, emotional responding and cognition. [Internet] [Thesis]. University of Alabama; 2009. [cited 2019 May 20]. Available from: http://purl.lib.ua.edu/110.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Miesse SE. The influence of risky and sexy video game content on motivational activation, emotional responding and cognition. [Thesis]. University of Alabama; 2009. Available from: http://purl.lib.ua.edu/110

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Adkins, Bennie Jean. An identification of musical ability, academic achievement and environmental influences of culturally disadvantaged third-grade pupils.

Degree: MA, Music Education, 1972, Texas Woman's University

Subjects/Keywords: Melodic memory study; Limited cultural experience; Home musical environment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adkins, B. J. (1972). An identification of musical ability, academic achievement and environmental influences of culturally disadvantaged third-grade pupils. (Masters Thesis). Texas Woman's University. Retrieved from http://hdl.handle.net/11274/10897

Chicago Manual of Style (16th Edition):

Adkins, Bennie Jean. “An identification of musical ability, academic achievement and environmental influences of culturally disadvantaged third-grade pupils.” 1972. Masters Thesis, Texas Woman's University. Accessed May 20, 2019. http://hdl.handle.net/11274/10897.

MLA Handbook (7th Edition):

Adkins, Bennie Jean. “An identification of musical ability, academic achievement and environmental influences of culturally disadvantaged third-grade pupils.” 1972. Web. 20 May 2019.

Vancouver:

Adkins BJ. An identification of musical ability, academic achievement and environmental influences of culturally disadvantaged third-grade pupils. [Internet] [Masters thesis]. Texas Woman's University; 1972. [cited 2019 May 20]. Available from: http://hdl.handle.net/11274/10897.

Council of Science Editors:

Adkins BJ. An identification of musical ability, academic achievement and environmental influences of culturally disadvantaged third-grade pupils. [Masters Thesis]. Texas Woman's University; 1972. Available from: http://hdl.handle.net/11274/10897


Brno University of Technology

11. Popelová, Lucie. Metody post-kvantové kryptografie .

Degree: 2018, Brno University of Technology

 V posledních desítkách let dochází k radikálnímu technologickému vývoji, který se mimo jiné orientuje i na kvantové počítače. V případě budoucího využití Shorova algoritmu na… (more)

Subjects/Keywords: postkvantová kryptografie; Raspberry Pi 3; Frodo; New Hope; Kyber; NTRU; BCNS; McBits; SIDH; SIKE; Picnic; výpočetně omezené zařízení; paměťově omezené zařízení; postquantum cryptography; Raspberry Pi 3; Frodo; New Hope; Kyber; NTRU; BCNS; McBits; SIDH; SIKE; Picnic; computationally limited device; memory limited device

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Popelová, L. (2018). Metody post-kvantové kryptografie . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/81979

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Popelová, Lucie. “Metody post-kvantové kryptografie .” 2018. Thesis, Brno University of Technology. Accessed May 20, 2019. http://hdl.handle.net/11012/81979.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Popelová, Lucie. “Metody post-kvantové kryptografie .” 2018. Web. 20 May 2019.

Vancouver:

Popelová L. Metody post-kvantové kryptografie . [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2019 May 20]. Available from: http://hdl.handle.net/11012/81979.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Popelová L. Metody post-kvantové kryptografie . [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/81979

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Brasília

12. Vinícius de Morais Alves. Protocolo de comprometimento de BIT eficiente com segurança sequencial baseado no modelo de memória limitada.

Degree: 2010, Universidade de Brasília

 O Comprometimento de Bit é uma primitiva criptográ_ca fundamental usada para construir provas de conhecimento nulo e computação segura distribuída. Ueli Maurer [Mau93] introduziu o… (more)

Subjects/Keywords: Segurança incondicional; primitivas criptográficas; capacidade de comprometimento; Unconditional security, cryptographic primitive, commitment bit; comprometimento de bit; modelo de memória limitada; TELECOMUNICACOES; model of limited memory, ability to compromise

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alves, V. d. M. (2010). Protocolo de comprometimento de BIT eficiente com segurança sequencial baseado no modelo de memória limitada. (Thesis). Universidade de Brasília. Retrieved from http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=6975

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alves, Vinícius de Morais. “Protocolo de comprometimento de BIT eficiente com segurança sequencial baseado no modelo de memória limitada.” 2010. Thesis, Universidade de Brasília. Accessed May 20, 2019. http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=6975.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alves, Vinícius de Morais. “Protocolo de comprometimento de BIT eficiente com segurança sequencial baseado no modelo de memória limitada.” 2010. Web. 20 May 2019.

Vancouver:

Alves VdM. Protocolo de comprometimento de BIT eficiente com segurança sequencial baseado no modelo de memória limitada. [Internet] [Thesis]. Universidade de Brasília; 2010. [cited 2019 May 20]. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=6975.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alves VdM. Protocolo de comprometimento de BIT eficiente com segurança sequencial baseado no modelo de memória limitada. [Thesis]. Universidade de Brasília; 2010. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=6975

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vrije Universiteit Amsterdam

13. Li, X. Temporary Price Deviation, Limited Attention and Information Acquisition in the Stock Market .

Degree: 2014, Vrije Universiteit Amsterdam

Subjects/Keywords: Limited Attention; Information Acquisition; Market Microstructure; Price Deviation; Long Memory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, X. (2014). Temporary Price Deviation, Limited Attention and Information Acquisition in the Stock Market . (Doctoral Dissertation). Vrije Universiteit Amsterdam. Retrieved from http://hdl.handle.net/1871/50923

Chicago Manual of Style (16th Edition):

Li, X. “Temporary Price Deviation, Limited Attention and Information Acquisition in the Stock Market .” 2014. Doctoral Dissertation, Vrije Universiteit Amsterdam. Accessed May 20, 2019. http://hdl.handle.net/1871/50923.

MLA Handbook (7th Edition):

Li, X. “Temporary Price Deviation, Limited Attention and Information Acquisition in the Stock Market .” 2014. Web. 20 May 2019.

Vancouver:

Li X. Temporary Price Deviation, Limited Attention and Information Acquisition in the Stock Market . [Internet] [Doctoral dissertation]. Vrije Universiteit Amsterdam; 2014. [cited 2019 May 20]. Available from: http://hdl.handle.net/1871/50923.

Council of Science Editors:

Li X. Temporary Price Deviation, Limited Attention and Information Acquisition in the Stock Market . [Doctoral Dissertation]. Vrije Universiteit Amsterdam; 2014. Available from: http://hdl.handle.net/1871/50923

14. Horváth, Gergely. Three essays on dynamic processes and information flow on social networks.

Degree: 2018, Universidad de Alicante

Subjects/Keywords: Social networks; Labor market search; Homophily; Occupational mismatch; Wages; Evolution of cooperation; Limited memory; Reputation; Fundamentos del Análisis Económico

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Horváth, G. (2018). Three essays on dynamic processes and information flow on social networks. (Thesis). Universidad de Alicante. Retrieved from http://hdl.handle.net/10045/22855

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Horváth, Gergely. “Three essays on dynamic processes and information flow on social networks.” 2018. Thesis, Universidad de Alicante. Accessed May 20, 2019. http://hdl.handle.net/10045/22855.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Horváth, Gergely. “Three essays on dynamic processes and information flow on social networks.” 2018. Web. 20 May 2019.

Vancouver:

Horváth G. Three essays on dynamic processes and information flow on social networks. [Internet] [Thesis]. Universidad de Alicante; 2018. [cited 2019 May 20]. Available from: http://hdl.handle.net/10045/22855.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Horváth G. Three essays on dynamic processes and information flow on social networks. [Thesis]. Universidad de Alicante; 2018. Available from: http://hdl.handle.net/10045/22855

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Lu, Di. STL on Limited Local Memory (LLM) Multi-core Processors.

Degree: MS, Computer Science, 2012, Arizona State University

Limited Local Memory (LLM) multicore architectures are promising powerefficient architectures will scalable memory hierarchy. In LLM multicores, each core can access only a small local… (more)

Subjects/Keywords: Computer science; Computer engineering; IBM Cell; Limited Local Memory; LLM; SPE; STL

…distributes data and tasks to the PEs. On each PE, there is a limited local memory, accessible by… …implementations assume the presence of unlimited memory on each core, which is not true for Limited… …organized as follows. In Chapter 2, we will introduce the background of Limited Local Memory (… …local memory of LLM core. 3 Chapter 2 BACKGROUND 2.1 Limited Local Memory architecture The… …Limited Local Memory (LLM) multicore architecture is an emerging memory hierarchy for… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, D. (2012). STL on Limited Local Memory (LLM) Multi-core Processors. (Masters Thesis). Arizona State University. Retrieved from http://repository.asu.edu/items/14567

Chicago Manual of Style (16th Edition):

Lu, Di. “STL on Limited Local Memory (LLM) Multi-core Processors.” 2012. Masters Thesis, Arizona State University. Accessed May 20, 2019. http://repository.asu.edu/items/14567.

MLA Handbook (7th Edition):

Lu, Di. “STL on Limited Local Memory (LLM) Multi-core Processors.” 2012. Web. 20 May 2019.

Vancouver:

Lu D. STL on Limited Local Memory (LLM) Multi-core Processors. [Internet] [Masters thesis]. Arizona State University; 2012. [cited 2019 May 20]. Available from: http://repository.asu.edu/items/14567.

Council of Science Editors:

Lu D. STL on Limited Local Memory (LLM) Multi-core Processors. [Masters Thesis]. Arizona State University; 2012. Available from: http://repository.asu.edu/items/14567


Brno University of Technology

16. Fujdiak, Radek. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice .

Degree: 2017, Brno University of Technology

 Telemetrické systémy, optimalizace, senzorické sítě, inteligentní sítě, internet věcí, senzory, informační bezpečnost, kryptografie, kryptografické algoritmy, kryptosystém, důvěrnost, integrita, autentičnost, čerstvost, nepopiratelnost.; Telemetry system, Optimisation, Sensoric… (more)

Subjects/Keywords: Dizertační práce se zabývá výzkumem v oblasti optimalizace telemetrických systémů v energetice z pohledu informační bezpečnosti. Práce pojednává o současných problémech informační bezpečnosti; její definici a i o metodách; které vedou k naplnění bezpečnostních principů; a soustředí se zejména na oblast; kde jsou využívány zařízení s omezenými zdroji To z toho důvodu; že zařízení s limitovanými zdroji; tj. operační paměť; omezený přístup k elektrické energii; výkon; aj.; představují bezpečnostní rizika; která mohou ovlivňovat následně celou energetickou infrastrukturu v případě nasazení technologií v konceptu inteligentních sítí. Jsou přiblíženy dnešní vědecké výzvy v této oblasti; objasněna terminologie i legislativa; která je pro tuto oblast také velice zásadní. Hlavní část dizertační práce je následně věnována výzkumu vlastního hybridního řešení; kryptosystému. Jedná se o řešení; které nenaplňuje pouze jeden bezpečnostní princip (např. pouze autentičnost); nýbrž o řešení; které nabízí všechny požadované principy informační bezpečnosti v energetice. Je provedena hloubková analýza dnešních řešení; které jsou následně evaluovány vlastními měřeními i pomocí současné aktuální literatury. Následně je proveden návrh kombinací symetrických a asymetrických kryptografických algoritmů; tak aby byla zaručena efektivita výsledného systému; ale také zachována jeho komplexnost systému. Jedná se o kombinaci symetrických blokových algoritmů elektronické kódové knihy; zajišťující autentizaci a integritu pomocí náhodných klíčů; řetězení šifrovaného textu zajišťující důvěrnost; společně s algoritmem Diffieho-Hellmana nad eliptickými křivkami zajišťující bezpečnou distribuci a výměnu symetrických tajných klíčů. V neposlední řadě je přiblížen provedený vlastní vývoj a optimalizace hybridního kryptosystému. Je představeno vlastní řešení pro reprezentaci velkých čísel a modulární algebru v zařízení s limitovanými zdroji; které je ověřeno experimentálními měřeními. Dále je rozebrán vlastní návrh; validace a optimalizace řešení náhodných hardwarových generátorů (založených na efektivním principu kvantizační chyby a protichůdných oscilátorů). Je také řešena navržená část symetrické kryptografie; kde je využito dvou dostupných knihoven; které jsou následně znatelně optimalizovány. V neposlední řadě je představen provedený rozsáhlý výzkum kryptografie eliptických křivek a možností distribuce symetrického klíče. Jsou implementovány algoritmy pro výpočty s body eliptických křivek nad polem s prvočíselným řádem i nad polem řádu 2. Realizace pak zahrnovala více než 50 eliptických křivek různých standardů; kde největším úspěchem jsou křivky nad polem prvočísel o řádu p = 256. Tyto křivky v době řešení nebyly na takto hardwarových platformách řešeny. Nakonec jsou představeny originální výsledky výzkumu; který se zabýval vhodnou volbou křivek a studií jejich doménových parametrů z pohledu vztahu velikosti k rychlosti operací nad křivkou.; The dissertation thesis focuses on research in the optimisation of telemetry systems in energy from the perspective of information security. The thesis deals with nowadays challenges in information security; its definition as well as its methods. The main focus is on the area; where devices with limited resources such as memory or computational power are used. These devices pose security risks that may affect the entire smart grid infrastructure. Nowadays research challenges terminology and legislative; which is crucial in the defined area; are brought closer. The main part of this thesis is devoted to the research of the author’s own hybrid solution – the hybrid cryptosystem. The solution fulfils all necessary principles of information security – authenticity; confidentiality; integrity and data freshness. An analysis of today’s solutions is provided together with a complex evaluation based on own experimental measurements and available literature sources. Subsequently; a combination of symmetric and asymmetric cryptography algorithms is designed that provides both high efficiency and complexity. It is a combination of the symmetric block cyphers Electronic Code Book; which provides authenticity and integrity by using random keys; Cipher Block Chaining; which provided confidentiality; and the asymmetric algorithm of Diffie-Hellman over Elliptic Curves; which provides key agreement scheme over an unsecured channel. Further; the development and optimisation of the hybrid cryptosystem are brought in light. The proprietary solution of large number representation and modular algebra in a device with limited resources is presented and validated via own experimental measurements. Moreover; the own design is analysed and the two proposed hardware generators (based on efficient methods of quantization error and opposing oscillators) are evaluated and optimised. Additionally; the symmetric part of the cryptosystem is also investigated; where two main solutions are highly optimised. Last but not least; deep research on the cryptography of elliptic curves and the key distribution scheme is presented. Two main curve types are dealt with – over a finite field and over a field of characteristic two. The implementation included more than 50 elliptic curves of different standards. The implementation of the curves of order p = 256 has the highest impact. These curves were not addressed on such devices at the time of solution. Finally; the original research results of possible speed optimisation via using special elliptic curves are introduced. The relationship between curve domain parameters and point computational efficiency is studied. This last part brings also promising results for the field of effective cryptographic algorithm – the lightweight cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fujdiak, R. (2017). Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fujdiak, Radek. “Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice .” 2017. Thesis, Brno University of Technology. Accessed May 20, 2019. http://hdl.handle.net/11012/69305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fujdiak, Radek. “Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice .” 2017. Web. 20 May 2019.

Vancouver:

Fujdiak R. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 May 20]. Available from: http://hdl.handle.net/11012/69305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fujdiak R. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/69305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.