To see the other types of publications on this topic, follow the link: Computer Science and Technology. Computing.

Dissertations / Theses on the topic 'Computer Science and Technology. Computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer Science and Technology. Computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Eltony, Amira M. (Amira Madeleine). "Scalable trap technology for quantum computing with ions." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99822.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages [187]-214).<br>Quantum computers employ quantum mechanical effects, such as superposition and entanglement, to process information in a distinctive way, with advantages for simulation and for new, and in some cases more-efficient algorithms. A quantum bit is a two-level quantum system, such as the electronic or spin state of a trapped atomic ion. Physics experiments with single atomic ions acting as "quantum bits" have demonstrated many of the ingredients for a quantum computer. But to perform useful computations these experimental systems will need to be vastly scaled-up. Our goal is to engineer systems for large-scale quantum computation with trapped ions. Building on established techniques of microfabrication, we create ion traps incorporating exotic materials and devices, and we investigate how quantum algorithms can be efficiently mapped onto physical trap hardware. An existing apparatus built around a bath cryostat is modified for characterization of novel ion traps and devices at cryogenic temperatures (4 K and 77 K). We demonstrate an ion trap on a transparent chip with an integrated photodetector, which allows for scalable, efficient state detection of a quantum bit. To understand and better control electric field noise (which limits gate fidelities), we experiment with coating trap electrodes in graphene. We develop traps compatible with standard CMOS manufacturing to leverage the precision and scale of this platform, and we design a Single Instruction Multiple Data (SIMD) algorithm for implementing the QFT using a distributed array of ion chains. Lastly, we explore how to bring it all together to create an integrated trap module from which a scalable architecture can be assembled.<br>by Amira M. Eltony.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
2

Wolcott, Peter. "Soviet advanced technology: The case of high-performance computing." Diss., The University of Arizona, 1993. http://hdl.handle.net/10150/186298.

Full text
Abstract:
This study uses Soviet high-performance computing (HPC) as a vehicle to study technological innovation, organizational transformation, and the R&D of advanced technologies in centralized-directive economies in the past and during periods of transition. Case studies are used to identify the factors most strongly influencing the evolution of high-performance systems and the facilities within which they were developed. Although closely tied to the military, the HPC sector was not able to overcome basic systemic and technological difficulties. HPC illustrates the limits of centralized-directive economic management's ability to coordinate and prioritize development and production of highly complex, rapidly evolving technologies. Projects were delayed by complex bureaucratic structures, the monopolistic nature of the supporting infrastructure, and resistance of production factories. Progress of individual projects was dependent on the degree to which they drove supporting industries, used immature technologies, had an industrial vs. academic orientation, and were developed in conjunction with production facilities. The benefits of the reforms--direct contacts between organizations, increased local control of finances and research, greater flexibility in the management of R&D, and improved opportunities for international contacts--have been overshadowed by economic decline and fundamental weaknesses in the supporting infrastructure. R&D facilities have been transformed into a collection of loosely-coupled semi-autonomous organizational units, increasing short-term viability, but threatening their ability to carry out large-scale, long-term, integrated development. Links between R&D and production facilities have been disrupted. The upstream infrastructure remains ill-suited for providing the technologies necessary for HPC development. Preconditions to long-term viability are restoration of the integrity of the development-production cycle and reduction of the HPC sector's dependency on domestic industries. Taking advantage of mass-produced Western technologies will require changes in philosophies of development and architectural approaches. The concept of a unified sector-wide technological paradigm is not well suited for explaining the diversity of architectural approaches and specific development trajectories. A paradigm consisting of layers of "micro-paradigms" better captures the patterns of continuity and change within projects and features shared between projects. This study suggests that the nature of the revenue stream and the opportunities for alternative organizational forms have a significant influence on organizational structure.
APA, Harvard, Vancouver, ISO, and other styles
3

Care, Charles. "From analogy-making to modelling : the history of analog computing as a modelling technology." Thesis, University of Warwick, 2008. http://wrap.warwick.ac.uk/2381/.

Full text
Abstract:
Today, modern computers are based on digital technology. However, during the decades after 1940, digital computers were complemented by the separate technology of analog computing. But what was analog computing, what were its merits, and who were its users? This thesis investigates the conceptual and technological history of analog computing. As a concept, analog computing represents the entwinement of a complex pre-history of meanings, including calculation, modelling, continuity and analogy. These themes are not only landmarks of analog's etymology, but also represent the blend of practices, ways of thinking, and social ties that together comprise an `analog culture'. The first half of this thesis identifies how the history of this technology can be understood in terms of the two parallel themes of calculation and modelling. Structuring the history around these themes demonstrates that technologies associated with modelling have less representation in the historiography. Basing the investigation around modelling applications, the thesis investigates the formation of analog culture. The second half of this thesis applies the themes of modelling and information generation to understand analog use in context. Through looking at examples of analog use in academic research, oil reservoir modelling, aeronautical design, and meteorology, the thesis explores why certain communities used analog and considers the relationship between analog and digital in these contexts. This study demonstrates that analog modelling is an example of information generation rather than information processing. Rather than focusing on the categories of analog and digital, it is argued that future historical scholarship in this field should give greater prominence to the more general theme of modelling.
APA, Harvard, Vancouver, ISO, and other styles
4

Nivens, Ryan Andrew. "Computing in STEM." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cady, Donna. "An Investigation of the Effects of The Integration of Computing Technology in a Science Curriculum on Female Students' Self-Efficacy Beliefs Toward Computing." NSUWorks, 2005. http://nsuworks.nova.edu/gscis_etd/438.

Full text
Abstract:
Literature indicates clear evidence that women are underrepresented in computer related fields of study and professions. This gender inequity can be attributed to women's lack of interest and participation in the use of technology (American Association of University Women, 2000). Since males and females display a similar interest in technology during their early school years, it is perplexing that such a large gender gap exists by high school (Oliveri, 2004). One of the major factors influencing technology acceptance is self-efficacy toward computing (Emurian, 2004). The purpose of this study was to investigate the role that a computer-enhanced curriculum played in influencing female students' self-efficacy beliefs toward computing. Literature indicates that female students enjoy working on tasks that are interdisciplinary in nature. This is especially true with regards to technology (Margolis & Fisher, 2003). If the computer-enhanced curriculum is linked to other subject areas, it is more likely to be appealing to young women (Clark, 2003). Traditional computer courses are typically taught as an isolated curriculum. If female students can understand that technology can be used for more than just programming, they may be more apt to become actively involved and increase their self-efficacy beliefs. The results of this study demonstrated that female students who participated in an integrated approach to computing had significantly higher self-efficacy beliefs toward computing than students who participated in a traditional computer class. The students using the integrated model of instruction became more engaged with technology. The female students in this group enjoyed learning about computers and developed confidence needed to complete technology tasks. The results of this study offer a possible solution for changing female students' decisions to enroll in computer courses.
APA, Harvard, Vancouver, ISO, and other styles
6

Sheng, Bo. "Building efficient wireless infrastructures for pervasive computing environments." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623557.

Full text
Abstract:
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but networked with each other through wireless channels so that people can easily control and access them. In the architecture of pervasive computing systems, these small and networked computing devices form a wireless infrastructure layer to support various functionalities in the upper application layer.;In practical applications, the wireless infrastructure often plays a role of data provider in a query/reply model, i.e., applications issue a query requesting certain data and the underlying wireless infrastructure is responsible for replying to the query. This dissertation has focused on the most critical issue of efficiency in designing such a wireless infrastructure. In particular, our problem resides in two domains depending on different definitions of efficiency. The first definition is time efficiency, i.e., how quickly a query can be replied. Many applications, especially real-time applications, require prompt response to a query as the consequent operations may be affected by the prior delay. The second definition is energy efficiency which is extremely important for the pervasive computing devices powered by batteries. Above all, our design goal is to reply to a query from applications quickly and with low energy cost.;This dissertation has investigated two representative wireless infrastructures, sensor networks and RFID systems, both of which can serve applications with useful information about the environments. We have comprehensively explored various important and representative problems from both algorithmic and experimental perspectives including efficient network architecture design and efficient protocols for basic queries and complicated data mining queries. The major design challenges of achieving efficiency are the massive amount of data involved in a query and the extremely limited resources and capability each small device possesses. We have proposed novel and efficient solutions with intensive evaluation. Compared to the prior work, this dissertation has identified a few important new problems and the proposed solutions significantly improve the performance in terms of time efficiency and energy efficiency. Our work also provides referrable insights and appropriate methodology to other similar problems in the research community.
APA, Harvard, Vancouver, ISO, and other styles
7

Le, Duy. "Understanding and Leveraging Virtualization Technology in Commodity Computing Systems." W&M ScholarWorks, 2012. https://scholarworks.wm.edu/etd/1539623603.

Full text
Abstract:
Commodity computing platforms are imperfect, requiring various enhancements for performance and security purposes. In the past decade, virtualization technology has emerged as a promising trend for commodity computing platforms, ushering many opportunities to optimize the allocation of hardware resources. However, many abstractions offered by virtualization not only make enhancements more challenging, but also complicate the proper understanding of virtualized systems. The current understanding and analysis of these abstractions are far from being satisfactory. This dissertation aims to tackle this problem from a holistic view, by systematically studying the system behaviors. The focus of our work lies in performance implication and security vulnerabilities of a virtualized system.;We start with the first abstraction---an intensive memory multiplexing for I/O of Virtual Machines (VMs)---and present a new technique, called Batmem, to effectively reduce the memory multiplexing overhead of VMs and emulated devices by optimizing the operations of the conventional emulated Memory Mapped I/O in hypervisors. Then we analyze another particular abstraction---a nested file system---and attempt to both quantify and understand the crucial aspects of performance in a variety of settings. Our investigation demonstrates that the choice of a file system at both the guest and hypervisor levels has significant impact upon I/O performance.;Finally, leveraging utilities to manage VM disk images, we present a new patch management framework, called Shadow Patching, to achieve effective software updates. This framework allows system administrators to still take the offline patching approach but retain most of the benefits of live patching by using commonly available virtualization techniques. to demonstrate the effectiveness of the approach, we conduct a series of experiments applying a wide variety of software patches. Our results show that our framework incurs only small overhead in running systems, but can significantly reduce maintenance window.
APA, Harvard, Vancouver, ISO, and other styles
8

Chowdhury, Naser. "Factors Influencing the Adoption of Cloud Computing Driven by Big Data Technology| A Quantitative Study." Thesis, Capella University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10846772.

Full text
Abstract:
<p>A renewed interest in cloud computing adoption has occurred in academic and industry settings because emerging technologies have strong links to cloud computing and Big Data technology. Big Data technology is driving cloud computing adoption in large business organizations. For cloud computing adoption to increase, cloud computing must transition from low-level technology to high-level business solutions. The purpose of this study was to develop a predictive model for cloud computing adoption that included Big Data technology-related variables, along with other variables from two widely used technology adoption theories: technology acceptance model (TAM), and technology-organization-environment (TOE). The inclusion of Big Data technology-related variables extended the cloud computing?s mix theory adoption approach. The six independent variables were perceived usefulness, perceived ease of use, security effectiveness, the cost-effectiveness, intention to use Big Data technology, and the need for Big Data technology. Data collected from 182 U.S. IT professionals or managers were analyzed using binary logistic regression. The results showed that the model involving six independent variables was statistically significant for predicting cloud computing adoption with 92.1% accuracy. Independently, perceived usefulness was the only predictor variable that can increase cloud computing adoption. These results indicate that cloud computing may grow if it can be leveraged into the emerging Big Data technology trends to make cloud computing more useful for its users.
APA, Harvard, Vancouver, ISO, and other styles
9

Tomar, Mohit. "Comparative analysis of load balancing algorithms in cloud computing." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10262288.

Full text
Abstract:
<p> Cloud computing is a novel trend emerging in Information Technology (IT) environments with immense infrastructure and resources. An integral aspect of cloud computing is load balancing. Efficient load balancing in cloud computing ensures effective resource utilization. There are two types of load balancers: the static load balancer and the dynamic load balancer. While both types of load balancers are widely used in the industry, they differ in performance. In this project, the performances of the most widely used static and dynamic load balancers, namely the round robin and the throttled, are compared. Specifically, the project examines whether the throttled algorithm takes less time than the round robin algorithm to access data in cloud computing. The results show that the throttled algorithm takes less time than the round robin algorithm to access data, and that this difference is due to a faultiness in the implementation of the round robin algorithm.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Sayler, Andy. "Securing Secrets and Managing Trust in Modern Computing Applications." Thesis, University of Colorado at Boulder, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108746.

Full text
Abstract:
<p> The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control access to these secrets is a significant challenge: such secrets must be stored in a manner that protects them from a variety of potentially malicious actors while still enabling the kinds of functionality users expect. </p><p> This dissertation discusses a system for isolating secrets from the applications that rely on them and storing these secrets via a standardized, service-oriented secret storage system. This &ldquo;Secret Storage as a Service&rdquo; (SSaaS) model allows users to reduce the trust they must place in any single actor while still providing mechanisms to support a range of cloud-based, multi-user, and multi-device use cases. </p><p> This dissertation contains the following contributions: an overview of the secret-storage problem and how it relates to the security and privacy of modern computing systems and users, a framework for evaluating the degree by which one must trust various actors across a range of popular use cases and the mechanisms by which this trust can be violated, a description of the SSaaS model and how it helps avoid such trust and security failures, a discussion of how the SSaaS approach can integrate with and improve the security of a range of applications, an overview of Custos &ndash; a first-generation SSaaS prototype, an overview of Tutamen &ndash; a next-generation SSaaS prototypes, and an exploration of the legal and policy implications of the SSaaS ecosystem. </p>
APA, Harvard, Vancouver, ISO, and other styles
11

Brow, Raymond A. "A systems thinking approach to cloud computing that complements the NIST guidance." Thesis, Capitol College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3585011.

Full text
Abstract:
<p> The move to cloud computing as mandated by the US federal CIO (Kundra, 2010) is one of the key initiatives expected to provide relief from US federal IT budget concerns. NIST was commissioned to provide guidance for the move. Federal agencies expressed concern that the guidance provided to them was deficient and GAO (2012) further stated that more planning was required. There is no research investigating the possible role systems thinking could play for complementing the NIST guidance and enhancing the planning. This study presents systems thinking as a complementary option to the NIST guidance. Using a mixed method, this study demonstrates first, quantitatively through content analysis that the NIST documentation does not take a systems thinking approach. Then secondly, this study qualitatively explores a systems thinking framework to supplement the NIST guidance. The framework is established based upon a thorough review of current scholarship in the areas of systems thinking and cloud computing using the established tools and methods of content analysis. The review of cloud computing demonstrates the diversity, complexity, and uncertainty of the technology. Systems thinking is shown to address just such situations. Based upon the research, a systems thinking framework is created that demonstrates how systems thinking could supplement the NIST guidance on moving to the cloud. Through the application of the framework US federal agencies could more confidently manage the risk of moving US federal assets to the cloud and thereby gain a firmer foothold in arresting the IT budget concerns.</p>
APA, Harvard, Vancouver, ISO, and other styles
12

Stapleton, Ross Alan. "Personal computing in the CEMA community: A study of international technology development and management." Diss., The University of Arizona, 1989. http://hdl.handle.net/10150/184767.

Full text
Abstract:
The dissertation covers a spectrum of issues relating to the creation, acquisition and application of personal computers in the CEMA economies. Personal computing is examined through five stages, each a step in the process of integration of personal computing into the economies. They consider personal computing as: (1) Paradigm, how the Soviets and East Europeans view personal computing and how that relates to Western developments; (2) Technology, with discussion of indigenous capabilities of the CEMA members. Major topics are the Soviet microprocessor inventory, and the mechanisms whereby indigenous capabilities are increased, in particular via technology transfer; (3) Commodity, relating the technologies to actual products and production levels achieved. This stage also considers the availability of external sources (trade) for technology embodied as products; (4) Tool, discussing the products in application. The major application areas, including computer literacy education, are described. (5) Change, summarizing the current and expected social and economic effects of personal computing. The greatest emphasis is placed on the first three stages, which have progressed to the point where strong conclusions may be drawn. Achievements in personal computing application vary greatly across the CEMA community, and the coverage is directed to two case studies of Hungary and the USSR. Analysis of the last stage is necessarily largely speculative. Problems encountered in the promotion of personal computing, almost all arising out of economic and technological deficiencies, have rendered moot many questions related to the social effects of personal computing. The research shows that personal computing, in particular as it acts as a commodity, is largely alien to current CEMA economic management, and that the CEMA economies are having a difficult time in the creation or acquisition and support of PCs. This prevents their appearance in sufficient quantity to be useful as tools, or to effect change. The dissertation concludes with predictions of the nature of personal computing in the CEMA community over the next decade, and an analysis of the current and future relationship of the CEMA community to the rest of the world, especially for technology and commodity transfer from the developed West and newly-industrializing countries.
APA, Harvard, Vancouver, ISO, and other styles
13

Laprade, Craig. "Domain Name Service Trust Delegation in Cloud Computing: Exploitation, Risks, and Defense." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28156620.

Full text
Abstract:
The Domain Name Service (DNS) infrastructure is a global distributed database that links human readable domain names with the Internet Protocol (IP) addresses of the resources that power the internet. With the explosion of cloud computing over the past decade, increasing proportions of organizations' computing services have moved from on-premise solutions to cloud providers. These services range from complete DNS management to singular services such as E-mail or a payroll application. Each of these outsourced services requires a trust delegation, that is, the owning organization needs to advertise to the world, often by DNS records, that another organization can act authoritatively on its behalf. What occurs when these trust delegations are misused? In this work, I explore the methods that can be used to exploit DNS trust delegation and then examine the top 1% of the most popular domains in the world for the presence of these exploitable vulnerabilities. Finally, I conclude with methods of defense against such attacks and the publishing of a novel tool to detect these vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
14

Young, Jeffrey. "Dynamic partitioned global address spaces for high-efficiency computing." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26467.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Yalamanchili, Sudhakar; Committee Member: Riley, George; Committee Member: Schimmel, David. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
15

Flori, Katherine. "Using Computing Technology in an Interdisciplinary Theater Curriculum for Urban High School Seniors." NSUWorks, 2007. http://nsuworks.nova.edu/gscis_etd/519.

Full text
Abstract:
In response to the technology explosion and to poor student performance on standardized exams nationwide, new education standards are being created at the federal, state and local levels. Yet, with all these innovations and a renewed focus on high schools, students graduate under-prepared for the job market or for higher education. Moreover, they lack the motivation to make the most of their final year of high school. This dissatisfaction promotes a systemic disengagement that is exacerbated in the exit year, known as senioritis. Fifty New York City high school seniors participated in a study to determine whether participation in a technology-infused, interdisciplinary program would encourage them to maintain their grades and attendance. The Experimental Group was comprised of 25 seniors involved in Art, Theater, Music, and Business classes. The Control Group was created from the remaining senior student body. A pool of Control Group students matching each Experimental Group participant in gender, academic average, and number of days absent was created. From each pool of matches, a Control Group participant was randomly selected. The common goal of the Experimental Group was the successful production of a play. This team effort brought together students and teachers in all involved disciplines. Students in this skills driven, results-oriented environment developed the 21th Century workplace skills of collaboration, creativity and cross-disciplinary thinking. Further, they applied their existing software skills, learned new ones as the need presented itself, and employed the appropriate technology tool for the task at hand. At term's end, academic averages and attendance records of both groups were compared using the data from the last term of the junior year as a baseline. While both groups maintained their academic averages, the Experimental Group also maintained its attendance. There was no significant difference between the two terms in the number of days absent of the Experimental Group. However, the Control Group significantly increased the number of days absent as compared with the previous term. The data suggests that one remedy for senioritis is engaging seniors in a technology rich, authentic workplace environment that cultivates 21 $I Century workplace skills.
APA, Harvard, Vancouver, ISO, and other styles
16

Barbosa, Maria Isabel Plácido Rodrigues. "Informação no projecto de arquitectura-um modelo para a comunicação à obra." Phd thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Arquitectura, 1999. http://dited.bn.pt:80/29110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Agostinho, Francisco Santos 1960. "Do desenho de uma Igreja à cidade de Lisboa em 1520-uma visão informática." Phd thesis, Instituições portuguesas -- UTL-Universidade Técnica de Lisboa -- -Faculdade de Arquitectura, 2000. http://dited.bn.pt:80/29213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Saleh, Mehdi. "Virtualization and self-organization for utility computing." Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5026.

Full text
Abstract:
We present an alternative paradigm for utility computing when the delivery of service is subject to binding contracts; the solution we propose is based on resource virtualization and a self-management scheme. A virtual cloud aggregates set virtual machines to work in concert for the tasks specified by the service agreement. A first step for the establishment of a virtual cloud is to create a scale-free overlay network through a biased random walk; scale-free networks enjoy a set of remarkable properties such as: robustness against random failures, favorable scaling, and resilience to congestion, small diameter, and average path length. Constrains such as limits on the cost of per unit of service, total cost, or the requirement to use only "green" computing cycles are then considered when a node of this overlay network decides whether to join the virtual cloud or not. A VIRTUAL CLOUD consists of a subset of the nodes assigned to the tasks specified by a Service Level Agreement, SLA, as well as a virtual interconnection network, or overlay network, for the virtual cloud. SLAs could serve as a congestion control mechanism for an organization providing utility computing; this mechanism allows the system to reject new contracts when there is the danger of overloading the system and failing to fulfill existing contractual obligations. The objective of this thesis is to show that biased random walks in power law networks are capable of responding to dynamic changes of the workload in utility computing.<br>ID: 029809025; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (M.S.)--University of Central Florida, 2011.; Includes bibliographical references (p. 65-68).<br>M.S.<br>Masters<br>Electrical Engineering and Computer Science<br>Engineering and Computer Science<br>Electrical Engineering
APA, Harvard, Vancouver, ISO, and other styles
19

Guice, Jon. "Designing the future : the US advanced research projects agency and revolution in computing /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 1997. http://wwwlib.umi.com/cr/ucsd/fullcit?p9820854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Curry, D. Bruce. "Developing a Wider View of Educational Technology Through Ubiquitous Computing: A Qualitative Case Study." NSUWorks, 2003. http://nsuworks.nova.edu/gscis_etd/475.

Full text
Abstract:
Ubiquitous computing in elementary schools is in its early phases of development. However, many signs point to the likelihood that some form of one-to-one personal computing in schools is inevitable in the near future. The research pertaining to this model of computing technology is relatively scarce, leaving schools with a knowledge void when attempting to make decisions pertaining to this paradigm. The investigation sought to help alleviate this gap in the knowledge base by providing a qualitative case study that examined an elementary school's wireless laptop program over an extended period of one and one-half years. It gathered and described basic information about this model of technology in education and helped form a database for future comparison and/or theory building related to ubiquitous computing. Additionally, the relationship between identifying/removing barriers to technology use and developing a wider view of educational computing among members of the school community was examined. The theoretical purpose of the investigation explored how participants in the program developed a wider view of educational computing, which was defined as the processes by which individuals come to understand how technology can enhance the school environment. The more basic purposes were threefold: to describe richly what occurred as this school made the transition to Ubiquitous computing, to interpret inductively the findings into a series of lessons learned from the experience, and to apply practically the findings to the future direction of the program. The qualitative inquiry into this laptop program employed an embedded single-case study design to achieve the stated purposes and made use of a variety of data-gathering strategies (interviews, observations, and document analysis), consistent with the investigator's goals. By advancing our understanding of the processes by which people come to use ubiquitous computing to empower teaching and learning, this research made a substantial contribution to knowledge and practice. Its timing relative to this paradigm's entry into schools gives it the potential to have a disproportionately significant impact on the model's development.
APA, Harvard, Vancouver, ISO, and other styles
21

Babbitt, William Edgar. "Ethnocomputing| the Design and Assessment of Culture-Based Learning Software for Math and Computing Education." Thesis, Rensselaer Polytechnic Institute, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3684064.

Full text
Abstract:
<p> The United States has a serious problem in Science, Technology, Engineering, and Mathematics. The STEM disciplines are suffering from a `Quiet Crisis'[1]. The problem is that African Americans, Latino/a, Native American, and other ethnic minority students are choosing careers in the STEM disciplines at lower percentages than their white and Asian counterparts [2]. We refer to this disparity as underrepresentation. This work focuses on the use of the Culturally Situated Design Tools (CSDTs, <b>http://csdt.rpi.edu</b>) as a means to counter this underrepresentation. The programmable set of CSDTs represents the development of this software from being focused on ethnomathematics, to ethnocomputing. Ethnocomputing is the reproduction of cultural artifacts in simulation. The CSDTs are part of the constructionist genre of programmable software that seeks to teach computer science concepts to students as they construct these cultural artifacts. Development work on the programmable CSDT software has provided the opportunity to examine the challenges that occur in cross cultural software development using the Agile method. This work includes ethnographic user and developer stories that have informed the development of the pCSDT software. Among the challenges of developing this software has been negotiating the controversy of what we have come to term "The Content Agnostic Position". This is the notion that all software with objects in simulation, regardless of what those objects are, possesses equal value in teaching students. This position, however, often results in the commercial or violent colonization of user spaces by corporate produced media objects and simulated gun violence. It is our view that this colonization can be diminished through the use of cultural objects in simulation, such as those found in the CSDTs. Our work is intended to create a decolonized space for mathematics and computing education. This work also reports the findings of a quasi-experiment conducted with junior high school students in Kumasi, Ghana, West Africa during the summer of 2014.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Lázaro, Pablo García-Crovetto. "Forensic Computing from a Computer Security perspective." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2421.

Full text
Abstract:
<p>This work contains a brief study about Forensic Computing problems done from a Computer Security perspective. </p><p>Based on the description and investigation methods of Forensic Computing, a list of common difficulties that forensic examiners have to deal with has been created. After making an analysis about each difficulty in the Forensic Computing field, it can be said that the main reasons are related to the legal restrictions and an incorrect security management. </p><p>Using a Computer Security perspective for analysing why the incorrect security management generates problems in the forensic computing field, we have made a risk analysis of a possible distribution for a correct security management. Later, based on own results, a list on priorities in prevention methods in t he Forensic Computing field has been created. </p><p>Finally it can be said that the difficulties in the Forensic Computing field could be avoided by creating awareness among users about the importance of taking prevention methods for protecting data and consequently for decreasing the number of e-crimes.</p>
APA, Harvard, Vancouver, ISO, and other styles
23

Velasquez, Alvaro. "Computation of Boolean Formulas Using Sneak Paths in Crossbar Computing." Honors in the Major Thesis, University of Central Florida, 2014. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1649.

Full text
Abstract:
Memristor-based nano-crossbar computing is a revolutionary computing paradigm that does away with the traditional Von Neumann architectural separation of memory and computation units. The computation of Boolean formulas using memristor circuits has been a subject of several recent investigations. Crossbar computing, in general, has also been a topic of active interest, but sneak paths have posed a hurdle in the design of pervasive general-purpose crossbar computing paradigms. In this paper, we demonstrate that sneak paths in nano-crossbar computing can be exploited to design a Boolean-formula evaluation strategy. We demonstrate our approach on a simple Boolean formula and a 1-bit addition circuit. We also conjecture that our nano-crossbar design will be an effective approach for synthesizing high-performance customized arithmetic and logic circuits.<br>B.S.<br>Bachelors<br>Electrical Engineering and Computer Science<br>Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
24

Kim, Sung Han. "Computing Research in Academia: Classifications, Keywords, Perceptions, and Connections." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/5893.

Full text
Abstract:
The Association for Computing Machinery (ACM) recognizes five computing disciplines: Computer Science (CS), Computer Engineering (CE), Information Technology (IT), Information Systems (IS), and Software Engineering (SE). Founded in 1947 the ACM is the world's largest society for computing educators, researchers, and professionals. While Computer Science has been a degree program since 1962, the other four are relatively new. This research focuses on understanding the graduate research in four of the five ACM disciplines (CS, CE, IT, and IS) using a large body of thesis and dissertation metadata. SE is not found in the metadata and graduate work in SE is not included. IS is no longer officially found in the metadata so its representative ProQuest replacement, Information Science although not an ACM recognized discipline is used based on the commonality of the associated ProQuest Classification code. The research is performed using co-word and graph analysis of author-supplied Classifications, Departments, and keywords. Similarities and differences between the disciplines are identified. Whether the computing discipline is the primary or the secondary focus of the research makes a large difference in the connections it makes with other academic disciplines. It was found that the Departments from which computing research originates varies widely but the majority come from computing-related Departments. Finally, gaps are apparent from the practitioners' views of the computing disciplines versus the public's view.
APA, Harvard, Vancouver, ISO, and other styles
25

Kodumuri, Samyuktha. "RemoraBook: Privacy-Preserving Social Networking Based On Remora Computing." Cleveland State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=csu1600208690003839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hamilton, Howard Gregory. "An Examination of Service Level Agreement Attributes that Influence Cloud Computing Adoption." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/53.

Full text
Abstract:
Cloud computing is perceived as the technological innovation that will transform future investments in information technology. As cloud services become more ubiquitous, public and private enterprises still grapple with concerns about cloud computing. One such concern is about service level agreements (SLAs) and their appropriateness. While the benefits of using cloud services are well defined, the debate about the challenges that may inhibit the seamless adoption of these services still continues. SLAs are seen as an instrument to help foster adoption. However, cloud computing SLAs are alleged to be ineffective, meaningless, and costly to administer. This could impact widespread acceptance of cloud computing. This research was based on the transaction cost economics theory with focus on uncertainty, asset specificity and transaction cost. SLA uncertainty and SLA asset specificity were introduced by this research and used to determine the technical and non-technical attributes for cloud computing SLAs. A conceptual model, built on the concept of transaction cost economics, was used to highlight the theoretical framework for this research. This study applied a mixed methods sequential exploratory research design to determine SLA attributes that influence the adoption of cloud computing. The research was conducted using two phases. First, interviews with 10 cloud computing experts were done to identify and confirm key SLA attributes. These attributes were then used as the main thematic areas for this study. In the second phase, the output from phase one was used as the input to the development of an instrument which was administered to 97 businesses to determine their perspectives on the cloud computing SLA attributes identified in the first phase. Partial least squares structural equation modelling was used to test for statistical significance of the hypotheses and to validate the theoretical basis of this study. Qualitative and quantitative analyses were done on the data to establish a set of attributes considered SLA imperatives for cloud computing adoption.
APA, Harvard, Vancouver, ISO, and other styles
27

Fernando, Kurukulasuriya Joseph Tilak Nihal. "Soft computing techniques in power system analysis." full-text, 2008. http://eprints.vu.edu.au/2025/1/thesis.pdf.

Full text
Abstract:
Soft computing is a concept that has come into prominence in recent times and its application to power system analysis is still more recent. This thesis explores the application of soft computing techniques in the area of voltage stability of power systems. Soft computing, as opposed to conventional “hard” computing, is a technique that is tolerant of imprecision, uncertainty, partial truth and approximation. Its methods are based on the working of the human brain and it is commonly known as artificial intelligence. The human brain is capable of arriving at valid conclusions based on incomplete and partial data obtained from prior experience. It is an approximation of this process on a very small scale that is used in soft computing. Some of the important branches of soft computing (SC) are artificial neural networks (ANNs), fuzzy logic (FL), genetic computing (GC) and probabilistic reasoning (PR). The soft computing methods are robust and low cost. It is to be noted that soft computing methods are used in such diverse fields as missile guidance, robotics, industrial plants, pattern recognition, market prediction, patient diagnosis, logistics and of course power system analysis and prediction. However in all these fields its application is comparatively new and research is being carried out continuously in many universities and research institutions worldwide. The research presented in this thesis uses the soft computing method of Artificial Neural Networks (ANN’s) for the prediction of voltage instability in power systems. The research is very timely and current and would be a substantial contribution to the present body of knowledge in soft computing and voltage stability, which by itself is a new field. The methods developed in this research would be faster and more economical than presently available methods enabling their use online.
APA, Harvard, Vancouver, ISO, and other styles
28

Dickerson, Jeremy. "Analysis of Computing Skills and Differences Between Demographic Groups: A Basis for Curriculum Development in Computer Technology Courses at UNC-Wilmington." NCSU, 2005. http://www.lib.ncsu.edu/theses/available/etd-06292005-102215/.

Full text
Abstract:
This study examined the entry-level computing skills of undergraduate education majors at the University of North Carolina at Wilmington during the Spring 2005 semester. This study also compared groups based on demographic categories to investigate if certain demographics were predictors of specific skills competency. This study utilized a representative convenience sample of 186 participants. The participants were pre-tested for their ability to complete 60 computer skills in the Microsoft Office Suite using an online performance test called Skills Assessment Manager by Thomson Course Technology. The data was analyzed as a whole group performance using descriptive statistics and analyzed for analysis between demographic groups using a non-parametric statistic test (the Mann Whitney U Test). The results yielded data that informed the researcher of the skills of the participants prior to taking a mandatory computer skills course. As a result, it was found that a large portion of students were able to do many of the skills before taking the mandatory skills course. It was also found that demographics were not a reliable predictor of computer skills. This study provided data that helped to inform the faculty at UNC-W that the curriculum for the computer skills course needed to be changed based on entry skills of students to reflect the abilities of students in 2005.
APA, Harvard, Vancouver, ISO, and other styles
29

Tellis, Winston M. "Information Technology in a University: An Institutional Case Study of Instructional and Research Computing in a client/Server." NSUWorks, 1997. http://nsuworks.nova.edu/gscis_etd/876.

Full text
Abstract:
This study examined the problem of financing of information technology in higher education institutions. Some of the pressures faced by those institutions as they attempt to control expenditures while continuing to support information technology were also examined. Particular emphasis was placed on the aspects of information technologies as they relate to pace of acquisition, the use of client/server computing, the Internet and the World Wide Web. The current study replicated a case study conducted by Samuel Levy at the University of Arizona in 1988, and extended it as described above, to explore various aspects of recent technological advances at Fairfield University. Levy (1988) used two surveys to assess computer use of the faculty and administrators. Those surveys were modified to reflect the environment in the case organization, and to capture data on the aspects Gmt extended the original study. The study used multiple sources of data as recommended by the literature, to improve the reliability of the study. The multiple sources included interviews, and internal documents that were relevant to the research agenda. The results of the survey showed that respondents expect their use of the Internet and the World Wide Web to increase in the next few years. The current method of equipment procurement was found unsatisfactory by a majority of the respondents. With the use of client/server computing increasing at all institutions, and the rapid growth in the use of the Internet and the World Wide Web, the results of this study should be of value to many other institutions. The recommendations of the study include shortening the information technology planning cycle to reflect the rapid advances in technology. Each planning cycle should be followed by a survey to evaluate the user acceptance of the initiatives in the planning cycle. The study also recommended formal capacity planning procedures for client/server environments to ensure the efficiency and integrity of the operation. Future researchers might be able to use the new groupings of data that were developed in this study. New variables could lead to new analyses and fresh insight into the problem of rapid acquisition of information technology.
APA, Harvard, Vancouver, ISO, and other styles
30

Johansson, Magnus. "Smart, Fast and Beautiful : On Rhetoric of Technology and Computing Discourse in Sweden 1955-1995." Doctoral thesis, Linköping : Tema, Univ, 1997. http://www.ep.liu.se/diss/arts_science/1997/164/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Egedigwe, Eges. "Service Quality and Perceived Value of Cloud Computing-Based Service Encounters: Evaluation of Instructor Perceived Service Quality in Higher Education in Texas." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/54.

Full text
Abstract:
Cloud computing based technology is becoming increasingly popular as a way to deliver quality education to community colleges, universities and other organizations. At the same time, compared with other industries, colleges have been slow on implementing and sustaining cloud computing services on an institutional level because of budget constraints facing many large community colleges, in addition to other obstacles. Faced with this challenge, key stakeholders are increasingly realizing the need to focus on service quality as a measure to improve their competitive position in today's highly competitive environment. Considering the amount of study done with cloud computing in education, very little has been done in examining the needs and the satisfactions of the instructor customer. The purpose of this study was to examine the expectations and perceptions of instructors’ usage of cloud computing based technology on overall quality of service (QoS). An extension and adaptation of the SERVQUAL model tailored to the higher education environment was introduced for this study. Using the established service quality (SERVQUAL) dimensions (tangibles, reliability, responsiveness, assurance, and empathy), the study investigated the relationship between instructors’ views (perception and expectation) and overall service quality received on their use of cloud computing based technology. A total of 301 online instructors at large Texas community colleges completed a Web-based survey containing previously validated and adapted items. The participants in this study completed four parts of the survey instruments that were used to measure service quality of academic cloud computing technology: Service Quality Expectations, Service Quality Perceptions, Perceived Service Quality and Demographic. The survey questions were answered using a seven-point Likert scale and the survey results were analyzed using descriptive and inferential statistical methods. The results indicated that the difference between instructors’ perception and expectation affected their perceived service quality of cloud computing based systems. The differences between the expectation and perception on all five SERVQUAL dimensions load to the instructors’ perceived service quality; gender but not age, income or education has significant effect on instructors’ overall perceived service quality. The results of the study create an awareness of instructors’ needs and offer useful feedback to college administrators and institutional planners in their efforts to improve service quality of educational technology initiative in higher education.
APA, Harvard, Vancouver, ISO, and other styles
32

Richards, Craig. "Development of Cyber-Technology Information for Remotely Accessing Chemistry Instrumentation." Youngstown State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1311712029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Lewis, Adam Justin. "A case study of modern computing| Importance for tablet computers in higher education." Thesis, University of Phoenix, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3585972.

Full text
Abstract:
<p> With the rapid growth of technology and a fast pace society, students have discovered tablet computers, a powerful portable useful device for education. Although studies have shown rapid growth of tablet computer adaptation within education, limited research exists regarding how tablet computers are used for classroom performance, communication, and leadership among college students. The purpose of the study was to explore and understand how college students use tablet computers by interviewing undergraduate and graduate students. Interview results of 20 college students are as follows: (a) students reported that tablet computers were more portable, easier to use, and convenient devices over laptop computers; (b) in regard to classroom performance, students expressed that the use of e-text books combined with tablets was a faster method of searching for a specific subject over standard paperback books; (c) in regards to leadership, many students believed that tablets are only a tool for leaders but not an essential tool for leading people; and (d) in regard to communication, students expressed that tablet computers was an essential tool for team projects and communicating with their professors and peers while on the go. The study includes a discussion of future research in leadership&rsquo;s use of technology in the workplace, college professors&rsquo; perceptions of tablet computers in the classroom, and marketing modern tablet computers.</p>
APA, Harvard, Vancouver, ISO, and other styles
34

Jamaliannasrabadi, Saba. "High Performance Computing as a Service in the Cloud Using Software-Defined Networking." Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1433963448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hakim, Zadok. "Factors That Contribute to The Resistance to Cloud Computing Adoption by Tech Companies vs. Non-Tech Companies." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1034.

Full text
Abstract:
Cloud computing (CC) may be the most significant development in recent history for businesses seeking to utilize technology. However, the adoption of CC hinges on many factors, and can have a greater positive impact on organizational performance. This study examined the different factors that contribute to the resistance to CC adoption. Anchored in The Theory of Technology-Organization-Environment (TOE), the study used a qualitative, grounded theory approach to develop a theoretical model for the acceptance of CC across firms. CC can have significant effects on efficiency and productivity for firms, but these effects will only be realized if IT usage becomes utilized globally. Thus, it was essential to understand the determinants of IT adoption, which was the goal of this research. The central research question involved understanding and examining the factors of resistance that contribute to cloud computing adoption across firms. Data was collected through semi-structured interviews with 22 chief information officers (CIOs) of various firms, including those considered technology companies (TCs) and those considered non-technology companies (NTCs). Data was analyzed using qualitative thematic analysis to determine what factors influence the adoption of CC systems and, moreover, to determine what factors create resistance to the adoption of CC in firms despite its well-documented advantages and benefits. Additionally, by examinging and focusing on the factors of resistance, the rsults of this study were generalized across a wider array of firms located in the Southeastern region of the US. A total of 12 categories were identified. These were organized into two groups. The core category being financial risks represented the probability of loss inherent in financing methods which may impair the ability to provide adequate return. The categories lack of knowledge, resistance to change, excessive cost to adopt, and cost saving fit under financial risks. Together these categories were indicators of the factors of resistance to adopt cloud computing technology. The core category security risks represented the overall perception of privacy in online environment. The categories process of research, accessing organization fit, perceived security risks, phased deployment, approval to adopt, and increase flexibility fit under security risks. Together these categories were direct indicators of the factors of resistance that contribute to the adoption of cloud computing technology by both TC and NTC. The result of this study showed that the predominant and critical factors of resistance that contribute to cloud computing adoption by TC were financial risks and security risks vs. security risks by NTC. A critical distinction between TC and NTC is that 86.4% of NTC’s participants did not care about cost, they only cared about data security. A model was subsequently developed based on the lived experiences of Chief Information Officers (CIOs) who have been faced with challenges regarding cloud acceptance, and cloud computing adoption. The theoretical model produced by this study may guide future researchers and enhance the understanding and implementation of cloud computing technologies. The results of this study will add to the body of literature and may guide companies attempting to implement cloud computing to do so more successfully.
APA, Harvard, Vancouver, ISO, and other styles
36

Henkel, Martin. "Service-based Processes : Design for business and technology." Doctoral thesis, Stockholm : Department of Computer and Systems Sciences, Royal Institute of Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kimball, Jeffrey. "Motivations of Students in the Open-Ended Use of Mobile Computing in Lecture-Based Classrooms." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/366.

Full text
Abstract:
While research supports the integration of mobile computing into instruction, there is disagreement concerning the unstructured use of mobile devices in lecture-based college classrooms. Research supports the argument that unstructured use creates distraction and decreased academic performance. Research also suggests that unstructured use actually supports lecture instruction through personalized learning situations. In either case, the motivations of students to use mobile device is often unclear. This study sought to investigate the motivations for students’ acceptance of mobile devices. The Unified Theory of Acceptance and Use of Technology (UTAUT) was utilized to identify the factors leading to college students’ adoption of mobile devices. A survey based on UTAUT was distributed to 254 college students in six distinct lecture-based general education courses. The results revealed that Performance Expectancy, Effort Expectancy, and Social Influence were positively correlated with Behavioral Intention for class-related behavior, with Performance Expectancy being the most significant. None of the constructs were significant for behavior unrelated to lecture. Analysis of the students’ intention based on the UTAUT moderators of age, gender, and experience did not produce any significant difference, nor did an analysis of the classes by subject. The study concludes that the ability of a mobile device to complete specific tasks was the strongest motivating factor leading to intention.
APA, Harvard, Vancouver, ISO, and other styles
38

Huang, Raymond. "A comparative study of mobile internet deployment models in New Zealand a thesis submitted to Auckland University of Technology in partial fulfillment of the requirements for the degree of Master of Computer and Information Sciences (MCIS), June 2007." Click here to access this resource online, 2007. http://repositoryaut.lconz.ac.nz/theses/1362/.

Full text
Abstract:
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2007.<br>Primary supervisor: Krassie Petrova. Includes bibliographical references. Also held in print (185 leaves : ill. ; 30 cm.) in City Campus Theses Collection (T 004.6 HUA)
APA, Harvard, Vancouver, ISO, and other styles
39

Baumgartner, Max R. "Instructional Technologies in Graduate Physical Therapy Courses." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/87.

Full text
Abstract:
The problem addressed is the significant lack of empirical research to describe the nature and extent of technology for use in physical therapy education (PTE). The goal was to facilitate the use of instructional technologies in accredited physical therapy (PT) courses. Computing technologies offer efficient, accessible methods for delivery of education as well as instructional formats with unique advantages for the allied health sciences. In order to facilitate the use of instructional technologies in accredited PT courses the nature and extent of current technology use in PTE are described. A description of technologies used for health professional education was extracted from the literature and used to develop a valid and reliable online survey instrument. An effort was made to survey all full-time faculty in the 200 Doctor of Physical Therapy programs accredited by the Commission on Accreditation in Physical Therapy Education. A 44% response rate was received from 904 faculty representing 193 programs. The results demonstrate that the technologies used most can be characterized as those that support cognition rather than content delivery. It is also apparent that a significant number of faculty are using technology for education while their self-assessment indicates that they have insufficient knowledge and skills to do so. Also, the findings indicate that many faculty have a limited knowledge of the technologies used in the locations where their students will receive clinical education and possibly gain employment following graduation. These results are discussed in detail. Seven recommendations are offered to facilitate diffusion of technology throughout courses offered in graduate PT programs.
APA, Harvard, Vancouver, ISO, and other styles
40

Steele, Aaron. "Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/946.

Full text
Abstract:
In order to keep shared access computers secure and stable system administrators resort to locking down the computing environment in order to prevent intentional and unintentional damage by users. Skilled attackers are often able to break out of locked down computing environments and intentionally misuse shared access computers. This misuse has resulted in cases of mass identity theft and fraud, some of which have had an estimated cost ranging in millions. In order to determine if it is possible to break out of locked down computing environments an assessment method is required. Although a number of vulnerability assessment techniques exist, none of the existing techniques are sufficient for assessing locked down shared access computers. This is due to the existing techniques focusing on traditional, application specific, software vulnerabilities. Break out path vulnerabilities (which are exploited by attackers in order to break out of locked down environments) differ substantially from traditional vulnerabilities, and as a consequence are not easily discovered using existing techniques. Ontologies can be thought of as a modelling technique that can be used to capture expert knowledge about a domain of interest. The method for discovering break out paths in locked down computers can be considered expert knowledge in the domain of shared access computer security. This research proposes an ontology based assessment process for discovering break out path vulnerabilities in locked down shared access computers. The proposed approach is called the ontological lockdown assessment process. The ontological lockdown assessment process is implemented against a real world system and successfully identifies numerous break out path vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
41

Green, Michael Jesse. "Motivation and Learning of Non-Traditional Computing Education Students in a Web-based Combined Laboratory." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/57.

Full text
Abstract:
Hands-on experiential learning activities are an important component of computing education disciplines. Laboratory environments provide learner access to real world equipment for completing experiments. Local campus facilities are commonly used to host laboratory classes. While campus facilities afford hands-on experience with real equipment high maintenance costs, restricted access, and limited flexibility diminish laboratory effectiveness. Web-based simulation and remote laboratory formats have emerged as low cost options, which allow open access and learner control. Simulation lacks fidelity and remote laboratories are considered too complex for novice learners. A web-based combined laboratory format incorporates the benefits of each format while mitigating the shortcomings. Relatively few studies have examined the cognitive benefits of web-based laboratory formats in meeting computing education students’ goals. A web-based combined laboratory model that incorporates motivation strategies was developed to address non-traditional computing education students’ preferences for control of pace and access to learning. Internal validation of the laboratory model was conducted using pilot studies and Delphi expert review techniques. A panel of instructors from diverse computing education backgrounds reviewed the laboratory model. Panel recommendations guided enhancement of the model design.
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Xiaogang. "Efficient and parallel evaluation of XQuery." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1139939037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Brunzel, Tino, and Giacomo Débora Di. "Cloud Computing Evaluation : How it Differs to Traditional IT Outsourcing." Thesis, Jönköping University, Jönköping International Business School, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12761.

Full text
Abstract:
<p><strong>Introduction</strong></p><p>Cloud Computing, that is providing computer resources as a service, is a technology revolution offering flexible IT usage in a cost efficient and pay-per-use way. As for the evaluation of companies to whether which technology solution to use, it would be necessary to decide whether or not the evaluation of cloud computing would actually differ to the traditional way of IT outsourcing.</p><p><strong></strong><strong>Problem Discussion</strong></p><p>Outsourcing IT capabilities are a crucial and inevitable step for enterprises that want to survive in the currently high competitive climate. Until now most of the researches, that has been done so far, only consider the XaaS model only from a traditional IT outsourcing point of view rather than in the cloud computing context. This research will now include the evaluation of cloud solutions giving companies another possibility to outsource their IT resources.</p><p><strong></strong><strong>Purpose</strong></p><p><strong></strong>The purpose is now to see how the evaluation of cloud computing possibilities as an outsourcing option actually differs to traditional IT outsourcing. One aspect that needs to be covered with this purpose, is whether it is possible to evaluate the source through a cloud computing solution with the same concepts and theories used to evaluate traditional IT outsourcing. It will also be the purpose to see, which aspects need to be added or removed when considering a cloud computing opportunity compared to the traditional IT outsourcing.</p><p><strong></strong><strong>Method </strong></p><p>With help of the theoretical framework, interviews have been launched with three companies to see what their general opinion and knowledge is on the evaluation of cloud computing and its maturity. Questions have been asked openly so that answers could not be directed or manipulated by the authors of the research.</p><p><strong></strong><strong>Conclusion</strong></p><p>After challenging the theoretical framework against the data collected, the traditional IT outsourcing theories appeared to be valid also for the evaluation of cloud computing solutions. Some important concepts are added to the evaluation of cloud computing solutions in consequence of particularities present in the model.</p>
APA, Harvard, Vancouver, ISO, and other styles
44

Rhoades, Melinda J. "Addressing The Computing Gender Gap: A Case Study Using Feminist Pedagogy and Visual Culture Art Education." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1217107478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Nasim, Robayet. "Architectural Evolution of Intelligent Transport Systems (ITS) using Cloud Computing." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35719.

Full text
Abstract:
With the advent of Smart Cities, Intelligent Transport System (ITS) has become an efficient way of offering an accessible, safe, and sustainable transportation system. Utilizing advances in Information and Communication Technology (ICT), ITS can maximize the capacity of existing transportation system without building new infrastructure. However, in spite of these technical feasibilities and significant performance-cost ratios, the deployment of ITS is limited in the real world because of several challenges associated with its architectural design. This thesis studies how to design a highly flexible and deployable architecture for ITS, which can utilize the recent technologies such as - cloud computing and the publish/subscribe communication model. In particular, our aim is to offer an ITS infrastructure which provides the opportunity for transport authorities to allocate on-demand computing resources through virtualization technology, and supports a wide range of ITS applications. We propose to use an Infrastructure as a Service (IaaS) model to host large-scale ITS applications for transport authorities in the cloud, which reduces infrastructure cost, improves management flexibility and also ensures better resource utilization. Moreover, we use a publish/subscribe system as a building block for developing a low latency ITS application, which is a promising technology for designing scalable and distributed applications within the ITS domain. Although cloud-based architectures provide the flexibility of adding, removing or moving ITS services within the underlying physical infrastructure, it may be difficult to provide the required quality of service (QoS) which decrease application productivity and customer satisfaction, leading to revenue losses. Therefore, we investigate the impact of service mobility on related QoS in the cloud-based infrastructure. We investigate different strategies to improve performance of a low latency ITS application during service mobility such as utilizing multiple paths to spread network traffic, or deploying recent queue management schemes. Evaluation results from a private cloud testbed using OpenStack show that our proposed architecture is suitable for hosting ITS applications which have stringent performance requirements in terms of scalability, QoS and latency.<br>Baksidestext: Intelligent Transport System (ITS) can utilize advances in Information and Communication Technology (ICT) and maximize the capacity of existing transportation systems without building new infrastructure. However, in spite of these technical feasibilities and significant performance-cost ratios, the deployment of ITS is limited in the real world because of several challenges associated with its architectural design.  This thesis studies how to design an efficient deployable architecture for ITS, which can utilize the advantages of cloud computing and the publish/subscribe communication model. In particular, our aim is to offer an ITS infrastructure which provides the opportunity for transport authorities to allocate on-demand computing resources through virtualization technology, and supports a wide range of ITS applications. We propose to use an Infrastructure as a Service (IaaS) model to host large-scale ITS applications, and to use a publish/subscribe system as a building block for developing a low latency ITS application. We investigate different strategies to improve performance of an ITS application during service mobility such as utilizing multiple paths to spread network traffic, or deploying recent queue management schemes.<br><p>Artikel 4 Network Centric Performance Improvement for Live VM Migration finns i avhandlingen som manuskript. Nu publicerat konferenspaper. </p>
APA, Harvard, Vancouver, ISO, and other styles
46

Spikol, Daniel. "Playing and Learning Across Locations: : Indentifying Factors for the Design of Collaborative Mobile Learning." Licentiate thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-3698.

Full text
Abstract:
<p>The research presented in this thesis investigates the design challenges associated with the development and use of mobile applications and tools for supporting collaboration in educational activities. These technologies provide new opportunities to promote and enhance collaboration by engaging learners in a variety of activities across different places and contexts. A basic challenge is to identify how to design and deploy mobile tools and services that could be used to support collaboration in different kinds of settings. There is a need to investigate how to design collaborative learning processes and to support flexible educational activities that take advantage of mobility. The main research question that I focus on is the identification of factors that influence the design of mobile collaborative learning.</p><p>The theoretical foundations that guide my work rely on the concepts behind computer supported collaborative learning and design-based research. These ideas are presented at the beginning of this thesis and provide the basis for developing an initial framework for understanding mobile collaboration. The empirical results from three different projects conducted as part of my efforts at the Center for Learning and Knowledge Technologies at Växjö University are presented and analyzed. These results are based on a collection of papers that have been published in two refereed international conference proceedings, a journal paper, and a book chapter. The educational activities and technological support have been developed in accordance with a grounded theoretical framework. The thesis ends by discussing those factors, which have been identified as having a significant influence when it comes to the design and support of mobile collaborative learning.</p><p>The findings presented in this thesis indicate that mobility changes the contexts of learning and modes of collaboration, requiring different design approaches than those used in traditional system development to support teaching and learning. The major conclusion of these efforts is that the learners’ creations, actions, sharing of experiences and reflections are key factors to consider when designing mobile collaborative activities in learning. The results additionally point to the benefit of directly involving the learners in the design process by connecting them to the iterative cycles of interaction design and research.</p>
APA, Harvard, Vancouver, ISO, and other styles
47

Bhatt, Mrunal Dipakkumar Bhatt. "INTELLIGENT VOICE ACTIVATED HOME AUTOMATION (IVA)." Cleveland State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=csu1463517275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Caceffo, Ricardo Edgard 1983. "Arquitetura para suporte a aplicações ubíquas que viabilizam a criação de um ambiente de aprendizado ativo em sala de aula." [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275542.

Full text
Abstract:
Orientador: Rodolfo Jardim de Azevedo<br>Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação<br>Made available in DSpace on 2018-08-27T04:45:04Z (GMT). No. of bitstreams: 1 Caceffo_RicardoEdgard_D.pdf: 9419075 bytes, checksum: 471d33da09caeddcc57b6039b579fbac (MD5) Previous issue date: 2015<br>Resumo: O modelo do Aprendizado Ativo defende uma maior participação, motivação e colaboração entre os alunos no ambiente de ensino e aprendizagem. Usualmente o Aprendizado Ativo é suportado através de elementos tecnológicos, como os sistemas de resposta em sala de aula. Neste ambiente, o professor propõe aos alunos questões de múltipla escolha, que são respondidas através de clickers, sendo os dados organizados por um software gerenciado pelo professor. Ocorre que, apesar do crescente desenvolvimento da tecnologia, este suporte ainda é limitado, não considerando variáveis importantes do contexto, histórico e ambiente de ensino e aprendizagem, apresentando ainda problemas em sua aplicação, como a distração dos alunos. Nesta tese é proposta uma Arquitetura Ubíqua de Suporte ao Aprendizado Ativo (AUSAA), em que é desenvolvido um framework para promoção do Aprendizado Ativo através do uso de dispositivos móveis. A AUSAA incorpora elementos da Computação Ubíqua, como sensibilidade ao contexto, localização e análise do histórico dos usuários, permitindo a criação de funcionalidades que se adaptam ao ambiente e necessidades dos participantes. A AUSAA suporta ainda o modelo de estilos de aprendizagem de Felder & Silverman, que afirma que cada aluno possui preferências individuais em relação à percepção, processamento e manipulação da informação. Parte da AUSAA foi implementada através de um software (LSQuiz). Nele é proposto um processo colaborativo em que o professor disponibiliza um conjunto de questões de múltipla escolha aos alunos, que podem, a qualquer instante, informar ao sistema que estão com dificuldades. A partir disso, através da análise de fatores de contexto e da localização dos estudantes, é escolhido um aluno para ser convidado a ajudar. O LSQuiz foi aplicado e avaliado em um ambiente de ensino, sendo identificados pontos de melhoria em seu design, como a necessidade de identificação automática da localização dos alunos e ajustes pontuais no algoritmo do processo colaborativo. Verificou-se que é válida a premissa de que a aplicação da Computação Ubíqua neste ambiente viabiliza de uma forma mais efetiva o modelo do Aprendizado Ativo, sendo a autonomia dos alunos um elemento positivo neste processo. Por fim, identificou-se que não é possível inferir os estilos de aprendizagem dos alunos através do seu desempenho nos questionários, sendo inviável a aplicação do modelo de Felder & Silverman neste contexto<br>Abstract: The Active Learning model advocates greater participation, motivation and collaboration between students in the teaching and learning environment. Usually, the Active Learning is supported by technology through the classroom response systems. In this environment, the teacher asks students multiple-choice questions, which are answered trough clickers, being the data organized by a software managed by the teacher. Despite the increasing development of technology, its use is still limited, not being considered important variables related to the context, user's history and the learning environment. In addition, its application presented some problems, like the ones related to the distraction and attention loss of the students. This thesis proposes a Ubiquitous Classroom Response System (UCRS), developed as a framework to support the Active Learning using mobile devices. The UCRS incorporates elements of ubiquitous computing like context awareness, location and historical analysis of users' data, allowing the development of features that adapt to the environment and needs of the participants. The UCRS further supports the Felder and Silverman Learning Styles Model (FSM), which states that each student has individual preferences in relation to perception, processing and manipulation of information. Part of the UCRS was implemented through software (LSQuiz). The LSQuiz supports a collaborative process in which the teacher submits a multiple-choice quiz to students, who may at any time ask for the help of other students. Then, the LSQuiz analyses context factors, like the location affinity among students, verifying which student should be invited to help. The LSQuiz was implemented and evaluated in a learning environment, being identified some issues, like the need for automatic student's location and specific changes in the collaborative process algorithm. In addition, it was found valid the assumption that Ubiquitous Computing enables a more effective way to support the Active Learning model, being the student's autonomy a positive element in this process. Finally, was identified that it is not possible to assume the learning styles of students through their performance in the questionnaires. Thus, it is unfeasible the application of the FSM in this context<br>Doutorado<br>Ciência da Computação<br>Doutor em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
49

Downey, Laura. "Well-being Technologies: Meditation Using Virtual Worlds." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/65.

Full text
Abstract:
In a technologically overloaded world, is it possible to use technology to support well-being activities and enhance human flourishing? Proponents of positive technology and positive computing are striving to answer yes to that question. However, the impact of technology on well-being remains unresolved. Positive technology combines technology and positive psychology. Positive psychology focuses on well-being and the science of human flourishing. Positive computing includes an emphasis on designing with well-being in mind as a way to support human potential. User experience (UX) is critical to positive technology and positive computing. UX researchers and practitioners are advocating for experience-driven design and third wave human-computer interaction (HCI) that focuses on multi-dimensional, interpretive, situated, and phenomenological aspects. Third-wave HCI goes beyond cognition to include emotions, values, culture, and experience. This research investigated technology-supported meditation in a three-dimensional (3D) virtual world from a positive technology perspective to examine how technology can support engagement, self-empowerment, and well-being. Designing and evaluating technology for well-being support is complex and challenging. Further, although virtual worlds have been used in positive technology applications, little research exists that illuminates the experience of user engagement in virtual worlds. In this formative exploratory study, experienced meditators (N = 12) interacted with a virtual meditation world titled Sanctuarium that was developed for this research. Using a third wave HCI approach, both quantitative and qualitative data were collected to understand the nature of engagement with a virtual world and the experiential aspects of technology-supported meditation. Results supported using virtual worlds to produce restorative natural environments. Participants overwhelmingly reacted positively to the islandscape including both visual and sound elements. Findings indicated that Sanctuarium facilitated the meditation experience, similar to guided meditation – although participants remarked on the uniqueness of the experience. Aspects of facilitation centered on the concepts of non-distraction, focus, and simplicity of design and instructions. Participants also identified Sanctuarium as a good tool for helping those new to meditation. Meditators described positive effects of their meditation experience during interviews and also rated their experience as positive using the scale titled Effects of Meditation During Meditation. Phenomenological analysis provided a rich description of the nature of engagement while meditating with Sanctuarium. Meditators also rated engagement as high via an adapted User Engagement Scale. This interdisciplinary work drew from multiple fields and contributes to the HCI domain, virtual worlds’ literature, information systems research, and the nascent areas of positive technology and positive computing.
APA, Harvard, Vancouver, ISO, and other styles
50

Da, Silva Ralston A. "Green Computing – Power Efficient Management in Data Centers Using Resource Utilization as a Proxy for Power." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1259760420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!