To see the other types of publications on this topic, follow the link: Effective computing.

Dissertations / Theses on the topic 'Effective computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Effective computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

林偉業 and Wai-yip Vincent Lum. "Effective content adaptation strategies for mobile computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31226450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohd, Nazir M. A. N. "Cost-effective resource management for distributed computing." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1331897/.

Full text
Abstract:
Current distributed computing and resource management infrastructures (e.g., Cluster and Grid) suffer from a wide variety of problems related to resource management, which include scalability bottleneck, resource allocation delay, limited quality-of-service (QoS) support, and lack of cost-aware and service level agreement (SLA) mechanisms. This thesis addresses these issues by presenting a cost-effective resource management solution which introduces the possibility of managing geographically distributed resources in resource units that are under the control of a Virtual Authority (VA). A VA is
APA, Harvard, Vancouver, ISO, and other styles
3

Kruger, Markus Gustav. "On evolutionary algorithms for effective quantum computing." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20095.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2012.<br>ENGLISH ABSTRACT: The goal of this thesis is to present evolutionary algorithms, and demonstrate their applicability in quantum computing. As an introduction to evolutionary algorithms, it is applied to the simple but still challenging (from a computational viewpoint) Travelling Salesman Problem (TSP). This example is used to illustrate the e ect of various parameters like selection method, and maximum population size on the accuracy and e ciency of the evolutionary algorithms. For the sample problem, the 48 continental state capitals of the
APA, Harvard, Vancouver, ISO, and other styles
4

Lum, Wai-yip Vincent. "Effective content adaptation strategies for mobile computing /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?B25151265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kong, Choi-yu. "Effective partial ontology mapping in a pervasive computing environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kong, Choi-yu, and 江采如. "Effective partial ontology mapping in a pervasive computing environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B32002737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jangjaimon, Itthichok. "Effective Checkpointing for Networked Multicore Systems and Cloud Computing." Thesis, University of Louisiana at Lafayette, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3615289.

Full text
Abstract:
<p> Checkpointing has been widely adopted in support of fault-tolerance and job migration essential for large-scale networked multicore systems and cloud computing. This dissertation pursues an effective checkpointing mechanism to handle failures and unavailable events in such systems and thus to reduce the expected job turnaround time, the aggregated file size, and the monetary cost involved. To withstand unavailability/failures of local nodes in networked systems, multi-level checkpointing is indispensable, with checkpoint files kept not only locally but also at remote storage. As the num
APA, Harvard, Vancouver, ISO, and other styles
8

Cassidy, John R. "Providing effective productivity tools : computing for the physically-challenged." Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/834524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bortz, Brennon Christopher. "Using Music and Emotion to Enable Effective Affective Computing." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90888.

Full text
Abstract:
The computing devices with which we interact daily continue to become ever smaller, intelligent, and pervasive. Not only are they becoming more intelligent, but some are developing awareness of a user's affective state. Affective computing—computing that in some way senses, expresses, or modifies affect—is still a field very much in its youth. While progress has been made, the field is still limited by the need for larger sets of diverse, naturalistic, and multimodal data. This work first considers effective strategies for designing psychophysiological studies that permit the assembly of ve
APA, Harvard, Vancouver, ISO, and other styles
10

Blake, Ben A. "A fast, effective scheduling framework for parallel computing systems /." The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487676261013122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kot, andriy. "Effective Large Scale Computing Software for Parallel Mesh Generation." W&M ScholarWorks, 2011. https://scholarworks.wm.edu/etd/1539623585.

Full text
Abstract:
Scientists commonly turn to supercomputers or Clusters of Workstations with hundreds (even thousands) of nodes to generate meshes for large-scale simulations. Parallel mesh generation software is then used to decompose the original mesh generation problem into smaller sub-problems that can be solved (meshed) in parallel. The size of the final mesh is limited by the amount of aggregate memory of the parallel machine. Also, requesting many compute nodes on a shared computing resource may result in a long waiting, far surpassing the time it takes to solve the problem.;These two problems (i.e., in
APA, Harvard, Vancouver, ISO, and other styles
12

Kruppa, Michael. "Migrating characters: effective user guidance in instrumented environments." Berlin Aka, 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2898568&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Wongrassamee, Somchai. "Determination of effective measures for the balanced scorecard using neural computing." Thesis, Heriot-Watt University, 2003. http://hdl.handle.net/10399/380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Maripi, Jagadish Kumar. "AN EFFECTIVE PARALLEL PARTICLE SWARM OPTIMIZATION ALGORITHM AND ITS PERFORMANCE EVALUATION." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/theses/275.

Full text
Abstract:
Population-based global optimization algorithms including Particle Swarm Optimization (PSO) have become popular for solving multi-optima problems much more efficiently than the traditional mathematical techniques. In this research, we present and evaluate a new parallel PSO algorithm that provides a significant performance improvement as compared to the serial PSO algorithm. Instead of merely assigning parts of the task of serial version to several processors, the new algorithm places multiple swarms on the available nodes in which operate independently, while collaborating on the same task. W
APA, Harvard, Vancouver, ISO, and other styles
15

Qiao, Zhi. "Building Reliable and Cost-Effective Storage Systems for High-Performance Computing Datacenters." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1707348/.

Full text
Abstract:
In this dissertation, I first incorporate declustered redundant array of independent disks (RAID) technology in the existing system by maximizing the aggregated recovery I/O and accelerating post-failure remediation. Our analytical model affirms the accelerated data recovery stage significantly improves storage reliability. Then I present a proactive data protection framework that augments storage availability and reliability. It utilizes the failure prediction methods to efficiently rescue data on drives before failures occur, which significantly reduces the storage downtime and lowers the ri
APA, Harvard, Vancouver, ISO, and other styles
16

O'Rourke, Julie, and Patrick Gallaher. "Effective use of collaborative information technology to enhance group performance." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1427.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This research was inspired by the need to create a universal net-centric environment to enable collaborative defense capabilities and deliver knowledge dominance to the DoD. Since superior information management and the use of collaborative IT technologies is fundamental to building intelligence capabilities, this study aims to contribute to the optimization of collaborative system use by military groups and organizations. The proposed research model illustrates and explains the direct relationships between collaborative IT competence a
APA, Harvard, Vancouver, ISO, and other styles
17

Gallaher, Patrick O'Rourke Julie. "Effective use of collaborative information technology to enhance group performance /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FGallaher.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pan, Long. "Effective and Efficient Methodologies for Social Network Analysis." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/25962.

Full text
Abstract:
Performing social network analysis (SNA) requires a set of powerful techniques to analyze structural information contained in interactions between social entities. Many SNA technologies and methodologies have been developed and have successfully provided significant insights for small-scale interactions. However, these techniques are not suitable for analyzing large social networks, which are very popular and important in various fields and have special structural properties that cannot be obtained from small networks or their analyses. There are a number of issues that need to be further stud
APA, Harvard, Vancouver, ISO, and other styles
19

Pica, Giuseppe. "Donor electron states for silicon quantum computing : from single spins to scaled architectures." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/7816.

Full text
Abstract:
This PhD work took place in the framework of theoretical research aimed at implementation of quantum computing schemes and algorithms in solid state devices. The electron and nuclear spins of dopant atoms implanted in silicon crystals, that already lie at the core of commercial diodes and the photovoltaic industry, are able to store quantum information longer than anything else in the solid state. Controlled manipulations of silicon qubits depend on the ability to tune the nanoscopic donor electron state: we provide a complete theoretical picture that includes, within the insightful and analyt
APA, Harvard, Vancouver, ISO, and other styles
20

Morshed, Md Monzur. "Effective protocols for privacy and security in RFID systems applications." Thesis, Staffordshire University, 2012. http://eprints.staffs.ac.uk/1896/.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology to identify objects or people automatically and has received many applications recent years. An RFID tag is a small and low-priced device consisting of a microchip with limited functionality and data storage and antenna for wireless communication with the readers. RFID tags can be passive, active or semi-active depending on the powering technique. In general passive tags are inexpensive. They have no on-board power; they get power from the signal of the interrogating reader. Active tags contain batteries for their transmission. The low-cost
APA, Harvard, Vancouver, ISO, and other styles
21

Liang, Po-Chou. "Cost-effective design of real-time home healthcare telemonitoring based on mobile cloud computing." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809778/.

Full text
Abstract:
The rise in both ageing and chronic disease populations has highlighted a pressing demand for better access to quality healthcare at home. Meanwhile, studies have shown that home-based treatments for older patients as a substitute for hospital care can produce better clinical outcomes and reduce healthcare expenditure. However, there remains a considerable question relating to the low adoption rate of home telehealthcare technologies due to a lack of robust evidence for their cost-effectiveness. In light of both the epoch-making advancements in smartphone-centric technologies and the pervasive
APA, Harvard, Vancouver, ISO, and other styles
22

Ai, Xusheng. "A TIERED RECOMMENDER SYSTEM FOR COST-EFFECTIVE CLOUD INSTANCE SELECTION." Scholarly Commons, 2021. https://scholarlycommons.pacific.edu/uop_etds/3763.

Full text
Abstract:
Cloud computing has greatly impacted the scientific community and the end users. By leveraging cloud computing, small research institutions and undergraduate colleges are able to alleviate costs and achieve research goals without purchasing and maintaining all the hardware and software. In addition, cloud computing allows researchers to access resources as their teams require and allows real-time collaboration with team members across the globe. Nowadays however, users are easily overwhelmed by the wide range of cloud servers and instances. Due to differences between the cloud server platform
APA, Harvard, Vancouver, ISO, and other styles
23

Sivasligil, Mustafa. "A Fast Model For Computing Infrared Atmospheric Background Effects." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/2/12606989/index.pdf.

Full text
Abstract:
The infrared atmospheric background modeling can be considered as one of the important key factor to develop a successful target detection technique. During the infrared atmospheric background modeling, defining the input parameters of the atmospheric profile are very important for the calculations of the absorption, emission and scattering effects of the atmosphere. The main objective of this thesis is to find the answer for the question &ldquo<br>is it possible to determine the &ldquo<br>effective&rdquo<br>height range for the sea level midlatitude clear weather conditions in the three speci
APA, Harvard, Vancouver, ISO, and other styles
24

Nan, Yucen. "Cost-effective Offloading Strategy for Delay-sensitive Applications in Cloud of Things Systems." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/16789.

Full text
Abstract:
The steep rise of Internet of Things (IoT) applications along with the limitations of Cloud Computing to address all IoT requirements leveraged a new distributed computing paradigm called Fog Computing, which aims to process data at the edge of the network. With the help of Fog Computing, some of the uncertainties of the communication among different tiers like the transmission latency, monetary spending and application loss caused by Cloud Computing can be effectively reduced. However, as the processing capacity of Fog nodes is more limited than that of cloud platforms, running all applicati
APA, Harvard, Vancouver, ISO, and other styles
25

Norrington, Peter. "Novel, robust and cost-effective authentication techniques for online services." Thesis, University of Bedfordshire, 2009. http://hdl.handle.net/10547/134951.

Full text
Abstract:
This thesis contributes to the study of the usability and security of visuo-cognitive authentication techniques, particularly those relying on recognition of abstract images, an area little researched. Many usability and security problems with linguistic passwords (including traditional text-based passwords) have been known for decades. Research into visually-based techniques intends to overcome these by using the extensive human capacity for recognising images, and add to the range of commercially viable authentication solutions. The research employs a mixed methodology to develop several con
APA, Harvard, Vancouver, ISO, and other styles
26

Palanisamy, Balaji. "Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/52157.

Full text
Abstract:
Cloud Computing represents a recent paradigm shift that enables users to share and remotely access high-powered computing resources (both infrastructure and software/services) contained in off-site data centers thereby allowing a more efficient use of hardware and software infrastructures. This growing trend in cloud computing, combined with the demands for Big Data and Big Data analytics, is driving the rapid evolution of datacenter technologies towards more cost-effective, consumer-driven, more privacy conscious and technology agnostic solutions. This dissertation is dedicated to taking a s
APA, Harvard, Vancouver, ISO, and other styles
27

Siebörger, Ingrid Gisélle. "Evolving an efficient and effective off-the-shelf computing infrastructure for schools in rural areas of South Africa." Thesis, Rhodes University, 2017. http://hdl.handle.net/10962/14557.

Full text
Abstract:
Upliftment of rural areas and poverty alleviation are priorities for development in South Africa. Information and knowledge are key strategic resources for social and economic development and ICTs act as tools to support them, enabling innovative and more cost effective approaches. In order for ICT interventions to be possible, infrastructure has to be deployed. For the deployment to be effective and sustainable, the local community needs to be involved in shaping and supporting it. This study describes the technical work done in the Siyakhula Living Lab (SLL), a long-term ICT4D experiment in
APA, Harvard, Vancouver, ISO, and other styles
28

Bartfeld, Dina. "Toward a model of effective responsive training for end-user computing, a constructivist approach to end-user training." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq41099.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

KOTTUPPARI, SRINIVAS SUSHEEL SAGAR. "Clustering Users Based on Mobility Patterns for Effective Utilization of Cellular Network Infrastructure." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13289.

Full text
Abstract:
Context With the rapidly growing demand for cellular networks’ capacityand coverage, effective planning of Network Infrastructure (NI) has been amajor challenge for the telecom operators. The mobility patterns of different subscriber groups in the networks have been found to be a crucialaspect in the planning of NI. For a telecom operator, it is important to havean estimate of the efficiency (in terms of the Network Capacity - numberof subscribers that the network can handle) of the existing NI. For thispurpose, Lundberg et. al., have developed an optimization based strategycalled as Tetris St
APA, Harvard, Vancouver, ISO, and other styles
30

Kwon, Young Woo. "Effective Fusion and Separation of Distribution, Fault-Tolerance, and Energy-Efficiency Concerns." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/49386.

Full text
Abstract:
As software applications are becoming increasingly distributed and mobile, their design and implementation are characterized by distributed software architectures, possibility of faults, and the need for energy awareness. Thus, software developers should be able to simultaneously reason about and handle the concerns of distribution, fault-tolerance, and energy-efficiency. Being closely intertwined, these concerns can introduce significant complexity into the design and implementation of modern software. In other words, to develop reliable and energy-efficient applications, software developers
APA, Harvard, Vancouver, ISO, and other styles
31

He, Yuanchen. "Fuzzy-Granular Based Data Mining for Effective Decision Support in Biomedical Applications." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_diss/12.

Full text
Abstract:
Due to complexity of biomedical problems, adaptive and intelligent knowledge discovery and data mining systems are highly needed to help humans to understand the inherent mechanism of diseases. For biomedical classification problems, typically it is impossible to build a perfect classifier with 100% prediction accuracy. Hence a more realistic target is to build an effective Decision Support System (DSS). In this dissertation, a novel adaptive Fuzzy Association Rules (FARs) mining algorithm, named FARM-DS, is proposed to build such a DSS for binary classification problems in the biomedical dom
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Huai, and 王怀. "Effective test case selection for context-aware applications based on mutation testing and adequacy testing from a context diversityperspective." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B5043441X.

Full text
Abstract:
Mutation testing and adequacy testing are two major technologies to assure the quality of software. In this thesis, we present the first work that alleviates the high cost of mutation testing and ineffectiveness of adequacy testing for context-aware applications. We also present large-scale multi-subject case studies to evaluate how our work successfully alleviates these problems. Mutation testing incurs a high execution cost if randomly selected test inputs kill a small percentage of remaining live mutants. To address this problem, we formulate the notion of context diversity to measure the
APA, Harvard, Vancouver, ISO, and other styles
33

Yan, Shihang. "Performance analysis and improvement of InfiniBand networks : modelling and effective Quality-of-Service mechanisms for interconnection networks in cluster computing systems." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/5713.

Full text
Abstract:
The InfiniBand Architecture (IBA) network has been proposed as a new industrial standard with high-bandwidth and low-latency suitable for constructing high-performance interconnected cluster computing systems. This architecture replaces the traditional bus-based interconnection with a switch-based network for the server Input-Output (I/O) and inter-processor communications. The efficient Quality-of-Service (QoS) mechanism is fundamental to ensure the import at QoS metrics, such as maximum throughput and minimum latency, leaving aside other aspects like guarantee to reduce the delay, blocking p
APA, Harvard, Vancouver, ISO, and other styles
34

Muthukrishnan, Gayathri. "Utilizing Hierarchical Clusters in the Design of Effective and Efficient Parallel Simulations of 2-D and 3-D Ising Spin Models." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/9944.

Full text
Abstract:
In this work, we design parallel Monte Carlo algorithms for the Ising spin model on a hierarchical cluster. A hierarchical cluster can be considered as a cluster of homogeneous nodes which are partitioned into multiple supernodes such that communication across homogenous clusters is represented by a supernode topological network. We consider different data layouts and provide equations for choosing the best data layout under such a network paradigm. We show that the data layouts designed for a homogeneous cluster will not yield results as good as layouts designed for a hierarchical cluster. We
APA, Harvard, Vancouver, ISO, and other styles
35

Skone, Gwyn S. "Stratagems for effective function evaluation in computational chemistry." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:8843465b-3e5f-45d9-a973-3b27949407ef.

Full text
Abstract:
In recent years, the potential benefits of high-throughput virtual screening to the drug discovery community have been recognized, bringing an increase in the number of tools developed for this purpose. These programs have to process large quantities of data, searching for an optimal solution in a vast combinatorial range. This is particularly the case for protein-ligand docking, since proteins are sophisticated structures with complicated interactions for which either molecule might reshape itself. Even the very limited flexibility model to be considered here, using ligand conformation ensemb
APA, Harvard, Vancouver, ISO, and other styles
36

Xu, Zichen. "Energy Modeling and Management for Data Services in Multi-Tier Mobile Cloud Architectures." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1468272637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kuriakose, Elizabeth B. "A cost effective school management system for disadvantaged schools in the Free State province using the software as a service (SaaS) delivery model." Thesis, [Bloemfontein?] : Central University of Technology, Free State, 2014. http://hdl.handle.net/11462/187.

Full text
Abstract:
Thesis (M. Tech. (Information Technology)) -- Central University of technology, Free State, 2013<br>The aim of this study was to create a dynamic software system that captures all information related to a student and delivers it to the educators, principal, higher authorities and parents. In order to achieve this aim, an investigation was launched as to the development of a cost-effective school management system for disadvantaged schools in the Free State Province using the Software as a Service (SaaS) delivery model. Although a variety of other school management systems exist in the market,
APA, Harvard, Vancouver, ISO, and other styles
38

De, Paris Renata. "An effective method to optimize docking-based virtual screening in a clustered fully-flexible receptor model deployed on cloud platforms." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2016. http://tede2.pucrs.br/tede2/handle/tede/7329.

Full text
Abstract:
Submitted by Caroline Xavier (caroline.xavier@pucrs.br) on 2017-06-05T14:58:52Z No. of bitstreams: 1 TES_RENATA_DE_PARIS_COMPLETO.pdf: 8873897 bytes, checksum: 43b2a883518fc9ce39978e816042ab5f (MD5)<br>Made available in DSpace on 2017-06-05T14:58:53Z (GMT). No. of bitstreams: 1 TES_RENATA_DE_PARIS_COMPLETO.pdf: 8873897 bytes, checksum: 43b2a883518fc9ce39978e816042ab5f (MD5) Previous issue date: 2016-10-28<br>Conselho Nacional de Pesquisa e Desenvolvimento Cient?fico e Tecnol?gico - CNPq<br>O uso de conforma??es obtidas por trajet?rias da din?mica molecular nos experimentos de docagem molecul
APA, Harvard, Vancouver, ISO, and other styles
39

Varotti, Stefano. "Effectively Encoding SAT and Other Intractable Problems into Ising Models for Quantum Computing." Doctoral thesis, Università degli studi di Trento, 2019. https://hdl.handle.net/11572/368161.

Full text
Abstract:
Quantum computing theory posits that a computer exploiting quantum mechanics can be strictly more powerful than classical models. Several quantum computing devices are under development, but current technology is limited by noise sensitivity. Quantum Annealing is an alternative approach that uses a noisy quantum system to solve a particular optimization problem. Problems such as SAT and MaxSAT need to be encoded to make use of quantum annealers. Encoding SAT and MaxSAT problems while respecting the constraints and limitations of current hardware is a difficult task. This thesis presents an app
APA, Harvard, Vancouver, ISO, and other styles
40

Varotti, Stefano. "Effectively Encoding SAT and Other Intractable Problems into Ising Models for Quantum Computing." Doctoral thesis, University of Trento, 2019. http://eprints-phd.biblio.unitn.it/3678/1/disclaimertesi.pdf.

Full text
Abstract:
Quantum computing theory posits that a computer exploiting quantum mechanics can be strictly more powerful than classical models. Several quantum computing devices are under development, but current technology is limited by noise sensitivity. Quantum Annealing is an alternative approach that uses a noisy quantum system to solve a particular optimization problem. Problems such as SAT and MaxSAT need to be encoded to make use of quantum annealers. Encoding SAT and MaxSAT problems while respecting the constraints and limitations of current hardware is a difficult task. This thesis presents an app
APA, Harvard, Vancouver, ISO, and other styles
41

Tête, Claire. "Profondeur, dimension et résolutions en algèbre commutative : quelques aspects effectifs." Thesis, Poitiers, 2014. http://www.theses.fr/2014POIT2288/document.

Full text
Abstract:
Cette thèse d'algèbre commutative porte principalement sur la théorie de la profondeur. Nous nous efforçons d'en fournir une approche épurée d'hypothèse noethérienne dans l'espoir d'échapper aux idéaux premiers et ceci afin de manier des objets élémentaires et explicites. Parmi ces objets, figurent les complexes algébriques de Koszul et de Cech dont nous étudions les propriétés cohomologiques grâce à des résultats simples portant sur la cohomologie du totalisé d'un bicomplexe. Dans le cadre de la cohomologie de Cech, nous avons établi la longue suite exacte de Mayer-Vietoris avec un traitement
APA, Harvard, Vancouver, ISO, and other styles
42

Okonkwo, Ejike C. "An Investigation of the Skill Sets Needed by Information Systems Managers to Cope Effectively with the Transition from Legacy Systems to Client/Server and Distributed Computing Environments." NSUWorks, 2003. http://nsuworks.nova.edu/gscis_etd/756.

Full text
Abstract:
The problem investigated in this study was the specific nature of management issues in the information system (IS) data conversion process: extended project time, high staff turnover, cost overrun, adherence to procedure and user disagreement. Data conversion involves the transfer of computer programs and data files from one computer system to another. Managing data conversion projects has posed problems and difficulties. A thorough comprehension of these issues has systematically eluded information technology (IT) professionals, and this may be related to unsuccessful outcomes of data convers
APA, Harvard, Vancouver, ISO, and other styles
43

Wong, Wen-Chian, and 翁文謙. "An Effective Algorithm for Computing Stipple Drawings." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/97800821088015307886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sun, Chi-Eng, and 孫啟恩. "An effective approach for computing epsilon join on uncertain data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/js9phw.

Full text
Abstract:
碩士<br>國立臺北科技大學<br>資訊工程系研究所<br>101<br>Join process is a very important computation in the relation database. The main purpose of the join process is to find the object pairs from two database relation and the object pairs have the same attribute or similarity. There are many join application around our life e.g. sensor database, location based service and face recognition system. These applications have their database, and the amount of data set is very big. There are many sensed data in sensor database and location information in LBS database. The join process has to check all the ob-ject comb
APA, Harvard, Vancouver, ISO, and other styles
45

Syuan-HaoLi and 李軒豪. "Development of An Effective Privacy Protection Scheme for Cloud Computing." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/47394791982833494833.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>98<br>With the development of technology and the consideration of business cost, Cloud Computing becomes the next generation of computing pattern. There are more and more cloud services into our daily life to provide more convenient services. However, one of its characteristic is that storing users’ data centralized in the same data center, and it also generates new issue of data security – Privacy. Nevertheless, the securities offered by cloud providers are not including the data confidentiality, which allows users’ material in the cloud is vulnerable to threats.
APA, Harvard, Vancouver, ISO, and other styles
46

Pan, Wen Chieh, and 潘彣杰. "Effective Identity-Based Encryption Schemes with Outsourced Revocation for Cloud Computing." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/25g23p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

"Towards Effective and Intelligent Multi-tenancy SaaS." Doctoral diss., 2011. http://hdl.handle.net/2286/R.I.8834.

Full text
Abstract:
abstract: Cloud computing has received significant attention recently as it is a new computing infrastructure to enable rapid delivery of computing resources as a utility in a dynamic, scalable, and visualized manner. SaaS (Software-as-a-Service) provide a now paradigm in cloud computing, which goal is to provide an effective and intelligent way to support end users' on-demand requirements to computing resources, including maturity levels of customizable, multi-tenancy and scalability. To meet requirements of on-demand, my thesis discusses several critical research problems and proposed soluti
APA, Harvard, Vancouver, ISO, and other styles
48

KC, U. "Effective cloud solutions for wildfire management." Thesis, 2021. https://eprints.utas.edu.au/46134/1/KC_whole_thesis.pdf.

Full text
Abstract:
Every year natural hazards such as wildfires cause massive destruction of physical infrastructure and loss of lives. A wide range of activities is carried out at different stages of a wildfire under wildfire management to minimize the associated risks. Representing the dynamics of wildfires with complex mathematical and empirical in the form of wild- fire models is one of the effective ways to understand the behavior and form strategies against threatening wildfires. The current practice of wildfire management uses operational fire models such as Spark, Phoenix, FARSITE, and Prometheus, which
APA, Harvard, Vancouver, ISO, and other styles
49

Shuo-Zhan, He, and 何碩展. "An Effective Task Scheduling Method with Link Contention Constraints for Heterogeneous Computing System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/83751815029828870092.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊工程系<br>91<br>Sufficient and various computing resources make heterogeneous computing system suitable for parallel and distributed application. A task scheduling problem is to find the minimum schedule length by arranging tasks of application on computing resources. In order to make this problem more practical, we take the link contention constraints into our system model. We extend from the list-scheduling algorithm and propose an effective and efficient algorithm called Communication Look-ahead Scheduling (CLS) algorithm. In the first phase of our method, we propose a new pr
APA, Harvard, Vancouver, ISO, and other styles
50

Chou, Yi-Ming, and 周億銘. "An Effective Campus Information Penetration System With The Design Approach of Cloud Computing." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/55635705734185068515.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程研究所<br>102<br>Information penetration is extremely important whether in the past or present. Information contains the exchange of multi-party communications, and other informing content. Information transformation defines as the sender using some media in some ways to pass information to achieve the purpose of the recipient. However, due to technological development to the present, its definition has been much more than that. Actually, we can reach a global information technology in information penetration environment. In the era of science and technology underdevelopment,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!