Academic literature on the topic 'Framework II (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Framework II (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Framework II (Computer file)"

1

Flügel, W. A., and C. Busch. "Development and implementation of an Integrated Water Resources Management System (IWRMS)." Advances in Science and Research 7, no. 1 (April 26, 2011): 83–90. http://dx.doi.org/10.5194/asr-7-83-2011.

Full text
Abstract:
Abstract. One of the innovative objectives in the EC project BRAHMATWINN was the development of a stakeholder oriented Integrated Water Resources Management System (IWRMS). The toolset integrates the findings of the project and presents it in a user friendly way for decision support in sustainable integrated water resources management (IWRM) in river basins. IWRMS is a framework, which integrates different types of basin information and which supports the development of IWRM options for climate change mitigation. It is based on the River Basin Information System (RBIS) data models and delivers a graphical user interface for stakeholders. A special interface was developed for the integration of the enhanced DANUBIA model input and the NetSyMod model with its Mulino decision support system (mulino mDss) component. The web based IWRMS contains and combines different types of data and methods to provide river basin data and information for decision support. IWRMS is based on a three tier software framework which uses (i) html/javascript at the client tier, (ii) PHP programming language to realize the application tier, and (iii) a postgresql/postgis database tier to manage and storage all data, except the DANUBIA modelling raw data, which are file based and registered in the database tier. All three tiers can reside on one or different computers and are adapted to the local hardware infrastructure. IWRMS as well as RBIS are based on Open Source Software (OSS) components and flexible and time saving access to that database is guaranteed by web-based interfaces for data visualization and retrieval. The IWRMS is accessible via the BRAHMATWINN homepage: http://www.brahmatwinn.uni-jena.de and a user manual for the RBIS is available for download as well.
APA, Harvard, Vancouver, ISO, and other styles
2

BERGENTI, FEDERICO, and AGOSTINO POGGI. "SUPPORTING AGENT-ORIENTED MODELLING WITH UML." International Journal of Software Engineering and Knowledge Engineering 12, no. 06 (December 2002): 605–18. http://dx.doi.org/10.1142/s0218194002001086.

Full text
Abstract:
Software engineering relies on the possibility of describing a system at different levels of abstraction. Agent-oriented software engineering introduces a new level of abstraction, that we called agent level, to allow the architect modelling a system in terms of interacting agents. This level of abstraction is not supported by an accepted set of tools and notations yet, even if a number of proposals are available. This paper introduces: (i) An UML-based notation capable of modelling a system at the agent level and (ii) A development framework, called ParADE, exploiting such a notation. The notation we propose is formalized in terms of a UML profile and it supports the realisation of artefacts modelling two basic concepts of the agent level, i.e., the architecture of the multi-agent system and the ontology followed by agents. The choice of formalising our notation in terms of a UML profile allows using it with any off-the-shelf CASE tool. The ParADE framework takes advantage of this choice by providing a code generator capable of producing skeletons of FIPA-compliant agents from XMI files of agent-oriented models. The developer is requested to complete the generated skeletons exploiting the services that ParADE and the underlying agent platform provide.
APA, Harvard, Vancouver, ISO, and other styles
3

Widmann, Tobias, Lucas P. Kreuzer, Matthias Kühnhammer, Andreas J. Schmid, Lars Wiehemeier, Sebastian Jaksch, Henrich Frielinghaus, et al. "Flexible Sample Environment for the Investigation of Soft Matter at the European Spallation Source: Part II—The GISANS Setup." Applied Sciences 11, no. 9 (April 29, 2021): 4036. http://dx.doi.org/10.3390/app11094036.

Full text
Abstract:
The FlexiProb project is a joint effort of three soft matter groups at the Universities of Bielefeld, Darmstadt, and Munich with scientific support from the European Spallation Source (ESS), the small-K advanced diffractometer (SKADI) beamline development group of the Jülich Centre for Neutron Science (JCNS), and the Heinz Maier-Leibnitz Zentrum (MLZ). Within this framework, a flexible and quickly interchangeable sample carrier system for small-angle neutron scattering (SANS) at the ESS was developed. In the present contribution, the development of a sample environment for the investigation of soft matter thin films with grazing-incidence small-angle neutron scattering (GISANS) is introduced. Therefore, components were assembled on an optical breadboard for the measurement of thin film samples under controlled ambient conditions, with adjustable temperature and humidity, as well as the optional in situ recording of the film thickness via spectral reflectance. Samples were placed in a 3D-printed spherical humidity metal chamber, which enabled the accurate control of experimental conditions via water-heated channels within its walls. A separately heated gas flow stream supplied an adjustable flow of dry or saturated solvent vapor. First test experiments proved the concept of the setup and respective component functionality.
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Seokjun, Wooyeon Jo, Soowoong Eo, and Taeshik Shon. "ExtSFR: scalable file recovery framework based on an Ext file system." Multimedia Tools and Applications 79, no. 23-24 (January 29, 2019): 16093–111. http://dx.doi.org/10.1007/s11042-019-7199-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Hyungchan, Sungbum Kim, Yeonghun Shin, Wooyeon Jo, Seokjun Lee, and Taeshik Shon. "Ext4 and XFS File System Forensic Framework Based on TSK." Electronics 10, no. 18 (September 20, 2021): 2310. http://dx.doi.org/10.3390/electronics10182310.

Full text
Abstract:
Recently, the number of Internet of Things (IoT) devices, such as artificial intelligence (AI) speakers and smartwatches, using a Linux-based file system has increased. Moreover, these devices are connected to the Internet and generate vast amounts of data. To efficiently manage these generated data and improve the processing speed, the function is improved by updating the file system version or using new file systems, such as an Extended File System (XFS), B-tree file system (Btrfs), or Flash-Friendly File System (F2FS). However, in the process of updating the existing file system, the metadata structure may be changed or the analysis of the newly released file system may be insufficient, making it impossible for existing commercial tools to extract and restore deleted files. In an actual forensic investigation, when deleted files become unrecoverable, important clues may be missed, making it difficult to identify the culprit. Accordingly, a framework for extracting and recovering files based on The Sleuth Kit (TSK) is proposed by deriving the metadata changed in Ext4 file system journal checksum v3 and XFS file system v5. Thereafter, by comparing the accuracy and recovery rate of the proposed framework with existing commercial tools using the experimental dataset, we conclude that sustained research on file systems should be conducted from the perspective of forensics.
APA, Harvard, Vancouver, ISO, and other styles
6

Sheu, Ruey-Kai, Shyan-Ming Yuan, Win-Tsung Lo, and Chan-I. Ku. "Design and Implementation of File Deduplication Framework on HDFS." International Journal of Distributed Sensor Networks 10, no. 4 (January 2014): 561340. http://dx.doi.org/10.1155/2014/561340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jang, Hyeongwon, Sang Youp Rhee, Jae Eun Kim, Yoonhee Kim, Hyuck Han, Sooyong Kang, and Hyungsoo Jung. "AutoBahn: a concurrency control framework for non-volatile file buffer." Cluster Computing 23, no. 2 (July 29, 2019): 895–910. http://dx.doi.org/10.1007/s10586-019-02964-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Shuang, Chenxi Zhang, and Pin‐Han Ho. "A secure business framework for file purchasing in vehicular networks." Security and Communication Networks 1, no. 3 (May 2008): 259–68. http://dx.doi.org/10.1002/sec.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

BAFTIU, Naim, and Samedin KRABAJ. "Creating Prototype Virus - Destroying Files and Texts on Any Computer." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 1 (April 26, 2019): 62. http://dx.doi.org/10.32936/pssj.v3i1.78.

Full text
Abstract:
When we study how viruses work and prevent them, we've developed a very simple application where we can see a prototype of a virus and virus function, as well as neutralizing a file if we want to break it down its structure at the level of the bits Purpose-Understand how a virus works by programming it in a high programming language. In our case, the C # programming language with the Visual Studio program that uses the .Net Framework. With the Windows Form Application module, the same application we are creating can also use it to neutralize a sentence if we know it is infected by interfering with the file we set up itself and by disrupting the system his Binary. Key words: Component, Virus, File, C# Programming, Visual Studio.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Tao, XiangZheng Sun, Wei Xue, Nan Qiao, Huang Huang, JiWu Shu, and Weimin Zheng. "ParSA: High-throughput scientific data analysis framework with distributed file system." Future Generation Computer Systems 51 (October 2015): 111–19. http://dx.doi.org/10.1016/j.future.2014.10.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Framework II (Computer file)"

1

Almedia, Danilo (Danilo D'Amico) 1975. "Framework for implementing file systems in Windows NT." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46208.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (p. 38-39).
by Danilo Almedia.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
2

Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.

Full text
Abstract:
The objective of this research is to evaluate and develop new forensic techniques for use in honeynet environments, in an effort to address areas where anti-forensic techniques defeat current forensic methods. The fields of Computer and Network Security have expanded with time to become inclusive of many complex ideas and algorithms. With ease, a student of these fields can fall into the thought pattern of preventive measures as the only major thrust of the topics. It is equally important to be able to determine the cause of a security breach. Thus, the field of Computer Forensics has grown. In this field, there exist toolkits and methods that are used to forensically analyze production and honeypot systems. To counter the toolkits, anti-forensic techniques have been developed. Honeypots and production systems have several intrinsic differences. These differences can be exploited to produce honeypot data sources that are not currently available from production systems. This research seeks to examine possible honeypot data sources and cultivate novel methods to combat anti-forensic techniques. In this document, three parts of a forensic framework are presented which were developed specifically for honeypot and honeynet environments. The first, TimeKeeper, is an inode preservation methodology which utilizes the Ext3 journal. This is followed with an examination of dentry logging which is primarily used to map inode numbers to filenames in Ext3. The final component presented is the initial research behind a toolkit for the examination of the recently deployed Ext4 file system. Each respective chapter includes the necessary background information and an examination of related work as well as the architecture, design, conceptual prototyping, and results from testing each major framework component.
APA, Harvard, Vancouver, ISO, and other styles
3

Purandare, Darshan. "A framework for efficient data distribution in peer-to-peer networks." Doctoral diss., Orlando, Fla. : University of Central Florida, 2008. http://purl.fcla.edu/fcla/etd/CFE0002260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clark, Miriam Shaheed. "Automation of the Modular Pattern System basic skirt pattern drafting methodology using Turbo Pascal and dBaseII." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Qing. "Framework to Facilitate Metacognitive Strategy Development in Computer-mediated Instruction: A Design and Development Study." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/103549.

Full text
Abstract:
This study develops a computer-based interactive content design framework to guide the design of metacognitive scaffolds in ill-structured problem-solving instruction. It adopts Type II design and development research approach to create a comprehensive and generalizable instructional design framework. The framework was composed by synthesizing research and practical literature, and then evaluated by experts in related fields. The completed framework includes metacognitive strategies, instructional design strategies, interactive media types, question prompts, and feedback. Instructional designers, instructors, and other key stakeholders could follow the guidelines proposed in this framework to create metacognitive-based ill-structured problem-solving instruction using e-Learning authoring tools. On one hand, this study bridges the gap between theory and practice; on the other hand, it adds to literature in media research with focusing on utilizing various media types to create effective learning materials.
Doctor of Philosophy
This study aims to develop an interactive content design framework to guide the design of metacognitive scaffolds in ill-structured problem-solving instruction. It applies the Type II design and development research method. The framework was proposed by synthesizing pertinent literature, and then evaluated by experts in related fields. The completed framework includes metacognitive strategies, instructional design strategies, interactive media types, question prompts, and feedback. Instructional designers, instructors, and other key stakeholders could follow the guidelines to create computer-mediated instruction using e-Learning authoring tools. On one hand, this study bridges the gap between theory and practice; on the other hand, it adds to literature in media research with implementing various media types to create effective learning materials.
APA, Harvard, Vancouver, ISO, and other styles
6

Manaf, Afwarman 1962. "Constraint-based software for broadband networks planninga software framework for planning with the holistic approach /." Monash University, Dept. of Electrical and Computer Systems Engineering, 2000. http://arrow.monash.edu.au/hdl/1959.1/8163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Manaf, Afwarman 1962. "Constraint-based software for broadband networks planning : a software framework for planning with the holistic approach." Monash University, Dept. of Electrical and Computer Systems Engineering, 2000. http://arrow.monash.edu.au/hdl/1959.1/7754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Shuang. "A Secure Business Framework for File Purchasing Application in Vehicular Ad Hoc Networks." Thesis, 2008. http://hdl.handle.net/10012/3803.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) are gaining growing interest from both industry and academia. Driven by road safety requirements, the car manufacturers, transportation authorities and communications standards organizations are working together to make a quantum step in terms of vehicular information technology (IT) by equipping the vehicles with sensors, on-board processing and wireless communication modules. VANETs are composed of OBUs (On Board Units) and RSUs (Road Side Units). The communication standard used in VANETs is called DSRC (Dedicated Short Range Communication). With many essential vehicle components (radios, spectrum, standards, etc) coming into place, a lot of new applications are emerging beside road safety, which support not only safety related services, but also entertainment and mobile Internet access services. In this study, we propose a promising commercial application for file purchasing in VANETs, where a legitimate vehicle can purchase digital files/data through a roadside unit (RSU). Due to the high mobility of the vehicles, the contact period between an RSU and a vehicle could be insufficient to download the complete file. To purchase a digital file, a vehicle purchases a permission key from a fixed RSU and then begins to download the file from the RSU via vehicle-to-RSU communications (V2R) when it is in the transmission range of the RSU. Once the vehicle in the process of downloading a file leaves the transmission range of the RSU, its neighboring vehicles with a piece of the file cooperatively help to complete the file transfer via vehicle-to-vehicle (V2V) communications. Such a commercial file purchasing system can obviously initiate a new application scenario. However, it cannot be put into practice unless the security issues, such as the user privacy, incentives for inter-vehicle cooperation, and the copyright protection for the file content are well addressed. In order to deal with these security issues, we develop a secure business framework for the file purchasing system in this study. In this framework, we preserve the user privacy by using the pseudo identity for each vehicle. We stimulate the cooperation between vehicles through micro-payment incentive mechanism and guarantee the secure payment at the same time. To protect the digital file content from unauthorized distribution, we encrypt the file content before delivery to an end user and use digital fingerprint technology to generate a unique copy for each vehicle after delivery. In a word, we propose a file purchasing application in VANETs and also develop a secure framework for this application.
APA, Harvard, Vancouver, ISO, and other styles
9

Johnston, James. "A framework for secure human computer interaction." Thesis, 2008. http://hdl.handle.net/10210/493.

Full text
Abstract:
This research is concerned with the development of a framework for the analysis and design of interfaces found in a security environment. An example of such an interface is a firewall. The purpose of this research is to use the framework as a method to improve the usability of an interface, thus aiding the user to implement the correct security features. The purpose is also to use the framework to assist in the development of trust between a user and a computer system. In this research the framework comprises six criteria which are used to analyse interfaces found in the traditional software environment, Internet banking environment and e-commerce environment. In order to develop the framework an overview of the fields of information security and human computer interfaces (HCI) is given. The overview provides background information and also establishes the existing research which has been done in these fields. Due to its popularity, the Windows Internet Connection Firewall is analysed in this research. Based on the criteria a level of trust fostered between the user and interface is calculated for the firewall. It is then shown how this level of trust can be improved by modifying the interface. A proposed interface for the firewall is presented according to the criteria. Interfaces found in the online Internet environment are discussed. This is important in order to identify the similarities and differences between traditional software interfaces and web interfaces. Due to these differences the criteria are modified to be relevant in the analysis and design of security interfaces found on the Internet. Three South African online banking websites are analysed according to the modified framework. Each interface is broken down into a number of components which are then analysed individually. The results of the analysis are compared between the three banking sites to identify the elements which make up a successful interface in an online banking environment. Lastly, three interfaces of e-commerce websites are analysed. Recommendations are made on how the interfaces can be improved, thus leading to a higher level of trust.
Labuschagne, L., Prof.
APA, Harvard, Vancouver, ISO, and other styles
10

Chaudhari, Shivangi. "Accelerating Hadoop Map-Reduce for small/intermediate data sizes using the Comet coordination framework." 2009. http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.000051790.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Framework II (Computer file)"

1

Lawrence, Kasevich, and Prague Cary N, eds. Framework II. Blue Ridge Summit, PA: Tab Books, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stone, Deborah L. The illustrated Framework II book. Dallas: Wordware Pub., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hergert, Douglas. Mastering Framework II. Berkeley: Sybex, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

H, Baker Richard, ed. Framework II applications. 2nd ed. Blue Ridge Summit, PA: Tab Books, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frederick, Williams. Framework II for writers. Torrance, Calif: Ashton-Tate, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The Framework book. Berkeley, Calif: Osborne McGraw-Hill, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Understanding and using Framework. St. Paul: West Pub. Co., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blake, Robert M. Measured doses of Framework. New York: Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Spoor, Cynthia. Framework from the ground up. Toronto: Bantam Books, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lawrence, Kasevich, ed. Using Framework, a pictorial guide. Blue Ridge Summit, PA: Tab Books, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Framework II (Computer file)"

1

Lazzarini, Victor. "File Input and Output." In Computer Music Instruments II, 105–13. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13712-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilson, Kenneth, and Philip Machanick. "SecureTorrent: A Security Framework for File Swarming." In Advances in Computer Systems Architecture, 538–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11859802_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krichen, Mariem, Johanne Cohen, and Dominique Barth. "File Transfer Application For Sharing Femto Access." In Computer and Information Sciences II, 191–98. London: Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2155-8_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Demir, Onur, and Berkay Kocak. "A Decentralized File Sharing Framework for Sensitive Data." In Communications in Computer and Information Science, 142–49. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27355-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shin, Ilhoon. "A File System Framework Independent of Operating Systems." In Communications in Computer and Information Science, 218–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31965-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Diaz, Claudia, Carmela Troncoso, and Bart Preneel. "A Framework for the Analysis of Mix-Based Steganographic File Systems." In Computer Security - ESORICS 2008, 428–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88313-5_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Casalicchio, Emiliano, Antonello Paoletti, and Salvatore Tucci. "DeDALO: A Framework for Distributed Systems Dependencies Discovery and Analysis." In Computer and Information Sciences II, 265–69. London: Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2155-8_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aerts, Kris, and Karel De Vlaminck. "Visto: A More Declarative Gui Framework." In Computer-Aided Design of User Interfaces II, 73–78. Dordrecht: Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4295-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marengoni, Maurício, Christopher Jaynes, Allen Hanson, and Edward Riseman. "Ascender II, a Visual Framework for 3D Reconstruction." In Lecture Notes in Computer Science, 469–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-49256-9_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Feng, Jun, Yu Chen, Douglas H. Summerville, and Kai Hwang. "Fair Non-repudiation Framework for Cloud Storage: Part II." In Computer Communications and Networks, 283–300. London: Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2236-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Framework II (Computer file)"

1

Chidambaram, Nithya, Kunda Vineela, Matthew J. Jebin, J. Balaji, and Pethuru Raj. "Fortified File Transfer Framework - A TranSecure Model." In 2018 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2018. http://dx.doi.org/10.1109/iccci.2018.8441210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Lidong, Yongwei Wu, Ruini Xue, Tse-Chuan Hsu, Hongji Yang, and Yeh-Ching Chung. "HybridFS — A High Performance and Balanced File System Framework with Multiple Distributed File Systems." In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cabau, George, Andrea Timea Salagean, and Gheorghe Sebestyen-Pal. "Realtime file processing based on Map-Reduce framework." In 2015 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 2015. http://dx.doi.org/10.1109/iccp.2015.7312716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ai, Yong, Hongbin Dong, Yiwen Liang, and R. I. McKay. "A Framework for a File View Model in Intranets." In 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccit.2009.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Fenghua. "Research and Application on validation.xml of Struts2 Framework Verify File." In 2015 International Industrial Informatics and Computer Engineering Conference. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/iiicec-15.2015.323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

C., Suresh, and Vijaya Kumar B.P. "Generalized RFID-based Tracking system Framework for Indian Manufacturing Industries." In International Conference on Computer Applications — Computer Applications - II. Singapore: Research Publishing Services, 2010. http://dx.doi.org/10.3850/978-981-08-7304-2_1608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nanda, Mohit, and Amol Khanapurkar. "Performance Engineering, Testing and System Sizing of an Automatic Code Evaluation Framework." In International Conference on Computer Applications — Computer Applications - II. Singapore: Research Publishing Services, 2010. http://dx.doi.org/10.3850/978-981-08-7304-2_1393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Wenrui, Guangming Liu, Jie Yu, Wei Hu, and Xin Liu. "SFDC: File Access Pattern Aware Cache Framework for High-performance Computer." In 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

R. Sahoo, Prabin. "Multicore Object Framework (MOF): An Effective Approach Towards Developing Applications for Multicore using C++ and POSIX Threads for Parallel Processing." In International Conference on Computer Applications — Computer Applications - II. Singapore: Research Publishing Services, 2010. http://dx.doi.org/10.3850/978-981-08-7304-2_1379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Moon, Sang-Ku, Yong-Mo Moon, Sridhar Kota, and Robert G. Landers. "Screw Theory Based Metrology for Design and Error Compensation of Machine Tools." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/dac-21083.

Full text
Abstract:
Abstract The paper presents a generalized mathematical framework for computation and compensation of tool tip errors in multi-axis machine tools using screw theory. In contrast to conventional Denavit–Hartenberg notation, Screw theory offers several advantages including: (i) modeling of complex machine tool configurations with rotational axes, (ii) tractability of error propagation which simplifies solution of inverse kinematics and subsequent error-compensation procedures, and (iii) functional representation of error screws in a global reference frame rather than cumbersome coordinate transformations of local reference frames. Kinestatic filtering technique [11,12] is adopted for evaluating the compensatability of errors and the Jacobian is used for error compensation. The methodology is illustrated using a five-axis machine tool with two rotational axes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography