Dissertations / Theses on the topic 'Implementations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Implementations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
O'Rourke, Colleen Marie. "Efficient NTRU implementations." Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0430102-111906.
Full textLembo, Domenico. "Dealing with Inconsistency and Incompleteness in Data Integration." Doctoral thesis, La Sapienza, 2004. http://hdl.handle.net/11573/917064.
Full textKhasian, Nooshin, and Sara Goodarzian. "OBDD–based Set Implementations." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21056.
Full textNemec, Matus <1992>. "Challenging RSA cryptosystem implementations." Doctoral thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/17849.
Full textThe aim of our research was to study security properties of real-world deployments of the RSA cryptosystem. First we analyze RSA key generation methods in cryptographic libraries. We show a practical application of biases in RSA keys for measuring popularity of cryptographic libraries and we develop a factorization method that breaks a proprietary key generation algorithm. Later we examine published implementation issues in the TLS protocol, such as RSA padding oracles, in the wider context of the Web ecosystem. Our work helps to demonstrate how RSA, a seemingly simple and intuitive cryptosystem, requires a lot of knowledge to be implemented correctly. Unlike RSA, elliptic curve cryptography (ECC) algorithms do not require padding, and parameters can be chosen such that random strings serve as keys. It is more resistant to bad user configurations and provides many other benefits. We conclude that practitioners should follow the example of TLS version 1.3 and stop using RSA in favor of ECC.
Hiles, Charmelle Amanda. "Using experience from previous failed implementations to improve future lean implementation strategy." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/11047.
Full textWang, Xuan. "Verification of digital controller implementations /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1073.pdf.
Full textHedenström, Felix. "Trial Division : Improvements and Implementations." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211090.
Full textTrial division är en av de enklaste algoritmerna när det kommer till attfaktorisera tal. Problemet med trial division är att det är relativt långsamtoch att det gör onödiga beräkningar. Hur kan man göra denna algoritmsnabbare utan att inte göra den seriell? Hur beter sig algoritmen när denär parallelliserad? Kan en förbättrad seriell sedan bli parallelliserad?För att besvara dessa frågor studerades trial division och dess möjligaförbättringar. Dessa olika förbättringar implementerades i form av flerafunktioner som sedan och testades mot varandra.Den snabbaste versionen byggde på att använda en lista utav primtaloch trådar för att minimera antal ’trials’ samt att dela upp arbetet. Denvar dock inte alltid snabbast, då den seriella versionen som också användeen lista av primtal var snabbare för siffror under 10 10 . Sent upptäck-tes ett re-allokeringsproblem med de parallella implementationerna, meneftersom de ändå var snabbare fixades inte detta problemet.
Valencia-Palomo, Guillermo. "Efficient implementations of predictive control." Thesis, University of Sheffield, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537995.
Full textYanco, Holly A. (Holly Ann). "Robot communication : issues and implementations." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/37729.
Full textPinto, de Mendonça José Rogério 1963. "Business impacts of CRM implementations." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8467.
Full textIncludes bibliographical references (leaves 75-76).
This thesis aims at examining CRM implementations and at obtaining theoretical and practical evidence to three questions: ** What patterns emerge in successful CRM implementations, and general factors that prevent organizations from achieving expected results in such projects; ** What business benefits and impacts (e.g., return on investment, customer value, and redesign of business processes), are typically observed in CRM initiatives; ** How companies rearrange their organizational structures to, maximize the benefits of CRM. To accomplish these goals the author conducted a review of available literature, arid then interviewed members of 3 companies that implemented CRM and 2 system integrators with comprehensive experience in implementation of CRM. This practical experience intended to confirm the findings obtained through the literature review. The 3 companies researched are market leaders in the Financial Service Industry in Latin America. Consistently, the System Integrators interviewed actively serve the same industry. The major findings of this work are the following: ** Technology components as well as vendor selection is secondary as a key success factor; ** Companies usually do not reorganize themselves due to CRM implementations. Structure models; seems to be much more dependent on intrinsic cultural aspects; ** Observed business benefits have a high degree of variation, depending much on the situation before the implementation - all researched cases were considered to be successful. Although the sample analyzed is not sufficient to establish generalizations, due to its size and to the impossibility of obtaining reliable numeric or quantitative data, we report our results and interpret as a contribution to the growing body of evidence. Most of the conclusions are consistent with the literature review findings, with the exception of the observed absence of 'business cases' in the analyzed companies. The literature claims that elaboration of detailed business cases is critical, whereas in the analyzed companies a less rigorous, but nevertheless detailed, planning was sufficient to ensure success. Apart from the limitation of the size of the researched sample, due to the relative newness of the theme, part of the literature reviewed was composed by white papers published by CRM vendors, management consulting firms, and independent research and advisory companies. The research suggests that such implementations have important and lasting effects on the business. It also indicates that the magnitude of the business impacts are intrinsically dependent of the realities of particular companies, and cannot be generalized even within the specific financial services sector. Most of conclusions are based on qualitative analysis. since the number of cases, complexity and variability of the implementations, prevent from generating statically sound analysis. It would be valuable if this research could be extended through other industry sectors, in Latin America, or alternatively to encompass financial service companies from other regions.
by José Rogério Pinto de Mendonça.
S.M.M.O.T.
Bharioke, Arjun. "Neural implementations of sensory computations." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648146.
Full textJansen, Roelof. "Evaluation of Doherty Amplifier Implementations." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/20445.
Full textENGLISH ABSTRACT: Modern communication systems demand efficient, linear power amplifiers. The amplifiers are often operated in the backed-off power levels at which linear amplifiers such as class B amplifier are particularly inefficient. The Doherty amplifier provides an improvement as it increases efficiency at backed of power levels. Doherty amplifiers consists of two amplifiers, a carrier amplifier and a peaking amplifier, of which the output is combined in a novel way. Implementation of the Doherty amplifier with transistors is not ideal. One of the main problems is the insufficient current production of the peaking amplifier at peak envelope power (PEP) if it is implemented as a class C amplifier. A suggested solution to this problem is a bias adaption system that controls the peaking amplifier gate voltage dynamically depending on the input power levels. The design and evaluation of such a adaptive Doherty amplifier is the main goal of this thesis. A classical Doherty amplifier with and an uneven Doherty amplifier with unequal power division between the carrier and peaking amplifiers are also evaluated and compared with the adaptive Doherty amplifier. The amplifiers are designed using a 10 W LDMOS FET device, the MRF282. The adaptive Doherty amplifier and the uneven Doherty amplifier show significant improvements in efficiency and output power over the even Doherty amplifier. At PEP the adaptive Doherty delivers 42.4 dBm at 39.75 % power added efficiency (PAE), the uneven Doherty amplifier 41.9 dBm at 40.75 % PAE and the even Doherty amplifier 40.8 dBm at 38.6 % PAE. At 3dB backed-off input power the adaptive Doherty amplifier has an efficiency of 34.3%, compared to 34.9 5% for the uneven Doherty amplifier and 29.75 % for the even Doherty amplifier.
AFRIKAANSE OPSOMMING: Moderne kommunikasie stelsels vereis effektiewe, linieêre drywing versterkers. Die versterkers word dikwels in laer drywings vlakke bedryf waar linieêre versterkers soos ’n klas B versterker besondere lae effektiwiteit het. Die Doherty versterker bied ’n uitweg omdat dit verbeterde effektiwiteit by lae drywings vlakke bied. ’n Doherty versterker bestaan uit twee versterkers, die hoof versterker en die aanvullende versterker, waarvan die uittrees met ’n spesiale kombinasie netwerk bymekaar gevoeg word. Die implementasie van Doherty versterkers met transistors is nie ideaal nie. Een van die hoof probleme is die onvoldoende stroom wat deur die aanvullings versterker gebied word by piek omhulsel drywing (POD). ’n Oplossing vir die probleem is om ’n aanpassings sisteem te gebruik wat die aanvullende versterker se hekspanning dinamies beheer afhangende van die intree drywings vlakke. Die ontwerp en evaluasie van so ’n aanpassings Doherty versterker is die hoof doel van hierdie tesis. ’n Klassieke Doherty versterke met gelyke drywings verdeling en ’n ongelyke Doherty versterker wat gebruik maak van ongelyke drywings verdeling tussen die hoof-en aanvullende versterkers is ook gevalueer en vergelyk met die aanpassings Doherty versterker. Die versterkers was ontwerp met ’n 10 W LDMOS FET, die MRF282. Die aanpassings Doherty versterker en die ongelyke Doherty versterker het aanmerklike verbeteringe in effektiwiteit en uittree drywing gebring in vergelyking met die ewe Doherty versterker. By POD het die aanpassings versterker 42.4 dBm teen 39.75 % drywing toegevoegde effektiwiteit (DTE) gelewer, die ongelyke Doherty versterker 41.9 dBm teen 40.75 % DTE, en die ewe Doherty versterker 40.8 dBm teen 38.6 DTE. By ’n intree drywingsvlak 3 dB laer as POD het die aanpassings Doherty versterker ’n effektiwiteit van 34.3 % getoon, in vergelyking met die onewe Doherty versterker se 34.9 % en die ewe Doherty versterker se 29.75 % DTE.
Zhang, Haotian. "Smart grid technologies and implementations." Thesis, City University London, 2014. http://openaccess.city.ac.uk/5918/.
Full textMichel, Claude. "Modeles et implementations d'interpretes reflexifs." Nice, 1997. http://www.theses.fr/1997NICE5117.
Full textYoo, Daniel. "Alchemy -- Transmuting base specifications into implementations." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-022609-151429/.
Full textBarlindhaug, Lars Feiring. "Developing Software Quality in KBE Implementations." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for produktutvikling og materialer, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18550.
Full textDhingra, Neha. "Analysis of ORM Based JPA Implementations." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36524.
Full textHedén, Mattias. "SCTP - An analysis of proposed implementations." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-5216.
Full textDe, Wulf Martin. "From timed models to timed implementations." Doctoral thesis, Universite Libre de Bruxelles, 2006. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210797.
Full textComputer Science is currently facing a grand challenge :finding good design practices for embedded systems. Embedded systems are essentially computers interacting with some physical process. You could find one in a braking systems or in a nuclear power plant for example. They present several design difficulties :first they are reactive systems, interacting indefinitely with their environment. Second,they must satisfy real-time constraints specifying when they should respond, and not only how. Finally, their environment is often deeply continuous, presenting complex dynamics. The formal models of choice for specifying such systems are timed and hybrid automata for which model checking is pretty well studied.
In a first part of this thesis, we study a complete design approach, including verification and code generation, for timed automata. We have to define a new semantics for timed automata, the AASAP semantics, that preserves the decidability properties for model checking and at the same time is implementable. Our notion of implementability is completely novel, and relies on the simulation of a semantics that is obviously implementable on a real platform. We wrote tools for the analysis and code generation and exemplify them on a case study about the well known Philips Audio Control Protocol.
In a second part of this thesis, we study the problem of controller synthesis for an environment specified as a hybrid automaton. We give a new solution for discrete controllers having only an imperfect information about the state of the system. In the process, we defined a new algorithm, based on the monotonicity of the controllable predecessors operator, for efficiently finding a controller and we show some promising applications on a classical problem :the universality test for finite automata.
Doctorat en sciences, Spécialisation Informatique
info:eu-repo/semantics/nonPublished
Lai, Pei Ling. "Neural implementations of canonical correlation analysis." Thesis, University of the West of Scotland, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.311771.
Full textNonthaleerak, Preeprem. "Strengthening Six Sigma for service implementations." Thesis, Lancaster University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427555.
Full textSingh, Rajinder Jit. "VLSI implementations for wave digital filtering." Thesis, Queen's University Belfast, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.359124.
Full textRoche, Brendan. "Modelling hardware implementations of neural networks." Thesis, University of Ulster, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.284751.
Full textYoo, Daniel. "Alchemy: Transmuting Base Specifications into Implementations." Digital WPI, 2009. https://digitalcommons.wpi.edu/etd-theses/168.
Full textFarmani, Mohammad. "Threshold Implementations of the Present Cipher." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/1024.
Full textZayes, Pedro A. (Pedro Angel) 1975. "Analyzing the behavior of TCP implementations." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47627.
Full textIncludes bibliographical references (p. 72-73).
by Pedro A. Zayes.
S.B.and M.Eng.
Weinstein, Yaakov Shmuel 1974. "Experimental implementations of quantum information processing." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/88834.
Full textDobson, Jonathan M. "ASIC implementations of the Viterbi Algorithm." Thesis, University of Edinburgh, 1999. http://hdl.handle.net/1842/13669.
Full textDe, Castro Leo(Leo Ramón Nathan). "Practical homomorphic encryption implementations & applications." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129883.
Full textCataloged from student-submitted PDF of thesis.
Includes bibliographical references (pages 67-69).
Homomorphic encryption is an exciting technology that enables computations to be performed over encrypted data. While initial constructions were impractical, recent works have enabled eciency necessary for many practical application. In this thesis, we present a new library for homomorphic encryption and two of applications built on this library. The first application is a fast oblivious linear evaluation protocol, a fundamental building block for secure computation. The second is a secure data aggregation platform used to study cyber risk.
by Leo de Castro.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Herrera-Marti, David A. "Implementations of fault-tolerant quantum devices." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/10209.
Full textHanna, Youssef. "Verifying sensor network security protocol implementations." [Ames, Iowa : Iowa State University], 2008.
Find full textBenatar, Jonathan G. "Fem implementations of magnetostrictive-based applications." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3273.
Full textThesis research directed by: Dept. of Aerospace Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Rodrigues, dos Santos d'Amorim Fernanda. "Modularity analysis of use case implementations." Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2409.
Full textConselho Nacional de Desenvolvimento Científico e Tecnológico
Atualmente, arquitetura baseada em componentes é a abordagem mais utilizada no desenvolvimento de softwares complexos; esta tem como principal objetivo a atribuição dos requisitos da aplicação aos componentes. Uma das técnicas mais difundidas para especificação de requisitos é a utilização de Casos de Uso. Em geral, arquiteturas de software baseadas em componentes resultam em implementações onde o código relativo a um caso de uso está espalhado e entrelaçado em diversos componentes do sistema, caracterizando um crosscutting concern. Isto ocorre porque técnicas tradicionais, como Orientação a Objetos (OO), não oferecem mecanismos que sejam capazes de modularizar este tipo de concern. Recentemente, novas técnicas de modularização como aspectos, mixins e classes virtuais, foram propostas para tentar resolver este problema. Estas técnicas podem ser usadas para agrupar o código relacionado a um único caso de uso em uma nova unidade de modularização. Este trabalho analisa qualitativa e quantitativamente o impacto causado por este tipo de modularização de casos de uso. Nós exploramos duas técnicas baseadas em Orientação a Aspectos (OA): (i) Casos de Uso como Aspectos - onde utilizamos os construtores de AspectJ para isolar todo código relativo à implementação de um caso de uso em um aspecto; e (ii) Casos de Uso como Colaborações Plugáveis - onde usamos os construtores de CaesarJ para modularizar implementações de casos de uso através de uma composição hierárquica de colaborações. Nós executamos dois estudos de casos onde comparamos as implementações OA de casos de uso com sua implementação OO. No processo de avaliação extraímos métricas tradicionais e contemporâneas incluindo coesão, acoplamento e separação de concerns e analisamos modularidade em termos de atributos de qualidade de software como: plugabilidade, rastreabilidade e suporte para desenvolvimento em paralelo. Nossos resultados indicam que modularidade é um conceito relativo e sua análise depende de outros fatores além do sistema alvo, das métricas e da técnica aplicada
Eliasi, Behnam, and Arian Javdan. "Comparison of blockchain e-wallet implementations." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-258932.
Full textMed blockkedja och kryptovalutornas ökande popularitet blir säkra e-plånböcker allt mer viktiga. Men vad gör en e-plånbok säker? I detta arbete ska olika implementationer för e-plånböcker undersökas för att se vilka alternativ som är tillräckligt säkra samt användarvänliga.Problemområdena delas upp i följande delar: nyckellagring, autentisering och återhämtning av stulen/förlorade nycklar. Arbetet innefattar jämförelser mellan olika lösningar till dessa områden med definierade jämförelsekriterier.Resultatet visar att för nyckellagring är de bästa alternativen Androids keystore system/IOS secure enclave som båda är en form av säker lagringsplats på telefonen, offline lagring och hybridlagring som enkelt förklarat är en tjänst som bevarar data offline och gör den online när användaren väl vill ha tillgång till datan. För autentisering är de bästa alternativen BankID och lokal autentisering genom telefonens operativsystem. För återhämtning av nycklar är de bästa alternativen recovery seed eller att använda multipla nycklar för både signering och återhämtning.En proof of concept gjordes där lagringsmetoderna papper (exempelvis QR-kod), online-lagring med Firebase och lokal lagring med Android keystore eller Secure enclave implementerats. Autentiseringen sker med hjälp av Facebook/Google login och lokal autentisering. Återhämtning görs med två utav tre nycklarna som används för både signering och återhämtning.
Giunti, Marco <1973>. "Secure implementations of typed channel abstractions." Doctoral thesis, Università Ca' Foscari Venezia, 2007. http://hdl.handle.net/10579/226.
Full textKimmel, Richard A. "Experimentation methodology for evaluating operational INFOCON implementations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA392768.
Full textThesis advisors, William G. Kemple, Shelley P. Gallup. Includes bibliographical references (p. 105-106). Also Available online.
Giambiagi, Pablo. "Secrecy for mobile implementations of security protocols." Licentiate thesis, KTH, Microelectronics and Information Technology, IMIT, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-1341.
Full textMobile code technology offers interesting possibilities tothe practitioner, but also raises strong concerns aboutsecurity. One aspect of security is secrecy, the preservationof confidential information. This thesis investigates themodelling, specification and verification of secrecy in mobileapplications which access and transmit confidential informationthrough a possibly compromised medium (e.g. the Internet).These applications can be expected to communicate secretinformation using a security protocol, a mechanism to guaranteethat the transmitted data does not reach unauthorizedentities.
The central idea is therefore to relate the secrecyproperties of the application to those of the protocol itimplements, through the definition of a "confidential protocolimplementation" relation. The argument takes an indirect form,showing that a confidential implementation transmits secretdata only in the ways indicated by the protocol. We define theimplementation relation using labelled transition semantics,bisimulations and relabelling functions. To justify itstechnical definition, we relate this property to a notion ofnoninterference for nondeterministic systems derived fromCohens definition of Selective Independency. We alsoprovide simple and local conditions that greatly simplify itsverification, and report on our experiments on an architectureshowing how the proposed formulations could be used in practiceto enforce secrecy of mobile code.
Larsen, Fredrik Lied. "Conformance testing of Data Exchange Set implementations." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9258.
Full textProduct information exchange has been described by a number of standards. The Standard for the Exchange of Product model data (STEP) is published by ISO as an international standard to cover this exchange. Product Life Cycle Support (PLCS) is a standard developed as an extension to STEP, covering the complete life cycle information needs for products. PLCS uses Data Exchange Sets (DEXs) to exchange information. A DEX is a subset of the PLCS structure applicable for product information exchange. A DEX is specified in a separate document form the PLCS standard, and is published under OASIS. The development of DEXs is ongoing and changing, nine DEXs have been identified and are being developed within the Organization for the Advancement of Structured Information Standards (OASIS). Each of the nine DEXs covers a specific business concept. Implementations based on the DEX specifications are necessary in order to send and receive populated DEXs with product information. The implementations add contents to a DEX structure in a neutral file format which can be exchanged. Interoperability between senders and receivers of DEXs can not be guaranteed, however, conformance testing of implementations can help increase the chances of interoperability. Conformance testing is the process of testing an implementation against a set of requirements stated in a specification or standard used to develop the implementation. Conformance testing is performed by sending inputs to the implementation and observing the output. The output is then analysed with respect to expected output. STEP dedicates a whole section of the standard to conformance testing of STEP implementations. This section describes how implementations of STEP shall be tested and analysed. PLCS is an extension of STEP, and DEXs are subsets of PLCS. Conformance testing for STEP is used as a basis for DEX conformance testing, because of the similarities between PLCS and STEP. A testing methodology based on STEP conformance testing and DEX specifications is developed. The testing methodology explains how conformance testing can be achieved on DEX implementations exemplified with a test example on a specific DEX. The thesis develops a proposed set of test methods for conformance testing DEX adapter implementations. Conformance testing of Export adapters tests the adapters ability to populate and output a correct DEX according to the specifications in the applicable DEX specification. Conformance testing of the Import adapter verifies that the content of the populated input DEX is retrievable in the receiving computer system. A specific DEX, Identify a part and its constituent parts, is finally used as an example on how to test a specific DEX specification. Test cases are derived from a set of test requirements identified from the DEX specification. Testing of these requirements is explained explicitly.
Bush, Charles D. "Teacher Perceptions About New Evaluation Model Implementations." Thesis, Northcentral University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10622533.
Full textThe challenge of designing and implementing teacher evaluation reform throughout the U.S. has been represented by different policies, teacher evaluation components, and difficulties with implementation. The purpose of this qualitative embedded single case study was to explore teacher perceptions about new evaluation model implementations and how new model implementations impact the relationships between teachers and administration. The main unit of analysis was teachers at one school experiencing the implementation of new evaluation reform. The sub-units were the experience levels of teachers, specifically New Teachers, Mid-career Teachers, and Seasoned Teachers. Findings in this research demonstrated a protectiveness of the low income school in which the participants work, and a lack of trust in the state understanding the needs of a low performing school. The findings indicated teachers perceive the lack of local control or input into the development or implementation of a new evaluation tool may create feelings of mistrust and ulterior motives. Results also emerged suggesting that teachers perceive a new teacher evaluation model may add stress to the site, provide tools for feedback and accountability, and possibly negatively impact the relationships with students. Finally, the findings indicated striking differences of the perceptions of teachers with different levels of teaching experience. Teachers of all experience levels perceived similar, positive relationships between teachers and administrators. However, the perceptions of the current evaluation tool was markedly different based on years of experience. New Teachers and Mid-Career Teachers stressed a desire to receive feedback and the need for feedback to improve their practice. Conversely, Seasoned Teachers stated a clear lack of need or desire for feedback. Additionally, All experience level groups perceived that there may be some level of added stress during the implementation of a new evaluation tool. Seasoned Teachers Mid-Career Teachers perceive the possibility of a new tool as a negative event, while New Teachers viewed this as an opportunity for accountability and alignment.
Zeffer, Håkan. "Hardware–Software Tradeoffs in Shared-Memory Implementations." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86369.
Full textKetcha, Ngassam Ernest. "Towards cache optimization in finite automata implementations." Thesis, Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-07212007-120525.
Full textWang, Xiao-an. "Trellis based decoders and neural network implementations." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/13730.
Full textO'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Full textTriki, Ahlem. "Distributed Implementations of Timed Component-based Systems." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GRENM014/document.
Full textCorrect distributed implementation of real-time systems has always been a challenging task. The coordination of components executing on a distributed platform has to be ensured by complex communication protocols taking into account their timing constraints. In this thesis, we propose rigorous design flow starting from a high-level model of an application software in BIP (Behavior, Interaction, Priority) and leading to a distributed implementation. The design flow involves the use of model transformations while preserving the functional properties of the original BIP models. A BIP model consists of a set of components synchronizing through multiparty interactions and priorities. Our method transforms high-level BIP models into Send/Receive models that operate using asynchronous message passing. The obtained models are directly implementable on a given platform. We present three solutions for obtaining Send/Receive BIP models. -In the first solution, we propose Send/Receive models with a centralized scheduler that implements interactions and priorities. Atomic components of the original models are transformed into Send/Receive components that communicate with the centralized scheduler via Send/Receive interactions. The centralized scheduler is required to schedule interactions under some conditions defined by partial state models. Those models represent high-level representation of parallel execution of BIP models. - In the second solution, we propose to decentralize the scheduler. The obtained Send/Receive models are structured in 3 layers: (1) Send/Receive atomic components, (2) a set of schedulers each one handling a subset of interactions, and (3) a set of components implementing a conflict resolution protocol. With the above solutions, we assume that the obtained Send/Receive models are implemented on platforms that provide fast communications (e.g. multi-process platforms) to meet perfect synchronization in components. This is because the obtained schedulers are modeled such that interactions scheduling corresponds exactly to execution in components. - In the third solution, we propose Send/Receive models that execute correctly even if communications are not fast enough. This solution is based on the fact that schedulers plan interactions execution and notify components in advance. In order to plan correctly the interactions, we show that the schedulers are required to observe additional components, in addition to the ones participating in the interactions. We present also a method to optimize the number of observed components, based on the use of static analysis techniques. From a given Send/Receive model, we generate a distributed implementation where Send/Receive interactions are implemented by TCP sockets. The experimental results on non trivial examples and case studies show the efficiency of our design flow
Zorluoglu, Habib Izzet, Turker Cakir, and Fahrettin Tezcan. "Offset implementations for Turkey's International Defense Acquisitions." Monterey California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/10326.
Full text"Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involve the transfer of technology and know-how. Overall, offsets are definitely not new, and occur under a variety of names. In the defense industry it is now an accepted practice among both sellers and purchasers, and is likely to remain so for the indefinite future. This research will discuss defense offsets within the context of international trade and global arms trade. This discussion will draw upon the existing body of theory and practice on offsets (as identified in the literature review) to provide a basic understanding of offsets within the wider international trade context. The offset policies of selected countries will be analyzed prior to exploring the development of Turkish offset policy. Additionally sample defense acquisition programs will be examined as case studies to explain the incentives within Turkish offsets and to suggest future offset policies
Ravindran, Somasundaram. "Aspects of practical implementations of PRAM algorithms." Thesis, University of Warwick, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.386838.
Full textSharpe, Jeremy Edward. "Expanding the synthesis of distributed memory implementations." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106006.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (page 63).
In this thesis, I expanded the programming model implemented by the Sketch language to supplement its distributed memory parallelism with shared memory parallelism that uses the popular fork-join model. The primary contribution of this thesis is the means by which the code is assured to be free of race conditions. Sketch uses constraint satisfaction analysis to ensure it synthesizes code the functions properly for all inputs, and I demonstrate how assertions can be generated and inserted into the analysis to guarantee freedom from race conditions. This expanded programming model is then evaluated using test cases to ensure correct operation and benchmarks to examine overall performance.
by Jeremy Edward Sharpe.
M. Eng.
Hasan, Sami Kadhim. "FPGA implementations for parallel multidimensional filtering algorithms." Thesis, University of Newcastle upon Tyne, 2013. http://hdl.handle.net/10443/2159.
Full textMitchell, Kevin Nicholas Peter. "Implementations of process synchronisation, and their analysis." Thesis, University of Edinburgh, 1985. http://hdl.handle.net/1842/15411.
Full textYun, Paul M. "Parallel Bus Implementations in Satellite Communications Systems." International Foundation for Telemetering, 1988. http://hdl.handle.net/10150/615247.
Full textAs the volume of linkages in the satellite communications systems increases, the parallel bus between the various processors of the satellite becomes a bottle neck to transfer the commands and data. The remedies to this problem are trivial in the ground stations; however, this problem imposes severe restrictions in parallel bus implementation of the satellite communications systems. The most severe restriction is the minimization of wire connections in the physical layer to minimize the weight, size and power consumption, and also to maximize the reliability. Another restriction is the flexibility in the link layer to adapt the different characteristics of the command and data messages. In this paper, the implementation to overcome the imposed restrictions in both physical and link layer of the parallel bus will be discussed.