Dissertations / Theses on the topic 'Rançon'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Rançon.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Palisse, Aurélien. "Analyse et détection de logiciels de rançon." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S003/document.
Full textThis phD thesis takes a look at ransomware, presents an autonomous malware analysis platform and proposes countermeasures against these types of attacks. Our countermeasures are real-time and are deployed on a machine (i.e., end-hosts). In 2013, the ransomware become a hot subject of discussion again, before becoming one of the biggest cyberthreats beginning of 2015. A detailed state of the art for existing countermeasures is included in this thesis. This state of the art will help evaluate the contribution of this thesis in regards to the existing current publications. We will also present an autonomous malware analysis platform composed of bare-metal machines. Our aim is to avoid altering the behaviour of analysed samples. A first countermeasure based on the use of a cryptographic library is proposed, however it can easily be bypassed. It is why we propose a second generic and agnostic countermeasure. This time, compromission indicators are used to analyse the behaviour of process on the file system. We explain how we configured this countermeasure in an empiric way to make it useable and effective. One of the challenge of this thesis is to collate performance, detection rate and a small amount of false positive. To finish, results from a user experience are presented. This experience analyses the user's behaviour when faced with a threat. In the final part, I propose ways to enhance our contributions but also other avenues that could be explored
Dallaire, Marc. "Les jeunes de la rue, la rançon d'une fausse liberté." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0017/MQ56397.pdf.
Full textVeilleux, Denis. "La motorisation, ou, "La rançon du progrès" : tramways, véhicules-moteurs et circulation (Montréal, 1900-1930)." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=35641.
Full textThis negotiation related to both the space available in the street and the movement of vehicles. Concerning space, the omnipresence of tramways and their installations along with the parking of motor vehicles, particularly in the downtown area of Montreal, led to suggestions of wide boulevards and subway systems as possible solutions. The fact that tramways had priority in traffic and could not be passed by motor vehicles constituted major obstacles for motorists anxious to benefit from the motor car. By the end of the 1920s, conflicts were so intense that the notion of progress was used to promote both the motor vehicle and the tramway.
These conflicts over the sharing of streets had other implications. First, different sections of Montreal's elite favoured one technology over the other. On the one hand, motorists were well organized. At the same time, tramway concerns were determined to protect their monopoly. This animosity within the elite was intensified by antimonopoly feelings and by dissatisfaction with tramway service. Finally, traffic problems multiplied with motorization: deaths, accidents, law suits and downtown congestion. Traffic became an important preoccupation leading to an increase in police forces and the establishment of numerous organizations dedicated to traffic management.
The popular classes of Montreal were not excluded from these conflicts among the elites. Generally speaking, the entire population was forced to take sides with one group of promoters or the other. Motorization then appears as a factor of division within social classes as well as a phenomenon transcending the barriers between them.
Mammadov, Khalid. "La Cour européenne des droits de l'homme, de réforme en réforme : la rançon d'un succès ?" Thesis, Strasbourg, 2014. http://www.theses.fr/2014STRAA031.
Full textThe European Court of Human Rights, since the 1990s, recognizes an unprecedented extension of its competence ratione personae and ratione loci. In order to face this exceptional phenomenon new instruments are required. The purpose of this study is the examination of new techniques adapted by the Court to maintain the level of protection of human rights guaranteed by the Convention. Other organs and Member States of the Council of Europe participated actively to the efforts in order to conserve the excellent level for the protection of human rights in Europe. These are specific areas having been reviewed and valued in terms of their contribution and sometimes their disadvantages. Prepared in a particular space-time, this study would ask in the future to be completed and assessed from this angle
Lollia, Fabrice. "Aide à la décision en situation de crise. Les nouvelles technologies pour la prévention sécuritaire des entreprises : limites et opportunités." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0031.
Full textThe current security context shows difficulties for the company in the protection of these employees (expatriates, business travelers). Previously known risks such as kidnapping against perdition are developing and experiencing new human forms that material and immaterial. Indeed, the kidnapping that is human, material or immaterial knows many forms of appearance and adapts according to The esperancy is followed against it in terms of responsibility. It is therefore only an omnipresent risk of which only one proactive attitude could be to reduce the risk. After studying, the kidnapping against deployment and its theoretical contributions. We were analyzed using part of the reading grid of the situational semiotics of Alex Mucchielli. Throughout this page in search action used method on main-exploration exploration with a situation Method that is most suitable for studying the field of security. We then created a digital solution Application of prevention for expatriates and corporate travelers (APSEV) to give a concrete and operational meaning to our work. This solution has been tested and validated as a protection mission at the Embassy of France in Afghanistan. But beyond its creation we explored its impact in the embassy in terms of human interaction. Accepted by some who feel protected and denied by others who feel guarded. This new security technology is disturbing because of its geolocation activity, whose meaning varies from one individual to another. The security problem of kidnapping against ransom can only be solved by the creation of a suitable geolocalisation digital solution without taking into account the effects on human interactions that will make it suitable for use
Bosco, Michele. "Ragion di Stato e salvezza dell’anima. Il riscatto dei cristiani captivi in Maghreb attraverso le redenzioni mercedarie (1575 - 1725)." Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0037.
Full textThe aim of this work is to analyse the captives redemptions' mechanism, through the study of the specific case of Mercedarians ransoming expeditions to North Africa. We have compared this mechanism with the ones pursued by other ransoming institutions in the Italian and Iberian areas, in order to let economics logics and juridical laws emerge that regulated te ransoming process. After a general introduction on the principal aspects that phenomenon entailed, a chapter of the tesis is dedicated to the analysis of four redemption missions, conducted by the religious Order of Our Lady of Mercy during a period of a century and half, precisely between 1575 and 1723
Con l’obiettivo di far luce sulle dinamiche economiche e sui meccanismi istituzionali che regolavano il riscatto dei cristiani captivi in Maghreb nei secoli centrali dell’età moderna, l’autore si propone di ricostruire l’attività redentrice di uno dei protagonisti indiscussi di quel commercio: l’Ordine di Nostra Signora della Mercede. Al fine di illustrane le specificità, l’autore presenta dapprima un quadro complessivo del fenomeno dei riscatti di captivi tra i secoli XVI e XVIII, inserendolo nel più generale contesto del Mediterraneo e della guerra da corsa combattuta tra le sue sponde. Successivamente, traccia una storia sintetica dell’Ordine della Mercede e della sua diffusione e progressivo sviluppo nei contesti italiano e iberico - con un occhio anche alla realtà dell’America spagnola - e attenta all’aspetto teologico e alla trattatistica giustificativa prodotta dai Mercedari stessi. Analizza, poi, a livello procedurale le missioni di redenzione condotte dai religiosi dell’Ordine a cavallo tra il tardo Cinquecento e il primo Settecento, ne traccia i contorni giuridici e normativi e mira a far emergere le ragioni economiche e politiche che le muovevano. A tal fine, prende in esame quattro esempi di redenzioni di captivi attraverso lo studio di altrettanti libri di conto: l’ampio arco cronologico di riferimento - un secolo e mezzo, dal 1575 al 1723 - consente all’autore di evidenziare i cambiamenti intercorsi a livello procedurale nei riscatti, così come in merito al loro finanziamento e alla destinazione d’uso delle elemosine di volta in volta raccolte. Il modus operandi delle redenzioni mercedarie è quindi messo a confronto con quello di altre istituzioni, laiche e statali, dedite al riscatto dei captivi in area italiana ed iberica e, anche qui, nell’intento di far emergere le logiche economiche, le istanze politiche e gli interessi nazionali e locali che vi sottostavano.La tesi difende l’idea che i religiosi della Mercede, nella loro opera della redenzione dei captivi, non fossero liberi di agire autonomamente e secondo le prerogative dettate dal proprio Ordine, ma che fossero, al contrario, strettamente vincolati a istruzioni date loro dal governo spagnolo e da privati cittadini, essendo questi ultimi i principali finanziatori delle loro missioni di riscatto. Sostiene, insomma, l’idea che l’azione umanitaria dei religiosi rispondesse, in realtà, più a logiche economiche e agli interessi della politica che non a quelli di una carità cristiana indifferente ai confini nazionali. Per tale ragione, l’autore, prendendo spunto dall’osservatorio specifico delle redenzioni mercedarie, giunge a ipotizzare che il commercio dei captivi in età moderna abbia potuto giocare un ruolo di «catalizzatore» di processi ben più ampi e complessi, come il progressivo distacco delle politiche assistenziali degli Stati dalla sfera religiosa, e che abbia potuto accelerare il graduale e controverso imporsi di sentimenti di appartenenza nazionale a scapito di altri, più tradizionali, legati alle comunità confessionali
Sanon, Grégoire. "La politique des programmes télévisuels en Afrique Noire francophone : originalité ou rançon d'une assistance étrangère ? : cas du Burkina Faso et de la côte d'Ivoire." Paris 1, 1997. http://www.theses.fr/1997PA010588.
Full textEmery, Arnaud. "L'otage en sauvetage : étude juridique." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSE3006.
Full textHostage-taking began when man realized that he could manipulate the emotional bond between two individuals in order to force their hand and obtain an advantage. Hostage-taking is a crime extremely old and complex. It has started to fascinate our societies so much since victims have begun to be regularly sacrificed by kidnappers and negotiating authorities alike. Unlike the extraordinary media frenzy they generate, these crises seem to arouse relative indifference among lawyers and doctrine. This subject, which seems to elude the law, touches on its raison d'être: the protection of the weakest, the search for the common good and peace.This research work attempts to lay the groundwork for legal reflection on issues ranging from the use of armed force in rescue operations, to the legality of ransoms, to crisis negotiation and the role of the judge. The hypotheses put forward are systematically compared with the opinions of the operators met in the course of this work. Finally, the author takes a forward-looking look at the legal framework surrounding hostage rescue operations. Through this prism, this thesis questions the limits of the rule of law and the anti-terrorist apparatus of our societies
Moussaileb, Routa. "Log analysis for malicious software detection." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0211.
Full textRansomware remains the number one cyberthreat for individuals, enterprises, and governments. Malware’s aftermath can cause irreversible casualties if the requirements of the attackers are not met in time. This thesis targets Windows ransomware. It affects users’ data and undermines many public services. Four stages of this malware attack are defined: delivery, deployment, destruction, and dealing. The corresponding countermeasures are assigned to each phase of the attack and clustered according to the techniques used. This thesis presents three contributions. The first detection mechanism is located in the file system layer. It is based on the system traversal that is sufficient to highlight the malicious behavior. This thesis proposes also an analysis of the network traffic. It is generated by collected ransomware samples to perform a packet-level detection. A study of the ransom notes is made to define where it takes place in a ransomware workflow. The last contribution provides an insight into plausible attacks, especially Doxware. A quantification model that explores the Windows file system in search of valuable data is presented. It is based on the term frequency-inverse document frequency solution provided in the literature for information retrieval. Honeypot techniques are also used to protect the sensitive files of the users. Finally, this thesis provides future perspectives granting a better roadmap for researchers
Windisch, David. "Random walks, disconnection and random interlacements /." [S.l.] : [s.n.], 2009. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18343.
Full textGleeson, James P. Saffman P. G. "Randon advection of a passive scalar /." Diss., Pasadena, Calif. : California Institute of Technology, 1999. http://resolver.caltech.edu/CaltechETD:etd-02062008-095449.
Full textKang, Mihyun. "Random planar structures and random graph processes." Doctoral thesis, [S.l.] : [s.n.], 2007. http://deposit.ddb.de/cgi-bin/dokserv?idn=985516585.
Full textBuckley, Stephen Philip. "Problems in random walks in random environments." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:06a12be2-b831-4c2a-87b1-f0abccfb9b8b.
Full textGOMES, CARMEN ANTUNES. "RANDON ACCESS WITH NOTIFICATION: MULTIPLE ACCESS PROTOCOLS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1993. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9396@1.
Full textEste trabalho propõe e analisa uma versão de um protocolo híbrido de acesso aleatório com notificação, desenvolvido para redes VSAT ( Very Small Aperture Terminal) onde se busca uma combinação do baixo tempo de resposta de protocolos do tipo RA-TDMA (Random Access-Time Division Multiple Access) . No protocolo aqui estudado as transmissões são feitas em uma primeira tentativa através de um esquema RA-TDMA e no caso de ocorrência de colisão, os pacotes envolvidos são retransmitidos através de um esquema DA-TDMA. As notificações de transmissões são feitas pelas estações VSAT, através de um canal de sinalização, onde é atribuído a cada uma delas um segmento de tempo, aqui referido como slot de tempo, de posição fixa dentro de cada quadro. O desempenho do protocolo é analisado utilizando a técnica de Análise no Ponto de Equilíbrio (EPA), sendo considerados como medida de desempenho os parâmetros retardo médio de mensagem, vazão e taxa de rejeição de pacotes. São consideradas mensagens de um pacote e mensagens de tamanho variável. Comparações com outros protocolos contendo buffer ou não, também analisados utilizando a técnica EPA, são realizadas. Resultados de simulação encontrados na literatura de dois outros protocolos são também apresentados.
A version of a random access with notification, multiple access protocol developed for VSAT networks is considered. This hybrid protocol combines the low response delay of RA- TDMA contention protocols with the efficiency and stability of DA-TDMA type protocols. In the considered protocol a message generated by a VSAT station is transmitted, in a first attempt, using a RA-TDMA type of scheme. If a collision occurs in this first transmission of the message the collided packets are retransmitted through a Demand Assignment (DA)-TDMA type of access. When a remote station transmits its message in a RA-TDMA contention mode it notifies the central hub using a separate TDMA channel in which a fixed position time slot is reserved to each station within a frame. The performance of the protocol is evaluated in terms of throughput, expected delay and packet rejection rate by means of the so called Equiilibrium Point Analysis (EPA). Single and multi-packet messages, with a random number of packets, are considered in the performance analysis. Comparisons with other hybrid protocols, which were also evaluated in the literature by means of the EPA technique or through simulation results, are presented.
Ngoc, Anh Do Hoang. "Anomalous diffusion and random walks on random fractals." Doctoral thesis, Universitätsbibliothek Chemnitz, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-201000205.
Full textOgrowsky, Arne [Verfasser]. "Random Differential Equations with Random Delay / Arne Ogrowsky." München : Verlag Dr. Hut, 2011. http://d-nb.info/1017353352/34.
Full textPymar, Richard James. "Random graphs and random transpositions on a circle." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610350.
Full textPark, Subok. "Signal detection with random backgrounds and random signals." Diss., The University of Arizona, 2004. http://hdl.handle.net/10150/280729.
Full textHannigan, Patrick. "Random polynomials." Thesis, University of Ulster, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263248.
Full textBall, Neville. "Random Structures." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/7902.
Full textHorn, Florian. "Random Games." Paris 7, 2008. http://www.theses.fr/2008PA077235.
Full textIn this thesis, we study games as a tool for the synthesis of controllers for reactive Systems. In this setting, a game is defined by an arena, representing the System and its evolution as a graph; and a winning condition, which models the specification that the controller must ensure In each state, the choice of the outgoing transition is done by either Eve (the controller), Adam (an hostile environment), or Random (uncontrollable evolution obeying a stochastic law). This process is repeated for an infinite number of times, leading to an infinite play whose winner depends on the winning condition. Our first object of study is the simplest case of Computing the optimal values of reachability games. We present a new effective approach, based on permutations of random states, to solve this classical problem. In terms of complexity, the resulting "permutation algorithm" is orthogonal to the classical, strategy-based algorithms: it is exponential in the number of random states, rather than in the number of controlled states. We also present an improvement heuristic for this algorithm, inspired by the "strategy improvement" algorithm. We turn next to a much more general class of problems, covering ail fie cases where the winning condition is prefix-independent. We prove the existence of optimal strategies for these games, and show that our permutation algorithm can be extended into a "meta-algorithm", changing any qualitative algorithm into a quantitative algorithm. Lastly, we study the complexity of optimal strategies for regular winning conditions represented as Muller games, and especially the amount of memory that can be saved by using randomised strategies. Using the Zielonka tree, we show tight bounds on the necessary and sufficient memory needed to define randomised optimal strategies for any single Muller condition
Dou, Carl C. Z. (Carl Changzhu). "Studies of random walks on groups and random graphs." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/13243.
Full textCarigi, Giulia. "On the recurrence of random walks in Lévy random environments." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10088/.
Full textSeierstad, Taral Guldahl. "The phase transition in random graphs and random graph processes." Doctoral thesis, [S.l.] : [s.n.], 2007. http://deposit.ddb.de/cgi-bin/dokserv?idn=985760044.
Full textKäsmä, E. (Emilia). "Siis jotain random tutkimuksia ne voi tehdä:vierassanan random käyttö suomessa." Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201802081181.
Full textORABY, TAMER. "Spectra of Random Block-Matrices and Products of Random Matrices." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1209391815.
Full textWu, Lei. "Random inscribed polytopes." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3210646.
Full textTitle from first page of PDF file (viewed June 7, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 60-65).
Renlund, Henrik. "Reinforced Random Walk." Thesis, Uppsala University, Department of Mathematics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-121389.
Full textAghaee, Saeed. "Random Stream Cipher." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1511.
Full textStream ciphers are counted as an important part of symmetric encryption method. Their basic idea comes from One-Time-Pad cipher using XOR operator on the plain text and the key to generate the cipher. The present work brings a new idea in symmetric encryption method, which inherits stream key generation idea from synchronous stream cipher and uses division instead of xoring. The Usage of division to combine the plain text with stream key gives numerous abilities to this method that the most important one is using random factors to produce the ciphers.
Xu, Su Huai. "Random analytic signals." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b1944056.
Full textJohansson, Carl Fredrik. "Random Loewner Chains." Doctoral thesis, KTH, Matematik (Inst.), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12163.
Full textRay, Gourab. "Hyperbolic random maps." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/48417.
Full textScience, Faculty of
Mathematics, Department of
Graduate
Forghani, Behrang. "Transformed Random Walks." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32538.
Full textThomack, Andrew. "Random Harmonic Polynomials." Thesis, Florida Atlantic University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10681500.
Full textThe study of random polynomials and in particular the number and behavior of zeros of random polynomials have been well studied, where the first signicant progress was made by Kac, finding an integral formula for the expected number of zeros of real zeros of polynomials with real coefficients. This formula as well as adaptations of the formula to complex polynomials and random fields show an interesting dependency of the number and distribution of zeros on the particular method of randomization. Three prevalent models of signicant study are the Kostlan model, the Weyl model, and the naive model in which the coefficients of the polynomial are standard Gaussian random variables.
A harmonic polynomial is a complex function constructed by summing an analytic polynomial with a conjugated analytic polynomial. Li and Wei adapted the Kac integral formula for the expected number of zeros to study random harmonic polynomials and take particular interest in their interpretation of the Kostlan model. In this thesis we find asymptotic results for the number of zeros of random harmonic polynomials under both the Weyl model and the naive model as the degree of the harmonic polynomial increases. We compare the findings to the Kostlan model as well as to the analytic analogs of each model.
We end by establishing results which lead to open questions and conjectures about random harmonic polynomials. We ask and partially answer the question, “When does the number and behavior of the zeros of a random harmonic polynomial asymptotically emulate the same model of random complex analytic polynomial as the degree increases?” We also inspect the variance of the number of zeros of random harmonic polynomials, motivating the work by the question of whether the distribution of the number of zeros concentrates near its mean as the degree of the harmonic polynomial increases.
Anderson, Grant. "Random Relational Rules." The University of Waikato, 2008. http://hdl.handle.net/10289/2562.
Full textDesruisseaux, Bernard. "Random dynamic fonts." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0007/MQ29682.pdf.
Full textDesruisseaux, Bernard. "Random dynamic fonts." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=27307.
Full textThis method allows the generation of random letterforms with different overall shapes, derived from single letterform descriptions, according to specified parameters and constraints. Letterforms generated in this manner remain closely related--to a certain extent--to the original letterforms, and preserve the continuity and thickness of the strokes.
Several examples of a typeface family designed with this method, implemented as PostScript Type 3 font programs, are presented. A survey of the literature on random dynamic fonts is also proposed.
Makai, Tamas. "Random graph processes." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/b24b89af-3fc1-4d2f-a673-64483a3bc2f2/8/.
Full textGoldschmidt, Christina Anna. "Large random hypergraphs." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615618.
Full textCroydon, David Alexander. "Random fractal dendrites." Thesis, University of Oxford, 2006. http://ora.ox.ac.uk/objects/uuid:4e17aebc-456d-4891-8527-692331ebff05.
Full textGassend, Blaise L. P. (Blaise Laurent Patrick) 1978. "Physical random functions." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/37606.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 87-89).
In general, secure protocols assume that participants are able to maintain secret key information. In practice, this assumption is often incorrect as an increasing number of devices are vulnerable to physical attacks. Typical examples of vulnerable devices are smartcards and Automated Teller Machines. To address this issue, Physical Random Functions are introduced. These are Random Functions that are physically tied to a particular device. To show that Physical Random Functions solve the initial problem, it must be shown that they can be made, and that it is possible to use them to provide secret keys for higher level protocols. Experiments with Field Programmable Gate Arrays are used to evaluate the feasibility of Physical Random Functions in silicon.
by Blaise L.P. Gassend.
S.M.
Pacheco, Carlos Ph D. Massachusetts Institute of Technology. "Directed random testing." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53297.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 155-162).
Random testing can quickly generate many tests, is easy to implement, scales to large software applications, and reveals software errors. But it tends to generate many tests that are illegal or that exercise the same parts of the code as other tests, thus limiting its effectiveness. Directed random testing is a new approach to test generation that overcomes these limitations, by combining a bottom-up generation of tests with runtime guidance. A directed random test generator takes a collection of operations under test and generates new tests incrementally, by randomly selecting operations to apply and finding arguments from among previously-constructed tests. As soon as it generates a new test, the generator executes it, and the result determines whether the test is redundant, illegal, error-revealing, or useful for generating more tests. The technique outputs failing tests pointing to potential errors that should be corrected, and passing tests that can be used for regression testing. The thesis also contributes auxiliary techniques that post-process the generated tests, including a simplification technique that transforms a, failing test into a smaller one that better isolates the cause of failure, and a branch-directed test generation technique that aims to increase the code coverage achieved by the set of generated tests. Applied to 14 widely-used libraries (including the Java JDK and the core .NET framework libraries), directed random testing quickly reveals many serious, previously unknown errors in the libraries. And compared with other test generation tools (model checking, symbolic execution, and traditional random testing), it reveals more errors and achieves higher code coverage.
(cont.) In an industrial case study, a test team at Microsoft using the technique discovered in fifteen hours of human effort as many errors as they typically discover in a person-year of effort using other testing methods.
by Carlos Pacheco.
Ph.D.
Gómez, Silvio Normey. "Random forests estocástico." Pontifícia Universidade Católica do Rio Grande do Sul, 2012. http://hdl.handle.net/10923/1598.
Full textIn the Data Mining area experiments have been carried out using Ensemble Classifiers. We experimented Random Forests to evaluate the performance when randomness is applied. The results of this experiment showed us that the impact of randomness is much more relevant in Random Forests when compared with other algorithms, e. g., Bagging and Boosting. The main purpose of this work is to decrease the effect of randomness in Random Forests. To achieve the main purpose we implemented an extension of this method named Stochastic Random Forests and specified the strategy to increase the performance and stability combining the results. At the end of this work the improvements achieved are presented.
Na área de Mineração de Dados, experimentos vem sendo realizados utilizando Conjuntos de Classificadores. Estes experimentos são baseados em comparações empíricas que sofrem com a falta de cuidados no que diz respeito à questões de aleatoriedade destes métodos. Experimentamos o Random Forests para avaliar a eficiência do algoritmo quando submetido a estas questões. Estudos sobre os resultados mostram que a sensibilidade do Random Forests é significativamente maior quando comparado com a de outros métodos encontrados na literatura, como Bagging e Boosting. O proposito desta dissertação é diminuir a sensibilidade do Random Forests quando submetido a aleatoriedade. Para alcançar este objetivo, implementamos uma extensão do método, que chamamos de Random Forests Estocástico. Logo especificamos como podem ser alcançadas melhorias no problema encontrado no algoritmo combinando seus resultados. Por último, um estudo é apresentado mostrando as melhorias atingidas no problema de sensibilidade.
Gnacik, Michal. "Quantum random walks." Thesis, Lancaster University, 2014. http://eprints.lancs.ac.uk/69946/.
Full textHlavacek, Magda L. "Random Tropical Curves." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/hmc_theses/95.
Full textAbdulsalam, Hanady. "Streaming Random Forests." Thesis, Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1321.
Full textFox, Michael (Michael Robert) Carleton University Dissertation Mathematics. "Random alternative routing." Ottawa, 1994.
Find full textLautensack, Claudia. "Random Laguerre Tessellations." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000006484.
Full textGhalloussi, Farah. "L'assurance des nouveaux risques maritimes." Thesis, Paris 1, 2019. http://www.theses.fr/2019PA01D021.
Full textThe rise of new risks that affect maritime transport operations raises the challenge of how to deal with them through maritime law and insurance procedures. Indeed, since it is the sine qua non condition of this trade, it is worth querying its methods of apprehending new risks and its procedures for dealing with them to see to what extent they can be the subject of an insurance operation. The hostility of the maritime environment is therefore intensified by the instability of the international legal framework, the uncertainties associated with shipping in certain areas, the accumulation of values at risk on very large vessels and finally the poorly monitored digital transition in the maritime industry. First, through the identification of new risks that are of concern to maritime operators, it has been made possible to identify some common features in their apprehension. The technical and legal insurability of each of these new risks is examined in the light of itscharacteristics. It is monitored to see what weaknesses it creates, what the consequences of its realization may be and what challenges it represents for the insurance market. In addition, the examination of the legal and normative framework for new maritime risks makes it possible to assess the relevance of the responses developed for their management and, if necessary, to propose appropriate responses in order to improve their insurability when this is possible. Next, the insurance of new maritime risks is to cover the risks selected by the contracting parties from among all insurable risks or those located "at the limit of insurability". The principle of the guarantee offer in this area follows two interdependent dynamics. On the one hand, policyholders, unable to cope with new risks, are seeking to transfer them to insurers by pushing them to expand their range of offers by creating products that are increasingly specific to their new needs. On the other hand, insurers have always been there for their clients by pushing the limits of their commitments and increasing their subscription capacities by seeking solutions in traditional or alternative risk transfer and sharing markets. The implementation of the guarantee taken out must make it possible to indemnify the new risks incurred against which the maritime actor has taken out insurance. The mobilization of insurance protection in the event of a claim may face barriers that place the marine insurer at the center of three actions dealing with the marine insurance contract. Two actions can be taken against him: One by the insured, the action in warranty, the other by the victim, the direct action taken by a third party against the insurer. The marine insurer, which has indemnified its policyholder for the damage it has suffered, has recourse against the liable third party who has mobilized its coverage through subrogation
fr, kaimanov@univ-rennes1. "Boundaries and Harmonic Functions for Random Walks with Random Transition Probabilities." ESI preprints, 2001. ftp://ftp.esi.ac.at/pub/Preprints/esi1085.ps.
Full text