Academic literature on the topic 'Redhat'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Redhat.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Redhat"

1

Syed Mohamed, Sulaiman, M. I. Buhari, and Akbar Badhusha. "Impact of Redhat IPv6 router on heterogeneous host connections." International Journal of Communication Systems 20, no. 4 (2007): 411–26. http://dx.doi.org/10.1002/dac.825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kleinke, Brian. "Challenges and lessons learned introducing an evolving open source technology into an established legacy Ada and C++ program." ACM SIGAda Ada Letters 40, no. 2 (2021): 70–72. http://dx.doi.org/10.1145/3463478.3463485.

Full text
Abstract:
When the Federal Aviation Administration (FAA) launched the System Wide Information Management (SWIM) initiative, the FAA had the goal of using the same portable, open infrastructure across all participating systems in the National Airspace System (NAS). Around 2008 for SWIM Segment 1, the FAA chose Iona Software's Free/Open Source Software (FOSS) based bundle, which was known and supported under the Fuse brand. The FAA obtained the licenses used by programs, including EnRoute Automation Modernization (ERAM), through Iona, which was later acquired by Progress and RedHat.
APA, Harvard, Vancouver, ISO, and other styles
3

Konarev, Petr V., Maxim V. Petoukhov, Vladimir V. Volkov, and Dmitri I. Svergun. "ATSAS2.1, a program package for small-angle scattering data analysis." Journal of Applied Crystallography 39, no. 2 (2006): 277–86. http://dx.doi.org/10.1107/s0021889806004699.

Full text
Abstract:
The program packageATSAS2.1 for small-angle X-ray and neutron scattering data analysis is presented. The programs included in the package cover the major processing and interpretation steps from primary data reduction to three-dimensional modelling. This system is primarily oriented towards the analysis of biological macromolecules, but could also be used for non-biological isotropic and partially ordered objects (nanoparticle systems, colloidal solutions, polymers in solution and bulk). Recent developments in the programs included inATSAS2.1 are highlighted. The main programs run on multiple hardware platforms, including Windows PC, Linux RedHat and Suse, DEC Alpha, SGI IRIX and Mac OSX.
APA, Harvard, Vancouver, ISO, and other styles
4

Kosasi, Sandy. "Perancangan Aplikasi Point of Sale dengan Arsitektur Client/Server Berbasis Linux dan Windows." Creative Information Technology Journal 1, no. 2 (2015): 116. http://dx.doi.org/10.24076/citec.2014v1i2.15.

Full text
Abstract:
Perancangan sistem aplikasi point of sale (POS) dapat memberikan pelayanan yang lebih baik kepada konsumen, seperti dalam perhitungan harga dan jumlah barang yang dibeli dapat menjadi lebih cepat dan kuantitas barang tidak lagi bergantung kepada pencatatan manual. Penelitian menghasilkan aplikasi POS menggunakan arsitektur client/server yang terintegrasi antar proses bisnis untuk bagian penjualan, kasir dan gudang. Pengembangan arsitektur client/server ini menggunakan sistem operasi Linux distro Redhat 9 dan Windows Xp Profesional. Penelitian ini menggunakan metode research and development dengan teknik pengumpulan data berupa observasi, wawancara, daftar pertanyaan. Perancangan aplikasi menggunakan menggunakan diagram use case, activity, sequence dan class. Hasil penelitian meliputi modul aplikasi kasir (front office), modul aplikasi gudang dan modul aplikasi laporan (back office). Modul aplikasi antara lain mencakup pengelolaan penjualan, edit data penjualan, pengisian data barang, penentuan harga barang, dan menghasilkan laporan penjualan.Point of sale (POS) application system design can give better service to the consumer, example in the price count and sum of item purchased can become faster and quantity of the item no longer rely on the manual recording. As for the research purpose is create integrated point of sale application using client/server architecture between business process to the warehouse, sales and cashier. The development of client/server architecture is using Linux operating system with distro Redhat 9.0 and windows Xp profesional. Experiment is using research and development method with technique to gather data are observation, interview, question list. This application design is using use case, activity, sequence and class diagram. The research instrument consist of cashier application (front office), warehouse application module and report application module (back office). Application module like sales management, sales data edit, equipment data insertion, pricing of the goods and generate sales report.
APA, Harvard, Vancouver, ISO, and other styles
5

Gibb, Christopher M., Robert Jackson, Sabah Mohammed, Jinan Fiaidhi, and Ingeborg Zehbe. "Pathogen–Host Analysis Tool (PHAT): an integrative platform to analyze next-generation sequencing data." Bioinformatics 35, no. 15 (2018): 2665–67. http://dx.doi.org/10.1093/bioinformatics/bty1003.

Full text
Abstract:
Abstract Summary The Pathogen–Host Analysis Tool (PHAT) is an application for processing and analyzing next-generation sequencing (NGS) data as it relates to relationships between pathogens and their hosts. Unlike custom scripts and tedious pipeline programming, PHAT provides an integrative platform encompassing raw and aligned sequence and reference file input, quality control (QC) reporting, alignment and variant calling, linear and circular alignment viewing, and graphical and tabular output. This novel tool aims to be user-friendly for life scientists studying diverse pathogen–host relationships. Availability and implementation The project is available on GitHub (https://github.com/chgibb/PHAT) and includes convenient installers, as well as portable and source versions, for both Windows and Linux (Debian and RedHat). Up-to-date documentation for PHAT, including user guides and development notes, can be found at https://chgibb.github.io/PHATDocs/. We encourage users and developers to provide feedback (error reporting, suggestions and comments).
APA, Harvard, Vancouver, ISO, and other styles
6

Irawan, Sudra, and Muhammad Zainuddin Lubis. "Geology Structure Identification Using Pre-Stack Depth Migration (PSDM) Method of Tomography Result in North West Java Basin." Journal of Geoscience, Engineering, Environment, and Technology 2, no. 2 (2017): 117. http://dx.doi.org/10.24273/jgeet.2017.2.2.297.

Full text
Abstract:
North West Java Basin is a tertiary sedimentary basin which is located in the right of the western part of the Java island. North West Java Basin is geodynamic where currently located at the rear position of the path of the volcanic arc of Java that is the result of the India-Australia plate subduction to the south towards the Eurasian plate (Explanation of Sunda) in the north. Geology structure observation is difficult to be conducted at Quaternary volcanicfield due to the classical problem at tropical region. In the study interpretation of fault structures can be done on a cross-section of Pre-Stack Depth Migration (PSDM) used prayer namely Hardware Key Device, ie Central Processing Unit: RedHat Enterprise Linux AS 5.0, prayer Monitor 24-inch pieces, Server: SGI altix 450/SuSe Linux Enterprise Server 9.0, 32 GB, 32 X 2,6 GHz Procesor, network: Gigabyte 1 Gb/s, and the software used is paradigm, product: Seismic Processing and Imaging. The third fault obtained in this study in accordance with the geological information derived from previous research conducted by geologists. The second general direction is northwest-southeast direction represented by Baribis fault, fault-fault in the Valley Cimandiri and Gunung Walat. This direction is often known as the directions Meratus (Meratus Trend). Meratus directions interpreted as directions that follow the pattern of continuous arc Cretaceous age to Meratus in Kalimantan.
APA, Harvard, Vancouver, ISO, and other styles
7

Belfaiza, M., D. Rondelaud, M. Moncef, and G. Dreyfuss. "Fasciola hepatica: cercarial productivity of redial generations in long-surviving Galba truncatula." Journal of Helminthology 78, no. 2 (2004): 115–20. http://dx.doi.org/10.1079/joh2003213.

Full text
Abstract:
AbstractBimiracidial infections of Galba truncatula with Fasciola hepatica were carried out to determine the effect of food quality on the frequency of 1- and 2-sporocyst infections, to analyse its impact on the developmental patterns (normal, or abnormal) of redial generations, and to verify its consequences on cercarial production. These investigations were performed in snails reared at 20°C and provided with cos lettuce and commercial fish food (Tetraphyll®) as a food source until their death. Double-sporocyst infections with normal development of redial generations were recorded in 43.9% of infected snails (out of 296). Single-sporocyst infections were noted in the other snails, with normal development of generations in 53.7% and abnormal development (the first mother redia early degenerated) in 2.4%. Four successive redial generations were found in long-surviving snails (more than 90 days). In both 1- and 2-sporocyst infections, showing normal development of generations, the daughter rediae, which exited from the first mother redia (R2a rediae), constituted the greater group of free rediae and produced the highest percentages of cercariae (46.2–48.2%). However, the development of these rediae inside the snail body was slower in 2-sporocyst infections than in 1-sporocyst infections. The numbers of rediae noted in subsequent generations (R2b/R3a and R3b/R4a rediae) were similar, whatever the number of full-grown sporocysts. The number of shed cercariae recorded in the 1- and 2-sporocyst infections did not significantly differ. When long-surviving snails died, 19.8–20.7% of cercariae produced by free rediae (essentially by R2b/R3a and R3b/R4a rediae) were still present in their bodies. The increased frequency of 2-sporocyst infections demonstrated that food quality had a significant effect on the redial burden of F. hepatica developing inside G. truncatula.
APA, Harvard, Vancouver, ISO, and other styles
8

Suhanda, Suhanda. "ANALISIS SISTEM KERJA FILE SERVER UNTUK MENINGKATKAN KEAMANAN DAN MEMPERLANCAR PROSES PERTUKARAN DATA-DATA ADMINISTRASI PERKANTORAN." ENSAINS JOURNAL 3, no. 1 (2020): 42. http://dx.doi.org/10.31848/ensains.v3i1.300.

Full text
Abstract:
Abstrak: Jurnal ini akan Membahas dan Menganalisa tentang Pengembangan File Server yang digunakan untuk menangani suatu kesibukan Pengolahan Pertukaran Data di suatu Perkantoran. Data yang diproses menggunakan Jaringan Lokal, untuk mengecek Data-Data hasil kerja, Pertukaran Data sering tidak Akurat, dan Data tidak sesuai dengan kegunaannya, bahkan Data sering keliru dan Hilang. Pengembangan File Server harus disertai dengan adanya Pengamanan terhdap File karena sering adanya gangguan Virus yang datang melalui Jaringan. Disamping Pengamanan Haedware, harus disertai Pengamanan Softwarenya. Supaya jalannya proses Data-Data Administrasi menjadi Lancar dam terjamin Keamanannya. File Server yang dianalisa menggunakan Samba Riga dan Linux Redhat yang Effetif dabn Effisien. Untuk menjaga Keamanan dari File tersebut, maka digunakan pembagian untuk Hak Aksesnya yang digunakan oleh masing-masing Operator Data Administrasi. Jurnal yang diambil dari hasil Penelitian tentang Data Administrasi salah satu Kantor di Kabupaten Garut yang memerlukan Peralatan Komputer dan Jaringannya untuk memperlancar pengolahan Data. Pekerjaan yang sedang dikerjakan didukung oleh teknologi File Sharing yang memadai, supaya pejerjaan dalam Pengolahan data dapat dilaksanakan dengan lancar dan tepat waktu serta Akurat. Dengan menggunakan dan menganalisis File Server dan Keamanannya, maka hasil kerja yang didapat menjadi lebih cepat dan Sumber Daya yang dibutuhkan menjadi lebih hemat, sehingga Biaya yang dikeluarkan lebih kecil, serta dapat memnuhi biaya yang lainya yang berhubungan dengan Pengolahan Data Administrasi di Perkantoran. Dengan Analisis dan Pengembangan File Server Proses Kerja Dara Administrasi terutama Pertukaran Data menjadi lebih lancar dan Aman dari Akurat.Kata kunci : File server, Pertukaran Data, Administrasi Perkantoran.Abstract: This journal will discuss and analyze the development of file servers that are used to handle a busy Exchange of Data Processing in an Office. Data is processed using Local Networks, to check Data on work results, Data Exchange is often inaccurate, and Data is not in accordance with its use, even Data is often wrong and Missing. The development of a File Server must be accompanied by the Security of Files because of frequent Virus interruptions that come through the Network. Besides the security of hardware, it must be accompanied by security software. So that the process of running administrative data becomes smooth and guaranteed. The file server analyzed using Samba Riga and Effetive Linux Redhat and Efficient. To maintain the security of the file, the division for access rights used by each operator of data administration is used. Journals taken from the results of Research on Administrative Data, one of the Offices in Garut Regency that requires Computer and Network Equipment to facilitate data processing. The work that is being worked on is supported by adequate File Sharing technology, so that workers in data processing can be carried out smoothly and on time and accurately. By using and analyzing File Servers and Security, the work results obtained will be faster and the Resources needed will be more efficient, so that the costs incurred are smaller, and can meet other costs associated with Processing Administrative Data in Offices. With Analysis and Development of File Servers the Administration of Work Processes, especially Data Exchange, becomes more smooth and safethanAccurate. Keywords: File server, Data Exchange, Office Administration.
APA, Harvard, Vancouver, ISO, and other styles
9

Rondelaud, D. "Fasciola hepatica: the infection rate and the development of redial generations in Lymnaea truncatula exposed to miracidia after experimental desiccation and activation in water." Journal of Helminthology 68, no. 1 (1994): 63–66. http://dx.doi.org/10.1017/s0022149x00013493.

Full text
Abstract:
AbstractAdult Lymnaea truncatula were subjected to 10 days of experimental desiccation and then remained in water for 1 or 8 days before each was exposed to a single miracidium. The infection rate was lower in these snails than in infected controls that were not exposed to stress (52–54% vs 73%). The redial burden clearly decreased in stressed snails (18–25 rediae per snail) than in controls (43 rediae). This numerical decrease concerned essentially: i) live independent rediae of the first generation and the first cohort of the second generation, and ii) dependent rediae of subsequent generations. Mature rediae were more numerous in the first cohort of the second generation than in the other generations. Desiccation before exposure limited the size of the redial burden but placement in water for 8 days just after the stress attenuated the effects of this factor.
APA, Harvard, Vancouver, ISO, and other styles
10

Rondelaud, D., M. Belfaiza, P. Vignoles, M. Moncef, and G. Dreyfuss. "Redial generations ofFasciola hepatica: a review." Journal of Helminthology 83, no. 3 (2009): 245–54. http://dx.doi.org/10.1017/s0022149x09222528.

Full text
Abstract:
AbstractAn update on the redial generations ofFasciola hepaticawas carried out to highlight the different developmental patterns of rediae, the effects of some factors on these generations, and the consequences of such developmental patterns on cercarial productivity. The development of generations is dependent on the behaviour of the first mother redia of the first generation. If this redia remains alive throughout snail infection, it produces most second-generation rediae. In contrast, if it dies during the first weeks, daughter redia formation is ensured by a substitute redia (the second mother redia of the first generation, or the first redia of the second generation). Environmental and biotic factors do not modify the succession of redial generations, but most act by limiting the numbers of rediae, either in all generations, or in the second and/or third generations. An abnormal development of rediae reduces the number of cercariae and most are formed by the second cohort of the first generation. By contrast, most cercariae are produced by the first cohort of the second generation when redial development is normal. The mother rediae described by previous authors might correspond to the first generation and the second cohort of the second generation, while daughter rediae would be the second cohort of the second generation and the first cohort of the third generation. Under certain circumstances, daughter redia formation is ensured by the first two mother rediae or all first-generation rediae, thus demonstrating that the first mother redia is not the only larva to ensure daughter redia formation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Redhat"

1

Nilsson, Ulrick, Rickard Holmström, and Mats Jarbe. "Windows, RedHat och IPv6 : ett test!" Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1697.

Full text
Abstract:
With the huge amount of computers connected to the Internet the IP-addresses are starting to run out. The Internet Engineering Task Force, IETF, have decided that it is about time to exchange the old 32 bits Internet protocol, Ipv4, to a more modern 128 bits protocol called Ipv6. This thesis explores the possibility to install Ipv6 in different operating systems. By testing various operating systems and by set up criteria compare them to each other we give the reader a picture of how the installation is done. We also show which operating systems to prefer if you want to use IPv6. The chosen operating systems are different Windows versions and Linux RedHat versions. The result of our testing reveals that it does not really matter which of the more recent versions of the operating systems, Windows XP or Linux RedHat 7.2, you use since they have come quite far ahead in their Ipv6 development.
APA, Harvard, Vancouver, ISO, and other styles
2

Janson, Fredrik. "Ubuntu, Debian, Fedora, RedHat och OpenSUSE : En jämförelse av CVE på Linux distributioner." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15244.

Full text
Abstract:
Package management in Linux systems is a popular way to install and update software and the de facto standard on Ubuntu, Debian, Fedora, RedHat, CentOS and OpenSUSE. The software provided in the repositories can however differ when it comes to fixing vulnerabilities since package maintainers in some cases must implement some specific changes to the source used to build the software to make it compatible with the Linux system it is intended to be executed on. The Common Vulnerabilities and Exposures (CVE) standard provides a way to compare how fixes for vulnerabilities is handled on each Linux system where this work is aimed to examine if there exists different patterns when it comes to the time in days it took for a fix to emerge in the changelog for the software. This data is collected by using scripts in Linux to iterate through the National Vulnerability Database (NVD) which contains CVE entries, the severity score in terms of the impact of the vulnerability and references to which systems that the vulnerability affects. The dates are collected by using another script that iterates through the changelog of all available packages and saves the earliest date when the fix was issued. The results show that there is not enough statistical significance to reliably determine if a difference existed between the Linux distributions except when comparing OpenSUSE with Ubuntu, Debian and Fedora where significance was found which suggests that further study is needed. The comparison showed that Ubuntu, Debian and Fedora was slightly better than RedHat on average regarding the time windows between when a CVE was published to when a fix was mentioned in the changelog and OpenSUSE was slower than all other Linux distributions.<br>Att använda pakethanterare i Linux system är ett populärt sätt att installera och uppdatera mjukvara och är det främsta sättet som används av Ubuntu, Debian, Fedora, RedHat, CentOS och OpenSUSE. Mjukvaran som finns i Linux repositories kan dock skilja sig när det gäller att fixa sårbarheter eftersom package maintainers som är ansvariga för att bygga paketen ibland måste implementera specifika ändringar i källkoden för att mjukvaran skall vara kompatibel med den Linux distribution som den ämnad att köras på. Common Vulnerabilities and Exposures (CVE) standarden möjliggör att kunna jämföra hur en fix för sårbarheter i mjukvaran hanteras på varje Linux distribution där detta arbete ämnar att undersöka om det finns olika mönster när det gäller hur många dagar det tog för en fix att hittas i ändringsloggen för mjukvaran.     Den data som kommer användas samlas in genom att använda script i Linux som itererar genom National Vulnerability Database (NVD) som innehåller CVE poster, en poäng som innebär vilken allvarlighetsgrad sårbarheten har och referenser till systemen som sårbarheten påverkar. Datumen samlas in med ett annat script som itererar genom alla ändringsloggar för alla tillgängliga paket och sparar det tidigaste datumet då en matchande fix hittades. Resultatet visar att det inte finns tillräckligt med statistisk signifikans för att tillförlitligt fastställa om en skillnad existerade mellan Linux distributionerna förutom när OpenSUSE jämfördes med Ubuntu, Debian och Fedora där signifikans hittades vilket tyder på ett behov av ytterligare studier inom ämnet. Jämförelsen visade att Ubuntu, Debian och Fedora var lite bättre än RedHat i genomsnitt när det gäller tidsfönstret mellan när en CVE publicerades till när en fix nämndes i ändringsloggen och sist kom OpenSUSE som var långsammare än alla andra Linux distributioner.
APA, Harvard, Vancouver, ISO, and other styles
3

Riedel, Wolfgang. "Verwaltung von Softwarepaketen mit rpm, 2. Teil." Universitätsbibliothek Chemnitz, 1997. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199700160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Monteferrante, Francesco. "Integrazione di Framework Open-source per Monitoraggio Distribuito di Sistemi basati su Redhat Enterprise Linux." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13353/.

Full text
Abstract:
La tesi tratta come concetto principale il monitoraggio. Vi è lo studio di due sistemi di monitoraggio: quello aziendale chiamato Skynet e uno di confronto chiamato Zabbix. Il progetto consiste nella realizzazione di un server Web che ha il compito di allineare dati monitorati con il SysAid CMDB. Il server Web crea dei CI all'interno del SysAid CMDB che contengono informazioni iniziali. Inoltre, sono stati realizzati servizi che possono essere divisi in due parti: quelli che vanno ad aggiungere dettagli alle informazioni iniziali scritte dal server Web nel SysAid CMDB e quelli a solo scopo di monitoraggio. Alla fine, l'intero progetto è stato integrato in Zabbix, in quanto all'inizio era predisposto per Skynet, per verificarne la solidità e la fattibilità di poter essere utilizzato anche con altri sistemi di monitoraggio.
APA, Harvard, Vancouver, ISO, and other styles
5

Bouriche, Khalid. "Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès." Thesis, Artois, 2013. http://www.theses.fr/2013ARTO0406/document.

Full text
Abstract:
La présente thèse s'intéresse à coder la politique de sécurité SELinux en OrBAC et à proposer une extension de ce modèle. Nous avons commencé par présenter l'état de l'art des différents modèles de contrôles d'accès présents dans la littérature en mettant en exergue les limites de chacun de ces modèles. Ensuite nous avons présenté le modèle OrBAC comme étant une extension du modèle RBAC, car d'une part il a apporté la notion de contexte et d'organisation et d'autre part il permet d'exprimer, en plus des permissions, des interdictions et des obligations. Ensuite, nous avons présenté la solution de sécurité SELinux qui utilise un ensemble de modèles de contrôle d'accès comme DAC, RBAC et MAC. Nous avons recensé plusieurs centaines, voire des milliers, de règles dans la politique de sécurité SELinux, ces règles peuvent concerner des décisions d'accès ou des décisions de transition. Nous avons ensuite pu coder lesdites règles en modèle OrBAC, et ce en passant par le remplissage ses tables d'entité, pour ensuite les transformer en relations OrBAC. Notre thèse a aussi rappelé les fondements de la logique possibiliste, et a ensuite apportée une amélioration importante du modèle OrBAC, il s'agit de l'introduction de l'entité priorité au niveau de chaque relation du modèle OrBAC. L'entité priorité quantifie la certitude pour qu'une entité concrète soit injectée dans l'entité abstraite correspondante, ou en cas général, le degré de certitude pour qu'une relation soit réalisée. Nous avons proposé trois modes de combinaison (pessimiste, optimiste et avancé) qui peuvent être adoptés pour déterminer la valeur de la priorité de chaque relation concrète à partir des priorités des relations abstraites correspondantes. Enfin, nous avons implémenté, via une application développé par DELPHI, le codage des règles concernant les décisions d'accès de la politique de sécurité SELinux, en modèle OrBAC tout en introduisant la notion de priorité<br>This thesis focuses on encoding default-based SELinux security policy in OrBAC and propose an extension of this model. We presented the state of the art of different models of access controls present in the literature underlining the limitations of each of these models. Then we presented the model OrBAC as an extension of the RBAC model, firstly because he brought the notion of context and organization and secondly it allows expressing, in addition to permissions, prohibitions and obligation. Then we presented the SELinux security solution that uses a set of access control models such as DAC, RBAC and MAC. We identified several hundreds or even thousands of rules in SELinux security policy, these rules may be access decisions or decisions of transition. We could then encode these rules in OrBAC model, and via filling its tables of entities, then transform relations OrBAC. Our thesis also reviewed the foundations of possibilistic logic, and then made an important enlargement in OrBAC model; it's to introduce an entity called "priority" in each relationship model OrBAC. The entity "priority" quantifies the certainty for concrete entity injection into the corresponding abstract entity, in general, it's meaning the degree of certainty that a relationship is performed. We proposed three modes of combination (pessimistic, optimistic and advanced) that can be adopted to determine the concrete relations priority value from priorities values of each corresponding abstract relationship. Finally, we implement, via an application developed by DELPHI, coding access decisions rules of the SELinux policy in OrBAC model introducing the priority entity
APA, Harvard, Vancouver, ISO, and other styles
6

Zhou, Yin. "Page connection representation an object-oriented and dynamic language for complex web applications." Ohio : Ohio University, 2001. http://www.ohiolink.edu/etd/view.cgi?ohiou1174408849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kertzman, Meredith O. "Reddit Alert: The Function and Future of Reddit as a Crisis Communication Tool." Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/scripps_theses/245.

Full text
Abstract:
This thesis examines the ways in which Reddit, a social news aggregator, functions as a tool that allows users to give and receive support and information during times of crisis. By exploring how Reddit was used in the aftermath of the Aurora shootings of July 2012 and the Boston bombings of April 2013, this thesis argues that Reddit has the potential to be a powerful and useful tool in times of crisis.
APA, Harvard, Vancouver, ISO, and other styles
8

Martorelli, Ugo. "Redeat verum studi sulla tecnica poetica dell'Alethia di Mario Claudio Vittorio." Stuttgart Steiner, 2006. http://d-nb.info/988745232/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arrowood, Chris. "Ask us Anything for Reddit AMA." Research Showcase @ CMU, 2015. http://repository.cmu.edu/theses/81.

Full text
Abstract:
In an eminently connected, networked and anonymous digital world, the individual sense of identity becomes a composition of personal and increasingly public layers of influences, likes, follows, and shares. To the digital native, this multi-layer composition is, in some cases, complimentary, and in others, entirely opposing manifestations of interests, tastes, preferences and experiences, canvased across multiple systems, apps and social networks. With an interest in enabling a digital archaeology of this information – exploring and understanding it in a more complete sense – this thesis will explore both the theoretical and philosophical basis on which modern identity is considered in the context of user experience design and online social networks. With a theoretical basis in storytelling, curation, and myth, building towards a technical and research basis in information assessability, natural language processing and data visualization, it will explore the notion of “personal digital identity” – both in the form of personal experience and personal story – under the context of online social network platforms that are prevalent today. Finally, it will propose and demonstrate a fully functional tool for the above mentioned “archaeology” of personal digital identity, within the context of a specific online social network – Reddit.com “Ask Me Anything” interview. As a design research project, the focus of the project will be on realizing the full potential for online knowledge sharing platforms in helping shape, develop, and share personal stories and experiences.
APA, Harvard, Vancouver, ISO, and other styles
10

Bednarska, Grazyna. "Reduta - Le théâtre d'art en Pologne." Thesis, Sorbonne Paris Cité, 2017. http://www.theses.fr/2017USPCA001.

Full text
Abstract:
Cette étude est consacrée au parcours créatif du Théâtre d'Art Polonais. Il m'a paru utile de faire des recherches sur l'origine de ce théâtre, sur les sources de son inspiration et son activité. J'appuierai mes constatations sur des citations de théoriciens, ainsi que sur des écrits des créateurs et autres interprètes de Reduta. J'aimerai présenter les créateurs du Théâtre d'Art en Pologne, leur parcours créatif dans le contexte socioculturel de l'époque, leurs réalisations en collaboration avec les auteurs des pièces présentées et leurs relations avec tous les participants à la création scénique. Un point important de mon travail consiste à retrouver et à classifier les éléments caractéristiques des représentations scéniques. On peut constater que les conditions et les circonstances assez spécifiques du travail créatif de Reduta ont donné une existence autonome et unique aux oeuvres présentées. Un examen approfondi de documents et d'articles, conjointement à l'étude de l'iconographie permettra de dégager les caractéristiques principales des ouvrages analysés et présentés et de définir leur structure. Mon objectif est d‟arriver à faire une synthèse permettant de définir l'esthétique et la spécificité des créations théâtrales du Théâtre d'Art Polonais. Je ferai donc la description des quatre périodes caractéristiques de l'activité de Reduta : la Première Reduta Varsovienne (1919-1925), Reduta à Vilnius (1925-1930) et la Deuxième Reduta Varsovienne (1930-1939), la Quatrième Reduta (1939-1946). Enfin, je situerai ce théâtre dans un courant européen de renouveau artistique en précisant les voies de son évolution à travers une multitude d'évènements artistiques, en montrant ses aspects innovateurs et ses transformations au cours de la longue période de son existence<br>I devote my studies to the creative activities of the Polish Art Theatre, called Reduta, against the background of general European culture. I would like to focus on searching for the sources of this theatre, on all aspects which provided its inspiration and paved the way for creative action. I will base many of my reflections on the theories and quotations of the theorists of this theatre, as well as on the thoughts of its creators expressed in many works, as for example in memoirs or letters addressed to their closest associates. I would like to present the creators of the Polish Art Theatre such as Juliusz Osterwa and Mieczysław Limanowski, in order to indicate certain aspects of their private lives, their artistic ambitions, their memoirs, their theoretical work, their road and their aspirations for excellence in the theatrical domain, most fully expressed in the innovative directing and acting aspects of the artistic creations presented, based on naturalness and direct contact with the spectator. Therefore, one very important element of my study will be to determine the character of the work for this theatre and the participation of the entire theatrical team, both acting and technical, in the creation of a given show. The methodology of acting work introduced by Mieczysław Limanowski and Juliusz Osterwa was very significant in the artistic development of an actor, his means of presentation, the shaping of his creative personality. I would like to analyze and indicate three major periods in the existence of the Polish Art Theatre
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Redhat"

1

Ahmed, Faisal. A comparison of Microsoft Windows XP Professional and Redhat Linux 8.0 Personal. University of East London, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tweedy, Jim. Charlie the RedCat. Crane Hill, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cornwell, Bernard. Redcoat. Viking, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Redcoat. Perennial, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gamber, Jackie. Redheart. Meadowhawk Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cornwell, Bernard. Redcoat. Penguin, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dead redhead. Bloodaxe Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hawkins, Doug. Redcoat renegades. Leisure Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tweedy, Jim. Charlie the RedCat in a nutshell. Crane Hill, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Corbett, David. The devil's redhead. Orion, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Redhat"

1

Susteck, Dominik. "Redgate, Roger." In Komponisten Lexikon. J.B. Metzler, 2003. http://dx.doi.org/10.1007/978-3-476-05274-2_243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gooch, Jan W. "Redia." In Encyclopedic Dictionary of Polymers. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_14655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brück, Mary T. "Redman, Roderick Oliver." In Biographical Encyclopedia of Astronomers. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4419-9917-7_1154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ikeyama, Setsuro, H. Clark Maddux, Virginia Trimble, et al. "Redman, Roderick Oliver." In The Biographical Encyclopedia of Astronomers. Springer New York, 2007. http://dx.doi.org/10.1007/978-0-387-30400-7_1154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yao, Yiyu, Yan Zhao, and Jue Wang. "On Reduct Construction Algorithms." In Rough Sets and Knowledge Technology. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11795131_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Froelich, Wojciech, and Alicja Wakulicz-Deja. "Probabilistic Similarity-Based Reduct." In Rough Sets and Knowledge Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24425-4_77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yao, Yiyu, Yan Zhao, and Jue Wang. "On Reduct Construction Algorithms." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-87563-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tang, David. "Consuming the Reddit API." In Pro Ember Data. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6561-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goodrich, Amanda. "Introduction." In Henry Redhead Yorke, Colonial Radical. Routledge, 2019. http://dx.doi.org/10.4324/9781781448632-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goodrich, Amanda. "Conclusion." In Henry Redhead Yorke, Colonial Radical. Routledge, 2019. http://dx.doi.org/10.4324/9781781448632-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Redhat"

1

Visoottiviseth, Vasaka, and Niwat Bureenok. "Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003." In 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008). IEEE, 2008. http://dx.doi.org/10.1109/waina.2008.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burke, Jack, and Ben Wagner. "RedNet, a different perspective of Reddit." In 2015 IEEE Integrated STEM Education Conference (ISEC). IEEE, 2015. http://dx.doi.org/10.1109/isecon.2015.7119910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Condon, J. H., T. S. Duff, M. F. Jukl, et al. "Rednet." In the 1st annual international conference. ACM Press, 1995. http://dx.doi.org/10.1145/215530.215568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arawjo, Ian, David Li, and Kevin Ma. "Reduct." In CHI '17: CHI Conference on Human Factors in Computing Systems. ACM, 2017. http://dx.doi.org/10.1145/3027063.3048415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bartindale, Tom, Daniel Jackson, Karim Ladha, Sebastian Mellor, Patrick Olivier, and Peter Wright. "RedTag." In the 2014 ACM international conference. ACM Press, 2014. http://dx.doi.org/10.1145/2602299.2602303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rachapalli, Jyothsna, Vaibhav Khadilkar, Murat Kantarcioglu, and Bhavani Thuraisingham. "REDACT." In the 22nd International Conference. ACM Press, 2013. http://dx.doi.org/10.1145/2487788.2487865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alessandrini, Andrea, Victor Loux, Gabriel Ferreira Serra, and Cormac Murray. "Designing ReduCat." In IDC '16: Interaction Design and Children. ACM, 2016. http://dx.doi.org/10.1145/2930674.2930675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singer, Philipp, Fabian Flöck, Clemens Meinhart, Elias Zeitfogel, and Markus Strohmaier. "Evolution of reddit." In the 23rd International Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2567948.2576943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gilbert, Eric. "Widespread underprovision on Reddit." In the 2013 conference. ACM Press, 2013. http://dx.doi.org/10.1145/2441776.2441866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pandey, Punit, and Deepshikha Pandey. "Reduct based Q-learning." In the 2011 International Conference. ACM Press, 2011. http://dx.doi.org/10.1145/1947940.1948001.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Redhat"

1

Bock, Geoffrey. RedDot Solutions for Content Management. Patricia Seybold Group, 2005. http://dx.doi.org/10.1571/pp1-13-05cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hopkins, A. T., Darrell L. Palmer, and Jeffrey R. Brown. Residual Dust and Radiation Model (REDRAM), Model Description. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada362633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mulliner, Sara. A Mixed Methods Analysis of Corpus Data from Reddit Discussions of "Gay Voice". Portland State University Library, 2019. http://dx.doi.org/10.15760/etd.7316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

DEPARTMENT OF THE NAVY WASHINGTON DC. Finding of no Significant Impact for the Redman Road Improvement, U.S. Naval Security Group Activity, Sabana Seca Puerto Rico. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada300351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kløcker Larsen, Rasmus, and Maria Boström. “Låt renen få igen landet som det var”: Konsekvenser av gruvan och vägen på Stihken för Vilhelmina Södra sameby. Stockholm Environment Institute, 2021. http://dx.doi.org/10.51414/sei2021.007.

Full text
Abstract:
Denna rapport presenterar en studie av Vilhelmina Södra samebys erfarenheter av de konsekvenser som gruvan på Stihken fört med sig, en gruva som drevs av Boliden Mineral AB 1976–1988. Det finns i dag ett stort kunskapsglapp angående vilka de faktiska konsekvenserna är av gruvindustri på samisk markanvändning, inklusive renskötseln. Detta är så vitt vi vet första gången som forskningen empiriskt belyser konsekvenserna av gruvindustrin, och de faktiska utfallen av försöken till efterbehandling, utifrån en samebys egna erfarenheter och kunskap. Studien genomfördes 2019–2020 i ett samarbete mellan samebyn, Svenska Samernas Riksförbund och Stockholm Environment Institute. Datainsamlingen har bestått av arbetsmöten, intervjuer, workshops, dokumentanalys och kartering med stöd av RenGIS och forskning om störningszoner. Fokus i denna rapport ligger på just Vilhelmina Södra samebys erfarenheter och gruvans konsekvenser för andra samebyar eller icke-renskötande samer i området har därför inte inkluderats. Resultaten visar den omfattande påverkan som gruvan haft på samebyn, dels under driftperioden men i högsta grad också efteråt. Under drifttiden förorsakade gruvan stora direkta och indirekta markförluster, med störningar från brytningen och trafiken, damning på betet, blockering av det naturliga flyttstråket och förlust av stora delar av samebyns renar in i Norge eller in på grannbyarnas mark på svensk sida. I nutid handlar de största konsekvenserna om en omfattande störning från besöksnäringen på grund av vägen som drogs i tidigare väglöst land. Detta föranleder i sin tur stort betesbortfall; försämrad djurhälsa och kondition för renen; förhöjd arbetsbelastning, fysiska påfrestningar, och arbetsmiljörisker för renskötarna; ökade kostnader för renskötselaktiviteter; samt förlust av samiska kulturminnen, ökad psykisk påfrestning, försämrade möjligheter för samebyns unga att satsa på renskötseln, och förlust av traditionell kunskap. Dessa forskningsresultat är viktiga för att korrigera vanligt förekommande missuppfattningar i den politiska och offentliga debatten kring gruvindustrin: nämligen att gruvindustrin och renskötseln kan samexistera utan någon större påverkan på renskötseln. De visar också tydligt vem som har bäst kunskap att bedöma riskerna vid en gruvetablering: samebyn identifierade redan på 1960-talet, och det ganska så exakt, de risker som denna studie nu kunnat visa blivit verklighet medan försöken från statens representanter var långt mindre precisa. Exempelvis antog statens experter en total störningszon på 500 meter runt gruvområdet och 100 meter på bägge sidor om vägen. Detta står i stark kontrast till de störningszoner som samebyn faktiskt har upplevt, nämligen upp mot 10 kilometer för gruvan och 1,5 kilometer för vägen. Problemen härrör främst från det faktum att svensk lagstiftning inte ger tillräckligt skydd för samiska rättigheter. De hänger även ihop med statens tvetydiga roll i hanteringen av de intressekonflikter som uppstår när man både har en skyldighet att skydda samiska rättigheter och ska tillgodose olika samhälls- och företagsekonomiska intressen i utvinningen av mineraler. Denna brist på ansvarstagande, som samebyn upplever från statens sida, visar med all tydlighet att den koloniala exploateringen av naturresurserna i Sápmi inte är ett historiskt fenomen utan något som i allra högsta grad fortgår än i dag. Som ett exempel har inga ansträngningar som helst gjorts för att se över huruvida den begränsade ekonomiska ersättningen som staten genomförde under 1960–70 talet verkligen motsvarar de faktiska skador som samebyn fått uthärda. Det finns flera sätt att åtgärda problemen i området vid Stihken. Exempelvis skulle regeringen kunna ge SGU i uppdrag att återställa området från tidigare prospekteringsverksamhet och kommun och länsstyrelse skulle i sin tur kunna ingripa för att hantera besöksnäringen och friluftslivet. Vad denna studie främst belyser är dock behovet av en genomgripande strategi från statens sida för att komma till rätta med konsekvenserna av Bolidens gruvprojekt och dess följdeffekter. Utifrån senaste årens rättsutveckling torde det numera finnas goda möjligheter för staten att se över sitt ansvar för de skador som framkommit på området vid Stihken.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!