Tesis sobre el tema "XAML"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "XAML".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Eriksson, Joakim. "Skillnader mellan Windows 8 applikationer byggda med XAML respektive HTML5". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217090.
Texto completoО, Петренко С. "ОСОБЛИВОСТІ ПРОГРАМНОЇ РЕАЛІЗАЦІЇ 3D-ЕФЕКТІВ ЗАСОБАМИ ПІДСИСТЕМИ WPF". Thesis, Київ, Національний авіаційний університет, 2015. http://er.nau.edu.ua/handle/NAU/19279.
Texto completoJutterström, Jenny. "Prototype of a Fragmented Document Editor". Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-9488.
Texto completoSignifikant Svenska AB supplies an information system called Assert, developed to facilitate the aftermarket sales in the manufacturing and subcontractor domains. The information system offers companies and organizations the possibility to gather their product information in a joint database in order to increase the information availability and distribution.
The management of the documents is an important part of the customer need and can be improved in order to also support document maintenance directly in Assert. At the moment, users only have the possibility to add and view documents in the database. By also providing users the possibility to create documents, update document contents, effectively reuse document sections and ease the translation of documents within Assert, the document management will be better facilitated.
The purpose of this thesis is to develop a prototype which shows the concept and benefits when providing the possibility to share document contents between several documents. The prototype is developed in C#/WPF and provides a word processor with features to reuse document contents and translation management.
Björklund, Thomas y Christer Wahlund. "GIS-IMPLEMENTATION AV BING MAPS TILL WINDOWS 8 OCH WINDOWS PHONE 8". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-21978.
Texto completoDetta examensarbete har utförts på konsultbolaget Sweco Position i Jönköping. Arbetet har varit uppdelat i två större delar: teoretiskt och praktiskt arbete. Teoretiska delen omfattade en utredning kring möjligheterna att implementera ett geografiskt informationssystem (GIS) för administration av brunnar med hjälp av Bing Maps tillsammans med Windows 8 och Windows Phone 8. Praktiska arbetet omfattade skapandet av en prototyp till Windows Phone 8 och Windows 8. Studenterna går bland annat genom Model-View-ViewModel-mönstret på en teoretisk nivå, beskriver skillnaderna mellan Windows 8 Pro och Windows RT. Ett utredande om för och nackdelar vid utveckling av webbaserade applikationer och native-applikationer. Resultatet av examensarbetet kommer innefatta en GIS-lösningen utvecklad i C# i samverkan med XAML och omfatta lokalt sparad data med WMS-tjänst baserad interaktion till Windows 8 och Windows Phone 8.
Bürger, Michal. "Technologie Silverlight a její praktické využití". Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-7523.
Texto completoRak, Jan. "SCADA systém stanic pro kontrolu těsnosti". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316379.
Texto completoBalga, Ondřej. "HMI pro BECKHOFF TWINCAT 3". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377027.
Texto completoTollerud, Ian. "Online 3D presentationer : Vilken teknik är mest lämplig idag för små och medelstora företag?" Thesis, University of Gävle, Department of Mathematics, Natural and Computer Sciences, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-142.
Texto completoDenna rapport beskriver och undersöker olika sätt att använda online 3D i webbpresentationer. 3D ställs emot vad som ibland brukar kallas 2,5D (Man fotograferar en produkt ur olika vinklar för att få en serie med bilder som kan ge en fiktiv 3D upplevelse). Rapporten ger bakgrund och historia över online 3D teknologi, ger en översikt över marknaden för online produktpresentationer idag och försöker ge en ögonblicksbild av situationen i andra kvartalet 2007 över en snabb föränderlig marknad. Fyra olika 3D system ställs mot varandra med hjälp av praktiska kodexempel och avslutas med en helhetslösning för dynamisk generering av webbsidor. Målgruppen är programmerare och webbutvecklare som tar fram material för små och medelstora företag.
Larsson, Fredrik y Fredrik Falkesand. "Övervakningsapplikation för Windows 8 surfplatta". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-21513.
Texto completoToday is there no system that monitors a tolling station without the need to be at the office or the tolling station. This report concerns the development of a monitoring application to Windows 8 store app environment on behalf of Combitech AB towards the customer Kapsch TrafficCom. The application was developed for a Windows 8 tablet to monitor a tolling station. The user interface was developed in XAML and its logic in C#. Onion Architecture has been used to build the architecture for the application. The result of this thesis was a working prototype of a monitoring application for Windows 8 tablet, where the content is generated by a simulator. The application displays information for the user about a specific tolling station, for example passages and events.
Kouba, Petr. "Technologie Silverlight". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219002.
Texto completoKlockare, Sofi. "Responsive design in Windows 8 applications". Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96665.
Texto completoDvořák, Marek. "Návrh a implementace mobilní aplikace pro platformu Microsoft Windows". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-234789.
Texto completoKvarnström, Dan y Mathias Jonsson. "Framtidens meny för ett IT-system". Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1357.
Texto completoThe mission was to create a prototype of a menu system for the company
System Andersson AB. The instructions were that it has to be as interesting and
modern now as in 20 years. We had to look at technology from the cutting edge
of development to make our prototype survive in the future. Windows
Presentation Foundation (WPF) was the technique we focused on. There are
only a few applications that take advantage of WPF today, but it is predicted
that WPF will be the next generation method for developing applications to the
Windows platform.
To make our menu visually appealing, easy to use and at the same time
functional, we followed the clear path and guidelines that are available in
interaction design. Those guidelines tell us how the design process should be
executed. Through usage of the six basic ideas of interaction design and taken
the principles of richer user experience further, we were able to build a menu
system that will be as modern in 20 years as it is now. We took the thoughts of
physical design into account to make the menu understandable and easy to use.
Examensarbetets uppdrag var att skapa en prototyp av ett menysystem åt
System Andersson AB, som enligt instruktioner ska vara intressant och
modernt, även om 20 år. För att lyckas med detta tittade vi på "cutting edge" av
vad som används idag för att inte systemet skulle riskera att bli föråldrat i
framtiden. Tekniken som vi undersökte och använde oss av var Windows
Presentation Foundation (WPF). I dagsläget är det endast ett fåtal applikationer
som använder WPF men utvecklingsmetoden spås vara morgondagens sätt att
programmera windowsapplikationer.
För att vår meny skulle bli estetiskt tilltalande, enkel att använda och samtidigt
funktionell så finns det inom interaktionsdesign klara riktlinjer om hur
designutvecklingen bör gå till väga. Genom att nyttja de sex grundtankarna: att
ett system ska vara effektivt, ha hög verkningsgrad, säkert att använda, vara
användbart, enkelt att förstå samt okomplicerat; i designen och att bygga vidare
med principerna så anser vi att vi har kunnat åstadkomma ett menysystem som
kommer att se lika intressant och modern ut om 20 år som det gör nu. För att
menyn skulle uppfylla de sex grundtankarna, bland annat att vara klart
förståelig och enkel att använda så använde vi oss av de tankar och teorier som
framgår i fysisk design.
Pelatti, Simone. "Progettazione e realizzazione di un sistema di eye-tracking per la generazione di contenuti in realtà aumentata in torre di controllo". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19049/.
Texto completoIngr, Michal. "Mobilní aplikace pro administraci CMS". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318324.
Texto completoKalina, Michal. "PC aplikace pro návrh animačních scénářů pro animované funkce světlometů". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316382.
Texto completoPopelka, Karel. "Aplikace s vkládáním virtuálních předmětů do záběru kamery". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255339.
Texto completoHortvík, Martin. "Automatické zjištování rozměrových změn betonových směsí při tuhnutí". Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2017. http://www.nusl.cz/ntk/nusl-320109.
Texto completoMbanaso, Uche Magnus. "Privacy trust access control infrastructure using XACML". Thesis, University of Salford, 2009. http://usir.salford.ac.uk/26805/.
Texto completoKasinath, Gautham. "Fine grained access control of ODF documents using XACML". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/276.
Texto completoMizani, Mehrdad Alizadeh. "An Xacml Based Framework For Structured Patient Privacy Policy (s3p)". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607695/index.pdf.
Texto completoAffonso, Ana Maria Ramo Y. "O corpo do xamã e a passagem de Carlos Castaneda". Universidade Federal de Minas Gerais, 2008. http://hdl.handle.net/1843/VCSA-7EKJ7B.
Texto completoNa presente dissertação, refletimos a respeito da prática antropológica e do impacto da obra de Castaneda na relação entre ciência e magia que a antropologia (entre outras coisas) representa. Castaneda sabe da impossibilidade de explicar o conhecimento de don Juan, o xamã que é seu .informante. (e seu mestre), fora de seus próprios termos, e é por isso que a antropologia de Carlos Castaneda vem abalar a explicação científica da magia. As palavras de don Juan transbordam o texto antropológico de Castaneda e chegam até nós com uma força que encantou milhares de leitores, dentro e fora da antropologia. Mas, o que dizem? Qual é o recado que Castaneda transmite e que teve tanto impacto quando se publicaram seus livros? No contexto de uma reflexão sobre a magia, o xamanismo, a bruxaria ou a feitiçaria, tentaremos prestar uma homenagem acadêmica a quem modificou o saber e a prática antropológica nos anos 70: don Juan Matus.
St-Martin, Michel. "A Verified Algorithm for Detecting Conflicts in XACML Access Control Rules". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20539.
Texto completoBraga, Karina Rachel Guerra. "Modelando xam?s:o caso da tenda do suor". Universidade Federal do Rio Grande do Norte, 2010. http://repositorio.ufrn.br:8080/jspui/handle/123456789/12265.
Texto completoCoordena??o de Aperfei?oamento de Pessoal de N?vel Superior
Este trabalho focaliza o fluxo do conhecimento xam?nico nos centros urbanos, que ? sustentado por uma rede de intera??o a que intitulo de circuito neoxam?nico. Os grupos praticantes do denominado xamanismo urbano, ou neoxamanismo, constituem um segmento do fen?meno Nova Era. N?o o considero um trabalho de religi?o, mas, uma pesquisa sobre um caso peculiar, sobre tradu??o de rituais ind?genas e seus atores no meio urbano. Focalizo as redes globais que os ligam a ind?genas da aldeia e o interc?mbio de saberes pr?ticos e simb?licos, formando uma linhagem de modeladores, alimentada pela centralidade do conhecimento e na tradu??o de rituais e pr?ticas de cura. A cosmologia ind?gena ? vivenciada na metr?pole como modo de vida atrav?s de viv?ncias em rituais tornando global o local. A partir da atua??o desses atores evidencio quest?es como tradu??o, modelagem e poder pessoal. O trabalho de pesquisa, a aprendizagem e o fluxo de rela??es que formam um jogo de constitui??o de poder das autoridades neoxam?nicas. Busquei principalmente situa??es nos eventos de xamanismo urbano organizados por Sthan Xanni?, no Rio de Janeiro, S?o Paulo e Minas Gerais principalmente
Rosa, William Domingo. "Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML)". ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/914.
Texto completoSemenski, Vedran. "An ABAC framework for IoT applications based on the OASIS XACML standard". Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18493.
Texto completoA IoT (Internet of Things) é uma área que apresenta grande potencial mas embora muitos dos seus problemas já terem soluções satisfatórias, a segurança permanece um pouco esquecida, mantendo-se um como questão ainda por resolver. Um dos aspectos da segurança que ainda não foi endereçado é o controlo de acessos. O controlo de acesso é uma forma de reforçar a segurança que envolve avaliar os pedidos de acesso a recursos e negar o acesso caso este não seja autorizado, garantindo assim a segurança no acesso a recursos críticos ou vulneráveis. O controlo de Acesso é um termo lato, existindo diversos modelos ou paradigmas possíveis, dos quais os mais significativos são: IBAC (Identity Based Access Control), RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control). Neste trabalho será usado o ABAC, já que oferece uma maior flexibilidade comparativamente a IBAC e RBAC. Além disso, devido à sua natureza adaptativa o ABAC tem maior longevidade e menor necessidade de manutenção. A OASIS (Organization for the Advancement of Structured Information Standards) desenvolveu a norma XACML (eXtensible Access Control Markup Language) para escrita/definição de políticas de acesso e pedidos de acesso, e de avaliação de pedidos sobre conjuntos de políticas com o propósito de reforçar o controlo de acesso sobre recursos. O XACML foi definido com a intenção de que os pedidos e as políticas fossem de fácil leitura para os humanos, garantindo, porém, uma estrutura bem definida que permita uma avaliação precisa. A norma XACML usa ABAC. Este trabalho tem o objetivo de criar uma plataforma de segurança que utilize os padrões ABAC e XACML que possa ser usado por outros sistemas, reforçando o controlo de acesso sobre recursos que careçam de proteção, e garantindo acesso apenas a sujeitos autorizadas. Vai também possibilitar a definição fina ou granular de regras e pedidos permitindo uma avaliação com maior precisão e um maior grau de segurança. Os casos de uso principais são grandes aplicações IoT, como aplicações Smart City, que inclui monitorização inteligente de tráfego, consumo de energia e outros recursos públicos, monitorização pessoal de saúde, etc. Estas aplicações lidam com grandes quantidades de informação (Big Data) que é confidencial e/ou pessoal. Existe um número significativo de soluções NoSQL (Not Only SQL) para resolver o problema do volume de dados, mas a segurança é ainda uma questão por resolver. Este trabalho vai usar duas bases de dados NoSQL: uma base de dados key-value (Redis) para armazenamento de políticas e uma base de dados wide-column (Cassandra) para armazenamento de informação de sensores e informação de atributos adicionais durante os testes.
IoT (Internet of Things) is an area which offers great opportunities and although a lot of issues already have satisfactory solutions, security has remained somewhat unaddressed and remains to be a big issue. Among the security aspects, we emphasize access control. Access Control is a way of enforcing security that involves evaluating requests for accessing resources and denies access if it is unauthorised, therefore providing security for vulnerable resources. Access Control is a broad term that consists of several methodologies of which the most significant are: IBAC (Identity Based Access Control), RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control). In this work ABAC will be used as it offers the most flexibility compared to IBAC and RBAC. Also, because of ABAC's adaptive nature, it offers longevity and lower maintenance requirements. OASIS (Organization for the Advancement of Structured Information Standards) developed the XACML (eXtensible Access Control Markup Language) standard for writing/defining requests and policies and the evaluation of the requests over sets of policies for the purpose of enforcing access control over resources. It is defined so the requests and policies are readable by humans but also have a well defined structure allowing for precise evaluation. The standard uses ABAC. This work aims to create a security framework that utilizes ABAC and the XACML standard so that it can be used by other systems and enforce access control over resources that need to be protected by allowing access only to authorised subjects. It will also allow for fine grained defining of rules and requests for more precise evaluation and therefore a greater level of security. The primary use-case scenarios are large IoT applications such as Smart City applications including: smart traffic monitoring, energy and utility consumption, personal healthcare monitoring, etc. These applications deal with large quantities (Big Data) of confidential and/or personal data. A number of NoSQL (Not Only SQL) solutions exist for solving the problem of volume but security is still an issue. This work will use two NoSQL databases. A key-value database (Redis) for the storing of policies and a wide-column database (Cassandra) for storing sensor data and additional attribute data during testing.
Toktar, Emir. "Controle de admissão de RSVP utilizando XACML / Emir Toktar ; orientador, Edgar Jamhour". reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2003. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=2258.
Texto completoInclui bibliografias
O avanço tecnológico determinou o surgimento de novas aplicações sobre a Internet, sendo necessário a garantia de serviços prestados aos usuários através de um efetivo controle dos recursos disponíveis da rede de computadores. O acesso à rede com garantia
The technological advance determined the sprouting of new applications on the Internet, being necessary to the guarantee of services given to the users through an effective control of the available resources of the computer network. The access to the net
Hendricks, Mona. "Remaking /Xam narratives in a post-apartheid South Africa". Thesis, University of the Western Cape, 2010. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_4856_1361369794.
Texto completoPublic history has become a dynamic new field of study in South African historiography during the post-apartheid period. As a field of applied history, it has been engaged with analysing the highly contested nature of knowledge production across a wide range of public sites. These include museums, art galleries, archaeological digs, theme-parks, shopping malls, tourist attractions and heritage sites. The wider national cultural and political challenge has been that of working towards restoration, healing, and reparation in the wake of a colonial and apartheid history marked by particularly acute brutality and dispossession. This thesis analyses the attempts of one public institution, the Iziko South African Museum, to negotiate the remaking of public history in the post-apartheid period. Unlike some of the newer sites of cultural production, such as the Cape Town Waterfront and the West Coast cultural village of !Kwa-ttu, the South African Museum has a century-long history of complicity in generating images of racial and cultural others, notably Khoisan communities. The thesis begins by exploring this history and the ways in which the South African Museum has tried to come to terms with this legacy in its post-apartheid policies: firstly, in the discussions and debates around the closing of the Bushman diorama (2001), and secondly, in the creation of a new exhibition on San rock art which draws extensively on the Bleek-Lloyd Collection (/Qe: The Power of Rock Art. Ancestors, Rain-making and Healing, 2003 to the present). The Iziko South African Museum has not been successful in its attempts to meet the challenge of coming to terms with its history of collecting human remains and creating body casts and putting them on display. I argue that the measures it has introduced over the last twenty two years, including the &lsquo
revision of the Bushman diorama exhibition&rsquo
(1988-89), to Miscast (1996), and the 
closure 
of the diorama (2001), are little more than window-dressing and staged productions, with lip-service being paid to transformation. In the place of the effective opening out of debate and discussion about the Museum&rsquo
s history of racial scientific research, we have seen the presentation of a new framework of knowledge about Khoisan communities through the &lsquo
lens of rock art 
research&rsquo
and the Bleek-Lloyd-/Xam records. I see these as a way of sanitising the story about colonialism and apartheid. In making these arguments I draw upon a number of scholarly works by academics involved in public and visual history
recent literature on trauma narratives
Foucauldian discourse
and newspaper.
Sousa, Alysson Ericeira. "A PERFORMANCE DO CONTADOR DE HISTÓRIA CONTEMPORÂNEO: a experiência do grupo Xama Teatro". Universidade Federal do Maranhão, 2014. http://tedebc.ufma.br:8080/jspui/handle/tede/12.
Texto completoAiming to comprehend the issues related to the storyteller s performance on contemporary days, this essay analyzes the experience of XamaTeatro group, having as a reference the spectacle A carroça é nossa . In order for that, it is discussed about the historical path that has led to disappearance and resurgence of storytellers on urban centers, taking in consideration the concepts of memory, tradition and modernity as well as the studies concerning performance, performativity and theatricality on contemporary scene. The essay results from a qualitative investigation based on a narrative research on which I analyze the training laboratories and the spectacles performed by this research s object group.
Visando a compreender as questões relacionadas à performance do contador de histórias na contemporaneidade, o trabalho analisa a experiência do grupo Xama Teatro, tendo como referência o espetáculo A carroça é nossa. Para tanto, discorre sobre o percurso histórico que levou ao desaparecimento e ao ressurgimento dos contadores de histórias nos centros urbanos, levando em consideração os conceitos de memória, tradição e modernidade, assim como os estudos sobre performance, performatividade e teatralidade na cena contemporânea. O trabalho é resultado de uma investigação qualitativa com base na pesquisa narrativa em que analiso os laboratórios de formação e os espetáculos realizados pelo grupo objeto da pesquisa.
Uttha, Worachet. "Etude des politiques de sécurité pour les applications distribuées : le problème des dépendances transitives : modélisation, vérification et mise en oeuvre". Thesis, Aix-Marseille, 2016. http://www.theses.fr/2016AIXM4044/document.
Texto completoThe access control is a fundamental ingredient of computer security. Since the 70s, the research in this area has provided many solutions to the privacy issue of personal data with applications to different environments (operating systems, databases, etc.). Among many access control models, we are interested in the model based on organisations (OrBAC) and we propose an extension adapted to distributed environments such as web services. This extended model is able, in particular, to handle access transitive requests. This situation can occur when a service has to call another service that may need to invoke in turn one or more services to meet the initial demand.We call D-OrBAC (Distributed Organisation Based Access Control), the extension of OrBAC model with a notion of delegation represented by a delegation graph. This graph allows us to represent agreements between the different organisations involved in the chain of service invocations, and to keep track of transitive authorisations. We also propose an analytical technique based on Datalog that allows us to simulate execution of scenarios and to check for the existence of unsafe situations.Thereafter, we use rewriting techniques to ensure that the security policy specified via our D-OrBAC model complies with important properties such as termination and consistency. Finally, we implement for a case study, the mechanism of access request evaluations according to the XACML on the WSO2 Identity Server platform to show that our solution is able to provide both the desired functionality and the security for the system
Vasconcelos, Gisele Soares de. "Ator-contador: a voz que canta, fala e conta nos espetáculos do Grupo Xama Teatro". Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/27/27156/tde-22092016-143149/.
Texto completoThis research paper analyzes the creative processes of both text and body writings of the rhapsody Minha Mãe Preta (My Black Mother), and the presentations A Carroça é Nossa (The Cartwheel is Ours), A Besta Fera (The Stupid Beast), and As Três Fiandeiras (The Three Spinners). The Xama Teatro Group, established in the city of São Luís, in the State of Maranhão, develops its presentations having the art of narrating as its starting point. In its artistic productions, the character of the actor-storyteller stands out: he is the one that sings, tells stories and talks, switching from the persona to the narrator, from the first to the third person. The actor-storyteller builds up his steps as from the path of rapsodos and griots, from the epic subject, from the brincantes (players), and from the anonym narrators. With his foot planted in memory, tradition and orality, he speaks of himself and also speaks of others, combining both real and fictional stories. In order to manifest the character of the actor-storyteller, some settings are necessary. Among them: the use of a voice that evokes missing elements; the neutral thought that produces the spacing between speech and action; the notion of the observer being the public listener; the use of a direct speech to the public; the authorial creation of works with oral vocation texts; the writing of a hybrid dramaturgy that mixes the epic, lyric and dramatic modes; the insertion of the playwright-storyteller in the creation process, in a conjugated way with actors-storytellers.
Johansson, Anna y Christina Bäck. "Produktionsplaneringsrutiner för manuella svetsresurser". Thesis, University West, Department of Technology, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-795.
Texto completoBrechlerová, Dagmar. "XML bezpečnost a její uplatnění v univerzitním informačním prostředí". Doctoral thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3739.
Texto completoAlissa, Khalid Adnan A. "Authorisation management in business process environments: An authorisation model and a policy model". Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/88962/1/Khalid%20Adnan%20A_Alissa_Thesis.pdf.
Texto completoYsasi, Alonso Alejandro. "La obra gráfica de Pedro Quetglas “Xam” (1915-2001): la riqueza de un patrimonio". Doctoral thesis, Universitat de les Illes Balears, 2014. http://hdl.handle.net/10803/284394.
Texto completoEs una investigación, análisis, y aproximación a la obra gráfica del artista mallorquín, del siglo XX, Pedro Quetglas, conocido por el seudónimo de “Xam”. Su actividad se ha sistematizado en base a la biografía, técnicas trabajadas y a su entorno. Xam, se ejercitó en la caricatura, el dibujo, el cartel, el grabado xilográfico, la pintura, los monotipos, la serigrafía y en el grabado calcográfico. Del conjunto de toda su producción se centra en la obra gráfica producida a partir de 1944, cuando puede datarse su primera xilografía, y su fallecimiento, en 2001, en el cual realiza su última litografía. La tarea se inserta en un ámbito sin tradición inmediata sobre la obra gráfica en Mallorca, prácticamente desaparecida tras la importante imprenta Guasp. Se han podido documentar más de 400 matrices. A su vez, se han trabajado las estampaciones de estas, que ascienden a 600 estampas calcográficas, xilográficas, serigráficas y litográficas.
The thesis is research, analysis and approach to the graphic work of the Majorcan artist of the 20th century, Pedro Quetglas, known by his pseudonym "Xam". Xam worked in several art fields, such as caricature, drawing, designing and painting posters, woodcut, painting, monotype, serigraphy and calcography engraving. From the sum of his work the thesis is centred in the graphic work produced between 1944, when we can date the first xylography, and his death, 2001, when he finished his last lithography. The task was inserted in a field without immediate tradition on the graphic work in Mallorca, which practically went missing after the important Guasp printing house closed down. It has been possible to document more than 400 blocks and, at the same time, the prints of those which add up to 600 prints on chalcography, xylography, serigraphy and lithography.
Rore, Guajardo Marisa del Carmen. "Estudio del endurecimiento en aleaciones Cu-xAl-xNi,CON x=3,5 y 7% at". Tesis, Universidad de Chile, 2012. http://www.repositorio.uchile.cl/handle/2250/111356.
Texto completoLas aleaciones ternarias Cu-Al-Ni, presentan en el extremo rico en Cu, una solución sólida α de estructura fcc, donde el Al y Ni ocupan posiciones de sustitución. Es sabido que las aleaciones Cu-Al-Ni de estructura inicial fase α, no necesariamente al equilibrio, endurecen por recocido. Durante el desarrollo de esta investigación, año 1994, al revisar la literatura, se encuentra que la mayor parte de las investigaciones originales, respecto al endurecimiento por recocido de las aleaciones Cu-Al-Ni, son previas al año 1950, sin el uso de Microscopía Electrónica de Transmisión (TEM), sino basadas principalmente en análisis por Microscopía Óptica. Una investigación (CANMET, 1977), utiliza Microscopía Óptica, Extracción Química y Microsonda Electrónica. La motivación de este trabajo, es estudiar el endurecimiento por recocido de tres aleaciones ternarias Cu-xAl-xNi, con x = 3, 5 y 7% at., de estructura inicial monofásica α, con técnicas de análisis por Microdureza Vickers (100 g), Microscopía Óptica, agregando la técnica de Microscopía Electrónica de Transmisión TEM. Particularmente, en este trabajo, es de interés verificar si tal endurecimiento se debe principalmente a precipitado de una o más fases, precipitado de partículas finas Ni3Al o precipitado de NiAl, entre otros posibles mecanismos. Debido al tamaño de los precipitados que se trate, la técnica de TEM es aquí realmente necesaria para correlacionar las propiedades y microestructura. Mediante observaciones de TEM sobre la muestra, la Imagen obtenida, permite buscar defectos cristalográficos, como dislocaciones y su comportamiento, y con el Diagrama Difracción de electrones, realizar el análisis radiocristalográfico para identificar las distintas fases cristalinas presentes en la muestra, comparando el Diagrama de la muestra con los Diagramas Patrón clasificados sistémicamente en el atlas publicado por la A.S.T.M. Para los recocidos se consideran tiempos de 1 y 3 h, y temperaturas entre 200 y 800 C. La aleación con x= 3 % at no endurece ni presenta modificaciones en su estructura. Las aleaciones con x= 5 y 7 %at si exhiben endurecimiento por recocido; en cada gráfico Dureza versus Temperatura de Recocido, se observa un máximo de dureza para temperaturas de 550-600 [C]. Este endurecimiento se puede asociar, mediante TEM, a la precipitación de finas partículas esféricas de la fase Ni3Al, con un diámetro medio de 0,02-0,03 μm. Nuestros resultados permiten también ayudar a precisar la ubicación del límite α/α + Ni3Al en el diagrama de equilibrio Cu-Ni-Al a 600C. Los resultados obtenidos serán relevantes para motivar y proponer recomendaciones para continuar el desarrollo de esta línea de investigación, para posteriores investigaciones del endurecimiento en aleaciones Cu-Al-Ni, mediante técnicas de análisis de TEM y Difracción de Rayos X, entre otras, y ampliar el campo de aplicación de estas aleaciones.
Abakar, Mahamat Ahmat. "Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public". Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.
Texto completoBhatia, Nupur. "Policy Management in Context-Aware Networks". Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92015.
Texto completoAmbient Network är ett EU-finansierat project inom det 6:e ramprogrammet.Projektets mål är att möjliggöra samarbete mellan heterogena nätverk, som använderbåde dagens men även framtidens trådlösa teknologier, för att minimeraslutanvändarens insats för att nå den tjänst de är intresserade av – oberoende av platseller vilket nätverk de använder. På grund av den stora delen av mobila användaresom kräver omedelbar och dynamisk tillgång till tjänster måste dessa nätverk gåsamman ’on the fly’ utan tidigare konfigurering.Användningen av context information i Ambient Networks kan elmininera behovet avförkonfigurering av nätverk, följaktligen blir de då autonoma. Dock, ett problem somuppkommer med detta är att den fria och okontrollerade spridningen av contextinformation bryter integriteten för deltagarna. Det är väldigt viktigt att ta itu med dettaproblem för att kunna kontrollera vilka som har tillgång till vilken contextinformation. Den här kontrollen kan uppnås genom väldefinierade policies. Dettaskapar ett behov av ett ramverk inom ContextWare arkitekturen för att skydda dentillgängliga context informationen. Den här uppsatsen är en del i ansträngningen att skapa en policy baserad infrastrukturför attestering av tillgång till context information inom Ambient Networks. Uppsatsenundersöker och designar en arkitektur för ett policy handhavande system som ärbaserat på OASIS XACML, den bygger vidare på arkitekturen för handhavande avcontext information i Ambient Networks. Utöver policy hantering inom ett ambientnetwork skapas också policy hantering mellan ambient networks när de förenas. Denframtagna arkitekturen är därefter implementerad för att visa på konceptets hållbarhet. En sammanslagning av två policy handhavande system när två nätverk slås ihop ärbehandlat endast i teorin, det är inte implementerat. Designen utvärderas genom att köra test på den implementerade versionen ochdärefter analysera och visa resultaten i rapporten. Dessa test innehåller mätningar avfördröjningen av en enda begäran samt flera, responstiden i ett system med policyhanteringjämfört med utan samt prestandan i ett policy-hanteringssystem med en litenmängd policies jämfört med en större mängd policies.
Staphorst, Luan. "Die wond sê dit aan my: die morele wêreldbeskouing van die |xam as eko-morele fenomenologie". University of the Western Cape, 2020. http://hdl.handle.net/11394/8180.
Texto completoDespite the loss of speakers of |xam, one of the 28 Khoisan languages once spoken across Southern Africa, a part of the heritage of these speakers can be found in predominantly two archives: that of Wilhelm H. I. Bleek and Lucy Lloyd (1911) and Gideon R. von Wielligh (1919-1921). The archives form the heart of Bushman* Studies, and has long since received attention in, amongst others, anthropology, literature, and linguistics. This study presents an investigation into the ethical views of the |xam, an investigation which, with the single exception of the studies of Antjie Krog (2004-), has not been undertaken in a philosophical tradition. Through a comparative study of texts across archival boundaries, I engage critically with the ethical views of the |xam, specifically the phenomenological nature of these views. To this end, I use the hermeneutical approach in African philosophy, an approach which focuses on identifying and analysing concepts in texts. The approach to ‘reading’ |xam texts remains, however, a burning issue, and the limit to which disciplinary boundaries are appropriate, is debatable (Wessels 2010). Consequently, and as a result of the relative density of the available texts, insights from anthropology, literature, linguistics and rock art are incorporated within the comparative study. I secondly bring the ethical views which are identified through the comparative analysis into conversation with the dominant ethical framework in African philosophy, namely Ubuntu. Where Ubuntu as been ‘read’ through various lenses (Van Niekerk 2013), a phenomenological approach is absent. Further, where Ubuntu, African ethics broadly, is generally regarded as humanist, a salient ecological consciousness is present in the |xam views. A comparison between Ubuntu and the |xam views therefore deepens the discourse around African ethics in general, and further provides insights into the unique nature of the ethical views of the |xam in particular. Through this I attempt to add value both to Bushman Studies and African philosophy, whilst highlighting an important voice unique to Africa which could be added to the burning discussion around ecological decay in the time of the Anthropocene.
Nishino, Yoichi, Takahiro Sugiura, Suguru Tanaka, Yuko Tamada, Yusuke Sandaiji, Hidetoshi Miyazaki, Manabu Inukai et al. "Soft X-ray photoemission study of thermoelectric alloys Fe2−x−yIryV1+xAl and Fe2−xV1+x−yTiyAl". Elsevier, 2011. http://hdl.handle.net/2237/20776.
Texto completoMcGranaghan, Mark. "Foragers on the frontiers : the |Xam Bushmen of the Northern Cape, South Africa, in the nineteenth century". Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:5d935fc4-648d-427b-8ac0-c134c1e3e755.
Texto completoKalibjian, Jeffrey R. "THE IMPACT OF XML SECURITY STANDARDS ON MANAGING POST PROCESSED TELEMETRY DATA". International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606667.
Texto completoToday many organizations use the Secure Sockets Layer protocol (SSL, now known as TLS, or Transport Layer Security) to secure post processed telemetry data transmitted over internal or external Internet Protocol (IP) networks. While TLS secures data traveling over a network, it does not protect data after it reaches its end point. In the Open Systems Interconnection (OSI) layer model, TLS falls several layers below the application category. This implies that applications utilizing data delivered by TLS have no way of evaluating whether data has been compromised before TLS encryption (from a source), or after TLS decryption (at the destination). This security “gap” can be addressed by adoption of a security infrastructure that allows security operations to be abstracted at an OSI application level.
Lima, Paulo Ricardo Barbieri Dutra. "SGPCA SISTEMA GERENCIADOR DE POLÍTICAS DE CONTROLE DE ACESSO". Universidade Federal de Santa Maria, 2008. http://repositorio.ufsm.br/handle/1/8050.
Texto completoInformation is the most precious assets to organizations; hence it is necessary to have mechanisms to protect it and to make it available only to whom have factual permission to use it. Considering the need for protection of the information in organizations it is proposed in this work a system to manage access control policies which can be easily used, that is, it does not require any knowledge of policies codification language. Further, as the creation of new policies could generate conflicts with existent ones, this work also proposes algorithms which manage automatically, in a period of policies creation, the control of some kinds of conflicts, such as interest conflicts. As result, we have offer a Access Control Police Management System that enable that the process of generation and editing policies occurs easily and without conflicts. The reference model used in this work refers to health organizations; however this study can be applied in other fields.
A informação é o bem mais valioso para as organizações, logo deve-se ter mecanismos para que ela possa ser bem protegida e que seja disponível somente para quem tem real permissão de utilizá-la. Dado esta necessidade de proteção da informação nas organizações, propõe-se neste trabalho um sistema de gerenciamento de políticas de controle de acesso, que possa ser utilizado de forma facilitada, ou seja, não requerendo conhecimento de linguagem de codificação de políticas. Adicionalmente, como a criação de novas políticas pode gerar conflitos com as já existentes, este trabalho propõe também algoritmos que gerenciam automaticamente, em tempo de criação das políticas, o controle de alguns tipos de conflitos, tais como conflitos de interesse. Como resultado tem-se um Sistema Gerenciador de Políticas de Controle de Acesso que possibilita que o processo de geração e edição de políticas ocorra de maneira facilitada e sem conflitos. O modelo de referência utilizado neste trabalho refere-se no âmbito de organizações da saúde, mas o estudo realizado pode ser utilizado em outras áreas.
Sebahi, Samir. "Monitoring business process compliance : a view based approach". Thesis, Lyon 1, 2012. http://www.theses.fr/2012LYO10032/document.
Texto completoNowadays, business processes allow more automation of tasks and complex interconnections within the same system and across different systems, which is particularly facilitated by the emergence of Web services. In this context, the tasks of specifying and checking compliance at runtime become particularly challenging.In this thesis, our goal is twofold: monitoring and security in the context of Service Oriented Architecture (SOA). Thus, we proposed a view-based monitoring approach and a framework that target monitoring of business process compliance at runtime. Our monitoring framework aims to offer an easy way to specify properties to be monitored and to facilitate its integration with SOA based environments. Thus, we have developed a new monitoring language called BPath, which is an XPath-based language that offers among others, the ability to express and to check temporal and hybrid logic properties at runtime, making the execution of business processes visible by expressing and evaluating quantitative indicators, in order to detect any compliance violation at runtime. A specific compliance monitoring concern in SOA based environment is security, which is also an important aspect for companies willing to give access to some of their resources over the Web. Thus, we proposed a domain specific language (DSL) based architecture for ensuring security in SOA environments. We particularly focused on access control by proposing a graphical language to facilitate the specification and generation of access control policies.Our approaches are implemented and integrated within a complete end to end compliance framework developed within the COMPAS project
Alpay, Erdem. "Patient Privacy And Consent Management In Ehealth". Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614525/index.pdf.
Texto completoMoreau, Stéphane. "Structure de la phase metastable zr 1 xal xo 2 x / 2 elaboree par voie chimique : effet de la synthese". Orléans, 1999. http://www.theses.fr/1999ORLE2016.
Texto completoSeelam, Uma Maheswara. "STRUCTURAL CHARACTERIZATION OF SPUTTER-DEPOSITED SS304+XAL (X = 0, 4, 7 AND 10 WT.%) COATINGS AND MECHANICALLY MILLED TI, ZR AND". Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3527.
Texto completoPh.D.
Department of Mechanical, Materials and Aerospace Engineering;
Engineering and Computer Science
Materials Science & Engr PhD
KENTZINGER, EMMANUEL. "Ordre et mobilite atomique dans les alliages cubiques centres : diffusion de neutrons dans fe#1#-#xal#x et simulations monte-carlo". Université Louis Pasteur (Strasbourg) (1971-2008), 1996. http://www.theses.fr/1996STR13113.
Texto completoSeelam, Uma Maheswara Rao. "Structural characterization of sputter-deposited SS304+xAl (x = 0, 4, 7 and 10 wt.%) coatings and mechanically milled Ti, Zr and Hf powders". Orlando, Fla. : University of Central Florida, 2010. http://purl.fcla.edu/fcla/etd/CFE0003161.
Texto completoHANNA, BAKRAJI ELIAS. "Etude de la position des atomes d'oxygene dans le reseau de ga#1#xal#xas prepare par epitaxie en phase vapeur a partir d'organometalliques". Paris 11, 1990. http://www.theses.fr/1990PA112074.
Texto completo