Spis treści
Gotowa bibliografia na temat „Programme d'ordinateur”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Programme d'ordinateur”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Programme d'ordinateur"
Reiss i Reiss. "Referenzmanager EndNote 5 – Funktionen – Weiterentwicklung – eigene Erfahrungen". Praxis 91, nr 40 (1.10.2002): 1645–50. http://dx.doi.org/10.1024/0369-8394.91.40.1645.
Pełny tekst źródłaKay, Robin Holding, i Sharon Lauricella. "Investigating the Benefits and Challenges of Using Laptop Computers in Higher Education Classrooms / Étude sur les avantages et les défis associés à l'utilisation d'ordinateurs portables dans les salles de classe d'enseignement supérieur". Canadian Journal of Learning and Technology / La revue canadienne de l’apprentissage et de la technologie 40, nr 2 (9.05.2014). http://dx.doi.org/10.21432/t2vc76.
Pełny tekst źródłaRozprawy doktorskie na temat "Programme d'ordinateur"
Dupuis-Toubol, Frédérique. "La nature juridique du programme d'ordinateur". Paris 10, 1985. http://www.theses.fr/1985PA100195.
Pełny tekst źródłaWiggershaus, Nick. "Mind the Gap : A Historico-Philosophical Investigation of the Ontological Status of Computer Programs". Electronic Thesis or Diss., Université de Lille (2022-....), 2025. https://pepite-depot.univ-lille.fr/ToutIDP/EDSHS/2025/2025ULILH004.pdf.
Pełny tekst źródłaThis thesis addresses the ontological status of computer programs. Previous studies have placed computer programs in almost every ontological category available and claimed that they have a ‘dual nature.' My primary contribution to the debate is offering an alternative framework emphasizing computational implementation and its relata. I argue that we do not need to endorse the dual nature view by suggesting that ‘program' is a polyseme - an umbrella term hosting various entities spanning the abstract-concrete dichotomy. The advantage of this view is the avoidance of positing metaphysically dubious entities. Instead, we can understand the ontology of programs as a network of relations between abstracta and concreta that we bundle together through implementation when using computing machines as epistemic tools. To flash out and explore the claims of this alternative view, I first delve into the philosophical literature on implementation and taxonomize its different notions. In due course, I offer a unified theory of agential implementation, short UTAI. Specifically, UTAI advocates developing a series of related clarificatory case studies that track three different dependency relations between us and the ontologically different constituents under the term program. Accordingly, I discuss the implications of the first dependency relation between programmers and programs as abstract objects. By adopting the Problem of Creation - a well-known issue from the philosophy of art - I present a fresh perspective on the metaphysical options that allow us to view programs as abstract entities. Next, I focus on the second dependency relation between human agents and physical computation. As a result, I provide a new argument for understanding computational implementation as a three-place relation and develop a suitable notion called Implementation-as (based on the DEKI account of scientific representation). Lastly, I address the third dependency relation between programmers and the material systems used for program execution. By combining the insights of interventionism, technical artifacts, and neo-mechanistic literature, I introduce the notion of ‘physical programmability.'
Aly, Walid Mohammed. "La protection des programmes d'ordinateur en Égypte et dans les pays arabes sous l'éclairage du droit international". Montpellier 1, 2004. http://www.theses.fr/2004MON10030.
Pełny tekst źródłaBhatia, Sapan. "Optimisations de compilateur optimistes pour les systèmes réseaux". Bordeaux 1, 2006. http://www.theses.fr/2006BOR13169.
Pełny tekst źródłaGalinec, David. "Exécution asynchrone de programmes synchrones par transformations automatiques : application au traitement d'images temps-réel". Lille 1, 1997. http://www.theses.fr/1997LIL10054.
Pełny tekst źródłaHeyd, Barbara. "Application de la théorie des types et du démonstrateur COQ à la vérification de programmes parallèles". Nancy 1, 1997. http://www.theses.fr/1997NAN10291.
Pełny tekst źródłaThis thesis is an approach to the formaI specification and verification of distributed systems and in particular to the computer assisted verification. In this work, we use the COQ prover to verify concurrent programs and the chosen specification mechanism is the UNITY logic. First, we describe the Calculus of Inductive Constructions, which is the logic used in the Coq prover. Then we introduce the UNITY theory, but we linger over the problems of its logic, due to the ambiguity of quantifications in the Hoare triples. We propose also an extension of the logic, which solves these problems: a program's context is introduced and a new definition for reachable states is given. After the correctness and the completness of this new logic, we present the Coq-UNITY tool, which results of the implementation of this extension in the Coq system. To illustrate the feasibility of our approach, we present several examples of different complexities: the euclidian division, the reader-writer, the parking and the lift control. These four examples are the first case studies. Each of them highlights a particular problem either in proofs or in specifications. A last example describes a telecommunication protocol, namely the ABT/DT protocol. This example shows that the context is an important notion. Once the context is well-defined, it becomes very helpful in the verification
Theologou, Olympia. "Contribution à l'évaluation de la fiabilité des réseaux". Compiègne, 1990. http://www.theses.fr/1990COMPD271.
Pełny tekst źródłaFortin, Jean. "BSP-Why, un outil pour la vérification déductive de programmes BSP : machine-checked semantics and application to distributed state-space algorithms". Phd thesis, Université Paris-Est, 2013. http://tel.archives-ouvertes.fr/tel-00974977.
Pełny tekst źródłaRantsoudis, Christos. "Bases de connaissance et actions de mise à jour préférées : à la recherche de consistance au travers des programmes de la logique dynamique". Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30286.
Pełny tekst źródłaIn the database literature it has been proposed to resort to active integrity constraints in order to restore database integrity. Such active integrity constraints consist of a classical constraint together with a set of preferred update actions that can be triggered when the constraint is violated. In the first part of this thesis, we review the main repairing routes that have been proposed in the literature and capture them by means of Dynamic Logic programs. The main tool we employ for our investigations is the recently introduced logic DL-PA, which constitutes a variant of PDL. We then go on to explore a new, dynamic kind of database repairing whose computational complexity and general properties are compared to the previous established approaches. In the second part of the thesis we leave the propositional setting and pursue to adapt the aforementioned ideas to higher level languages. More specifically, we venture into Description Logics and investigate extensions of TBox axioms by update actions that denote the preferred ways an ABox should be repaired in case of inconsistency with the axioms of the TBox. The extension of the TBox axioms with these update actions constitute new, active TBoxes. We tackle the problem of repairing an ABox with respect to such an active TBox both from a syntactic as well as a semantic perspective. Given an initial ABox, the syntactic approach allows us to construct a set of new ABoxes out of which we then identify the most suitable repairs. On the other hand, for the semantic approach we once again resort to a dynamic logic framework and view update actions, active inclusion axioms and repairs as programs. Given an active TBox aT , the framework allows to check (1) whether a set of update actions is able to repair an ABox according to the active axioms of aT by interpreting the update actions locally and (2) whether an ABox A' is the repair of a given ABox A under the active axioms of aT using a bounded number of computations by interpreting the update actions globally. After discussing the strong points of each direction, we conclude by combining the syntactic and semantic investigations into a cohesive approach
Soni, Hardik. "Une approche modulaire avec délégation de contrôle pour les réseaux programmables". Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4026/document.
Pełny tekst źródłaNetwork operators are facing great challenges in terms of cost and complexity in order to incorporate new communication technologies (e.g., 4G, 5G, fiber) and to keep up with increasing demands of new network services to address emerging use cases. Softwarizing the network operations using SoftwareDefined Networking (SDN) and Network Function Virtualization (NFV) paradigms can simplify control and management of networks and provide network services in a cost effective way. SDN decouples control and data traffic processing in the network and centralizes the control traffic processing to simplify the network management, but may face scalability issues due to the same reasons. NFV decouples hardware and software of network appliances for cost effective operations of network services, but faces performance degradation issues due to data traffic processing in software. In order to address scalability and performance issues in SDN/NFV, we propose in the first part of the thesis, a modular network control and management architecture, in which the SDN controller delegates part of its responsibilities to specific network functions instantiated in network devices at strategic locations in the infrastructure. We have chosen to focus on a modern application using an IP multicast service for live video streaming applications (e.g., Facebook Live or Periscope) that illustrates well the SDN scalability problems. Our solution exploits benefits of the NFV paradigm to address the scalability issue of centralized SDN control plane by offloading processing of multicast service specific control traffic to Multicast Network Functions (MNFs) implemented in software and executed in NFV environment at the edge of the network. Our approach provides smart, flexible and scalable group management and leverages centralized control of SDN for Lazy Load Balance Multicast (L2BM) traffic engineering policy in software defined ISP networks. Evaluation of this approach is tricky, as real world SDN testbeds are costly and not easily available for the research community. So, we designed a tool that leverages the huge amount of resources available in the grid, to easily emulate such scenarios. Our tool, called DiG, takes into account the physical resources (memory, CPU, link capacity) constraints to provide a realistic evaluation environment with controlled conditions. Our NFV-based approach requires multiple application specific functions (e.g., MNFs) to control and manage the network devices and process the related data traffic in an independent way. Ideally, these specific functions should be implemented directly on hardware programmable routers. In this case, new routers must be able to execute multiple independently developed programs. Packet-level programming language P4, one of the promising SDN-enabling technologies, allows applications to program their data traffic processing on P4 compatible network devices. In the second part of the thesis, we propose a novel approach to deploy and execute multiple independently developed and compiled applications programs on the same network device. This solution, called P4Bricks, allows multiple applications to control and manage their data traffic, independently. P4Bricks merges programmable blocks (parsers/deparsers and packet processing pipelines) of P4 programs according to processing semantics (parallel or sequential) provided at the time of deployment
Książki na temat "Programme d'ordinateur"
Vos, Jean-Claude de. Microsof Excel 3, pas à pas, Version Mac. Paris: Dunod, 1991.
Znajdź pełny tekst źródłaHerzberg, Paul A. How SAS works: A comprehensive introduction to the SAS system. Wyd. 2. New York, NY, USA: Springer-Verlag, 1990.
Znajdź pełny tekst źródłaJolles, Antonia Stacy. PageMaker par la pratique sur PC et compatibles. Paris: Sybex, 1986.
Znajdź pełny tekst źródłaBurgess, Eric. Celestial BASIC: Astronomy on your computer. Berkeley: Sybex, 1985.
Znajdź pełny tekst źródłaavocat, Bertrand André. La protection des logiciels. Paris: Presses universitaires de France, 1994.
Znajdź pełny tekst źródłaSehan, Jean François. Super jeux, PC et compatibles: 50 programmes de jeux en Basic. Paris: P.S.I, 1986.
Znajdź pełny tekst źródłaBareiss, Ray. Exemplar-based knowledge acquisition: A unified approach to concept representation, classification, and learning. Boston: Academic Press, 1989.
Znajdź pełny tekst źródłaChevrier, Jacques. L' ordinateur, outil d'apprentissage. Hull, Qué: Université du Québec à Hull, 1985.
Znajdź pełny tekst źródłaCanada, Canada Industry, Conference Board of Canada i Canada Industrie Canada, red. Canada's SchoolNet GrassRoots Program : case studies 2000-2001 =: Programme Rescol à la source : études de cas, 2000-2001. Ottawa, Ont: Industry Canada = Industrie Canada, 2001.
Znajdź pełny tekst źródła