Recursos de colección

Universidad Nacional de La Plata (74.783 recursos)

Este servicio se brinda en el marco del Proyecto de Enlace de Bibliotecas (PrEBi) y significa una novedosa iniciativa en pos de la difusión a través de Internet, dentro y fuera del ámbito de la Universidad, de los conocimientos que en ella se generan para servir como vehículo de promoción y jerarquización. Los objetivos que se han planteados para SeDiCI son sumamente ambiciosos e incluyen la difusion electrónica de tesis, tesinas y disertaciones pero también de otros tipos de creaciones intelectuales, pretendiendo abarcar la ciencia, la tecnología y el arte buscando modos de presentación no solo de objetos en forma de documentos de texto sino también otros medios multimediales aptos para creaciones no documentales.

vol. 11, no. 02

Mostrando recursos 1 - 11 de 11

  1. Distributed systems: principles and paradigms (2nd edition)

    Tinetti, Fernando Gustavo
    This book presents the authors' updated view on the most relevant topics of distributed systems. This second edition shares most of the contents with the previous one in terms of contents/chapters, but many of the chapters have been updated and some new material has been added. Most notably, a new chapter on distributed systems architectures has been added as Chapter 2, giving a general view on the ways distributed systems can be organized.

  2. Multipath Fault-Tolerant Routing Policies to deal with Dynamic Link Failures in High Speed Interconnection Networks

    Zarza, Gonzalo
    In this thesis, we present fault-tolerant routing policies based on concepts of adaptability and deadlock freedom, capable of serving interconnection networks affected by a large number of dynamic link failures. The strongest point of this thesis is that it provides a simple but complete solution to the problem of dynamic fault tolerance in interconnection networks. The proposed solution does not require any information about network faults when the system is started or restarted. Throughout the thesis, we present the conception, design, implementation and evaluation of two contributions. The first of these contributions is the adaptive multipath routing method Fault-Tolerant Distributed...

  3. Methodology for efficient Execution of SPMD applications on Multicore Clusters

    Muresano, Ronal
    Nowadays, the scientific applications are developed with more complexity and accuracy and these precisions need high computational resources to be executed. Also, the current trend in high performance computing (HPC) is to find clusters composed of Multicore nodes, and these nodes include heterogeneity levels which have to be handled carefully if we want to improve the performance metrics. The integration of these Multicore nodes in HPC (High Performance Computing) has allowed the inclusion of more parallelism within nodes, but this parallelism generates challenges that have to be managed considering some troubles present in these environments that affect the application efficiency...

  4. Fortran Refactorings for Legacy Systems

    Méndez, Mariano
    This thesis is based on a certain type of legacy software that came from scientific research. Scientists have become one of the most important legacy code producers for many reasons. One of these is long-lived field (about 50 years old) they have been working in. Another reason is the amount of code produced through years and the lack of a well-defined software development process. Even though refactoring concept was born within the pale of object oriented programming we think that this concept is a paramount tool to be applied on Fortran source code. Since it has been successfully used in...

  5. A Formal Structure of Separation of Duty and Trust in Modelling Delegation Policy

    Ogundele, Oloruntoba Samuel; Adewale, O. S.; Alese, B. K.; Falaki, S. O.
    There are considerable number of approaches to policy specification both for security management and policy driven network management purposes as reported in [20]. This specification sort security policies into two basic types: authorization and obligation policies. Most of the researches in security policies specification over the years focus on authorization policy modelling. In this paper, we report our approach in the design and Modelling of obligation Policy as delegation in information security by considering separation of duty and trust as pre-requisite conditions for delegation. The formal structures of the Delegation models developed was adapted from the Mathematical structures of Separation...

  6. Test automation for Markov Chain Usage Models

    Bettinotti, Adriana M.; Garavaglia, Mauricio
    Statistical testing with Markov Chain Usage Models is an effective method to be used by programmers and testers during web sites development, to guarantee the software reliability. The JUMBL software works on this models; it supports model construction with the TML language and analysis, tests generation and execution and analysis of tests results. This paper is targeted at test automation for web sites development with JUMBL and JWebUnit.

  7. Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

    Saraireh, Ja'afer M. al; Saraireh, Saleh S.; Saraireh, Mohammad S.; Nabhan, Mohammad M. al
    This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze...

  8. Fuzzy Classification to Classify the Income Category Based On Entropy

    Srinivasan, Vaiyapuri; Govind, Rajenderan; Jagannathan, Vandar Kuzhali; Murugesan, Aruna
    The classification problem is one of the main issues in data mining because it aims to extract a classifier which can be used to predict the classes of objects whose class table are unknown. This paper deals with classifying the income database with the entropy based method for analyzing the income is high or low. This method incorporates two mathematical techniques Entropy and Information Gain (IG) with Interactive Dichotomize 3 Algorithm (ID3). Subsets are calculated through Entropy. We fix the threshold point based on the fuzzy approach and the factors are identified using IG. The ID3 algorithm is used to...

  9. Forward-link throughput optimization for wireless cellular packet data networks

    Ekpenyong, Moses E.
    An attempt has been made in this paper to access the control layer of the General Packet Radio Service (GPRS) network base station (BS), using throughput optimization. We focus on the effect of packet transmissions on the throughput of forwardlink (downlink) power balancing, with specific interest on the relative throughput of the four GPRS coding schemes for a realistic GPRS network operating in Nigeria. We derive a model capable of improving the channel quality and simulate the throughput and choice of optimum coding scheme over diverse packet sizes using the MATrix LABoratory toolkit. Simulation results show that the existing system...

  10. Image steganography: hiding short audio messages withidin digital images

    Khalil, M. I.
    It is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography and it is the process of hiding one medium of communication within another. Many different carrier file formats (text, sound or image) can be used, but digital images are the most popular because of their frequency on the Internet. Essentially, the information-hiding process in a steganographic system starts by identifying a cover meduim's redundant bits (those that can be modified without destroying that medium's integrity)....

  11. Using Thematic Contexts and Previous Solutions for Maintaining and Accessing Institutional Repositories

    Delgado, Pablo H.; Maguitman, Ana Gabriela; Ferracutti, Victor M.; Herrera, Luis A.
    Institutional Repositories are collections of digital resources organized to facilitate their long term access. Two fundamental issues that need to be addressed at the moment of implementing these repositories are their maintenance and search instruments. This article describes an intelligent tool whose goal is to overcome certain general limitations encountered in current mechanisms for managing Institutional Repositories. The novel aspects of the proposed tool are the use of previous examples to generate suggestions for cataloging incoming digital resources and the ability to refect a thematic context during the search process. The proposed tool applies casebased reasoning in combination with information...

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.