Academic literature on the topic 'Computer systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer systems"

1

Ferres-López, Enrique, Eugenio Roanes-Lozano, Angélica Martínez-Zarzuelo, and Fernando Sánchez. "One-sided differentiability: a challenge for computer algebra systems." Electronic Research Archive 31, no. 3 (2023): 1737–68. http://dx.doi.org/10.3934/era.2023090.

Full text
Abstract:
<abstract><p>Computer Algebra Systems (CASs) are extremely powerful and widely used digital tools. Focusing on differentiation, CASs include a command that computes the derivative of functions in one variable (and also the partial derivative of functions in several variables). We will focus in this article on real-valued functions of one real variable. Since CASs usually compute the derivative of real-valued functions as a whole, the value of the computed derivative at points where the left derivative and the right derivative are different (that we will call conflicting points) should be something like "undefined", although this isn't always the case: the output could strongly differ depending on the chosen CAS. We have analysed and compared in this article how some well-known CASs behave when addressing differentiation at the conflicting points of five different functions chosen by the authors. Finally, the ability for calculating one-sided limits of CASs allows to directly compute the result in these cumbersome cases using the formal definition of one-sided derivative, which we have also analysed and compared for the selected CASs. Regarding teaching, this is an important issue, as it is a topic of Secondary Education and nowadays the use of CASs as an auxiliary digital tool for teaching mathematics is very common.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
2

Karatza, Helen D. "Computer systems." Journal of Systems and Software 71, no. 3 (May 2004): 199–200. http://dx.doi.org/10.1016/s0164-1212(03)00005-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chu, Dominique, Mikhail Prokopenko, and J. Christian J. Ray. "Computation by natural systems." Interface Focus 8, no. 6 (October 19, 2018): 20180058. http://dx.doi.org/10.1098/rsfs.2018.0058.

Full text
Abstract:
Computation is a useful concept far beyond the disciplinary boundaries of computer science. Perhaps the most important class of natural computers can be found in biological systems that perform computation on multiple levels. From molecular and cellular information processing networks to ecologies, economies and brains, life computes. Despite ubiquitous agreement on this fact going back as far as von Neumann automata and McCulloch–Pitts neural nets, we so far lack principles to understand rigorously how computation is done in living, or active, matter. What is the ultimate nature of natural computation that has evolved, and how can we use these principles to engineer intelligent technologies and biological tissues?
APA, Harvard, Vancouver, ISO, and other styles
4

Sorokatyi, R., A. Dykha, O. Pasichnyk, and T. Skrypnyk. "Computer information technology modeling tribological systems." Problems of tribology 25, no. 2 (June 5, 2020): 59–66. http://dx.doi.org/10.31891/2079-1372-2020-96-2-59-66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brandao, Pedro Ramos. "Computer Forensics in Cloud Computing Systems." Budapest International Research in Exact Sciences (BirEx) Journal 1, no. 1 (January 28, 2019): 71–86. http://dx.doi.org/10.33258/birex.v1i1.141.

Full text
Abstract:
The challenges on traditional Computer Forensic mythology in facing with the growing adoption of Cloud Computing services and models by corporations and organizations. We analyse the results of recent research in analysis of computers’ physical memory, new methodologies and tools, and how these technologies can be applied to computer forensics in this specific context.
APA, Harvard, Vancouver, ISO, and other styles
6

Matsuzaka, Yasunari, and Ryu Yashiro. "AI-Based Computer Vision Techniques and Expert Systems." AI 4, no. 1 (February 23, 2023): 289–302. http://dx.doi.org/10.3390/ai4010013.

Full text
Abstract:
Computer vision is a branch of computer science that studies how computers can ‘see’. It is a field that provides significant value for advancements in academia and artificial intelligence by processing images captured with a camera. In other words, the purpose of computer vision is to impart computers with the functions of human eyes and realise ‘vision’ among computers. Deep learning is a method of realising computer vision using image recognition and object detection technologies. Since its emergence, computer vision has evolved rapidly with the development of deep learning and has significantly improved image recognition accuracy. Moreover, an expert system can imitate and reproduce the flow of reasoning and decision making executed in human experts’ brains to derive optimal solutions. Machine learning, including deep learning, has made it possible to ‘acquire the tacit knowledge of experts’, which was not previously achievable with conventional expert systems. Machine learning ‘systematises tacit knowledge’ based on big data and measures phenomena from multiple angles and in large quantities. In this review, we discuss some knowledge-based computer vision techniques that employ deep learning.
APA, Harvard, Vancouver, ISO, and other styles
7

Mytkowicz, Todd, Amer Diwan, and Elizabeth Bradley. "Computer systems are dynamical systems." Chaos: An Interdisciplinary Journal of Nonlinear Science 19, no. 3 (September 2009): 033124. http://dx.doi.org/10.1063/1.3187791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Bin. "Computer-Mediated Communication Systems." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 531–34. http://dx.doi.org/10.31269/triplec.v9i2.309.

Full text
Abstract:
The essence of communication is to exchange and share information. Computers provide a new medium to human communication. CMC system, composed of human and computers, absorbs and then extends the advantages of all former formats of communication, embracing the instant interaction of oral communication, the abstract logics of printing dissemination, and the vivid images of movie and television. It also creates a series of new communication formats, such as Hyper Text, Multimedia etc. which are the information organizing methods, and cross-space message delivering patterns. Benefiting from the continuous development of technique and mechanism, the computer-mediated communication makes the dream of transmitting information cross space and time become true, which will definitely have a great impact on our social lives.
APA, Harvard, Vancouver, ISO, and other styles
9

Yu, Bin. "Computer-Mediated Communication Systems." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 531–34. http://dx.doi.org/10.31269/vol9iss2pp531-534.

Full text
Abstract:
The essence of communication is to exchange and share information. Computers provide a new medium to human communication. CMC system, composed of human and computers, absorbs and then extends the advantages of all former formats of communication, embracing the instant interaction of oral communication, the abstract logics of printing dissemination, and the vivid images of movie and television. It also creates a series of new communication formats, such as Hyper Text, Multimedia etc. which are the information organizing methods, and cross-space message delivering patterns. Benefiting from the continuous development of technique and mechanism, the computer-mediated communication makes the dream of transmitting information cross space and time become true, which will definitely have a great impact on our social lives.
APA, Harvard, Vancouver, ISO, and other styles
10

BARBU, Ionuț-Daniel. "Computer Systems Vulnerabilities." International Journal of Information Security and Cybercrime 1, no. 1 (June 21, 2012): 55–65. http://dx.doi.org/10.19107/ijisc.2012.01.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer systems"

1

Merritt, John W. "Distributed file systems in an authentication system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shone, N. "Detecting misbehaviour in a complex system-of-systems environment." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4537/.

Full text
Abstract:
Modern systems are becoming increasingly complex, integrated and distributed, in order to meet the escalating demands for functionality. This has given rise to concepts such as system-of-systems (SoS), which organise a myriad of independent component systems into a collaborative super-system, capable of achieving unmatchable levels of functionality. Despite its advantages, SoS is still an infantile concept with many outstanding security concerns, including the lack of effective behavioural monitoring. This can be largely attributed to its distributed, decentralised and heterogeneous nature, which poses many significant challenges. The uncertainty and dynamics of both the SoS’s structure and function poses further challenges to overcome. Due to the unconventional nature of a SoS, existing behavioural monitoring solutions are often inadequate as they are unable to overcome these challenges. This monitoring deficiency can result in the occurrence of misbehaviour, which is one of the most serious yet underestimated security threats facing SoSs and their components. This thesis presents a novel misbehaviour detection framework specifically developed for operation in a SoS environment. By combining the use of uniquely calculated behavioural threshold profiles and periodic threshold adaptation, the framework is able to cope with monitoring the dynamic behaviour and suddenly occurring changes that affect threshold reliability. The framework improves SoS contribution and monitoring efficiency by controlling monitoring observations using statecharts, which react to the level of behavioural threat perceived by the system. The accuracy of behavioural analysis is improved by using a novel algorithm to quantify detected behavioural abnormalities, in terms of their level of irregularity. The framework utilises collaborative behavioural monitoring to increase the accuracy of the behavioural analysis, and to combat the threat posed by training based attacks to the threshold adaptation process. The validity of the collaborative behavioural monitoring is assured by using the novel behavioural similarity assessment algorithm, which selects the most behaviourally appropriate SoS components to collaborate with. The proposed framework and its subsequent techniques are evaluated via numerous experiments. These examine both the limitations and relative merits when compared to monitoring solutions and techniques from similar research areas. The results of these conclude that the framework is able to offer misbehaviour monitoring in a SoS environment, with increased efficiency and reduced false positive rates, false negative rates, resource usage and run-time requirements.
APA, Harvard, Vancouver, ISO, and other styles
3

Paterson, Colin Alexander. "Computer controlled suspension systems." Thesis, Coventry University, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harbison, William Samuel. "Trusting in computer systems." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thulnoon, A. A. T. "Efficient runtime security system for decentralised distributed systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9043/.

Full text
Abstract:
Distributed systems can be defined as systems that are scattered over geographical distances and provide different activities through communication, processing, data transfer and so on. Thus, increasing the cooperation, efficiency, and reliability to deal with users and data resources jointly. For this reason, distributed systems have been shown to be a promising infrastructure for most applications in the digital world. Despite their advantages, keeping these systems secure, is a complex task because of the unconventional nature of distributed systems which can produce many security problems like phishing, denial of services or eavesdropping. Therefore, adopting security and privacy policies in distributed systems will increase the trustworthiness between the users and these systems. However, adding or updating security is considered one of the most challenging concerns and this relies on various security vulnerabilities which existing in distributed systems. The most significant one is inserting or modifying a new security concern or even removing it according to the security status which may appear at runtime. Moreover, these problems will be exacerbated when the system adopts the multi-hop concept as a way to deal with transmitting and processing information. This can pose many significant security challenges especially if dealing with decentralized distributed systems and the security must be furnished as end-to-end. Unfortunately, existing solutions are insufficient to deal with these problems like CORBA which is considered a one-to-one relationship only, or DSAW which deals with end-to-end security but without taking into account the possibility of changing information sensitivity during runtime. This thesis provides a proposed mechanism for enforcing security policies and dealing with distributed systems’ security weakness in term of the software perspective. The proposed solution utilised Aspect-Oriented Programming (AOP), to address security concerns during compilation and running time. The proposed solution is based on a decentralized distributed system that adopts the multi-hop concept to deal with different requested tasks. The proposed system focused on how to achieve high accuracy, data integrity and high efficiency of the distributed system in real time. This is done through modularising the most efficient security solutions, Access Control and Cryptography, by using Aspect-Oriented Programming language. The experiments’ results show the proposed solution overcomes the shortage of the existing solutions by fully integrating with the decentralized distributed system to achieve dynamic, high cooperation, high performance and end-to-end holistic security.
APA, Harvard, Vancouver, ISO, and other styles
6

Perucic, Michele. "Performance analysis of computer systems." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33020.

Full text
Abstract:
With an ever-growing and more productive computer industry, the performance of computer systems has become a major concern. Problems related to computer performance usually occur either because the system is not correctly sized or because its resources are not adequately allocated.
Performance analysis of computer systems is the process of evaluating the current performance of a system by monitoring and studying its behavior under different loads. It involves a deep understanding of the functioning of the basic components of a system. Performance analysis is typically followed by performance tuning, in which required changes are applied to the system in order to achieve optimum performance.
In this thesis, we discuss the basics of performance analysis. The different resources of a system are described and an overview of performance-monitoring tools for these resources is presented. An application of performance analysis is also included: two new major systems at McGill University are analyzed (the library management system ALEPH and the finance system BANNER).
APA, Harvard, Vancouver, ISO, and other styles
7

Styne, Bruce Alan. "Management systems for computer graphics." Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xiao, Cheng. "Computer simulation of fluid systems." Thesis, University of Oxford, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.386636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anderson, Thomas R. "Computer modelling of agroforestry systems." Thesis, University of Edinburgh, 1991. http://hdl.handle.net/1842/13429.

Full text
Abstract:
The potential of agroforestry in the British uplands depends largely on the ability of system components to efficiently use resources for which they compete. A typical system would comprise conifers planted at wide spacing, with sheep grazing pasture beneath. Computer models were developed to investigate the growth of trees and pasture in a British upland agroforest system, assuming that growth is primarily a function of light intercepted. Some of the implications of growing trees at wide spacing compared to conventional spacings, and the impact of trees on the spatial and annual production of pasture, were examined. Competition for environmental resources between trees and pasture was assumed to be exclusively for light: below-ground interactions were ignored. Empirical methods were used to try and predict timber production in agroforest stands based on data for conventional forest stands, and data for widely-spaced radiata pine grown in South Africa. These methods attempted to relate stem volume increment to stand density, age, and derived competition measures. Inadequacy of the data base prevented successful extrapolation of growth trends of British stands, although direct extrapolation of the South African data did permit predictions to be made. A mechanistic individual-tree growth model was developed, both to investigate the mechanisms of tree growth at wide spacings, and to provide an interface for a pasture model to examine pasture growth under the shading conditions imposed by a tree canopy. The process of light interception as influenced by radiation geometry and stand architecture was treated in detail. Other features given detailed consideration include carbon partitioning, respiration, the dynamics of foliage and crown dimensions, and wood density within tree stems. The predictive ability of the model was considered poor, resulting from inadequate knowledge and data on various aspects of tree growth. The model highlighted the need for further research into the dynamics of crown dimensions, foliage dynamics, carbon partitioning patterns and wood density within stems, and how these are affected by wide spacing. A pasture model was developed to investigate growth beneath the heterogeneous light environment created by an agroforest tree canopy. Pasture growth was closely related to light impinging on the crop, with temperature having only a minor effect. The model highlighted the fact that significant physiological adaptation (increased specific leaf area, decreased carbon partitioned below-ground and changes in the nitrogen cycle) is likely to occur in pasture shaded by a tree canopy.
APA, Harvard, Vancouver, ISO, and other styles
10

Battisti, Anna. "Computer Simulation of Biological Systems." Doctoral thesis, Università degli studi di Trento, 2012. https://hdl.handle.net/11572/368453.

Full text
Abstract:
This thesis investigates two biological systems using atomistic modelling and molecular dynamics simulation. The work is focused on: (a) the study of the interaction between a segment of a DNA molecule and a functionalized surface; (b) the dynamical modelling of protein tau, an intrinsically disordered protein. We briefly describe here the two problems; for their detailed introduction we refer respectively to chapter DNA and chapter TAU. The interest in the study of the adsorption of DNA on functionalized surfaces is related to the considerable effort that in recent years has been devoted in developing technologies for faster and cheaper genome sequencing. In order to sequence a DNA molecule, it has to be extracted from the cell where it is stored (e.g. the blood cells). As a consequence any genomic analysis requires a purification process in order to remove from the DNA molecule proteins, lipids and any other contaminants. The extraction and purification of DNA from biological samples is hence the first step towards an efficient and cheap genome sequencing. Using the chemical and physical properties of DNA it is possible to generate an attractive interaction between this macromolecule and a properly treated surface. Once positioned on the surface, the DNA can be more easily purified. In this work we set up a detailed molecular model of DNA interacting with a surface functionalized with amino silanes. The intent is to investigate the free energy of adsorption of small DNA oligomers as a function of the pH and ionic strength of the solution. The tau protein belongs to the category of Intrinsically Disordered Proteins (IDP), which in their native state do not have an average stable structure and fluctuate between many conformations. In its physiological state, tau protein helps nucleating and stabilizing the microtubules in the axons of the neurons. On the other hand, the same tau - in a pathological aggregation - is involved in the development of the Alzheimer disease. IDPs do not have a definite 3D structure, therefore their dynamical simulation cannot start from a known list of atomistic positions, like a protein data bank file. We first introduce a procedure to find an initial dynamical state for a generic IDP, and we apply it to the tau protein. We then analyze the dynamical properties of tau, like the propensity of residues to form temporary secondary structures like beta-sheets or alpha-helices.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer systems"

1

Elahi, Ata. Computer Systems. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93449-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elahi, Ata. Computer Systems. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-66775-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Herbert, Andrew, and Karen Spärck Jones, eds. Computer Systems. New York: Springer-Verlag, 2004. http://dx.doi.org/10.1007/b97622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Warford, J. Stanley. Computer systems. Sudbury, Mass: Jones and Bartlett Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Veríssimo, Paulo. Distributed systems for system architects. Boston: Kluwer Academic, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vincze, Markus, Timothy Patten, Henrik I. Christensen, Lazaros Nalpantidis, and Ming Liu, eds. Computer Vision Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87156-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ding, Yongshan, and Frederic T. Chong. Quantum Computer Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-031-01765-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schiele, Bernt, and Gerhard Sagerer, eds. Computer Vision Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-48222-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tzovaras, Dimitrios, Dimitrios Giakoumis, Markus Vincze, and Antonis Argyros, eds. Computer Vision Systems. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34995-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alber, Antone F. Interactive Computer Systems. Boston, MA: Springer US, 1993. http://dx.doi.org/10.1007/978-1-4615-2888-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer systems"

1

Rosato, Dominick V., Donald V. Rosato, Marlene G. Rosato, and Nick R. Schott. "Computer Systems." In Plastics Institute of America Plastics Engineering, Manufacturing & Data Handbook, 1570–95. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1615-6_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ebbesmeyer, Curtis. "Computer Systems." In Drowning, 1171–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-04253-9_184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ennals, Richard. "Computer Systems." In Artificial Intelligence and Human Institutions, 79–89. London: Springer London, 1991. http://dx.doi.org/10.1007/978-1-4471-1735-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

LaMeres, Brock J. "Computer Systems." In Embedded Systems Design using the MSP430FR2355 LaunchPad™, 129–41. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40574-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Whiteley, David. "Computer Systems." In Introduction to Information Systems, 196–207. London: Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-1-137-10325-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

LaMeres, Brock J. "Computer Systems." In Embedded Systems Design using the MSP430FR2355 LaunchPad™, 121–33. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-20888-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mitchell, R. J. "Computer Instructions." In Microprocessor Systems, 176–99. London: Macmillan Education UK, 1995. http://dx.doi.org/10.1007/978-1-349-13812-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mitchell, R. J. "Computer Software." In Microprocessor Systems, 10–18. London: Macmillan Education UK, 1995. http://dx.doi.org/10.1007/978-1-349-13812-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mitchell, R. J. "Computer Hardware." In Microprocessor Systems, 19–29. London: Macmillan Education UK, 1995. http://dx.doi.org/10.1007/978-1-349-13812-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rathore, Heena. "Computer Networks." In Mapping Biological Systems to Network Systems, 11–25. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29782-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer systems"

1

Majdara, Aref, and Toshio Wakabayashi. "A new approach for computer-aided fault tree generation." In 2009 3rd Annual IEEE Systems Conference. IEEE, 2009. http://dx.doi.org/10.1109/systems.2009.4815817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Session CA: Computer architecture & computer aided design." In Systems (ICCES). IEEE, 2009. http://dx.doi.org/10.1109/icces.2009.5383283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rao, Kuntam Babu. "Computer systems architecture vs quantum computer." In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2017. http://dx.doi.org/10.1109/iccons.2017.8250619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wilson, Francis A., John N. Wilson, and Anne M. Smith. "Computer-based systems." In the 1993 conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/158011.158124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cozien, Roger F. "From war to computer war: military forces, computer intelligence, and computer assault." In Intelligent Systems and Advanced Manufacturing, edited by Angappa Gunasekaran and Yahaya Y. Yusuf. SPIE, 2001. http://dx.doi.org/10.1117/12.443141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karpova, Vera, and Leonid Karpov. "V.A. Melnikov - The Architect of Soviet Computers and Computer Systems." In 2014 Third International Conference on Computer Technology in Russia and in the Former Soviet Union (SoRuCom). IEEE, 2014. http://dx.doi.org/10.1109/sorucom.2014.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tadeusiewicz, R. "Computers in psychology and psychology in computer science." In 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM). IEEE, 2010. http://dx.doi.org/10.1109/cisim.2010.5643696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Leveson, Nancy G. "System Safety in Computer-Controlled Automotive Systems." In SAE 2000 World Congress. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2000. http://dx.doi.org/10.4271/2000-01-1048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shoemaker, Richard L. "Multimicroprocessor computer systems in optics." In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1986. http://dx.doi.org/10.1364/oam.1986.fm3.

Full text
Abstract:
The commercial availability of powerful 32-bit microprocessors provides an unprecedented opportunity for researchers to construct inexpensive but very powerful multiprocessor computer systems that are optimally designed for specific computational tasks. However, to obtain good performance from such systems it is essential that both the processor interconnection architecture and the system software be appropriate for the problem. Two multiprocessor system designs being developed at the Optical Sciences Center illustrate the potential of such systems. The first is an image- data-driven dynamically reconfigurable multiprocessor using thirty Motorola 68000 microprocessors interconnected by multiple global data buses. This system is fully operational and is being used to develop machine vision systems capable of very high speed biomedical image acquisition and image understanding. The second system is still in the design phase and will be used for image reconstruction using simulated annealing. It consists of an array of sixty-four Inmos Transputers with fourway or six-way nearest-neighbor interconnections.
APA, Harvard, Vancouver, ISO, and other styles
10

Mykolenko, D. A., and Yu B. Tomashevskiy. "System approach in organization of power supply of computer and computer systems." In 2012 International Conference on Actual Problems of Electron Devices Engineering (APEDE). IEEE, 2012. http://dx.doi.org/10.1109/apede.2012.6478082.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer systems"

1

Abbott, Russell, and Scott Cannon. Adaptive Computer Systems. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada436050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

SECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Systems Management. Fort Belvoir, VA: Defense Technical Information Center, February 2001. http://dx.doi.org/10.21236/ada405169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forrest, Stephanie. Automated Diversity in Computer Systems. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada439916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Haley, Cornelius J., Steven M. LaFountain, Holly M. Traxler, Dixie B. Baker, and R. Brown. Gould, Inc. Computer Systems Division. Fort Belvoir, VA: Defense Technical Information Center, December 1986. http://dx.doi.org/10.21236/ada208006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Steinauer, Dennis D. Security of personal computer systems. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.sp.500-120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hoting, S. K., and R. J. Costello. Computer Systems Division Software System Metrics Approach, Revision 1. Fort Belvoir, VA: Defense Technical Information Center, September 1996. http://dx.doi.org/10.21236/ada328410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vo, C. V. Computer systems and software description for gas characterization system. Office of Scientific and Technical Information (OSTI), April 1997. http://dx.doi.org/10.2172/16922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Payne, Jerome F. Recapitalization of Tactical Computer Automation Systems. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Satran, J., K. Meth, C. Sapuntzakis, M. Chadalapaka, and E. Zeidner. Internet Small Computer Systems Interface (iSCSI). RFC Editor, April 2004. http://dx.doi.org/10.17487/rfc3720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Andriole, S. Computer-Aided Systems Engineering. Version 01.00.00. Fort Belvoir, VA: Defense Technical Information Center, June 1994. http://dx.doi.org/10.21236/ada283230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography