To see the other types of publications on this topic, follow the link: Computer systems-Architecture.

Dissertations / Theses on the topic 'Computer systems-Architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer systems-Architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Umeh, Njideka Adaku. "Security architecture methodology for large net-centric systems." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
APA, Harvard, Vancouver, ISO, and other styles
2

Cockton, Gilbert. "Architecture and abstraction in interactive systems." Thesis, Heriot-Watt University, 1992. http://hdl.handle.net/10399/1460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Almeida, Jose Carlos Alves de. "Software architecture for distributed real-time embedded systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA355809.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1998.
"September 1998." Thesis advisor(s): Man-Tak Shing, Michael Holden. Includes bibliographical references (p. 121-123). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Azar, Iyad Bahgat. "A vision architecture for integrated manufacturing systems." Thesis, Loughborough University, 1989. https://dspace.lboro.ac.uk/2134/27051.

Full text
Abstract:
This thesis introduces a conceptual multi-layered reference model to deal with representing information in a visual scene and to relate this data to similar data structures used within manufacturing processes. In this model, information is processed by a set of algorithms organised within layers of hierarchy. The bottom layer deals directly with data collected by the sensors and the top-most layer offers an interface to the different related manufacturing processes. The building elements of the model and the functionality of each layer are examined with respect to different potential implementation. Through a study of typical vision problems, the thesis shows how conventional image processing solution can be re-implemented in a compatible way with the reference model with the advantage of making use of standard algorithms and development tools. The thesis also examines the impact of using machine vision, based on layered model with other manufacturing entities, and the resulting consequences on computer-integrated manufacturing strategy.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Mingsheng. "A new architecture of multimedia distributed systems." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=20137.

Full text
Abstract:
This paper proposes a now architecture for distributed multimedia systems, we called it MSZ, which allows users to access multimedia documents in the system. MSZ assumes a system consisting of a not of client machines and a got of server machines. All of these machines are connected through the Internet. A user can ask for a document to be played with the desired quality of service from any server; MSZ is responsible for selecting the beat server that is able to deliver the document to the user most efficiently. The best server satisfies the following properties: (1) It stores the requested document and has the ability to deliver the document to the user (the ability includes its free CPU time and free bandwidth and free memory space). (2) The server is much closer to the user geographically in comparison to other servers in the system, and the related network path has the most available resource, which is more than the service requires. (3) The server has a lighter system load compared to other servers.
MSZ is able to minimize the response time and optimize the service quality as much as possible (the users are rejected only when the requested document is unavailable in all servers or servers are all loaded at maximum, or the communication network resource is less than the service required). Also MSZ has the self-learn ability. The more it is used, the better it works.
The system has the ability to detect any degradation in service and to automatically recover during the presentation of the document. A server's failure doesn't affect the whole system and it is very easy for the system to add and remove a server. Generally, MSZ offers a better service to users with less blocking time, less cost and higher quality service.
APA, Harvard, Vancouver, ISO, and other styles
6

Nicolaou, Cosmos Andrea. "A distributed architecture for multimedia communication systems." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kulkarni, Nitin Y. "Application of expert systems in landscape architecture." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43899.

Full text
Abstract:

Application of artificial intelligence (Al) has been a topic of interest among researchers for the past decade or more. Years of research in the commercial application of Al, availability of hardware support for Al application and affordability of software and hardware has generated a lot of interest in this field and brought this technology within the reach of micro-computer based users. The commercial impact of AI is due to expert systems (ESs). ES technology is a collection of methods and techniques for constructing human-machine systems with specialized problem solving expertise.

This project explores the application of ESs in landscape architecture by developing a prototype ES and testing implications of its use with designers while working on a hypothetical problem in a studio environment. The development process helps identify the typical difficulties of such an application, to uncover technical problems, and to identify areas needing further research.

The project aims at building an ES that provides very limited preliminary data and design guidelines to initialize the design process and keeps track of the most fundamental issues necessary for planning, thus acting as an expert and assistant simultaneously. The idea is to explore the possibility of applying ESs to facilitate the design process so that designers may concentrate on other important aspects of design which include intuitive judgement about qualitative aspects.


Master of Landscape Architecture
APA, Harvard, Vancouver, ISO, and other styles
8

Shepherd, Simon John. "A distributed security architecture for large scale systems." Thesis, University of Plymouth, 1992. http://hdl.handle.net/10026.1/2143.

Full text
Abstract:
This thesis describes the research leading from the conception, through development, to the practical implementation of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open Systems Interconnection (OSI) model. The Comprehensive Security System (CSS) is arranged basically as an Application Layer service but can allow any of the ISO recommended security facilities to be provided at any layer of the model. It is suitable as an 'add-on' service to existing arrangements or can be fully integrated into new applications. For large scale, distributed processing operations, a network of security management centres (SMCs) is suggested, that can help to ensure that system misuse is minimised, and that flexible operation is provided in an efficient manner. The background to the OSI standards are covered in detail, followed by an introduction to security in open systems. A survey of existing techniques in formal analysis and verification is then presented. The architecture of the CSS is described in terms of a conceptual model using agents and protocols, followed by an extension of the CSS concept to a large scale network controlled by SMCs. A new approach to formal security analysis is described which is based on two main methodologies. Firstly, every function within the system is built from layers of provably secure sequences of finite state machines, using a recursive function to monitor and constrain the system to the desired state at all times. Secondly, the correctness of the protocols generated by the sequences to exchange security information and control data between agents in a distributed environment, is analysed in terms of a modified temporal Hoare logic. This is based on ideas concerning the validity of beliefs about the global state of a system as a result of actions performed by entities within the system, including the notion of timeliness. The two fundamental problems in number theory upon which the assumptions about the security of the finite state machine model rest are described, together with a comprehensive survey of the very latest progress in this area. Having assumed that the two problems will remain computationally intractable in the foreseeable future, the method is then applied to the formal analysis of some of the components of the Comprehensive Security System. A practical implementation of the CSS has been achieved as a demonstration system for a network of IBM Personal Computers connected via an Ethernet LAN, which fully meets the aims and objectives set out in Chapter 1. This implementation is described, and finally some comments are made on the possible future of research into security aspects of distributed systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Matthews, Stephen W. Miller Kenneth H. "An open architecture for defense virtual environment training systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMatthews.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Rudolph P. Darken, Joseph A. Sullivan. Includes bibliographical references (p. 131-134). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhat, Vidya G. "Domain specific architecture development for enterprise systems based on common object request broker architecture (CORBA)." FIU Digital Commons, 1999. http://digitalcommons.fiu.edu/etd/1673.

Full text
Abstract:
Large business organizations with enterprise wide systems have followed an ad hoc incremental growth pattern. They are either monolithic, that are difficult to replace and maintain, or are components with little or no interoperability between them. Such systems suffer from lack of uniformity and definition in their information technology infrastructure. To migrate from this state, to systems that are extensible, interoperable and non-redundant in functionality it is very important to focus on the architecture. We use the healthcare enterprise system as a case study for the purpose of this thesis. It is indeed difficult, if not impossible to construct the overall architecture of the system without identifying the individual components of the system. Hence we follow an incremental methodology in identifying and developing each component. One such component is Order management, which is an essential component of a healthcare information system that offers enterprise wide functionality.
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Baoyu. "An architecture for domain based distributed systems management." Thesis, Lancaster University, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.277397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Meccawy, Maram. "A service-orientated architecture for adaptive and collaborative e-learning systems." Thesis, University of Nottingham, 2009. http://eprints.nottingham.ac.uk/10684/.

Full text
Abstract:
This research proposes a new architecture for Adaptive Educational Hypermedia Systems (AEHS). Architectures in the context of this thesis refer to the components of the system and their communications and interactions. The architecture addresses the limitations of AEHS regarding interoperability, reusability, openness, flexibility, and limited tools for collaborative and social learning. It presents an integrated adaptive and collaborative Web-based learning environment. The new e-learning environment is implemented as a set of independent Web services within a service-oriented architecture (SOA). Moreover, it uses a modern Learning Management System (LMS) as the delivery service and the user interface for this environment. This is a two-way solution, whereby adaptive learning is introduced via a widely adopted LMS, and the LMS itself is enriched with an external - yet integrated - adaptation layer. To test the relevance of the new architecture, practical experiments were undertaken. The interoperability, reusability and openness test revealed that the user could easily switch between various LMS to access the personalised lessons. In addition, the system was tested by students at the University of Nottingham as a revision guide to a Software Engineering module. This test showed that the system was robust; it automatically handled a large number of students and produced the desired adaptive content. However, regarding the use of the collaborative learning tools, the test showed low levels of such usage.
APA, Harvard, Vancouver, ISO, and other styles
13

Tatapudi, Suryanarayana Bhimeshwara. "A high performance low power mesochronous pipeline architecture for computer systems." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Spring2006/s%5Ftatapudi%5F042706.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Thompson, David. "A holistic approach to computer integrated manufacturing architecture and systems design." Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/2310.

Full text
Abstract:
This work addresses the problem of finding an improved solution to Computer Integrated Manufacturing (ClM) Architecture and Systems Design. The current approaches are shown to be difficult to understand and use, over complex. In spite of their complexity of approach they lack comprehensiveness and omit many factors and dimensions considered essential for success in today's competitive and often global market place. A new approach to ClM Architecture and Systems Design is presented which offers a simpler, more flexible and more robust format for defining a particular ClM System within a general architectural framework. At the same time this new approach is designed to offer a comprehensive and holistic solution. The research work involved the investigation of current approaches and research and development initiatives focusing particularly on the CIM-OSA and GRAI Integrated methodologies in the field of ClM Architecture. The strengths and weaknesses of the various approaches are examined. Developments in other related fields including manufacturing systems, manufacturing management, information technology and systems generally have been investigated regarding their relevance and possible contribution to an improved solution. The author has built on his practical experience in creating, designing and managing the implementation of a global CIM system. The authors work on several publicly funded collaborative research and development projects relevant to the problem area is described. These include CIM-OSA, IMOCIM and TIQS projects. In the latter two projects the author was instrumental in developing the methodological approach based on a systems approach to business processes in connection with the design of quality and manufacturing systems. Both of these projects have contributed to this work. The author has also participated in the global IMS programme as a rapporteur for the European Commission and this helped to provide a global perspective on the problems of manufacturing companies as they attempt to compete in a world wide market place. The results of this work provide the basis for a radically improved approach to ClM Architecture and Systems Design based on the holistic view of an enterprise. The approach developed supports the business process view of an enterprise; addresses the people and organisational aspects; leads to ClM solutions focused on meeting enterprise goals; and is able to deal with a significantly increased scope and complexity compared with existing methods yet is easily understood and more simple to simple to apply than current approaches.
APA, Harvard, Vancouver, ISO, and other styles
15

Rixner, Scott. "Memory system architecture for real-time multitasking systems." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/36599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

McClenaghan, Ashley. "Distributed systems : architecture-driven specification using extended LOTOS." Thesis, University of Stirling, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zhu, Liming Computer Science &amp Engineering Faculty of Engineering UNSW. "Software architecture evaluation for framework-based systems." Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28250.

Full text
Abstract:
Complex modern software is often built using existing application frameworks and middleware frameworks. These frameworks provide useful common services, while simultaneously imposing architectural rules and constraints. Existing software architecture evaluation methods do not explicitly consider the implications of these frameworks for software architecture. This research extends scenario-based architecture evaluation methods by incorporating framework-related information into different evaluation activities. I propose four techniques which target four different activities within a scenario-based architecture evaluation method. 1) Scenario development: A new technique was designed aiming to extract general scenarios and tactics from framework-related architectural patterns. The technique is intended to complement the current scenario development process. The feasibility of the technique was validated through a case study. Significant improvements of scenario quality were observed in a controlled experiment conducted by another colleague. 2) Architecture representation: A new metrics-driven technique was created to reconstruct software architecture in a just-in-time fashion. This technique was validated in a case study. This approach has significantly improved the efficiency of architecture representation in a complex environment. 3) Attribute specific analysis (performance only): A model-driven approach to performance measurement was applied by decoupling framework-specific information from performance testing requirements. This technique was validated on two platforms (J2EE and Web Services) through a number of case studies. This technique leads to the benchmark producing more representative measures of the eventual application. It reduces the complexity behind the load testing suite and framework-specific performance data collecting utilities. 4) Trade-off and sensitivity analysis: A new technique was designed seeking to improve the Analytical Hierarchical Process (AHP) for trade-off and sensitivity analysis during a framework selection process. This approach was validated in a case study using data from a commercial project. The approach can identify 1) trade-offs implied by an architecture alternative, along with the magnitude of these trade-offs. 2) the most critical decisions in the overall decision process 3) the sensitivity of the final decision and its capability for handling quality attribute priority changes.
APA, Harvard, Vancouver, ISO, and other styles
18

Sontag, Ralph. "Learning Technology Systems Architecture - LTSA." Universitätsbibliothek Chemnitz, 2000. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200000613.

Full text
Abstract:
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze und verteilte Systeme (Fakultaet fuer Informatik) der TU Chemnitz. Workshop-Thema: Infrastruktur der ¨Digitalen Universitaet¨ Der Vortrag führt in den in Entwicklung befindlichen Standard IEEE1484 ein. Die Standardisierung im Bereich computer- und netzgestützter Kurse ist Voraussetzung für Datenaustausch und Verbreitung.
APA, Harvard, Vancouver, ISO, and other styles
19

Udupa, Kuppar Ranganath. "Designing a security architecture for distributed systems : an engineering approach." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=83939.

Full text
Abstract:
The dynamic and public nature of a large scale public distributed system introduces challenging security issues that demand new technical approaches. Existing literature has discussed a variety of schemes but fall short of describing an engineering process to design security in such systems. This thesis presents a process model for security system design in large distributed systems that are prone to unpredictable joins and departures, the possibility of malicious behaviors by public nodes and diverse local policies. A case study on designing security architecture for a Public Computing Utility (PCU) is presented which is in tune with the proposed process model. The security architecture for the PCU integrates with a hierarchical trust and incentive management system of the PCU. The trust management system provides a mechanism to build and evaluate trust amongst resources based on individual transactions and community references. Additional features of the security architecture include (a) an authentication mechanism through non forgeable, self-describing certificates; (b) the authorization and access control for resource access; (c) identification and resolution of a majority of threats a PCU is subjected to.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Tianqi. "An architecture to support scalable distributed virtual environment systems on grid." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B31473374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Singh, Neha S. M. Massachusetts Institute of Technology. "A region-based architecture for service-providing distributed systems." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34125.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (leaves 131-136).
A service-providing system consists of hosts that provide services such as data, content, computational and memory resources and data-based services to other entities in the system. Consumers that wish to use services describe their needs with a set of high-level objectives. In this thesis, we address the problem of locating services in a large-scale distributed system using their descriptions, rather than their addresses. We propose a network architecture that is based on the concept of dividing the service-providing hosts into Regions. A Region is a grouping of elements of the network that share a set of common characteristics and policies. Members of a region manage their interactions with other regions and their elements according to some defined rules and policies. Hosts can be divided into regions based on various properties such as their content, their commercial model or their security characteristics to name a few. The service provided by a region is an aggregate of the services provided by all its member hosts. The region-based architecture routes a service request through the network efficiently based on its description and on the advertisements from regions providing services. Division of hosts into a set of independent regions partitions the search space and produces a scalable structure.
(cont.) The architecture also does not impose any rules on the internal organization of regions making the system flexible and dynamic.
by Neha Singh.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
22

He, Qing Ph D. Massachusetts Institute of Technology. "An architecture for low-power voice-command recognition systems." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/105574.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 149-157).
The advancements in fields such as machine-learning have allowed for a growing number of applications seeking to exploit learning methods. Many such applications involve complex algorithms working over high-dimensional features and are implemented in large scale systems where power and other resources are abundant. With emerging interest in embedded applications, nano-scale systems, and mobile devices, which are power and computation constrained, there is a rising need to find simple, low-power solutions for common applications such as voice activation. This thesis develops an ultra-low-power system architecture for voice-command recognition applications. It optimizes system resources by exploiting compact representations of the signal features and extracting them with efficient analog front-ends. The front-end performs feature pre-selection such that only a subset of all available features are chosen and extracted. Two variations of front-end feature extraction design are developed, for the applications of text-dependent speaker-verification and user-independent command recognition, respectively. For speaker-verification, the features are selected with knowledge of the speaker's fundamental frequency and are adapted based on the noise spectrum. The back-end algorithm, supporting adaptive feature selection, is a weighted dynamic time warping algorithm that removes signal misalignments and mitigates speech rate variations while preserving the signal envelope. In the case of user-independent command recognition, a universal set of features are selected without using speaker-specific information. The back-end classifier is enabled by a novel multi-band deep neural network model that processes only the selected features at each decision. In experiments, the proposed systems achieve improved accuracy with noise robustness using significantly less power consumption and computation than existing systems. Components of the front- and back-ends have been implemented in hardware, and the end-to-end system power consumption is kept under a few hundred [mu]Ws.
by Qing He.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
23

Chatterjee, Sandeep 1973. "Composable system resources as an architecture for networked systems." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/26889.

Full text
Abstract:
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 169-173).
(cont.) In this thesis, I describe an architecture for network devices that is based on using pluggable system resource modules that can be composed together to create a close-to-optimal platform for a particular application mix and device. Frequently used applications execute efficiently, while infrequently used applications execute less efficiently. Metrics for calculating efficiencies and selected application domains and mixes are specified by individuals as opposed to one-size-fits- all metrics specified by manufacturers. I show that such a composable system architecture is effective in optimizing system performance with respect to user preferences and application requirements, while the modularity of the architecture introduces little overhead. I also explore opportunities that arise from segmenting devices into UI and computational resource components, and show that an automated design environment can be created that greatly simplifies custom device design, reducing time-to-market and lowering costs.
Network devices promise to provide a variety of user interfaces through which users can interact with network applications. The design of these devices stand in stark contrast to the design of personal computers in which new software content is accommodated by increased processor performance. Network device design, on the other hand, must take into consideration a variety of metrics including interactive performance, power consumption, battery life, transaction security, physical size and weight, and cost. Designing a general-purpose platform that caters to all of these metrics for all applications and devices is impractical. For an application mix, a processor architecture and platform can be designed that is optimized for a selected set of metrics, such as power consumption and battery life. Each of these optimized processor architectures and platforms will no doubt be applicable to a variety of devices. This suggests a modular system architecture for network devices that segments the computational resources from the device UI. Computational resources can be selected for a device UI that are optimized with respect to application mixes as well as to user preferences and metrics. Segmenting out the device UI reduces the complexity of device UIs, simplifying development and lowering costs. At the same time, with little electrical circuitry resident on device UIs, the selected platform can more fully optimize the entire device.
by Sandeep Chatterjee.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
24

Chung, Chanwoo S. M. Massachusetts Institute of Technology. "NOHOST : a new storage architecture for distributed storage systems." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107295.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 53-55).
This thesis introduces a new NAND flash-based storage architecture, NOHOST, for distributed storage systems. A conventional flash-based storage system is composed of a number of high-performance x86 Xeon servers, and each server hosts 10 to 30 solid state drives (SSDs) that use NAND flash memory. This setup not only consumes considerable power due to the nature of Xeon processors, but it also occupies a huge physical space compared to small flash drives. By eliminating costly host servers, the suggested architecture uses NOHOST nodes instead, each of which is a low-power embedded system that forms a cluster of distributed key-value store. This is done by refactoring deep I/O layers in the current design so that refactored layers are light-weight enough to run seamlessly on resource constrained environments. The NOHOST node is a full-fledged storage node, composed of a distributed service frontend, key-value store engine, device driver, hardware flash translation layer, flash controller and NAND flash chips. To prove the concept of this idea, a prototype of two NOHOST nodes has been implemented on Xilinx Zynq ZC706 boards and custom flash boards in this work. NOHOST is expected to use half the power and one-third the physical space as compared to a Xeon-based system. NOHOST is expected to support the through of 2.8 GB/s which is comparable to contemporary storage architectures.
by Chanwoo Chung.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
25

Uzuncaova, Engin. "A generic software architecture for deception-based intrusion detection and response systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FUzuncaova.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science and M.S. in Software Engineering)--Naval Postgraduate School, March 2003.
Thesis advisor(s): James Bret Michael, Richard Riehle. Includes bibliographical references (p. 63-66). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
26

Mian, Zhibao. "Model transformation for multi-objective architecture optimisation for dependable systems." Thesis, University of Hull, 2014. http://hydra.hull.ac.uk/resources/hull:10519.

Full text
Abstract:
Model-based engineering (MBE) promises a number of advantages for the development of embedded systems. Model-based engineering depends on a common model of the system, which is refined as the system is developed. The use of a common model promises a consistent and systematic analysis of dependability, correctness, timing and performance properties. These benefits are potentially available early and throughout the development life cycle. An important part of model-based engineering is the use of analysis and design languages. The Architecture Analysis and Design Language (AADL) is a new modelling language which is increasingly being used for high dependability embedded systems development. AADL is ideally suited to model-based engineering but the use of new language threatens to isolate existing tools which use different languages. This is a particular problem when these tools provide an important development or analysis function, for example system optimisation. System designers seek an optimal trade-off between high dependability and low cost. For large systems, the design space of alternatives with respect to both dependability and cost is enormous and too large to investigate manually. For this reason automation is required to produce optimal or near optimal designs. There is, however, a lack of analysis techniques and tools that can perform a dependability analysis and optimisation of AADL models. Some analysis tools are available in the literature but they are not able to accept AADL models since they use a different modelling language. A cost effective way of adding system dependability analysis and optimisation to models expressed in AADL is to exploit the capabilities of existing tools. Model transformation is a useful technique to maximise the utility of model-based engineering approaches because it provides a route for the exploitation of mature and tested tools in a new model-based engineering context. By using model transformation techniques, one can automatically translate between AADL models and other models. The advantage of this model transformation approach is that it opens a path by which AADL models may exploit existing non-AADL tools. There is little published work which gives a comprehensive description of a method for transforming AADL models. Although transformations from AADL into other models have been reported only one comprehensive description has been published, a transformation of AADL to petri net models. There is a lack of detailed guidance for the transformation of AADL models. This thesis investigates the transformation of AADL models into the HiP-HOPS modelling language, in order to provide dependability analysis and optimisation. HiP-HOPS is a mature, state of the art, dependability analysis and optimisation tool but it has its own model. A model transformation is defined from the AADL model to the HiP-HOPS model. In addition to the model-to-model transformation, it is necessary to extend the AADL modelling attributes. For cost and dependability optimisation, a new AADL property set is developed for modelling component and system variability. This solves the problem of describing, within an AADL model, the design space of alternative designs. The transformation (with transformation rules written in ATLAS Transformation Language (ATL)) has been implemented as a plug-in for the AADL model development tool OSATE (Open-source AADL Tool Environment). To illustrate the method, the plug-in is used to transform some AADL model case-studies.
APA, Harvard, Vancouver, ISO, and other styles
27

Bani, Ruchi Rastogi Mohanty Saraju. "A new N-way reconfigurable data cache architecture for embedded systems." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Fath, Janet Louise. "An architecture for adaptive computer-assisted instruction programs for complex dynamic systems." Diss., Georgia Institute of Technology, 1987. http://hdl.handle.net/1853/33442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hoaglund, Catharine McIntire. "Design factors for the communication architecture of distributed discrete event simulation systems." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3058.

Full text
Abstract:
The purpose of the thesis was to investigate the influence communication architecture decisions have on the performance of a simulation system with distributed components. In particular, the objective was to assess the relative importance of factors affecting reliability and variability of an external data interface to the performance of the simulation, as compared to factor within the simulation itself.
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Tianqi, and 王天琦. "An architecture to support scalable distributed virtual environment systems on grid." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31473374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bicer, Veli. "Architecture Specification Of Service-oriented Systems Through Semantic Web Technologies." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608692/index.pdf.

Full text
Abstract:
This thesis presents a semantic-based modeling approach for describing Service-Oriented Architectures (SOA). Ontologies are utilized as a major representation mechanism for describing various elements available in the architecture. The methodology proposes an architecture specification mechanism to constuct a unified ontology that enables transition from design concerns to the modeling elements. A multi-level modeling is also achieved by employing Model-Driven Engineering (MDE) techniques to describe various models at different stages of the software architecture. This aims to organize service-oriented models within a number of architecture viewpoints in order to provide an architectural perspective for SOA. The use of ontologies for model specification also allows us to make use of ontology mapping to specify the transformation between different models. Additionally, we present a case study to demonstrate the proposed methodology on a real-world healthcare scenario.
APA, Harvard, Vancouver, ISO, and other styles
32

Lee, Seung Man. "Agent-based simulation of socio-technical systems : software architecture and timing mechanisms." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/24351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Johnsen, Andreas. "Architecture-Based Verification of Software-Intensive Systems." Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-8917.

Full text
Abstract:

Development of software-intensive systems such as embedded systems for telecommunications, avionics and automotives occurs under severe quality, schedule and budget constraints. As the size and complexity of software-intensive systems increase dramatically, the problems originating from the design and specification of the system architecture becomes increasingly significant. Architecture-based development approaches promise to improve the efficiency of software-intensive system development processes by reducing costs and time, while increasing quality. This paradox is partially explained by the fact that the system architecture abstracts away unnecessary details, so that developers can concentrate both on the system as a whole, and on its individual pieces, whether it's the components, the components' interfaces, or connections among components. The use of architecture description languages (ADLs) provides an important basis for verification since it describes how the system should behave, in a high level view and in a form where automated tests can be generated. Analysis and testing based on architecture specifications allow detection of problems and faults early in the development process, even before the implementation phase, thereby reducing a significant amount of costs and time. Furthermore, tests derived from the architecture specification can later be applied to the implementation to see the conformance of the implementation with respect to the specification. This thesis extends the knowledge base in the area of architecture-based verification. In this thesis report, an airplane control system is specified using the Architecture Analysis and Description Language (AADL). This specification will serve as a starting point of a system development process where developed architecture-based verification algorithms are applied.

APA, Harvard, Vancouver, ISO, and other styles
34

Haque, Naoshin. "Advanced data bus architecture using CDMA for highly reliable systems." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41538.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 69-70).
Conventional fault-tolerant architectures require extensive cross-strapping of redundant modules. The purpose of this thesis is to prove the feasibility of the use of code division multiple access (CDMA) to permit shared data bus architecture for fault-tolerant applications. Four families of pseudorandom codes, the Barker, gold, maximal length, and GPS C/A codes, were evaluated for their performances with respect to minimum signal gain under different uncertainties, such as varying voltage and noise levels. For data buses with three devices, the GPS C/A code performed the best. A voting process consisting of two rounds of voting, based on an extension of a solution to the Byzantine general's problem, was used to demonstrate that CDMA could be used successfully to contain a single fault in a data bus with three devices. Finally, extensions of this thesis were considered, such as having a variable number of devices on the advanced data bus system.
by Naoshin Haque.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
35

Alsolaim, Ahmad M. "Dynamically reconfigurable architecture for third generation mobile systems." Ohio : Ohio University, 2002. http://www.ohiolink.edu/etd/view.cgi?ohiou1178733781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Walsh, Daniel S. "A Conceptual Framework & Enterprise Architecture Model To Support Information Systems Technology." NSUWorks, 1992. http://nsuworks.nova.edu/gscis_etd/908.

Full text
Abstract:
The purpose of this dissertation is to present a conceptual framework and enterprise architectural model to support information systems technology. The dissertation first discusses several information technology (IT) problems facing a typical enterprise in today's dynamic business environment, such as ineffective data management, non-integrated and fragmented systems, excessive system delivery times, user dissatisfaction, availability management, connectivity issues, Poor capacity and performance planning, inadequate data storage, ineffective security, and the question of centralization versus decentralization. Next, the rationale for the development of an effective enterprise architecture, together with a description of a new vision, is presented. An extensive literature review which addresses the significant work and findings of subject matter experts (SME) in the IT field are discussed. The dissertation then critiques and evaluates, with the assistance of these experts, fifteen already deployed information systems frameworks and architectures. Next, a view of information engineering (IE) as it relates to the enterprise architecture is addressed, because IE provides many of the foundations for the proposed enterprise architecture. The expanding role of IE has forced strategic systems planners to change the scope, objectives, style, and sources of expertise in planning. The dissertation then builds upon these concepts and proposes an enterprise architecture which provides enterprises with a structure that should allow them to support their visions, missions, objectives and goals. The enterprise architecture permits enterprises, by using open systems, to move computer application systems across different environments and platforms to various work groups and geographic locations within the various enterprises, and makes it possible for them to share processes and information with external business partners. After presenting the environmental impacts and driving forces which influence the enterprise architecture, the dissertation subsequently details each of the building blocks which constitute the enterprise architecture. The dissertation concludes by addressing several of the peripheral considerations which impact the enterprise architecture. Among these are a discussion of: business strategy development and the alignment of an organization's business strategies with information systems strategies ; the importance of perceiving information systems from a strategic perspective; strategic business initiatives; competitive positioning; an assessment of how risk analysis can be used to establish the business case for effective information systems; the development of a transition plan, and how an enterprise migrates from its embedded base of current information systems to a targeted portfolio of systems; a possible interoperability architecture; and closes with concluding comments on the enterprise architecture and its impact on the enterprise. A definition of terms, concepts, acronyms and abbreviations is presented in Appendix A. Appendix B depicts some mappings to assist with functional data modeling. Appendix C presents a taxonomy of emerging technologies which should be considered by enterprises when addressing their technical architecture. Appendix D presents an enterprise architecture example and template.
APA, Harvard, Vancouver, ISO, and other styles
37

Aydin, Galip. "Service oriented architecture for geographic information systems supporting real time data grids." [Bloomington, Ind.] : Indiana University, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3253640.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, Dept. of Computer Science, 2007.
Title from PDF t.p. (viewed Nov. 19, 2008). Source: Dissertation Abstracts International, Volume: 68-02, Section: B, page: 1059. Adviser: Geoffrey C. Fox.
APA, Harvard, Vancouver, ISO, and other styles
38

Mostert, Sias. "A computational architecture for real-time systems." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51562.

Full text
Abstract:
Thesis (PhD)--Stellenbosch University, 2000.
ENGLISH ABSTRACT: The engineering of dependable real-time systems for mission critical applications is a resource intensive and error prone process. Achieving dependability requires a general consensus on the correctness of a system with regard to its intended function. For a consensus to be achieved, the properties of the system must be well understood which, in turn, requires consensus on a rigorously defined computational architecture. There is currently no single agreed upon computational architecture at the application level which can serve as a common denominator for the design and implementation of real-time systems. It is the thesis of this dissertation that a rigorous computational architecture, applicable from design to implementation, enables engineers to better understand software for real-time systems. To substantiate this claim, the real-time data flow architecture RDF with its notation allowing the description of complete systems from design to implementation will be explored. Four distinct research areas for improving the engineering process of real-time systems are dealt with in the dissertation: 1) the development of an architecture for real-time systems being suitable for design and implementation in software and hardware, 2) the consolidation of a number of graphical languages into a graphical notation for functional specification, design and construction of real-time systems, 3) the development of a simple processor architecture for the execution of real-time applications, and 4) and the evaluation of the architecture in the framework of a microsatellite case study. In particular, the following original contributions are made: 1) the firing semantics of data flow systems are expanded to include disjunctive firing semantics in a novel way in addition to the classical conjunctive firing semantics, 2) the inherent real-time data flow property, Le. that a receiving task must be ready to receive the next incoming message when it is sent, is extended to the synchronous data flow model, 3) a notation for describing all properties of real-time systems is defined 'with the real-time data flow language RDF as base language, 4) two hardware processor architectures are introduced that offer one-to-one correspondence between design and implementation and, thus, reduce the semantic gap between design language and program execution, and 5) the class of systems that can be modelled with data flow architectures is shown to include control systems and data flow systems. The language set and processor architecture were applied to certain aspects of the SUNSAT microsatellite project.
AFRIKAANSE OPSOMMING:Die skep van betroubare intydsestelsels vir missie kritiese toepassings is 'n proses wat baie hulpbronne verg en waarin maklik 'n fout gemaak kan word. Om 'n betroubare stelsel te skep vereis 'n konsensus oor die korrektheid van 'n stelsel, wat bereik word wanneer die eienskappe van die stelsel goed verstaan word. Dit vereis op sy beurt weer 'n konsensus oor 'n goed gedefinieerde berekenings argitektuur. Daar is tans geen enkel ooreengekome berekenings argitektuur op die toepassingsvlak wat kan dien as 'n gemeenskaplike voertuig vir die ontwerp en implementering van intydsestelsels nie. Dit is die hipotese van die proefskrif dat 'n berekenings argitektuur met 'n streng basis, wat toegepas kan word vanaf ontwerp tot implementering, ingenieurs in staat sal stel om intydsestelsels beter te kan verstaan. Die hipotese word ondersoek deur die intydse datavloei argitektuur, RDF, te gebruik om 'n stelsel vanaf ontwerp tot implementering te beskryf. Daar is vier spesifieke navorsings areas ter verbetering van die ingenieurswese proses vir intydsestelsels, wat in die proefskrif aangespreek word: 1) die ontwikkelling van 'n argitektuur vir intydsestelsels wat geskik is vir die ontwerp en implementering in programmatuur en apparatuur, 2) . die konsolidering van 'n aantal grafiese tale in 'n grafiese notasie vir die funksionele spesifikasie, ontwerp en implementering van intydsestelsels, 3) die ontwikkelling van 'n eenvoudige verwerker argitektuur vir die uitvoering van intydse toepassings en 4) die evaluering van die argitektuur in die konteks van 'n mikrosatelliet gevallestudie. Die volgende oorspronklike bydraes word gemaak: 1) die sneller voorwaardes vir datavloei stelsels word uitgebrei met 'n disjunktiewe patroon saam met die tradisionele konjunktiewe patroon, 2) die inherente intydse datavloei eienskap, n.l. dat'n taak wat boodskappe ontvang, alle verwerking wat met 'n vorige boodskap gepaard gegaan het moet afhandel, voordat 'n volgende boodskap ontvang word, word uitgebrei na die sinkrone datavloei model, 3) 'n notasie om al die eienskappe van 'n intydsestelsel te beskryf word gedefinieer met RDF as die basis taal, 4) twee apparatuur verwerker argitekture word beskryf wat 'n een-tot-een kartering aanbied tussen die ontwerp en die implementering, en wat gevolglik die semantiese gaping verklein tussen ontwerpstaal en die uitvoeringsargitektuur en 5) die klasse van stelsels wat gemodelleer kan word met RDF sluit beheerstelsels en datavloeistelsels in. Die grafiese notasie en verwerker argitektuur was toegepas op sekere aspekte van die SUNSAT mikrosatelliet projek.
APA, Harvard, Vancouver, ISO, and other styles
39

Zhou, Di. "A model driven architecture based approach for developing multi-agent systems." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2104.

Full text
Abstract:
The research described in this thesis is an attempt to utilize the Model Driven Architecture for semi-automatically developing a prototype Multi-Agent System to support the management of a real container terminal. Agent technology has been increasingly applied in Transport Logistics and seems to be a viable solution to support the container terminal management. Thus, from the user point of view, the focus of this research is to investigate the applicability of Multi-Agent Systems to assist the container terminal's decision makers in improving the container terminal productivity, which is often measured in terms of the productivity of cranes. A prototype Multi-Agent System has been developed to evaluate and compare a set of proposed vehicle dispatching strategies, which are a collection of rules that a vehicle (e.g. straddle carrier) uses to decide the priority of serving the working cranes. Employing an appropriate dispatching strategy may greatly improve the efficiency of vehicle allocation to the working cranes, so as to increase the utilization of cranes which directly enhance the container terminal productivity. In order to investigate the applicability of the Multi-Agent System for supporting the container terminal management, experiments have been conducted in a variety of real-world scenarios. The experiment results have revealed that Multi-Agent Systems are applicable to assist container terminal decision makers in evaluating operating strategies. On the other hand, from the developer point of view, the author investigates how to apply the Model Driven Architecture to agent technologies, providing a partially automated support for the derivation of Multi-Agent System implementation from the agent-oriented design, independently from the target implementation platforms. The Model Driven Architecture approach studied in this research is a model-driven software development process that explicitly separates models at three different levels of abstraction: platform independent models, platform specific models, and implementation models. In contrast to the conventional code-centric software development, the Model Driven Architecture based software development uses models as the primary engineering artifacts. The adopted development approach is to take a high-level abstraction model of a system and transform it into a set of platform specific models, each of which is in turn transformed into the corresponding implementation. Transformations between models are automatically carried out by a set of transformation tools. The experience of using the Model Driven Architecture for the development of the prototype Multi-Agent System has revealed the following benefits: (a) automated transformations between models increase software productivity; (b) separating the high-level specification of the system from the underlying implementation technology improves the portability of the system's high-level abstraction model; (c) strong separation of concerns, guaranteed consistency between models, and automatic generation of source code minimize future software maintenance effort.
APA, Harvard, Vancouver, ISO, and other styles
40

TANTAMANGO, IVO A. "EPICCONFIGURATOR COMPUTER CONFIGURATOR AND CMS PLATFORM." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/728.

Full text
Abstract:
Very often when we are looking to buy new IT equipment in an online store, we face the problem that certain parts of our order are not compatible with others or sometimes one part needs additional components. From another point of view in this process, when an online store owner wants to manage the products available in stock, assign prices, set conditions to make an order, or manage customer information, he or she must often rely on information from different systems, physical files, or other sources. EpicConfigurator simplifies and solves the issues mentioned above. EpicConfigurator makes it easy for User Customers to configure computer products by making the process of product selection more straightforward. It can actively gather customer requirements and map them to a set of products and service options. These capabilities will guide users towards an optimal solution for their needs. EpicConfigurator also allows User Customers to keep track and edit saved product configurations. This system also includes a user administrator perspective that allows Store Owners to act as User Admins helping them to manage and load new products, set configuration rules for products and manage all users. Following open source technologies, EpicConfigurator is an application easy to enhance, expand and integrate with newer technologies. This is a configurator tool and does not provide any purchasing feature. To purchase, the configuration results should be provided to the local reseller or sales representative to get an official quote.
APA, Harvard, Vancouver, ISO, and other styles
41

Johnsen, Andreas. "Architecture-Based Verification of Dependable Embedded Systems." Licentiate thesis, Mälardalens högskola, Innovation och produktrealisering, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18993.

Full text
Abstract:
Quality assurance of dependable embedded systems is becoming increasingly difficult, as developers are required to build more complex systems on tighter budgets. As systems become more complex, system architects must make increasingly complex architecture design decisions. The process of making the architecture design decisions of an intended system is the very first, and the most significant, step of ensuring that the developed system will meet its requirements, including requirements on its ability to tolerate faults. Since the decisions play a key role in the design of a dependable embedded system, they have a comprehensive effect on the development process and the largest impact on the developed system. Any faulty architecture design decision will, consequently, propagate throughout the development process, and is likely to lead to a system not meeting the requirements, an unacceptable level of dependability and costly corrections. Architecture design decisions are in turn critical with respect to quality and dependability of a system, and the cost of the development process. It is therefore crucial to prevent faulty architecture design decisions and, as early as practicable, detect and remove faulty decisions that have not successfully been prevented. The use of Architecture Description Languages (ADLs) helps developers to cope with the increasing complexity by formal and standardized means of communication and understanding. Furthermore, the availability of a formal description enables automated and formal analysis of the architecture design. The contribution of this licentiate thesis is an architecture quality assurance framework for safety-critical, performance-critical and mission-critical embedded systems specified by the Architecture Analysis and Design Language (AADL). The framework is developed through the adaption of formal methods, in particular traditional model checking and model-based testing techniques, to AADL, by defining formal verification criteria for AADL, and a formal AADL-semantics. Model checking of AADL models provides evidence of the completeness, consistency and correctness of the model, and allows for automated avoidance of faulty architecture design decisions, costly corrections and threats to quality and dependability. In addition, the framework can automatically generate test suites from AADL models to test a developed system with respect to the architecture design decisions. A successful test suite execution provides evidence that the architecture design has been implemented correctly. Methods for selective regression verification are included in the framework to cost-efficiently re-verify a modified architecture design, such as after a correction of a faulty design decision.
Kvalitetssäkring av tillförlitliga inbyggda system är en ständigt växande utmaning då utvecklare av sådana system är tvungna att bygga allt mer komplexa system inom allt mer begränsade budgetar. Då komplexiteten av systemen ökar måste systemarkitekter göra allt mera komplicerade beslut om systemens arkitekturdesign. Processen att besluta arkitekturdesignen av ett tilltänkt system är det allra första, och det mest signifikanta, steget att försäkra att det utvecklade systemet kommer uppnå dess krav, inklusive krav på dess möjlighet att tolerera defekter. Då dessa designbeslut dessutom har en nyckelroll i designen av ett tillförlitligt inbyggt system har de en omfattande effekt på utvecklingsprocessen samt den största påverkan på det utvecklade systemet. På grund av detta kommer ett felaktigt beslut om arkitekturdesignen propagera igenom hela utvecklingsprocessen och sannolikt resultera i ett system som inte uppnår kraven, får en oacceptabel tillförlitlighetsnivå, och kostsamma korrigeringar. De är därmed kritiska med hänsyn till kvaliteten och tillförlitligheten av ett inbyggt system, och kostnaden av utvecklingsprocessen. Således är det kritiskt att förhindra felaktiga beslut om arkitekturdesign och, så tidigt som möjligt, detektera och avlägsna felaktiga beslut som inte har lyckats att förhindras. Användningen av språk för arkitekturbeskrivning hjälper utvecklare att hantera den ökande komplexiteten genom standardiserade kommunikationsmedel och förståelsemedel. Dessutom möjliggör en formell beskrivning automatiserad och formell analys av arkitekturdesignen. Bidraget av denna licentiatavhandling är ett formellt kvalitetssäkringsramverk för säkerhetskritiska, prestandakritiska och uppdragskritiska inbyggda system specificerade i arkitekturbeskrivningsspråket ”Architecture Analysis and Design Language” (AADL). Ramverket är utvecklat genom adaptionen av formella metoder, i synnerhet traditionella modellkontrolltekniker och modellbaserad testningstekniker, till AADL, med hjälp av att definiera formella verifikationskriterier för AADL och en formell AADL-semantik. Modellkontroll av AADL-modeller analyserar modellens fullständighet, konsistens och korrekthet och möjliggör automatisk undvikande av felaktiga arkitekturdesignbeslut, kostsamma korrigeringar och hot mot kvalitet och tillförlitlighet. Därutöver kan ramverket automatiskt generera testsviter från AADL-modeller för att testa ett utvecklat system mot den bestämda arkitekturdesignen. En lyckad testsvitexekvering garanterar att arkitekturdesignen är korrekt implementerad. Metoder för selektiv regressionsverifiering är inkluderade i ramverket för att på ett kostnadseffektivt tillvägagångssätt verifiera en, tidigare verifierad, arkitekturdesign som har blivit modifierad, såsom efter en korrigering av ett felaktigt designbeslut.
APA, Harvard, Vancouver, ISO, and other styles
42

Bani, Ruchi Rastogi. "A New N-way Reconfigurable Data Cache Architecture for Embedded Systems." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12079/.

Full text
Abstract:
Performance and power consumption are most important issues while designing embedded systems. Several studies have shown that cache memory consumes about 50% of the total power in these systems. Thus, the architecture of the cache governs both performance and power usage of embedded systems. A new N-way reconfigurable data cache is proposed especially for embedded systems. This thesis explores the issues and design considerations involved in designing a reconfigurable cache. The proposed reconfigurable data cache architecture can be configured as direct-mapped, two-way, or four-way set associative using a mode selector. The module has been designed and simulated in Xilinx ISE 9.1i and ModelSim SE 6.3e using the Verilog hardware description language.
APA, Harvard, Vancouver, ISO, and other styles
43

Ding, Junhua. "A methodology for formally modeling and analyzing software architecture of mobile agent systems." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/2820.

Full text
Abstract:
A methodology for formally modeling and analyzing software architecture of mobile agent systems provides a solid basis to develop high quality mobile agent systems, and the methodology is helpful to study other distributed and concurrent systems as well. However, it is a challenge to provide the methodology because of the agent mobility in mobile agent systems. The methodology was defined from two essential parts of software architecture: a formalism to define the architectural models and an analysis method to formally verify system properties. The formalism is two-layer Predicate/Transition (PrT) nets extended with dynamic channels, and the analysis method is a hierarchical approach to verify models on different levels. The two-layer modeling formalism smoothly transforms physical models of mobile agent systems into their architectural models. Dynamic channels facilitate the synchronous communication between nets, and they naturally capture the dynamic configuration and agent mobility of mobile agent systems. Component properties are verified based on transformed individual components, system properties are checked in a simplified system model, and interaction properties are analyzed on models composing from involved nets. Based on the formalism and analysis method, this researcher formally modeled and analyzed the software architecture of mobile agent systems, and designed an architectural model of a medical information processing system based on mobile agents. The model checking tool SPIN was used to verify properties such as reachability, concurrency and safety of the medical information processing system. From successful modeling and analyzing the software architecture of mobile agent systems, the conclusion is that PrT nets extended with channels are a powerful tool to model mobile agent systems, and the hierarchical analysis method provides a rigorous foundation for the modeling tool. The hierarchical analysis method not only reduces the complexity of the analysis, but also expands the application scope of model checking techniques. The results of formally modeling and analyzing the software architecture of the medical information processing system show that model checking is an effective and an efficient way to verify software architecture. Moreover, this system shows a high level of flexibility, efficiency and low cost of mobile agent technologies.
APA, Harvard, Vancouver, ISO, and other styles
44

Sargur, Sudarshan Lakshminarasimhan. "An Efficient Architecture for Dynamic Profiling of Multicore Systems." Thesis, The University of Arizona, 2015. http://hdl.handle.net/10150/595814.

Full text
Abstract:
Application profiling is an important step in the design and optimization of embedded systems. Accurately identifying and analyzing the execution of frequently executed computational kernels is needed to effectively optimize the system implementation, both at design time and runtime. In a traditional design process, it suffices to perform the profiling and optimization steps offline, during design time. The offline profiling guides the design space exploration, hardware software codesign, or power and performance optimizations. When the system implementation can be finalized at design time, this approach works well. However, dynamic optimization techniques, which adapt and reconfigure the system at runtime, require dynamic profiling with minimum runtime overheads. Existing profiling methods are usually software based and incur significant overheads that may be prohibitive or impractical for profiling embedded systems at runtime. In addition, these profiling methods typically focus on profiling the execution of specific tasks executing on a single processor core, but do not consider accurate and holistic profiling across multiple processor cores. Directly utilizing existing profiling approaches and naively combining isolated profiles from multiple processor cores can lead to significant profile inaccuracies of up to 35%. To address these challenges, a hardware-based dynamic application profiler for non-intrusively and accurately profiling software applications in multicore embedded systems is presented. The profiler provides a detailed execution profile for computational kernels and maintains profile accuracy across multiple processor cores. The hardware-based profiler achieves an average error of less than 0.5% for the percentage execution time of profiled applications while being area efficient.
APA, Harvard, Vancouver, ISO, and other styles
45

Arun, Parakh. "Performance estimation and mapping of applications onto GPUs." Thesis, IIT Delhi, 2017. http://localhost:8080/iit/handle/2074/7059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Robinson, William Hugh. "Modeling and implementation of an integrated pixel processing tile for focal plane systems." Diss., Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04072004-180157/unrestricted/robinson%5Fwilliam%5Fh%5F200312%5Fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hibbert, Kirk R. "A need for systems architecture approach for next generation mine warfare capability." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FHibbert.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): John Osmundson, Martha Jallim Hall. "September 2006." Includes bibliographical references (p. 79-83). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
48

Kim, Hongkyu. "Architectural enhancements for efficient operand transport in multimedia systems." Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-01022007-165414/.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2007.
Allen R. Tannenbaum, Committee Member ; Jeffrey A. Davis, Committee Member ; Hsien-Hsin S. Lee, Committee Member ; Linda M. Wills, Committee Co-Chair ; D. Scott Wills, Committee Chair ; Gabriel H. Loh, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
49

Ishebabi, Harold. "Architecture synthesis for adaptive multiprocessor systems on chip." Phd thesis, Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4131/.

Full text
Abstract:
This thesis presents methods for automated synthesis of flexible chip multiprocessor systems from parallel programs targeted at FPGAs to exploit both task-level parallelism and architecture customization. Automated synthesis is necessitated by the complexity of the design space. A detailed description of the design space is provided in order to determine which parameters should be modeled to facilitate automated synthesis by optimizing a cost function, the emphasis being placed on inclusive modeling of parameters from application, architectural and physical subspaces, as well as their joint coverage in order to avoid pre-constraining the design space. Given a parallel program and a set of an IP library, the automated synthesis problem is to simultaneously (i) select processors (ii) map and schedule tasks to them, and (iii) select one or several networks for inter-task communications such that design constraints and optimization objectives are met. The research objective in this thesis is to find a suitable model for automated synthesis, and to evaluate methods of using the model for architectural optimizations. Our contributions are a holistic approach for the design of such systems, corresponding models to facilitate automated synthesis, evaluation of optimization methods using state of the art integer linear and answer set programming, as well as the development of synthesis heuristics to solve runtime challenges.
Aktuelle Technologien erlauben es komplexe Multiprozessorsysteme auf einem Chip mit Milliarden von Transistoren zu realisieren. Der Entwurf solcher Systeme ist jedoch zeitaufwendig und schwierig. Diese Arbeit befasst sich mit der Frage, wie On-Chip Multiprozessorsysteme ausgehend von parallelen Programmen automatisch synthetisiert werden können. Die Implementierung der Multiprozessorsysteme auf rekonfigurierbaren Chips erlaubt es die gesamte Architektur an die Struktur eines vorliegenden parallelen Programms anzupassen. Auf diese Weise ist es möglich die aktuellen technologischen Unzulänglichkeiten zu umgehen, insbesondere die nicht weitersteigende Taktfrequenzen sowie den langsamen Zugriff auf Datenspeicher. Eine Automatisierung des Entwurfs von Multiprozessorsystemen ist notwendig, da der Entwurfsraum von Multiprozessorsystemen zu groß ist, um vom Menschen überschaut zu werden. In einem ersten Ansatz wurde das Syntheseproblem mittels linearer Gleichungen modelliert, die dann durch lineare Programmierungswerkzeuge gelöst werden können. Ausgehend von diesem Ansatz wurde untersucht, wie die typischerweise langen Rechenzeiten solcher Optimierungsmethoden durch neuere Methode aus dem Gebiet der Erfüllbarkeitsprobleme der Aussagenlogik minimiert werden können. Dabei wurde die Werkzeugskette Potassco verwendet, in der lineare Programme direkt in Logikprogramme übersetzt werden können. Es wurde gezeigt, dass dieser zweite Ansatz die Optimierungszeit um bis zu drei Größenordnungen beschleunigt. Allerdings lassen sich große Syntheseprobleme auf diese weise wegen Speicherbegrenzungen nicht lösen. Ein weiterer Ansatz zur schnellen automatischen Synthese bietet die Verwendung von Heuristiken. Es wurden im Rahmen diese Arbeit drei Heuristiken entwickelt, die die Struktur des vorliegenden Syntheseproblems ausnutzen, um die Optimierungszeit zu minimieren. Diese Heuristiken wurden unter Berücksichtigung theoretischer Ergebnisse entwickelt, deren Ursprung in der mathematische Struktur des Syntheseproblems liegt. Dadurch lassen sich optimale Architekturen in kurzer Zeit ermitteln. Die durch diese Dissertation offen gewordene Forschungsarbeiten sind u. a. die Berücksichtigung der zeitlichen Reihenfolge des Datenaustauschs zwischen parallelen Tasks, die Optimierung des logik-basierten Ansatzes, die Integration von Prozessor- und Netzwerksimulatoren zur funktionalen Verifikation synthetisierter Architekturen, sowie die Entwicklung geeigneter Architekturkomponenten.
APA, Harvard, Vancouver, ISO, and other styles
50

Gentile, Antonio. "Portable multimedia supercomputers : system architecture design and evaluation." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/14726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography