Dissertations / Theses on the topic 'Computer systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Merritt, John W. "Distributed file systems in an authentication system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.
Full textShone, N. "Detecting misbehaviour in a complex system-of-systems environment." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4537/.
Full textPaterson, Colin Alexander. "Computer controlled suspension systems." Thesis, Coventry University, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357047.
Full textHarbison, William Samuel. "Trusting in computer systems." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627286.
Full textThulnoon, A. A. T. "Efficient runtime security system for decentralised distributed systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9043/.
Full textPerucic, Michele. "Performance analysis of computer systems." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33020.
Full textPerformance analysis of computer systems is the process of evaluating the current performance of a system by monitoring and studying its behavior under different loads. It involves a deep understanding of the functioning of the basic components of a system. Performance analysis is typically followed by performance tuning, in which required changes are applied to the system in order to achieve optimum performance.
In this thesis, we discuss the basics of performance analysis. The different resources of a system are described and an overview of performance-monitoring tools for these resources is presented. An application of performance analysis is also included: two new major systems at McGill University are analyzed (the library management system ALEPH and the finance system BANNER).
Styne, Bruce Alan. "Management systems for computer graphics." Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303247.
Full textXiao, Cheng. "Computer simulation of fluid systems." Thesis, University of Oxford, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.386636.
Full textAnderson, Thomas R. "Computer modelling of agroforestry systems." Thesis, University of Edinburgh, 1991. http://hdl.handle.net/1842/13429.
Full textBattisti, Anna. "Computer Simulation of Biological Systems." Doctoral thesis, Università degli studi di Trento, 2012. https://hdl.handle.net/11572/368453.
Full textBattisti, Anna. "Computer Simulation of Biological Systems." Doctoral thesis, University of Trento, 2012. http://eprints-phd.biblio.unitn.it/689/1/Tesi-PhD.pdf.
Full textGregory, Frank Hutson. "A logical analysis of soft systems modelling : implications for information system design and knowledge based system design." Thesis, University of Warwick, 1993. http://wrap.warwick.ac.uk/2888/.
Full textAbdlhamed, M. "Intrusion prediction system for cloud computing and network based systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/8897/.
Full textRedfern, Ian Douglas. "Automatic coset systems." Thesis, University of Warwick, 1993. http://wrap.warwick.ac.uk/56939/.
Full textZhao, G. F. "A real-time messaging system for distributed computer control systems." Thesis, Swansea University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.636733.
Full textAhmad, Farooq. "An expert system for computer-aided design of control systems." Thesis, University of Strathclyde, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357165.
Full textFerguson, John Urquhart. "Mutually reinforcing systems." Thesis, University of Glasgow, 2011. http://theses.gla.ac.uk/2760/.
Full textTosun, Suleyman. "Reliability-centric system design for embedded systems." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2005. http://wwwlib.umi.com/cr/syr/main.
Full textSmith, Barry S. "Integrated inspection system in manufacturing : vision systems /." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-04272010-020147/.
Full textVestlund, Christian. "Threat Analysis on Vehicle Computer Systems." Thesis, Linköping University, Department of Computer and Information Science, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661.
Full textVehicles have been around in our society for over a century, until recently they have been standalone systems. With increased amounts of initiatives to inter-network vehicles to avoid accidents and reduce environmental impact the view of a vehicle as a standalone system needs to be reconsidered. Networking and cooperation between vehicles requires that all systems and the information therein are trustworthy. Faulty or malicious vehicle systems are thus not limited to only affecting a single vehicle but also the entire network. The detection of anomalous behavior in a vehicle computer system is therefore of importance. To improve the vehicle systems we strive to achieve security awareness within the vehicle computer system. As a first step we will identify threats toward the vehicle computer system and what has been done to address them.
We perform a threat analysis consisting of fault trees and misuse cases to identify the threats. The fault trees provide away to connect the threats found with vehicle stakeholders' goals. The connection between stakeholder goals and threat highlights the need for threat mitigation.
Several research initiatives are discussed to find out what has been done to address the identified threats and to find the state of the research for security in vehicle computer system.
Lastly, an error model for the Controller Area Network (CAN) is proposed to model the consequences of threats applied to the CAN bus.
Bouyer, Maouen Abdelkarim. "Computer simulations of alkane-zeolite systems." Doctoral thesis, Universite Libre de Bruxelles, 1998. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/212049.
Full textBlakes, Jonathan. "Infobiotics : computer-aided synthetic systems biology." Thesis, University of Nottingham, 2013. http://eprints.nottingham.ac.uk/13434/.
Full textSoukup, Michael. "Brain-Computer Interface In Control Systems." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for teknisk kybernetikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25749.
Full textAfzal, Tahir Mahmood. "Load sharing in distributed computer systems." Thesis, University of Newcastle Upon Tyne, 1987. http://hdl.handle.net/10443/2066.
Full textColley, B. A. "Computer simulation of marine traffic systems." Thesis, University of Plymouth, 1985. http://hdl.handle.net/10026.1/2223.
Full textGoldthorp, Mark. "Computer simulation of biomass energy systems." Thesis, University of Bristol, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.361083.
Full textWolff, Josephine Charlotte Paulina. "Classes of defense for computer systems." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99535.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 175-181).
Computer security incidents often involve attackers acquiring a complex sequence of escalating capabilities and executing those capabilities across a range of different intermediary actors in order to achieve their ultimate malicious goals. However, popular media accounts of these incidents, as well as the ensuing litigation and policy proposals, tend to focus on a very narrow defensive landscape, primarily individual centralized defenders who control some of the capabilities exploited in the earliest stages of these incidents. This thesis proposes two complementary frameworks for defenses against computer security breaches -- one oriented around restricting the computer-based access capabilities that adversaries use to perpetrate those breaches and another focused on limiting the harm that those adversaries ultimately inflict on their victims. Drawing on case studies of actual security incidents, as well as the past decade of security incident data at MIT, it analyzes security roles and defense design patterns related to these broad classes of defense for application designers, administrators, and policy-makers. Application designers are well poised to undertake access defense by defining and distinguishing malicious and legitimate forms of activity in the context of their respective applications. Policy-makers can implement some harm limitation defenses by monitoring and regulating money flows, and also play an important role in collecting the data needed to expand understanding of the sequence of events that lead up to successful security incidents and inform which actors can and should effectively intervene as defenders. Organizations and administrators, meanwhile, occupy an in-between defensive role that spans both access and harm in addressing digital harms, or harms that are directly inflicted via computer capabilities, through restrictions on crucial intermediate harms and outbound information flows. The comparative case analysis ultimately points to a need to broaden defensive roles and responsibilities beyond centralized access defense and defenders, as well as the visibility challenges compounding externalities for defenders who may lack not only the incentives to intervene in such incidents but also the necessary knowledge to figure out how best to intervene.
by Josephine Wolff.
Ph. D. in Technology, Management and Policy
Jazaa, Abid Thyab. "Computer-aided mangement of ADA systems." Thesis, Keele University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314465.
Full textWu, Zhenyu. "Discovering New Vulnerabilities in Computer Systems." W&M ScholarWorks, 2012. https://scholarworks.wm.edu/etd/1539623356.
Full textGrossman, Michael D. "A computer simulation of processor scheduling in UNIX 4.2BSD /." Online version of thesis, 1987. http://hdl.handle.net/1850/10295.
Full textSobel, Ann E. Kelley. "Modular verification of concurrent systems /." The Ohio State University, 1986. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487267546983528.
Full textPhilippou, Anna. "Reasoning about systems with evolving structure." Thesis, University of Warwick, 1996. http://wrap.warwick.ac.uk/93676/.
Full textFinney, James. "Autocoding methods for networked embedded systems." Thesis, University of Warwick, 2009. http://wrap.warwick.ac.uk/36892/.
Full textJohansson, Oscar, and Max Forsman. "Shared computer systems and groupware development : Escaping the personal computer paradigm." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75953.
Full textPurdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.
Full textLurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Full textPinnix, Justin Everett. "Operating System Kernel for All Real Time Systems." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010310-181302.
Full textPINNIX, JUSTIN EVERETT. Operating System Kernel for All Real Time Systems.(Under the direction of Robert J. Fornaro and Vicki E. Jones.)
This document describes the requirements, design, and implementation of OSKAR, ahard real time operating system for Intel Pentium compatible personal computers.OSKAR provides rate monotonic scheduling, fixed and dynamic priority scheduling,semaphores, message passing, priority ceiling protocols, TCP/IP networking, and globaltime synchronization using the Global Positioning System (GPS). It is intended toprovide researchers a test bed for real time projects that is inexpensive, simple tounderstand, and easy to extend.
The design of the system is described with special emphasis on design tradeoffs made toimprove real time requirements compliance. The implementation is covered in detail atthe source code level. Experiments to qualify functionality and obtain performanceprofiles are included and the results explained.
Lever, K. E. "Identifying and mitigating security risks in multi-level systems-of-systems environments." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/8707/.
Full textThomas, Sam Lloyd. "Backdoor detection systems for embedded devices." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8365/.
Full textForbes, Harold C. "Operating system principles and constructs for dynamic multi-processor real-time control systems." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8165.
Full textArdeshir-Larijani, Ebrahim. "Automated equivalence checking of quantum information systems." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/63940/.
Full textUmeh, Njideka Adaku. "Security architecture methodology for large net-centric systems." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.
Full textVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
Jiang, Junyi. "Optical wireless communication systems." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/387239/.
Full textMayo, Maldonado Jonathan. "Switched linear differential systems." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/383678/.
Full textNofal, Samer. "Algorithms for argument systems." Thesis, University of Liverpool, 2013. http://livrepository.liverpool.ac.uk/12173/.
Full textRogers, David T. "A framework for dynamic subversion." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRogers.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
Van, Riet F. A. "LF : a language for reliable embedded systems." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52322.
Full textENGLISH ABSTRACT: Computer-aided verification techniques, such as model checking, are often considered essential to produce highly reliable software systems. Modern model checkers generally require models to be written in eSP-like notations. Unfortunately, such systems are usually implemented using conventional imperative programming languages. Translating the one paradigm into the other is a difficult and error prone process. If one were to program in a process-oriented language from the outset, the chasm between implementation and model could be bridged more readily. This would lead to more accurate models and ultimately more reliable software. This thesis covers the definition of a process-oriented language targeted specifically towards embedded systems and the implementation of a suitable compiler and run-time system. The language, LF, is for the most part an extension of the language Joyce, which was defined by Brinch Hansen. Both LF and Joyce have features which I believe make them easier to use than other esp based languages such as occam. An example of this is a selective communication primitive which allows for both input and output guards which is not supported in occam. The efficiency of the implementation is important. The language was therefore designed to be expressive, but constructs which are expensive to implement were avoided. Security, however, was the overriding consideration in the design of the language and runtime system. The compiler produces native code. Most other esp derived languages are either interpreted or execute as tasks on host operating systems. Arguably this is because most implementations of esp and derivations thereof are for academic purposes only. LF is intended to be an implementation language. The performance of the implementation is evaluated in terms of practical metries such as the time needed to complete communication operations and the average time needed to service an interrupt.
AFRIKAANSE OPSOMMING: Rekenaar ondersteunde verifikasietegnieke soos programmodellering, is onontbeerlik in die ontwikkeling van hoogs betroubare programmatuur. In die algemeen, aanvaar programme wat modelle toets eSP-agtige notasie as toevoer. Die meeste programme word egter in meer konvensionele imperatiewe programmeertale ontwikkel. Die vertaling vanuit die een paradigma na die ander is 'n moelike proses, wat baie ruimte laat vir foute. Indien daar uit die staanspoor in 'n proses gebaseerde taal geprogrammeer word, sou die verwydering tussen model en program makliker oorbrug kon word. Dit lei tot akkurater modelle en uiteindelik tot betroubaarder programmatuur. Die tesis ondersoek die definisie van 'n proses gebaseerde taal, wat gemik is op ingebedde programmatuur. Verder word die implementasie van 'n toepaslike vertaler en looptyd omgewing ook bespreek. Die taal, LF, is grotendeels gebaseer op Joyce, wat deur Brinch Hansen ontwikkel is. Joyce en op sy beurt LF, is verbeterings op ander esp verwante tale soos occam. 'n Voorbeeld hiervan is 'n selektiewe kommunikasieprimitief wat die gebruik van beide toevoer- en afvoerwagte ondersteun. Omdat 'n effektiewe implementasie nagestreef word, is die taalontwerp om so nadruklik moontlik te wees, sonder om strukture in te sluit wat oneffektief is om te implementeer. Sekuriteit was egter die oorheersende oorweging in die ontwerp van die taal en looptyd omgewing. Die vertaler lewer masjienkode, terwyl die meeste ander implementasies van eSP-agtige tale geinterpreteer word of ondersteun word as prosesse op 'n geskikte bedryfstelsel- die meeste eSP-agtige tale word slegs vir akademiese doeleindes aangewend. LF is by uitstek ontwerp as implementasie taal. Die evaluasie van die stelsel se werkverrigting is gedoen aan die hand van praktiese maatstawwe soos die tyd wat benodig word vir kommunikasie, sowel as die gemiddelde tyd benodig vir die hantering van onderbrekings.
Miles, R. K. "The Soft Systems Methodology : A practicable framework for computer systems analysis." Thesis, Lancaster University, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380317.
Full textFrame, Charles E. "Personal computer and workstation operating systems tutorial." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280132.
Full textThesis advisor(s): Norman F. Schneidewind. "March 1994." Includes bibliographical references. Also available online.
Goh, Han Chong. "Intrusion deception in defense of computer systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FGoh.pdf.
Full text