Academic literature on the topic 'Operating system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Operating system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Operating system"

1

Kabiraj, Sumanta, Anjli Gupta, and Prof Subhashis Kumar Chandra. "Operating System a Case Study." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 166–75. http://dx.doi.org/10.31142/ijtsrd10780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raghuvanshi, Durgesh. "Memory Management in Operating System." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (August 31, 2018): 2346–47. http://dx.doi.org/10.31142/ijtsrd18342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bielik, Valerii, Yuriy Morozov, and Mykola Morozov. "Sensors in Cyber-Physical Systems Based on Android Operating System." Advances in Cyber-Physical Systems 6, no. 2 (December 17, 2021): 83–89. http://dx.doi.org/10.23939/acps2021.02.083.

Full text
Abstract:
The cyber-physical systems take the major part of any system that help users to interact with environment processes. Cyber-physical systems are intelligent systems, which include networks of physical and computing components that interact on internal level. The basis for the development of various models of cyber-physical systems are the using of measuring instruments and their software. Measuring instruments are necessary to control technological parameters processes and the environment. The purpose was to investigate the features of interaction with sensors, to identify the most useful of them in use, to classify types and describe their capabilities for future use in developing of cyber-physical systems. The relevance of the choice of this topic is that mobile and cyber-physical systems occupy a significant place in modern life. The systems that help the user to simplify daily tasks are of maximum benefit. These tasks can be attributed to the tasks of the environment as they exist and are performed in it. Especially cyber-physical systems that interact with the environment have the ability to solve such problems. Sensors act as a tool of interaction, the so-called bridge between the environment and the program. Sensors collect and provide information for further processing and use in solving problems.
APA, Harvard, Vancouver, ISO, and other styles
4

Suri, Rajiv, and Kevin Otto. "Manufacturing System Robustness Through Integrated Modeling." Journal of Mechanical Design 123, no. 4 (August 1, 1999): 630–36. http://dx.doi.org/10.1115/1.1402129.

Full text
Abstract:
Robust design techniques are often applied to the design of manufacturing processes to determine the most robust operating points for a production system. However, such efforts have traditionally been focused on treating the output of each manufacturing operation in isolation. This approach ignores the fact that the sensitivity of each operation to input variation is a function of the operating point, which can only be changed in conjunction with the operating points of all other operations in that system. As such, applying robust design to each operation within a system individually does not guarantee lowest end-of-line variation. This is contrary to commonly held beliefs. What is needed instead is a method for conducting a system-wide parameter design where the operating points of each operation are optimized as a complete set to reduce final product variation. The logistics of such an integrated parameter design scheme become difficult or impossible on processes that may occur in different geographical locations. In this paper we outline the use of mathematical models to conduct system-wide parameter design. We demonstrate this technique on a model of a sheet stretch-forming manufacturing system. Through this example, we show that selecting operating points while considering the entire system results in a greater reduction in variation than Taguchi-style robust design conducted independently on each of the operations within the system.
APA, Harvard, Vancouver, ISO, and other styles
5

Pareek, Apoorva. "Operating System." Review of Professional Management- A Journal of New Delhi Institute of Management 2, no. 1 (June 1, 2004): 72. http://dx.doi.org/10.20968/rpm/2004/v2/i1/101096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pachouri, Anshul, Mohit Sharma, Tribhuwan Tewari, and Prashant Kaushik. "Green Operating System: Future Low Power Operating System." International Journal of Computer Applications 1, no. 21 (February 25, 2010): 82–85. http://dx.doi.org/10.5120/48-644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Göhringer, Diana, Michael Hübner, Etienne Nguepi Zeutebouo, and Jürgen Becker. "Operating System for Runtime Reconfigurable Multiprocessor Systems." International Journal of Reconfigurable Computing 2011 (2011): 1–16. http://dx.doi.org/10.1155/2011/121353.

Full text
Abstract:
Operating systems traditionally handle the task scheduling of one or more application instances on processor-like hardware architectures. RAMPSoC, a novel runtime adaptive multiprocessor System-on-Chip, exploits the dynamic reconfiguration on FPGAs to generate, start and terminate hardware and software tasks. The hardware tasks have to be transferred to the reconfigurable hardware via a configuration access port. The software tasks can be loaded into the local memory of the respective IP core either via the configuration access port or via the on-chip communication infrastructure (e.g. a Network-on-Chip). Recent-series of Xilinx FPGAs, such as Virtex-5, provide two Internal Configuration Access Ports, which cannot be accessed simultaneously. To prevent conflicts, the access to these ports as well as the hardware resource management needs to be controlled, e.g. by a special-purpose operating system running on an embedded processor. For that purpose and to handle the relations between temporally and spatially scheduled operations, the novel approach of an operating system is of high importance. This special purpose operating system, called CAP-OS (Configuration Access Port-Operating System), which will be presented in this paper, supports the clients using the configuration port with the services of priority-based access scheduling, hardware task mapping and resource management.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Ming Xin. "Research on Operating System Security Technology." Applied Mechanics and Materials 703 (December 2014): 294–97. http://dx.doi.org/10.4028/www.scientific.net/amm.703.294.

Full text
Abstract:
This paper study three mainstream operating system,their kernel module on-demand loading mechanism, their safety and reliability measures, points out the weaknesses these operating systems have in the kernel module security control. Along with the study of two new operating system -- dynamic extensible operating system and virtual address space based on file operation system, make a prospects on the operating system architecture development
APA, Harvard, Vancouver, ISO, and other styles
9

Beckman, Pete, Kamil Iskra, Kazutomo Yoshii, and Susan Coghlan. "Operating system issues for petascale systems." ACM SIGOPS Operating Systems Review 40, no. 2 (April 2006): 29–33. http://dx.doi.org/10.1145/1131322.1131332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Plagemann, T., V. Goebel, P. Halvorsen, and O. Anshus. "Operating system support for multimedia systems." Computer Communications 23, no. 3 (February 2000): 267–89. http://dx.doi.org/10.1016/s0140-3664(99)00180-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Operating system"

1

Дядечко, Алла Миколаївна, Алла Николаевна Дядечко, Alla Mykolaivna Diadechko, and A. Skrynnyk. "Android operating system." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/13457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arwin, Emil. "THz Spectrophotometer Operating System." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-95336.

Full text
Abstract:
The Complex Materials Optics Network comprises active research groups within the University of Nebraska-Lincoln. Their main focus is optical materials preparation, characterization, and instrumentation development. The purpose of the project is to develop a computer interface for a Terahertz-source and detector. The interface should consist of a manual and a remote Transmission Control Protocol/Internet Protocol (TCP/IP) control of the hardware and must display the status of the source and the detector. It must also allow direct changes of the source and detector parameters. The program used for programming the interface is LabVIEW and the work plan was split into experiment design, command set, interface design, graphical user interface design and a test. A computer interface for the Terahertz-source and detector was designed and tested with approved results.
APA, Harvard, Vancouver, ISO, and other styles
3

Pinnix, Justin Everett. "Operating System Kernel for All Real Time Systems." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010310-181302.

Full text
Abstract:

PINNIX, JUSTIN EVERETT. Operating System Kernel for All Real Time Systems.(Under the direction of Robert J. Fornaro and Vicki E. Jones.)

This document describes the requirements, design, and implementation of OSKAR, ahard real time operating system for Intel Pentium compatible personal computers.OSKAR provides rate monotonic scheduling, fixed and dynamic priority scheduling,semaphores, message passing, priority ceiling protocols, TCP/IP networking, and globaltime synchronization using the Global Positioning System (GPS). It is intended toprovide researchers a test bed for real time projects that is inexpensive, simple tounderstand, and easy to extend.

The design of the system is described with special emphasis on design tradeoffs made toimprove real time requirements compliance. The implementation is covered in detail atthe source code level. Experiments to qualify functionality and obtain performanceprofiles are included and the results explained.

APA, Harvard, Vancouver, ISO, and other styles
4

Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Snowdon, David Computer Science &amp Engineering Faculty of Engineering UNSW. "Operating system directed power management." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44747.

Full text
Abstract:
Energy is a critical resource in all types of computing systems from servers, where energy costs dominate data centre expenses and carbon footprints, to embedded systems, where the system's battery life limits the device's functionality. In their efforts to reduce the energy use of these system's hardware manufacturers have implemented features which allow a reduced energy consumption under software control. This thesis shows that managing these settings is a more complex problem than previously considered. Where much (but not all) of the previous academic research investigates unrealistic scenarios, this thesis presents a solution to managing the power on varying hardware. Instead of making unrealistic assumptions, we extract a model from empirical data and characterise that model. Our models estimate the effect of different power management settings on the behaviour of the hardware platform, taking into account the workload, platform and environmental characteristics, but without any kind of a-priori knowledge of the specific workloads being run. These models encapsulate a system's knowledge of the platform. We also developed a \emph{generalised energy-delay} policy which allows us to quickly express the instantaneous importance of both performance and energy to the system. It allows us to select a power management strategy from a number of options. This thesis shows, by evaluation on a number of platforms, that our implementation, Koala, can accurately meet energy and performance goals. In some cases, our system saves 26\% of the system-level energy required for a task, while losing only 1\% performance. This is nearly 46\% of the dynamic energy. Taking advantage of all energy-saving opportunities requires detailed platform, workload and environmental information. Given this knowledge, we reach the exciting conclusion that near optimal power management is possible on real operating systems, with real platforms and real workloads.
APA, Harvard, Vancouver, ISO, and other styles
6

Engler, Dawson R. "The exokernel operating system architecture." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/16713.

Full text
Abstract:
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Includes bibliographical references (p. 115-120).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
On traditional operating systems only trusted software such as privileged servers or the kernel can manage resources. This thesis proposes a new approach, the exokernel architecture, which makes resource management unprivileged but safe by separating management from protection: an exokernel protects resources, while untrusted application-level software manages them. As a result, in an exokernel system, untrusted software (e.g., library operating systems) can implement abstractions such as virtual memory, file systems, and networking. Themain thrusts of this thesis are: (1) how to build an exokernel system; (2) whether it is possible to build a real one; and (3) whether doing so is a good idea. Our results, drawn from two exokernel systems [25, 48], show that the approach yields dramatic benefits. For example, Xok, an exokernel, runs a web server an order of magnitude faster than the closest equivalent on the same hardware, common unaltered Unix applications up to three times faster, and improves global system performance up to a factor of five. The thesis also discusses some of the new techniques we have used to remove the overhead of protection. Themost unusual technique, untrusted deterministic functions, enables an exokernel to verify that applications correctly track the resources they own, eliminating the need for it to do so. Additionally, the thesis reflects on the subtle issues in using downloaded code for extensibility and the sometimes painful lessons learned in building three exokernel-based systems.
by Dawson R. Engler.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
7

Gurevich, Yevgeny. "The M-Machine operating system." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/37041.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1995.
Includes bibliographical references (leaves 117-118).
by Yevgeny Gurevich.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
8

Roker, I. G. R. J. "A real-time operating system." Thesis, University of Bath, 1986. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.375638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oakes, David R. "Microsoft operating systems development and strategy : an assessment of the Windows 2000 Server operating system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369436.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Scientific and Technical Intelligence)) Naval Postgraduate School, September 1999.
Thesis advisor(s): Douglas E. Brinkley. Includes bibliographical references (p. 151-153). Also Available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Ke. "Real-time operating system modelling and simulation using systemC." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1088/.

Full text
Abstract:
Increasing system complexity and stringent time-to-market pressure bring challenges to the design productivity of real-time embedded systems. Various System-Level Design (SLD), System-Level Design Languages (SLDL) and Transaction-Level Modelling (TLM) approaches have been proposed as enabling tools for real-time embedded system specification, simulation, implementation and verification. SLDL-based Real-Time Operating System (RTOS) modelling and simulation are key methods to understand dynamic scheduling and timing issues in real-time software behavioural simulation during SLD. However, current SLDL-based RTOS simulation approaches do not support real-time software simulation adequately in terms of both functionality and accuracy, e.g., simplistic RTOS functionality or annotation-dependent software time advance. This thesis is concerned with SystemC-based behavioural modelling and simulation of real-time embedded software, focusing upon RTOSs. The RTOS-centric simulation approach can support flexible, fast and accurate real-time software timing and functional simulation. They can help software designers to undertake real-time software prototyping at early design phases. The contributions in this thesis are fourfold. Firstly, we propose a mixed timing real-time software modelling and simulation approach with various timing related techniques, which are suitable for early software modelling and simulation. We show that this approach not only avoids the accuracy drawback in some existing methods but also maintains a high simulation performance. Secondly, we propose a Live CPU Model to assist software behavioural timing modelling and simulation. It supports interruptible and accurate software timing simulation in SystemC and extends modelling capability of the mixed timing approach for HW/SW interactions. Thirdly, we propose a RTOS-centric real-time embedded software simulation model. It provides a systematic approach for building modular software (including both application tasks and RTOS) simulation models in SystemC. It flexibly supports mixed timing application task models. The functions and timing overheads of the RTOS model are carefully designed and considered. We show that the RTOS-centric model is both convenient and accurate for real-time software simulation. Fourthly, we integrate TLM communication interfaces in the software models, which extend the proposed RTOS-centric software simulation model for SW/HW inter-module TLM communication modelling. As a whole, this thesis focuses on RTOS and real-time software modelling and simulation in the context of SystemC-based SLD and provides guidance to software developers about how to utilise this approach in their real-time software development. The various aspects of research work in this thesis constitute an integrated software Processing Element (PE) model, interoperable with existing TLM hardware and communication modelling.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Operating system"

1

Andújar, Daniel G. Operating system. Madrid]: Museo Nacional Centro de Arte Reina Sofía, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Comer, Douglas. Operating system design. Englewood Cliffs, N.J: Prentice Hall, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Comer, Douglas. Operating system design. Englewood Cliffs, N.J: Prentice Hall, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

B, Galvin Peter, and Gagne Greg, eds. Operating system concepts. 7th ed. Hoboken, NJ: J. Wiley & Sons, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nofrontiere, ed. Nofrontiere operating system. Vienna: Nofrontiere Design, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jaeger, Trent. Operating System Security. Cham: Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Yukun, Yong Yue, and Liwei Guo. UNIX Operating System. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20432-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Silberschatz, Abraham. Operating system concepts. 8th ed. Hoboken, NJ: J. Wiley & Sons, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

B, Galvin Peter, and Gagne Greg, eds. Operating system principles. 7th ed. Hoboken, NJ: J. Wiley & Sons, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Silberschatz, Abraham. Operating system concepts. 6th ed. [Hoboken, NJ]: Wiley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Operating system"

1

Romá, Llorenç, and Bernard Tellenbach. "Secure Operating System." In Trends in Data Protection and Encryption Technologies, 115–20. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_21.

Full text
Abstract:
AbstractThe operating system is the backbone of every modern computer system, managing the system’s resources and executing applications. Therefore, it is essential to improve operating system security to ensure data integrity, confidentiality, and availability. When discussing secure operating systems, we generally refer to security-focused operating systems and security-evaluated operating systems. In critical environments, such as governments and military systems, that typically have higher security restrictions, security-evaluated operating systems are a convenient option used in other countries, ensuring those systems fulfill a set of security requirements. In addition, a trend toward more hardware security components, especially for separating cryptographic functions and implementing critical operations, has emerged. Although using secure operating systems is not a definitive solution to protect against all the dangers of current cyberspace, it is clear that it can reduce the impact of individual vulnerable applications or modules being exploited on the whole system.
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "operating system." In Computer Science and Communications Dictionary, 1150. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Crutcher, Paul D., Neeraj Kumar Singh, and Peter Tiegs. "Operating System." In Essential Computer Science, 81–131. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Węgrzyn, Stefan, Jean-Charles Gille, and Pierre Vidal. "Developmental Systems with Operating System." In Developmental System, 91–120. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4612-3438-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Theaker, Colin J., and Graham R. Brookes. "Operating System Performance." In Concepts of Operating Systems, 196–202. London: Macmillan Education UK, 1993. http://dx.doi.org/10.1007/978-1-349-11511-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sadek, R. I. M. "Operating System Routines." In The Complete Disc Manual for the BBC Microcomputer, 106–27. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-08590-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Burkow, Tatjana, and Sape Mullender. "Operating System Support." In Multimedia Databases in Perspective, 249–87. London: Springer London, 1997. http://dx.doi.org/10.1007/978-1-4471-0957-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brennan, Glenn. "Operating System Internals." In Using and Administering an Apollo Network, 244–63. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-10308-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Halvorsen, Ole Henry, and Douglas Clarke. "Operating System Fundamentals." In OS X and iOS Kernel Programming, 1–13. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3537-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wootton, Cliff. "Operating System Internals." In Samsung ARTIK Reference, 45–55. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2322-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Operating system"

1

Kell, Stephen. "The operating system." In the Seventh Workshop. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2525528.2525534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burns, G. D., A. K. Pfiffer, D. L. Fielding, and A. A. Brown. "Trillium operating system." In the third conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/62297.62338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shan, Yizhou, Sumukh Hallymysore, Yutong Huang, Yilun Chen, and Yiying Zhang. "Disaggregated operating system." In SoCC '17: ACM Symposium on Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3127479.3131617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Laadan, Oren, and Jason Nieh. "Operating system virtualization." In the 3rd Annual Haifa Experimental Systems Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1815695.1815717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Penna, Pedro Henrique de Mello Morado, Marcio Bastos Castro, Henrique Cota de Freitas, Jean-Francois Mehaut, and Joao Caram. "Using the Nanvix Operating System in Undergraduate Operating System Courses." In 2017 VII Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2017. http://dx.doi.org/10.1109/sbesc.2017.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ferrow, Michael. "An Operating Management System to Deliver Safe Operations." In SPE Offshore Europe Oil and Gas Conference and Exhibition. Society of Petroleum Engineers, 2011. http://dx.doi.org/10.2118/146018-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jefferson, D., B. Beckman, F. Wieland, L. Blume, and M. Diloreto. "Time warp operating system." In the eleventh ACM Symposium. New York, New York, USA: ACM Press, 1987. http://dx.doi.org/10.1145/41457.37508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Krumme, D. W. "The SIMPLEX operating system." In the third conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/62297.62340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sayers, Jerry. "A small operating system." In the 1990 ACM SIGSMALL/PC symposium. New York, New York, USA: ACM Press, 1990. http://dx.doi.org/10.1145/99412.99447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cittolin, Sergio, Fabio Riccardi, and Sandro Vascotto. "ADVANCED OPERATING SYSTEM TECHNOLOGIES." In Proceedings of the International Conference. WORLD SCIENTIFIC, 1996. http://dx.doi.org/10.1142/9789814447188_0092.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Operating system"

1

Knott, M., M. Kraimer, and F. Lenkszus. APS control system operating system choice. Office of Scientific and Technical Information (OSTI), May 1990. http://dx.doi.org/10.2172/378892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hollingworth, Dennis, Timothy Redmond, and Robert Rice. Extensible Operating System Security. Fort Belvoir, VA: Defense Technical Information Center, September 2002. http://dx.doi.org/10.21236/ada408087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mansbach, Peter. GRAMPS multiprocessor operating system. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.89-4190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Manbach, Peter, and Michael Shneier. The GRAMPS operating system :. Gaithersburg, MD: National Bureau of Standards, 1988. http://dx.doi.org/10.6028/nbs.ir.88-3776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Andrews, Gregory R., and Richard D. Schlichting. The Saguaro Distributed Operating System. Fort Belvoir, VA: Defense Technical Information Center, May 1989. http://dx.doi.org/10.21236/ada215083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Green, J. W. Soil washwater treatment system operating procedure. Office of Scientific and Technical Information (OSTI), November 1993. http://dx.doi.org/10.2172/10109436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mercer, Clifford W., Jim Zelenka, and Ragunathan Rajkumar. On Predictable Operating System Protocol Processing. Fort Belvoir, VA: Defense Technical Information Center, May 1994. http://dx.doi.org/10.21236/ada282657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bershad, Brian N., and Henry M. Levy. Operating System Services for Networked Clusters. Fort Belvoir, VA: Defense Technical Information Center, June 2003. http://dx.doi.org/10.21236/ada417680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schneider, Fred. Nexus Operating System for Trustworthy Computing. Fort Belvoir, VA: Defense Technical Information Center, November 2009. http://dx.doi.org/10.21236/ada510872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stolarski, David J., Gary D. Noojin, and Clarence P. Cain. Operating Manual for Ultrashort Pulse Laser System-II (1060 nm Operation). Fort Belvoir, VA: Defense Technical Information Center, December 1997. http://dx.doi.org/10.21236/ada333217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography