Dissertations / Theses on the topic 'Operating systems (Computers)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Operating systems (Computers).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Neugebauer, Rolf. "Decentralising resource management in operating systems." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/4118/.
Full textBaumann, Andrew Computer Science & Engineering Faculty of Engineering UNSW. "Dynamic update for operating systems." Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28356.
Full textRogers, David T. "A framework for dynamic subversion." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRogers.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.
Full textRoth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.
Full textGrossman, Michael D. "A computer simulation of processor scheduling in UNIX 4.2BSD /." Online version of thesis, 1987. http://hdl.handle.net/1850/10295.
Full textDodge, Catherine A. "Recommendations for secure initialization routines in operating systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDodge.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109) Also available online.
Forbes, Harold C. "Operating system principles and constructs for dynamic multi-processor real-time control systems." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8165.
Full textGoktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Full textThesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Swift, Michael M. "Improving the reliability of commodity operating systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7019.
Full textGoel, Ashvin. "Operating system support for low-latency streaming /." Full text open access at:, 2003. http://content.ohsu.edu/u?/etd,194.
Full textMurray, Jessica L. "An exfiltration subversion demonstration." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMurray.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 83-92). Also available online.
Purdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.
Full textTennant, Robert Satchwell. "An alternative peripheral executive for the data general AOS/VS operating system." Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1002031.
Full textOkyay, Mehmet Onur Aytaç Sıtkı. "A portable real-time operating system for embedded platforms/." [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000477.doc.
Full textKumano, Shintaro. "Boundary clusters in adaptive neighborhood networks." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/9150.
Full textMesser, Alan. "A market model for controlled resource allocation in distributed operating systems." Thesis, City, University of London, 1999. http://openaccess.city.ac.uk/20134/.
Full textWei, Jinpeng. "Improving operating systems security two case studies /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31849.
Full textCommittee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Blough, Douglas; Committee Member: Giffin, Jonathon; Committee Member: Li, Kang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
McDonald, Ian Lindsay. "Memory management in a distributed system of single address space operating systems supporting quality of service." Thesis, University of Glasgow, 2001. http://theses.gla.ac.uk/5427/.
Full text余永嘉 and Wing-ka Yu. "Execution objects: flexible composition and efficient interaction." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31213868.
Full textYu, Wing-ka. "Execution objects : flexible composition and efficient interaction /." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19671659.
Full textWells, George Clifford. "A study of real-time operating systems for microcomputers." Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1004896.
Full textLeslie, Rebekah. "A Functional Approach to Memory-Safe Operating Systems." PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/499.
Full textDodge, Catherine A. "Recommendations for secure initialization routines in operating systems." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1206.
Full textWhile a necessity of all operating systems, the code that initializes a system can be notoriously difficult to understand. This thesis explores the most common architectures used for bringing an operating system to its initial state, once the operating system gains control from the boot loader. Specifically, the ways in which the OpenBSD and Linux operating systems handle initialization are dissected. With this understanding, a set of threats relevant to the initialization sequence was developed. A thorough study was also made to determine the degree to which initialization code adheres to widely accepted software engineering principles. Based upon this threat analysis and the observed strengths and weaknesses of existing systems, a set of recommendations for initialization sequence architecture and implementation have been developed. These recommendations can serve as a guide for future operating system development.
Civilian, Naval Postgraduate School
Spafford, Eugene Howard. "Kernel structures for a distributed operating system." Diss., Georgia Institute of Technology, 1986. http://hdl.handle.net/1853/9144.
Full textMcLean, Angus L. M. Thom III. "Real-time distributed simulation analysis : an application of temporal database and simulation systems research." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9124.
Full textKou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Bershad, Brian Nathan. "High performance cross-address space communication /." Thesis, Connect to this title online; UW restricted, 1990. http://hdl.handle.net/1773/6939.
Full textSchneck, Phyllis Adele. "Dynamic management of computation and communication resources to enable secure high-performances applications." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/8264.
Full textSeelam, Seetharami R. "Towards dynamic adaptation of I/O scheduling in commodity operating systems." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2006. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textDeBrunner, Linda Sumners. "Multitasking operating systems for real-time applications." Thesis, Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/104318.
Full textVigder, Mark (Mark Ronald) Carleton University Dissertation Engineering Electrical. "Applying formal techniques to the design of concurrent systems." Ottawa, 1992.
Find full textGraunke, Kenneth William. "Extensible Scheduling in a Haskell-based Operating System." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/1.
Full textApte, Manoj Shriganesh. "An operating system architecture and hybrid scheduling methodology for real-time systems with uncertainty." Diss., Mississippi State : Mississippi State University, 2004. http://library.msstate.edu/etd/show.asp?etd=etd-11102004-152431.
Full textYuh, Han-Sheng. "Spider: An overview of an object-oriented distributed computing system." CSUSB ScholarWorks, 1997. https://scholarworks.lib.csusb.edu/etd-project/1417.
Full textWebb, Jason N. "The advanced features of Mac OS X and their benefits to the design community /." Online version of thesis, 2003. http://homepage.mac.com/jasonwebb/thesis/.
Full textRappin, Noel. "A framework for teaching learners to model by focusing complexity of modeling and simulation tools." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/8248.
Full textLoubser, Johannes Jacobus. "Device drivers : a comparison of different development strategies." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51690.
Full textENGLISH ABSTRACT: Users are not supposed to modify an operating system kernel, but it is often necessary to add a device driver for a new peripheral device. Device driver development is a difficult and time-consuming process that must be performed by an expert. Drivers are difficult to debug and a malfunctioning driver could cause the operating system to crash. Ways are therefore needed to make the development of device drivers safer and easier. A number of different device driver development methods are examined in this thesis. An existing micro-kernel that supports in-kernel device drivers as well as extensible device drivers has been modified to support user-level and loadable drivers. These extensions ensured that all the development methods were implemented in the same environment and a comparison could thus be made on a fair basis. A comparison of the different methods with respect to the efficiency of the resulting device driver, as well as the ease of the development process, is presented.
AFRIKAANSE OPSOMMING: Gebruikers is nie veronderstelom aan 'n bedryfstelsel te verander nie, maar tog is dit gereeld nodig om 'n toesteldrywer vir 'n nuwe randapparaat by te voeg. Die ontwikkeling van 'n toesteldrywer is 'n tydrowende en moeilike proses en moet deur 'n kundige aangepak word. Toesteldrywers is moeilik om te ontfout en kan deur verkeerde werking die hele stelsel tot stilstand bring. Daar is dus tegnieke nodig om die ontwikkeling van toestelhanteerders makliker en veiliger te maak. 'n Aantal verskillende ontwikkelingsmetodes vir toesteldrywers word in hierdie tesis ondersoek. 'n Bestaande mikro-kern wat in-kern, sowel as uitbreibare toesteldrywers ondersteun, is aangepas om gebruikersvlak en laaibare toestelhanteerders te ondersteun. Hierdie uitbreiding het verseker dat al die ontwikkelingsmetodes in dieselfde omgewing geïmplementeer is. Dit was dus moontlik om die metodes op 'n regverdige grondslag te vergelyk. Die vergelyking is gedoen ten opsigte van die effektiwiteit van die resulterende toesteldrywer sowel as die moeilikheidsgraad van die ontwikkelingsproses.
Deorukhkar, Mayuresh. "Deadlock probability prediction and detection in distributed systems /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1421130.
Full textSomanathan, Muthuveer. "An initial operating system adaptation heuristic for Swap Cluster Max (SCM)." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textWang, Koping. "Spider II: A component-based distributed computing system." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1874.
Full textVan, Riet F. A. "LF : a language for reliable embedded systems." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52322.
Full textENGLISH ABSTRACT: Computer-aided verification techniques, such as model checking, are often considered essential to produce highly reliable software systems. Modern model checkers generally require models to be written in eSP-like notations. Unfortunately, such systems are usually implemented using conventional imperative programming languages. Translating the one paradigm into the other is a difficult and error prone process. If one were to program in a process-oriented language from the outset, the chasm between implementation and model could be bridged more readily. This would lead to more accurate models and ultimately more reliable software. This thesis covers the definition of a process-oriented language targeted specifically towards embedded systems and the implementation of a suitable compiler and run-time system. The language, LF, is for the most part an extension of the language Joyce, which was defined by Brinch Hansen. Both LF and Joyce have features which I believe make them easier to use than other esp based languages such as occam. An example of this is a selective communication primitive which allows for both input and output guards which is not supported in occam. The efficiency of the implementation is important. The language was therefore designed to be expressive, but constructs which are expensive to implement were avoided. Security, however, was the overriding consideration in the design of the language and runtime system. The compiler produces native code. Most other esp derived languages are either interpreted or execute as tasks on host operating systems. Arguably this is because most implementations of esp and derivations thereof are for academic purposes only. LF is intended to be an implementation language. The performance of the implementation is evaluated in terms of practical metries such as the time needed to complete communication operations and the average time needed to service an interrupt.
AFRIKAANSE OPSOMMING: Rekenaar ondersteunde verifikasietegnieke soos programmodellering, is onontbeerlik in die ontwikkeling van hoogs betroubare programmatuur. In die algemeen, aanvaar programme wat modelle toets eSP-agtige notasie as toevoer. Die meeste programme word egter in meer konvensionele imperatiewe programmeertale ontwikkel. Die vertaling vanuit die een paradigma na die ander is 'n moelike proses, wat baie ruimte laat vir foute. Indien daar uit die staanspoor in 'n proses gebaseerde taal geprogrammeer word, sou die verwydering tussen model en program makliker oorbrug kon word. Dit lei tot akkurater modelle en uiteindelik tot betroubaarder programmatuur. Die tesis ondersoek die definisie van 'n proses gebaseerde taal, wat gemik is op ingebedde programmatuur. Verder word die implementasie van 'n toepaslike vertaler en looptyd omgewing ook bespreek. Die taal, LF, is grotendeels gebaseer op Joyce, wat deur Brinch Hansen ontwikkel is. Joyce en op sy beurt LF, is verbeterings op ander esp verwante tale soos occam. 'n Voorbeeld hiervan is 'n selektiewe kommunikasieprimitief wat die gebruik van beide toevoer- en afvoerwagte ondersteun. Omdat 'n effektiewe implementasie nagestreef word, is die taalontwerp om so nadruklik moontlik te wees, sonder om strukture in te sluit wat oneffektief is om te implementeer. Sekuriteit was egter die oorheersende oorweging in die ontwerp van die taal en looptyd omgewing. Die vertaler lewer masjienkode, terwyl die meeste ander implementasies van eSP-agtige tale geinterpreteer word of ondersteun word as prosesse op 'n geskikte bedryfstelsel- die meeste eSP-agtige tale word slegs vir akademiese doeleindes aangewend. LF is by uitstek ontwerp as implementasie taal. Die evaluasie van die stelsel se werkverrigting is gedoen aan die hand van praktiese maatstawwe soos die tyd wat benodig word vir kommunikasie, sowel as die gemiddelde tyd benodig vir die hantering van onderbrekings.
McKenney, Paul E. "Exploiting deferred destruction : an analysis of read-copy-update techniques in operating system kernels /." Full text open access at:, 2004. http://content.ohsu.edu/u?/etd,225.
Full textBrinkmeyer, Jay Charles 1960. "A multi-tasking operating system for real-time applications." Thesis, The University of Arizona, 1987. http://hdl.handle.net/10150/276589.
Full textLiles, Stewart Whitfield. "On the characterization and analysis of system of systems architectures." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3281.
Full textVita: p. 192. Thesis director: Alexander H. Levis. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 184-191). Also issued in print.
Gunaseelan, L. "Debugging of Distributed object systems." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/9219.
Full textBrogan, David C. "Simulation levels of detail for control and animation." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/8142.
Full textFrey, Clifford A. (Clifford Arthur). "Acetone : a system call interface for Asbestos labels." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33149.
Full textIncludes bibliographical references (p. 53-55).
Acetone is a secure operating system kernel that uses a shared address space and supports Asbestos labels. Acetone uses Asbestos labels to enable a wide variety of security policies including ones that prevent untrusted applications from being able to disclose private data. All threads run in the same address space, but have different memory access privileges. Acetone uses standard memory protection mechanisms to ensure that all memory accesses are consistent with label rules. The performance results show that these checks have a relatively low cost.
by Clifford A. Frey.
M.Eng.
Motara, Yusuf Moosa. "File integrity checking." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.
Full textMukherjee, Bodhisattwa. "Reconfigurable multiprocessor operating system kernel for high performance computing." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/9120.
Full text