Tesi sul tema "Operating systems (Computers)"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Operating systems (Computers)".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Neugebauer, Rolf. "Decentralising resource management in operating systems". Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/4118/.
Testo completoBaumann, Andrew Computer Science & Engineering Faculty of Engineering UNSW. "Dynamic update for operating systems". Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28356.
Testo completoRogers, David T. "A framework for dynamic subversion". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRogers.pdf.
Testo completoThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility". Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.
Testo completoRoth, Christopher. "A distributed password scheme for network operating systems". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.
Testo completoGrossman, Michael D. "A computer simulation of processor scheduling in UNIX 4.2BSD /". Online version of thesis, 1987. http://hdl.handle.net/1850/10295.
Testo completoDodge, Catherine A. "Recommendations for secure initialization routines in operating systems /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDodge.pdf.
Testo completoThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109) Also available online.
Forbes, Harold C. "Operating system principles and constructs for dynamic multi-processor real-time control systems". Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8165.
Testo completoGoktepe, Meftun. "Windows XP Operating System security analysis". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Testo completoThesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Swift, Michael M. "Improving the reliability of commodity operating systems /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7019.
Testo completoGoel, Ashvin. "Operating system support for low-latency streaming /". Full text open access at:, 2003. http://content.ohsu.edu/u?/etd,194.
Testo completoMurray, Jessica L. "An exfiltration subversion demonstration". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMurray.pdf.
Testo completoThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 83-92). Also available online.
Purdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)". Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.
Testo completoTennant, Robert Satchwell. "An alternative peripheral executive for the data general AOS/VS operating system". Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1002031.
Testo completoOkyay, Mehmet Onur Aytaç Sıtkı. "A portable real-time operating system for embedded platforms/". [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000477.doc.
Testo completoKumano, Shintaro. "Boundary clusters in adaptive neighborhood networks". Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/9150.
Testo completoMesser, Alan. "A market model for controlled resource allocation in distributed operating systems". Thesis, City, University of London, 1999. http://openaccess.city.ac.uk/20134/.
Testo completoWei, Jinpeng. "Improving operating systems security two case studies /". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31849.
Testo completoCommittee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Blough, Douglas; Committee Member: Giffin, Jonathon; Committee Member: Li, Kang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
McDonald, Ian Lindsay. "Memory management in a distributed system of single address space operating systems supporting quality of service". Thesis, University of Glasgow, 2001. http://theses.gla.ac.uk/5427/.
Testo completo余永嘉 e Wing-ka Yu. "Execution objects: flexible composition and efficient interaction". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31213868.
Testo completoYu, Wing-ka. "Execution objects : flexible composition and efficient interaction /". Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19671659.
Testo completoWells, George Clifford. "A study of real-time operating systems for microcomputers". Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1004896.
Testo completoLeslie, Rebekah. "A Functional Approach to Memory-Safe Operating Systems". PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/499.
Testo completoDodge, Catherine A. "Recommendations for secure initialization routines in operating systems". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1206.
Testo completoWhile a necessity of all operating systems, the code that initializes a system can be notoriously difficult to understand. This thesis explores the most common architectures used for bringing an operating system to its initial state, once the operating system gains control from the boot loader. Specifically, the ways in which the OpenBSD and Linux operating systems handle initialization are dissected. With this understanding, a set of threats relevant to the initialization sequence was developed. A thorough study was also made to determine the degree to which initialization code adheres to widely accepted software engineering principles. Based upon this threat analysis and the observed strengths and weaknesses of existing systems, a set of recommendations for initialization sequence architecture and implementation have been developed. These recommendations can serve as a guide for future operating system development.
Civilian, Naval Postgraduate School
Spafford, Eugene Howard. "Kernel structures for a distributed operating system". Diss., Georgia Institute of Technology, 1986. http://hdl.handle.net/1853/9144.
Testo completoMcLean, Angus L. M. Thom III. "Real-time distributed simulation analysis : an application of temporal database and simulation systems research". Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9124.
Testo completoKou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example". Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.
Testo completoScience, Faculty of
Computer Science, Department of
Graduate
Bershad, Brian Nathan. "High performance cross-address space communication /". Thesis, Connect to this title online; UW restricted, 1990. http://hdl.handle.net/1773/6939.
Testo completoSchneck, Phyllis Adele. "Dynamic management of computation and communication resources to enable secure high-performances applications". Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/8264.
Testo completoSeelam, Seetharami R. "Towards dynamic adaptation of I/O scheduling in commodity operating systems". To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2006. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Testo completoDeBrunner, Linda Sumners. "Multitasking operating systems for real-time applications". Thesis, Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/104318.
Testo completoVigder, Mark (Mark Ronald) Carleton University Dissertation Engineering Electrical. "Applying formal techniques to the design of concurrent systems". Ottawa, 1992.
Cerca il testo completoGraunke, Kenneth William. "Extensible Scheduling in a Haskell-based Operating System". PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/1.
Testo completoApte, Manoj Shriganesh. "An operating system architecture and hybrid scheduling methodology for real-time systems with uncertainty". Diss., Mississippi State : Mississippi State University, 2004. http://library.msstate.edu/etd/show.asp?etd=etd-11102004-152431.
Testo completoYuh, Han-Sheng. "Spider: An overview of an object-oriented distributed computing system". CSUSB ScholarWorks, 1997. https://scholarworks.lib.csusb.edu/etd-project/1417.
Testo completoWebb, Jason N. "The advanced features of Mac OS X and their benefits to the design community /". Online version of thesis, 2003. http://homepage.mac.com/jasonwebb/thesis/.
Testo completoRappin, Noel. "A framework for teaching learners to model by focusing complexity of modeling and simulation tools". Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/8248.
Testo completoLoubser, Johannes Jacobus. "Device drivers : a comparison of different development strategies". Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51690.
Testo completoENGLISH ABSTRACT: Users are not supposed to modify an operating system kernel, but it is often necessary to add a device driver for a new peripheral device. Device driver development is a difficult and time-consuming process that must be performed by an expert. Drivers are difficult to debug and a malfunctioning driver could cause the operating system to crash. Ways are therefore needed to make the development of device drivers safer and easier. A number of different device driver development methods are examined in this thesis. An existing micro-kernel that supports in-kernel device drivers as well as extensible device drivers has been modified to support user-level and loadable drivers. These extensions ensured that all the development methods were implemented in the same environment and a comparison could thus be made on a fair basis. A comparison of the different methods with respect to the efficiency of the resulting device driver, as well as the ease of the development process, is presented.
AFRIKAANSE OPSOMMING: Gebruikers is nie veronderstelom aan 'n bedryfstelsel te verander nie, maar tog is dit gereeld nodig om 'n toesteldrywer vir 'n nuwe randapparaat by te voeg. Die ontwikkeling van 'n toesteldrywer is 'n tydrowende en moeilike proses en moet deur 'n kundige aangepak word. Toesteldrywers is moeilik om te ontfout en kan deur verkeerde werking die hele stelsel tot stilstand bring. Daar is dus tegnieke nodig om die ontwikkeling van toestelhanteerders makliker en veiliger te maak. 'n Aantal verskillende ontwikkelingsmetodes vir toesteldrywers word in hierdie tesis ondersoek. 'n Bestaande mikro-kern wat in-kern, sowel as uitbreibare toesteldrywers ondersteun, is aangepas om gebruikersvlak en laaibare toestelhanteerders te ondersteun. Hierdie uitbreiding het verseker dat al die ontwikkelingsmetodes in dieselfde omgewing geïmplementeer is. Dit was dus moontlik om die metodes op 'n regverdige grondslag te vergelyk. Die vergelyking is gedoen ten opsigte van die effektiwiteit van die resulterende toesteldrywer sowel as die moeilikheidsgraad van die ontwikkelingsproses.
Deorukhkar, Mayuresh. "Deadlock probability prediction and detection in distributed systems /". free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1421130.
Testo completoSomanathan, Muthuveer. "An initial operating system adaptation heuristic for Swap Cluster Max (SCM)". To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Testo completoWang, Koping. "Spider II: A component-based distributed computing system". CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1874.
Testo completoVan, Riet F. A. "LF : a language for reliable embedded systems". Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52322.
Testo completoENGLISH ABSTRACT: Computer-aided verification techniques, such as model checking, are often considered essential to produce highly reliable software systems. Modern model checkers generally require models to be written in eSP-like notations. Unfortunately, such systems are usually implemented using conventional imperative programming languages. Translating the one paradigm into the other is a difficult and error prone process. If one were to program in a process-oriented language from the outset, the chasm between implementation and model could be bridged more readily. This would lead to more accurate models and ultimately more reliable software. This thesis covers the definition of a process-oriented language targeted specifically towards embedded systems and the implementation of a suitable compiler and run-time system. The language, LF, is for the most part an extension of the language Joyce, which was defined by Brinch Hansen. Both LF and Joyce have features which I believe make them easier to use than other esp based languages such as occam. An example of this is a selective communication primitive which allows for both input and output guards which is not supported in occam. The efficiency of the implementation is important. The language was therefore designed to be expressive, but constructs which are expensive to implement were avoided. Security, however, was the overriding consideration in the design of the language and runtime system. The compiler produces native code. Most other esp derived languages are either interpreted or execute as tasks on host operating systems. Arguably this is because most implementations of esp and derivations thereof are for academic purposes only. LF is intended to be an implementation language. The performance of the implementation is evaluated in terms of practical metries such as the time needed to complete communication operations and the average time needed to service an interrupt.
AFRIKAANSE OPSOMMING: Rekenaar ondersteunde verifikasietegnieke soos programmodellering, is onontbeerlik in die ontwikkeling van hoogs betroubare programmatuur. In die algemeen, aanvaar programme wat modelle toets eSP-agtige notasie as toevoer. Die meeste programme word egter in meer konvensionele imperatiewe programmeertale ontwikkel. Die vertaling vanuit die een paradigma na die ander is 'n moelike proses, wat baie ruimte laat vir foute. Indien daar uit die staanspoor in 'n proses gebaseerde taal geprogrammeer word, sou die verwydering tussen model en program makliker oorbrug kon word. Dit lei tot akkurater modelle en uiteindelik tot betroubaarder programmatuur. Die tesis ondersoek die definisie van 'n proses gebaseerde taal, wat gemik is op ingebedde programmatuur. Verder word die implementasie van 'n toepaslike vertaler en looptyd omgewing ook bespreek. Die taal, LF, is grotendeels gebaseer op Joyce, wat deur Brinch Hansen ontwikkel is. Joyce en op sy beurt LF, is verbeterings op ander esp verwante tale soos occam. 'n Voorbeeld hiervan is 'n selektiewe kommunikasieprimitief wat die gebruik van beide toevoer- en afvoerwagte ondersteun. Omdat 'n effektiewe implementasie nagestreef word, is die taalontwerp om so nadruklik moontlik te wees, sonder om strukture in te sluit wat oneffektief is om te implementeer. Sekuriteit was egter die oorheersende oorweging in die ontwerp van die taal en looptyd omgewing. Die vertaler lewer masjienkode, terwyl die meeste ander implementasies van eSP-agtige tale geinterpreteer word of ondersteun word as prosesse op 'n geskikte bedryfstelsel- die meeste eSP-agtige tale word slegs vir akademiese doeleindes aangewend. LF is by uitstek ontwerp as implementasie taal. Die evaluasie van die stelsel se werkverrigting is gedoen aan die hand van praktiese maatstawwe soos die tyd wat benodig word vir kommunikasie, sowel as die gemiddelde tyd benodig vir die hantering van onderbrekings.
McKenney, Paul E. "Exploiting deferred destruction : an analysis of read-copy-update techniques in operating system kernels /". Full text open access at:, 2004. http://content.ohsu.edu/u?/etd,225.
Testo completoBrinkmeyer, Jay Charles 1960. "A multi-tasking operating system for real-time applications". Thesis, The University of Arizona, 1987. http://hdl.handle.net/10150/276589.
Testo completoLiles, Stewart Whitfield. "On the characterization and analysis of system of systems architectures". Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3281.
Testo completoVita: p. 192. Thesis director: Alexander H. Levis. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 184-191). Also issued in print.
Gunaseelan, L. "Debugging of Distributed object systems". Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/9219.
Testo completoBrogan, David C. "Simulation levels of detail for control and animation". Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/8142.
Testo completoFrey, Clifford A. (Clifford Arthur). "Acetone : a system call interface for Asbestos labels". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33149.
Testo completoIncludes bibliographical references (p. 53-55).
Acetone is a secure operating system kernel that uses a shared address space and supports Asbestos labels. Acetone uses Asbestos labels to enable a wide variety of security policies including ones that prevent untrusted applications from being able to disclose private data. All threads run in the same address space, but have different memory access privileges. Acetone uses standard memory protection mechanisms to ensure that all memory accesses are consistent with label rules. The performance results show that these checks have a relatively low cost.
by Clifford A. Frey.
M.Eng.
Motara, Yusuf Moosa. "File integrity checking". Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.
Testo completoMukherjee, Bodhisattwa. "Reconfigurable multiprocessor operating system kernel for high performance computing". Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/9120.
Testo completo