Gotowa bibliografia na temat „Computer systems-Architecture”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Computer systems-Architecture”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Computer systems-Architecture"

1

Ma, K. "Review: Computer Systems Architecture". Computer Bulletin 46, nr 5 (1.09.2004): 31. http://dx.doi.org/10.1093/combul/46.5.31-a.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Palagin, A. V. "Architecture of ontology-controlled computer systems". Cybernetics and Systems Analysis 42, nr 2 (marzec 2006): 254–64. http://dx.doi.org/10.1007/s10559-006-0061-z.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wu, Nan, i Yuan Xie. "A Survey of Machine Learning for Computer Architecture and Systems". ACM Computing Surveys 55, nr 3 (30.04.2023): 1–39. http://dx.doi.org/10.1145/3494523.

Pełny tekst źródła
Streszczenie:
It has been a long time that computer architecture and systems are optimized for efficient execution of machine learning (ML) models. Now, it is time to reconsider the relationship between ML and systems and let ML transform the way that computer architecture and systems are designed. This embraces a twofold meaning: improvement of designers’ productivity and completion of the virtuous cycle. In this article, we present a comprehensive review of the work that applies ML for computer architecture and system design. First, we perform a high-level taxonomy by considering the typical role that ML techniques take in architecture/system design, i.e., either for fast predictive modeling or as the design methodology. Then, we summarize the common problems in computer architecture/system design that can be solved by ML techniques and the typical ML techniques employed to resolve each of them. In addition to emphasis on computer architecture in a narrow sense, we adopt the concept that data centers can be recognized as warehouse-scale computers; sketchy discussions are provided in adjacent computer systems, such as code generation and compiler; we also give attention to how ML techniques can aid and transform design automation. We further provide a future vision of opportunities and potential directions and envision that applying ML for computer architecture and systems would thrive in the community.
Style APA, Harvard, Vancouver, ISO itp.
4

Clements, Alan. "TRON Project 1987: Open-architecture computer systems". Microprocessors and Microsystems 13, nr 5 (czerwiec 1989): 351. http://dx.doi.org/10.1016/0141-9331(89)90094-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Clements, Alan. "TRON project 1988: open-architecture computer systems". Microprocessors and Microsystems 13, nr 8 (październik 1989): 492. http://dx.doi.org/10.1016/0141-9331(89)90101-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Pelc, Mariusz, i Dawid Galus. "Adaptation Architecture for Self-Healing Computer Systems". International Journal of Software Engineering and Knowledge Engineering 27, nr 05 (czerwiec 2017): 791–815. http://dx.doi.org/10.1142/s0218194017500292.

Pełny tekst źródła
Streszczenie:
Nowadays, information/data security and availability are of utmost importance. However, due to the fact that security is a process rather than a state, there is an increasing demand for technologies or architectural solutions that would allow a computer system to adjust its level of security in response to changes in its environmental/network characteristics. In this paper, an architecture for a self-managing adaptive router/firewall has been proposed to facilitate an intelligent and real-time self-protection of a computer system. We also show how the proposed architecture might be used to control other system mechanisms or resources (for example, RAM).
Style APA, Harvard, Vancouver, ISO itp.
7

Milutinovic, Fura, Helbig i Linn. "Architecture/Compiler Synergism in GaAs Computer Systems". Computer 20, nr 5 (maj 1987): 72–93. http://dx.doi.org/10.1109/mc.1987.1663566.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Schill, Alexander. "Systems Application Architecture". Computer Communications 14, nr 9 (listopad 1991): 573. http://dx.doi.org/10.1016/0140-3664(91)90116-i.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Raghavan, SV. "Systems network architecture". Computer Communications 18, nr 1 (styczeń 1995): 56. http://dx.doi.org/10.1016/0140-3664(95)90075-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Aken, B. R. "Large systems and Enterprise Systems Architecture". IBM Systems Journal 28, nr 1 (1989): 4–14. http://dx.doi.org/10.1147/sj.281.0004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Computer systems-Architecture"

1

Umeh, Njideka Adaku. "Security architecture methodology for large net-centric systems". Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
Style APA, Harvard, Vancouver, ISO itp.
2

Cockton, Gilbert. "Architecture and abstraction in interactive systems". Thesis, Heriot-Watt University, 1992. http://hdl.handle.net/10399/1460.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Almeida, Jose Carlos Alves de. "Software architecture for distributed real-time embedded systems". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA355809.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1998.
"September 1998." Thesis advisor(s): Man-Tak Shing, Michael Holden. Includes bibliographical references (p. 121-123). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
4

Azar, Iyad Bahgat. "A vision architecture for integrated manufacturing systems". Thesis, Loughborough University, 1989. https://dspace.lboro.ac.uk/2134/27051.

Pełny tekst źródła
Streszczenie:
This thesis introduces a conceptual multi-layered reference model to deal with representing information in a visual scene and to relate this data to similar data structures used within manufacturing processes. In this model, information is processed by a set of algorithms organised within layers of hierarchy. The bottom layer deals directly with data collected by the sensors and the top-most layer offers an interface to the different related manufacturing processes. The building elements of the model and the functionality of each layer are examined with respect to different potential implementation. Through a study of typical vision problems, the thesis shows how conventional image processing solution can be re-implemented in a compatible way with the reference model with the advantage of making use of standard algorithms and development tools. The thesis also examines the impact of using machine vision, based on layered model with other manufacturing entities, and the resulting consequences on computer-integrated manufacturing strategy.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Mingsheng. "A new architecture of multimedia distributed systems". Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=20137.

Pełny tekst źródła
Streszczenie:
This paper proposes a now architecture for distributed multimedia systems, we called it MSZ, which allows users to access multimedia documents in the system. MSZ assumes a system consisting of a not of client machines and a got of server machines. All of these machines are connected through the Internet. A user can ask for a document to be played with the desired quality of service from any server; MSZ is responsible for selecting the beat server that is able to deliver the document to the user most efficiently. The best server satisfies the following properties: (1) It stores the requested document and has the ability to deliver the document to the user (the ability includes its free CPU time and free bandwidth and free memory space). (2) The server is much closer to the user geographically in comparison to other servers in the system, and the related network path has the most available resource, which is more than the service requires. (3) The server has a lighter system load compared to other servers.
MSZ is able to minimize the response time and optimize the service quality as much as possible (the users are rejected only when the requested document is unavailable in all servers or servers are all loaded at maximum, or the communication network resource is less than the service required). Also MSZ has the self-learn ability. The more it is used, the better it works.
The system has the ability to detect any degradation in service and to automatically recover during the presentation of the document. A server's failure doesn't affect the whole system and it is very easy for the system to add and remove a server. Generally, MSZ offers a better service to users with less blocking time, less cost and higher quality service.
Style APA, Harvard, Vancouver, ISO itp.
6

Nicolaou, Cosmos Andrea. "A distributed architecture for multimedia communication systems". Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385935.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kulkarni, Nitin Y. "Application of expert systems in landscape architecture". Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43899.

Pełny tekst źródła
Streszczenie:

Application of artificial intelligence (Al) has been a topic of interest among researchers for the past decade or more. Years of research in the commercial application of Al, availability of hardware support for Al application and affordability of software and hardware has generated a lot of interest in this field and brought this technology within the reach of micro-computer based users. The commercial impact of AI is due to expert systems (ESs). ES technology is a collection of methods and techniques for constructing human-machine systems with specialized problem solving expertise.

This project explores the application of ESs in landscape architecture by developing a prototype ES and testing implications of its use with designers while working on a hypothetical problem in a studio environment. The development process helps identify the typical difficulties of such an application, to uncover technical problems, and to identify areas needing further research.

The project aims at building an ES that provides very limited preliminary data and design guidelines to initialize the design process and keeps track of the most fundamental issues necessary for planning, thus acting as an expert and assistant simultaneously. The idea is to explore the possibility of applying ESs to facilitate the design process so that designers may concentrate on other important aspects of design which include intuitive judgement about qualitative aspects.


Master of Landscape Architecture
Style APA, Harvard, Vancouver, ISO itp.
8

Shepherd, Simon John. "A distributed security architecture for large scale systems". Thesis, University of Plymouth, 1992. http://hdl.handle.net/10026.1/2143.

Pełny tekst źródła
Streszczenie:
This thesis describes the research leading from the conception, through development, to the practical implementation of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open Systems Interconnection (OSI) model. The Comprehensive Security System (CSS) is arranged basically as an Application Layer service but can allow any of the ISO recommended security facilities to be provided at any layer of the model. It is suitable as an 'add-on' service to existing arrangements or can be fully integrated into new applications. For large scale, distributed processing operations, a network of security management centres (SMCs) is suggested, that can help to ensure that system misuse is minimised, and that flexible operation is provided in an efficient manner. The background to the OSI standards are covered in detail, followed by an introduction to security in open systems. A survey of existing techniques in formal analysis and verification is then presented. The architecture of the CSS is described in terms of a conceptual model using agents and protocols, followed by an extension of the CSS concept to a large scale network controlled by SMCs. A new approach to formal security analysis is described which is based on two main methodologies. Firstly, every function within the system is built from layers of provably secure sequences of finite state machines, using a recursive function to monitor and constrain the system to the desired state at all times. Secondly, the correctness of the protocols generated by the sequences to exchange security information and control data between agents in a distributed environment, is analysed in terms of a modified temporal Hoare logic. This is based on ideas concerning the validity of beliefs about the global state of a system as a result of actions performed by entities within the system, including the notion of timeliness. The two fundamental problems in number theory upon which the assumptions about the security of the finite state machine model rest are described, together with a comprehensive survey of the very latest progress in this area. Having assumed that the two problems will remain computationally intractable in the foreseeable future, the method is then applied to the formal analysis of some of the components of the Comprehensive Security System. A practical implementation of the CSS has been achieved as a demonstration system for a network of IBM Personal Computers connected via an Ethernet LAN, which fully meets the aims and objectives set out in Chapter 1. This implementation is described, and finally some comments are made on the possible future of research into security aspects of distributed systems.
Style APA, Harvard, Vancouver, ISO itp.
9

Matthews, Stephen W. Miller Kenneth H. "An open architecture for defense virtual environment training systems /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMatthews.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Rudolph P. Darken, Joseph A. Sullivan. Includes bibliographical references (p. 131-134). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
10

Bhat, Vidya G. "Domain specific architecture development for enterprise systems based on common object request broker architecture (CORBA)". FIU Digital Commons, 1999. http://digitalcommons.fiu.edu/etd/1673.

Pełny tekst źródła
Streszczenie:
Large business organizations with enterprise wide systems have followed an ad hoc incremental growth pattern. They are either monolithic, that are difficult to replace and maintain, or are components with little or no interoperability between them. Such systems suffer from lack of uniformity and definition in their information technology infrastructure. To migrate from this state, to systems that are extensible, interoperable and non-redundant in functionality it is very important to focus on the architecture. We use the healthcare enterprise system as a case study for the purpose of this thesis. It is indeed difficult, if not impossible to construct the overall architecture of the system without identifying the individual components of the system. Hence we follow an incremental methodology in identifying and developing each component. One such component is Order management, which is an essential component of a healthcare information system that offers enterprise wide functionality.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Computer systems-Architecture"

1

Newman, Robert M. Computer systems architecture. Exeter [UK]: Crucial, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Lacy, M. Understanding computer systems architecture. London: DP Publications, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Systems architecture. Wyd. 3. Boston, Mass: Course Technology, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Andleigh, Prabhat K. UNIX systems architecture. Englewood Cliffs, N.J: Prentice Hall, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Scott, John. IBM: Systems Applications Architecture. New York: Prentice Hall, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Omondi, Amos, i Stanislav Sedukhin, red. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/13479.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Choi, Lynn, Yunheung Paek i Sangyeun Cho, red. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74309-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Srikanthan, Thambipillai, Jingling Xue i Chip-Hong Chang, red. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572961.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Yew, Pen-Chung, i Jingling Xue, red. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b100354.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Jesshope, Chris, i Colin Egan, red. Advances in Computer Systems Architecture. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11859802.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Computer systems-Architecture"

1

Cole, Robert. "Network Systems Architecture". W Computer Communications, 104–18. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Weik, Martin H. "open systems architecture". W Computer Science and Communications Dictionary, 1145. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12822.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Bhushan, Abhay K., i Dennis G. Frahmann. "Xerox Network Systems Architecture". W Computer Network Architectures and Protocols, 417–47. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pozefsky, Diane P., Daniel A. Pitt i James P. Gray. "IBM’s Systems Network Architecture". W Computer Network Architectures and Protocols, 449–509. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Weik, Martin H. "Open Systems Interconnection architecture". W Computer Science and Communications Dictionary, 1146. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12825.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Encarnação, José L., Rolf Lindner i Ernst G. Schlechtendahl. "The Architecture of CAD Systems". W Computer Aided Design, 165–221. Berlin, Heidelberg: Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-642-84054-8_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Lee, Ruby B. "Processor Architecture for Trustworthy Computers". W Advances in Computer Systems Architecture, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572961_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Hill, Gillian. "An architecture for complex systems". W Lecture Notes in Computer Science, 189–201. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0025044.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Fuchs-Kittowski, Frank, i Daniel Faust. "Architecture of Mobile Crowdsourcing Systems". W Lecture Notes in Computer Science, 121–36. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10166-8_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bancilhon, François. "Object database systems: Functional architecture". W Lecture Notes in Computer Science, 163–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57342-9_72.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Computer systems-Architecture"

1

Rao, Kuntam Babu. "Computer systems architecture vs quantum computer". W 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2017. http://dx.doi.org/10.1109/iccons.2017.8250619.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

"Session CA: Computer architecture & embedded systems". W Systems (ICCES). IEEE, 2011. http://dx.doi.org/10.1109/icces.2011.6141002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Goddard, Iain, Hui Chao i Mark Skalabrin. "Scalable computer architecture for digital vascular systems". W Medical Imaging '98, redaktorzy Yongmin Kim i Seong K. Mun. SPIE, 1998. http://dx.doi.org/10.1117/12.312503.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

"Technical session CA: Computer architecture and embedded systems". W 2008 International Conference on Computer Engineering & Systems. IEEE, 2008. http://dx.doi.org/10.1109/icces.2008.4772955.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zhou, Jie, i Jim Alves-Foss. "Architecture-based refinements for secure computer systems design". W the 2006 International Conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1501434.1501453.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Tabeling, P., i B. Grone. "Integrative architecture elicitation for large computer based systems". W Proceedings. 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems. IEEE, 2005. http://dx.doi.org/10.1109/ecbs.2005.46.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Ramachandran, Umakishore, i William D. Leahy. "An integrated approach to teaching computer systems architecture". W the 2007 workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1275633.1275641.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Pacuraru, Raluca olguta, i Gheorghe Grecu. "ARCHITECTURE AND DESIGN OF COMPUTER-ASSISTED INSTRUCTION SYSTEMS". W eLSE 2013. Carol I National Defence University Publishing House, 2013. http://dx.doi.org/10.12753/2066-026x-13-157.

Pełny tekst źródła
Streszczenie:
The multitude of innovations which assault us in all areas of life made necessary "the education for change". Through education, people must ensure the ability to develop the capacity to understand and respond appropriately to various challenges from society, to become agents of their own training, to organize and structure their own knowledge. As time goes by, it becomes more and more obvious the need for diversification and institutional personalization in Romanian education system, diversification of types of study programs, the need to promote lifelong learning and reform the existing legislation in this area. From the perspective of the education system, the evolution towards the knowledge society is a revolution in how people think the whole process of education - both as management as well as structure. In higher education is a tendency to an "education of the masses" - undergraduate studies, followed by higher cycles - master's degree, doctoral studies. It also tends to lifelong learning, appreciating the return in the educational process should be at least every five years to ensure competence in a particular field. In the knowledge society, the very paradigm of education has changed, the role of ICT has become more and more important and present in an increasingly wide range of activities. Nowadays the use of an e-learning system is a must for any university that wants to align to the existing trends and have a high quality of educational process. More than that, computer-assisted instruction systems (commonly called today "e-learning platforms") are also used for lifelong learning - regardless of whether it is done in universities, specialized organizations or at job. This paper aims to deal with some aspects of the design and architecture of computer-assisted instruction systems, so that choosing, implementing and developing such a system could have a well-documented starting point.
Style APA, Harvard, Vancouver, ISO itp.
9

Merchant, A. "Session details: Systems/architecture". W SIGMETRICS07: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/3246554.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dally, W. J. "Communication-oriented computer architecture: data choreography". W Proceedings Innovative Architecture for Future Generation High-Performance Processors and Systems. IEEE, 1997. http://dx.doi.org/10.1109/iwia.1997.670414.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Computer systems-Architecture"

1

Zhou, Jie, i Jim Alves-Foss. Architecture-Based Refinements for Secure Computer Systems Design. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2006. http://dx.doi.org/10.21236/ada459287.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wysochanski, D. Declarative Public Extension Key for Internet Small Computer Systems Interface (iSCSI) Node Architecture. RFC Editor, kwiecień 2007. http://dx.doi.org/10.17487/rfc4850.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tsidylo, Ivan M., Hryhoriy V. Tereshchuk, Serhiy V. Kozibroda, Svitlana V. Kravets, Tetiana O. Savchyn, Iryna M. Naumuk i Darja A. Kassim. Methodology of designing computer ontology of subject discipline by future teachers-engineers. [б. в.], wrzesień 2019. http://dx.doi.org/10.31812/123456789/3249.

Pełny tekst źródła
Streszczenie:
The article deals with the problem of the methodology of designing computer ontology of the subject discipline by the future teachers-engineers in the field of computer technologies. The scheme of ontology of the subject discipline is presented in which the set of concepts of the future computer ontology and the set of relations between them are represented. The main criteria of the choice of systems of computer ontologies for designing computer ontology of the subject discipline: software architecture and tools development; interoperability; intuitive interface are established. The selection of techniques for designing ontologies using computer ontology systems is carried out. The algorithm of designing computer ontology of the subject discipline by the future teachers-engineers in the field of computer technologies is proposed.
Style APA, Harvard, Vancouver, ISO itp.
4

Tkachuk, Viktoriia V., Vadym P. Shchokin i Vitaliy V. Tron. The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy. [б. в.], listopad 2018. http://dx.doi.org/10.31812/123456789/2668.

Pełny tekst źródła
Streszczenie:
Research goal: the research is aimed at developing a model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Object of research is the model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Results of the research: the developed model of use of mobile ICT as tools of learning Computer Sciences to future professionals in Engineering Pedagogy is based on the competency-based, person-centered and systemic approaches considering principles of vocational education, general didactic principles, principles of Computer Science learning, and principles of mobile learning. It also takes into account current conditions and trends of mobile ICT development. The model comprises four blocks: the purpose-oriented block, the content-technological block, the diagnostic block and the result-oriented block. According to the model, the learning content of Computer Sciences consists of 5 main units: 1) Fundamentals of Computer Science; 2) Architecture of Modern Computers; 3) Fundamentals of Algorithmization and Programming; 4) Software of Computing Systems; 5) Computer Technologies in the Professional Activity of Engineer-pedagogues.
Style APA, Harvard, Vancouver, ISO itp.
5

Osadchyi, Viacheslav V., Hanna Y. Chemerys, Kateryna P. Osadcha, Vladyslav S. Kruhlyk, Serhii L. Koniukhov i Arnold E. Kiv. Conceptual model of learning based on the combined capabilities of augmented and virtual reality technologies with adaptive learning systems. [б. в.], listopad 2020. http://dx.doi.org/10.31812/123456789/4417.

Pełny tekst źródła
Streszczenie:
The article is devoted to actual problem of using modern ICT tools to increase the level of efficiency of the educational process. The current state and relevance of the use of augmented reality (AR) and virtual reality (VR) technologies as an appropriate means of improving the educational process are considered. In particular, attention is paid to the potential of the combined capabilities of AR and VR technologies with adaptive learning systems. Insufficient elaboration of cross-use opportunities for achieving of efficiency of the educational process in state-of-the-art research has been identified. Based on analysis of latest publications and experience of using of augmented and virtual reality technologies, as well as the concept of adaptive learning, conceptual model of learning based on the combined capabilities of AR and VR technologies with adaptive learning systems has been designed. The use of VR and AR technologies as a special information environment is justified, which is applied in accordance with the identified dominant type of students' thinking. The prospects of using the proposed model in training process at educational institutions for the implementation and support of new teaching and learning strategies, as well as improving learning outcomes are determined by the example of such courses as “Algorithms and data structures”, “Computer graphics and three-dimensional modeling”, “Circuit Engineering”, “Computer Architecture”.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii