Gotowa bibliografia na temat „Operating systems (Computers)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Operating systems (Computers)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Operating systems (Computers)"

1

Kočíš, Tomáš, i Vilém Srovnal. "Operating Systems for Embedded Computers". IFAC Proceedings Volumes 36, nr 1 (luty 2003): 359–64. http://dx.doi.org/10.1016/s1474-6670(17)33774-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Al-Hasnawi, Haider, i Nawal Abbas Abdel. "THE IMPACT OF USING INTERNAL CONTROL UNDER THE ELECTRONIC OPERATING SYSTEM". International journal of business and management sciences 04, nr 05 (9.05.2024): 119–40. http://dx.doi.org/10.55640/ijbms-04-05-11.

Pełny tekst źródła
Streszczenie:
Internal control tools constitute one of the modern frameworks approved by the Committee of Sponsoring Organizations (COSO). "And the one which takes into account setting the objectives first, then estimating the possibility of those objectives being exposed to threats, then internal control procedures are designed that reduce the risks, and at the same time provide reasonable guarantees for achieving the organization's objectives and introducing all modern developments into the system. The contemporary trend of internal control focuses on the integration between managing the risks to which the organization is exposed and the internal control frameworks (Enterprise Risk Management- Integrated Framework) and its abbreviation (ERM), which provides the organization Management in conditions of uncertainty related to risks and their probabilities to be able to create and preserve value. The continuous developments in internal control systems, on the one hand, and competition between economic units, on the other hand, have led to many challenges through the use of modern technology and the innovation of new methods of development, which required the development of all sub-systems of control, including internal control systems, and then review the internal control structure and the extent of its acceptance of this computer-based technology and the effectiveness of its devices in providing information that supports the system's ability to adopt it. Based on this, the research topic was divided into five sections. The first section dealt with the research methodology, the second section dealt with the theoretical framework of the internal control system, and the third section dealt with the problems and limits of using electronic computers. The fourth section was devoted to studying the impact of using computers. The electronic section focuses on the components of the internal control system, while the fifth section is dedicated to stating the most important conclusions and recommendations.
Style APA, Harvard, Vancouver, ISO itp.
3

Vdovjak, Krešimir, Josip Balen i Krešimir Nenadić. "Experimental Evaluation of Desktop Operating Systems Networking Performance". International journal of electrical and computer engineering systems 11, nr 2 (24.06.2020): 67–76. http://dx.doi.org/10.32985/ijeces.11.2.2.

Pełny tekst źródła
Streszczenie:
The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck can also be caused by insufficient hardware, operating system and software resources on clients’ machines. Therefore, in this paper a networking performance evaluation of three globally most common and most used versions of Windows operating systems; namely Windows 7TM, Windows 8.1TM and Windows 10TM, on two identical computer systems, is conducted. Networking performance measurements are performed with three different benchmarks: namely iPerf, D-ITG and NetStress. Performance evaluation results showed that a newer versions of an operating system bring certain networking performance improvements but by sacrificing other performances.
Style APA, Harvard, Vancouver, ISO itp.
4

Kendysh, I. V. "Automated system for deploying operating systems using LAN (PXE SERVER)". Litiyo i Metallurgiya (FOUNDRY PRODUCTION AND METALLURGY), nr 1 (12.03.2022): 82–85. http://dx.doi.org/10.21122/1683-6065-2022-1-82-85.

Pełny tekst źródła
Streszczenie:
PXE is an environment for booting computers using a network card without using hard drives, CDs and other devices used while booting operating systems. By choosing a network boot in the BIOS, it is possible to install the OS / rid of viruses /recover disks /test RAM from the PXE Boot server. Such a tool is irreplaceable in the case of a large number of computers
Style APA, Harvard, Vancouver, ISO itp.
5

Ochilov, Nizomiddin. "Creating Secure File Systems in Open-Source Operating Systems". WSEAS TRANSACTIONS ON SYSTEMS 21 (24.11.2022): 221–32. http://dx.doi.org/10.37394/23202.2022.21.24.

Pełny tekst źródła
Streszczenie:
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer. The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors. Each of them has its shortcomings which manifest themselves during development. Combining the advantages of file encryptors and file system encryptors helped to overcome those shortcomings. The userspace filesystem library was used for this purpose. The study involved the methods aimed at designing and developing the Udev daemon file system for Linux using the OpenSSL library. The file system design was mathematically modelled and formally verified through a test parser. The file system also has its own authentication and authorization procedures to provide uniform access across multiple operating systems. The Udev daemon file system is the result of this work. Each file is encrypted with a separate key to protect against cryptanalysis. This key is encrypted with the owner’s private key, thereby enabling him/her to change the ownership. The passphrase is used to decrypt the user’s private key. The developed file system has passed authentication and access control testing successfully. The file system shows best performance with file sizes 1 KB to 256 MB. Encryption-caused performance degradation was also measured and found to be within acceptable limits. This Udev daemon stackable file system is available for all Unix clones with OpenSSL libraries. The prospects for further work are the development of a file system using several combined methods from a list of existing design and development methods for file systems.
Style APA, Harvard, Vancouver, ISO itp.
6

Craig, John S. "Managing Computer-Related Anxiety and Stress within Organizations". Journal of Educational Technology Systems 22, nr 4 (czerwiec 1994): 309–25. http://dx.doi.org/10.2190/mv5d-mykd-blla-06jl.

Pełny tekst źródła
Streszczenie:
Computer-related anxiety and stress affects everyone who uses a computer and is aggravated by poor management, faulty system design, inadequate training, misunderstandings by users of what computers can do, and substandard documentation. Research has shown that computer users, no matter how experienced they are, can experience anxiety and stress that negatively affect their job performance. The problem is so pervasive that no single management strategy, ergonomic plan, training model, or system design can resolve the dilemma. Physical and psychological problems that afflict computer users can be reduced only by a united effort of all people involved with designing systems, training, and operating computers within organizations. This article reviews research in the field, and outlines how management, system designers, and technical communicators can help users relieve stress and anxiety when using and learning how to operate computers. When managers, designers, and technical communicators work together, factors that create computer stress and anxiety can be identified and reduced when computer systems and training are properly designed and managed.
Style APA, Harvard, Vancouver, ISO itp.
7

Dalimunthe, Ruri Ashari, Riki Andri Yusda i William Ramdhan. "INSTALASI SISTEM OPERASI BERBASIS WINDOWS 10 PADA SEKOLAH MAN KISARAN". Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal 3, nr 2 (14.07.2020): 163–68. http://dx.doi.org/10.33330/jurdimas.v3i2.499.

Pełny tekst źródła
Streszczenie:
Abstract: Community service activities entitled "Installation of Operating Systems Based on Windows 10" aims to provide information to students from MAN Asahan about Installing Windows Operating Systems. The method used in this activity is a direct observation of the MAN Asahan school by watching and analyzing the problems or troubleshooting that occurs at the Computer Lab at MAN Asahan. In addition, information on problems in the computer Labs of the school was also carried out by a team of lecturers as the perpetrators of this community service by way of direct interviews with the Teachers and employees who served in the Computer Lab of the MAN Asahan school. The end result of this dedication is how students can repair computers, as well as troubleshooting that occurs on school computers and computers at home, can be overcome alone without having to use computer repair services.Keywords: installation; operating system; Windows 10 Abstrak: Kegiatan pengabdian kepada masyarakat yang diberi judul “Instalasi Sistem Operasi Berbasis Windows 10” bertujuan untuk memberikan informasi kepada siswa dan siswi MAN Asahan tentang Instalasi Sistem Operasi Windows. Metode yang digunakan dalam kegiatan ini adalah observasi langsung ke sekolah MAN Asahan dengan melihat serta menganalisa permasalahan ataupun troubleshooting yang terjadi pada Laboratorium Komputer disekolah MAN Asahan. Selain itu, Informasi permasalahan pada komputer Lab sekolah juga dilakukan tim dosen selaku pelaku kegiatan pengabdian ini dengan cara wawancara langsung kepada Guru dan pegawai yang bertugas di Lab Komputer sekolah MAN Asahan. Hasil akhir dari pengabdian ini adalah bagaimana siswa dan siswi dapat memperbaiki komputer serta troubleshooting yang terjadi pada komputer sekolah maupun komputer dirumah dapat teratasi sendiri tanpa harus memakai jasa perbaikan komputer. Kata kunci: instalasi; sistem operasi; windows 10
Style APA, Harvard, Vancouver, ISO itp.
8

Saiedian, Hossein, i Munib Siddiqi. "A framework for the assessment of operating systems for small computers". ACM SIGICE Bulletin 21, nr 4 (kwiecień 1996): 2–27. http://dx.doi.org/10.1145/1059966.1059967.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Colling, J. A., i H. S. von Harrach. "A control and imaging system for dedicated STEM". Proceedings, annual meeting, Electron Microscopy Society of America 50, nr 2 (sierpień 1992): 968–69. http://dx.doi.org/10.1017/s0424820100129474.

Pełny tekst źródła
Streszczenie:
A new digital control system has been developed for the HB600 series of cold field-emission STEM’S manufactured by VG Microscopes. The philosophy behind this control scheme has been to develop a system which is both user-friendly for non-experts in STEM/TEM operation as well as offering access to all functions for unusual modes of operation.The control scheme, as shown in Fig.1, is based on two computers; one for instrument control, using a multi-tasking, real-time operating system (OS/2) with a graphical user interface (Presentation Manager), the other for control of image acquisition and display.The instrument control computer controls the high voltage power supply, column and stepper motor electronics via opto-isolated serial lines (RS232). The system is interrupt driven and therefore minimises the computer traffic which has the potential for causing interference in highly stable systems. An Ethernet link connects the two computers and a link to an external computer can also be implemented.
Style APA, Harvard, Vancouver, ISO itp.
10

MORIARTY, K. J. M., i T. TRAPPENBERG. "PROGRAMMING TOOLS FOR PARALLEL COMPUTERS". International Journal of Modern Physics C 04, nr 06 (grudzień 1993): 1285–94. http://dx.doi.org/10.1142/s0129183193001002.

Pełny tekst źródła
Streszczenie:
Although software tools already have a place on serial and vector computers they are becoming increasingly important for parallel computing. Message passing libraries, parallel operating systems and high level parallel languages are the basic software tools necessary to implement a parallel processing program. These tools up to now have been specific to each parallel computer system and a short survey will be given. The aim of another class of software tools for parallel computers is to help in writing or rewriting application programs. Because automatic parallelization tools are not very successful, an interactive component has to be incorporated. We will concentrate here on the discussion of SPEFY, a parallel program development facility.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Operating systems (Computers)"

1

Neugebauer, Rolf. "Decentralising resource management in operating systems". Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/4118/.

Pełny tekst źródła
Streszczenie:
This dissertation explores operating system mechanisms to allow resource-aware applications to be involved in the process of managing resources under the premise that these applications (1) potentially have some (implicit) notion of their future resource demands and (2) can adapt their resource demands. The general idea is to provide feedback to resource-aware applications so that they can proactively participate in the management of resources. This approach has the benefit that resource management policies can be removed from central entities and the operating system has only to provide mechanism. Furthermore, in contrast to centralised approaches, application specific features can be more easily exploited. To achieve this aim, I propose to deploy a microeconomic theory, namely congestion or shadow pricing, which has recently received attention for managing congestion in communication networks. Applications are charged based on the potential "damage" they cause to other consumers by using resources. Consumers interpret these congestion charges as feedback signals which they use to adjust their resource consumption. It can be shown theoretically that such a system with consumers merely acting in their own self-interest will converge to a social optimum. This dissertation focuses on the operating system mechanisms required to decentralise resource management this way. In particular it identifies four mechanisms: pricing & charging, credit accounting, resource usage accounting, and multiplexing. While the latter two are mechanisms generally required for the accurate management of resources, pricing & charging and credit accounting present novel mechanisms. It is argued that congestion prices are the correct economic model in this context and provide appropriate feedback to applications. The credit accounting mechanism is necessary to ensure the overall stability of the system by assigning value to credits.
Style APA, Harvard, Vancouver, ISO itp.
2

Baumann, Andrew Computer Science &amp Engineering Faculty of Engineering UNSW. "Dynamic update for operating systems". Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28356.

Pełny tekst źródła
Streszczenie:
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administrators. The aim of this research is to develop a model for dynamic update of operating systems, allowing a system to be patched without the need for a reboot or other service interruption. In this work, a model for dynamic update based on operating system modularity is developed and evaluated using a prototype implementation for the K42 operating system. The prototype is able to update kernel code and data structures, even when the interfaces between kernel modules change. When applying an update, at no point is the system's entire execution blocked, and there is no additional overhead after an update has been applied. The base runtime overhead is also very low. An analysis of the K42 revision history shows that approximately 79% of past performance and bug-fix changes to K42 could be converted to dynamic updates, and the proportion would be even higher if the changes were being developed for dynamic update. The model also extends to other systems such as Linux and BSD, that although structured modularly, are not strictly object-oriented like K42. The experience with this approach shows that dynamic update for operating systems is feasible given a sufficiently-modular system structure, allows maintenance patches and updates to be applied without disruption, and need not constrain system performance.
Style APA, Harvard, Vancouver, ISO itp.
3

Rogers, David T. "A framework for dynamic subversion". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRogers.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
4

Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility". Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Roth, Christopher. "A distributed password scheme for network operating systems". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Grossman, Michael D. "A computer simulation of processor scheduling in UNIX 4.2BSD /". Online version of thesis, 1987. http://hdl.handle.net/1850/10295.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Dodge, Catherine A. "Recommendations for secure initialization routines in operating systems /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDodge.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109) Also available online.
Style APA, Harvard, Vancouver, ISO itp.
8

Forbes, Harold C. "Operating system principles and constructs for dynamic multi-processor real-time control systems". Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8165.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Goktepe, Meftun. "Windows XP Operating System security analysis". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
10

Swift, Michael M. "Improving the reliability of commodity operating systems /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Operating systems (Computers)"

1

Flynn, Ida M. Understanding operating systems. Boston: PWS, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Flynn, Ida M. Understanding operating systems. Wyd. 5. Boston: Thomson Course Technology, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Flynn, Ida M. Understanding operating systems. Wyd. 4. Boston, Mass: Thomson Course Technology, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Flynn, Ida M. Understanding operating systems. Wyd. 2. Boston: PWS Pub., 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Haldar, Sibsankar. Operating systems. Upper Saddle River, NJ: Pearson, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Haldar, Sibsankar. Operating systems. Upper Saddle River, NJ: Pearson Education, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Comer, Douglas. Operating Systems Designs. Englewood Cliffs (N.J.): Prentice-Hall, 1987.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

William, Stallings. Operating systems. New York: Macmillan, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

William, Stallings. Operating systems. Wyd. 2. Englewood Cliffs, NJ: Prentice Hall, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

William, Stallings. Operating systems. Wyd. 2. London: Prentice-Hall, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Operating systems (Computers)"

1

Chakraborty, Pranabananda. "Computers and Software". W Operating Systems, 1–34. Boca Raton: Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003383055-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Marwedel, Peter. "System Software". W Embedded Systems, 203–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_4.

Pełny tekst źródła
Streszczenie:
AbstractIn order to cope with the complexity of applications of embedded systems, reuse of components is a key technique. As pointed out by Sangiovanni-Vincentelli (The context for platform-based design. IEEE Design and Test of Computers, 2002), software and hardware components must be reused in the platform-based design methosdology (see p. 296). These components comprise knowledge from earlier design efforts and constitute intellectual property (IP). Standard software components that can be reused include system software components such as embedded operating systems (OSs) and middleware. The last term denotes software that provides an intermediate layer between the OS and application software. This chapter starts with a description of general requirements for embedded operating systems. This includes real-time capabilities as well as adaptation techniques to provide just the required functionality. Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols. We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel. Furthermore, we will explain how Linux can be adapted to systems with tight resource constraints. Finally, we will provide pointers for additional reusable software components, like hardware abstraction layers (HALs), communication software, and real-time data bases. Our description of embedded operating systems and of middleware in this chapter is consistent with the overall design flow.
Style APA, Harvard, Vancouver, ISO itp.
3

Romá, Llorenç, i Bernard Tellenbach. "Secure Operating System". W Trends in Data Protection and Encryption Technologies, 115–20. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_21.

Pełny tekst źródła
Streszczenie:
AbstractThe operating system is the backbone of every modern computer system, managing the system’s resources and executing applications. Therefore, it is essential to improve operating system security to ensure data integrity, confidentiality, and availability. When discussing secure operating systems, we generally refer to security-focused operating systems and security-evaluated operating systems. In critical environments, such as governments and military systems, that typically have higher security restrictions, security-evaluated operating systems are a convenient option used in other countries, ensuring those systems fulfill a set of security requirements. In addition, a trend toward more hardware security components, especially for separating cryptographic functions and implementing critical operations, has emerged. Although using secure operating systems is not a definitive solution to protect against all the dangers of current cyberspace, it is clear that it can reduce the impact of individual vulnerable applications or modules being exploited on the whole system.
Style APA, Harvard, Vancouver, ISO itp.
4

Chalk, B. S. "Operating Systems". W Computer Organisation and Architecture, 137–55. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-13871-5_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chalk, B. S., A. T. Carter i R. W. Hind. "Operating systems". W Computer Organisation and Architecture, 154–76. London: Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-0-230-00060-5_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Page, Daniel. "Operating Systems". W Texts in Computer Science, 495–534. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-256-6_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Grillmeyer, Oliver. "Operating Systems". W Exploring Computer Science with Scheme, 373–409. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2937-5_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Blum, Edward K. "Operating Systems (OS)". W Computer Science, 97–104. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1168-0_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Crutcher, Paul D., Neeraj Kumar Singh i Peter Tiegs. "Operating System". W Essential Computer Science, 81–131. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cherry, Denny. "Computer Operating System Security". W Enterprise-Grade IT Security for Small and Medium Businesses, 71–81. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8628-9_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Operating systems (Computers)"

1

Desnoyers, Peter J. "Teaching operating systems as how computers work". W the 42nd ACM technical symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1953163.1953249.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Levinthal, Adam, Pat Hanrahan, Mike Paquette i Jim Lawson. "Parallel computers for graphics applications". W ASPLOS II: Architectual support for programming languages and operating systems. New York, NY, USA: ACM, 1987. http://dx.doi.org/10.1145/36206.36202.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Larina, T. B. "SECURE BOOT OF OPERATING SYSTEMS IN COMPUTERS OF TRANSPORT CONTROL SYSTEMS". W Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-637-644.

Pełny tekst źródła
Streszczenie:
The article is devoted to the organization of loading operating systems in computers with firmware BIOS and UEFI BIOS. The steps for booting from MBR and GPT mapped hard drives are discussed. Particular attention is paid to the analysis of aspects of secure boot and potential vulnerabilities at all stages of the boot process.
Style APA, Harvard, Vancouver, ISO itp.
4

Lagar-Cavilla, Andres, Junwhan Ahn, Suleiman Souhlal, Neha Agarwal, Radoslaw Burny, Shakeel Butt, Jichuan Chang i in. "Software-Defined Far Memory in Warehouse-Scale Computers". W ASPLOS '19: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297858.3304053.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Shi, Yunong, Nelson Leung, Pranav Gokhale, Zane Rossi, David I. Schuster, Henry Hoffmann i Frederic T. Chong. "Optimized Compilation of Aggregated Instructions for Realistic Quantum Computers". W ASPLOS '19: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297858.3304018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Blahova, Marta. "Diagnostic Management, Operating State Configuration". W 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC). IEEE, 2022. http://dx.doi.org/10.1109/cscc55931.2022.00034.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Murali, Prakash, Jonathan M. Baker, Ali Javadi-Abhari, Frederic T. Chong i Margaret Martonosi. "Noise-Adaptive Compiler Mappings for Noisy Intermediate-Scale Quantum Computers". W ASPLOS '19: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297858.3304075.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Murali, Prakash, David C. Mckay, Margaret Martonosi i Ali Javadi-Abhari. "Software Mitigation of Crosstalk on Noisy Intermediate-Scale Quantum Computers". W ASPLOS '20: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3373376.3378477.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Porterfield, Allan, Rob Fowler, Sridutt Bhalachandra, Barry Rountree, Diptorup Deb i Rob Lewis. "Application Runtime Variability and Power Optimization for Exascale Computers". W ROSS '15: International Workshop on Runtime and Operating Systems for Supercomputers. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2768405.2768408.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Du, Dong, Qingyuan Liu, Xueqiang Jiang, Yubin Xia, Binyu Zang i Haibo Chen. "Serverless computing on heterogeneous computers". W ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3503222.3507732.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Operating systems (Computers)"

1

Wittie, Larry D. Portable Operating Systems for Network Computers: Distributed Operating Systems Support for Group Communications. Fort Belvoir, VA: Defense Technical Information Center, październik 1985. http://dx.doi.org/10.21236/ada170113.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Willson. L51756 State of the Art Intelligent Control for Large Engines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), wrzesień 1996. http://dx.doi.org/10.55274/r0010423.

Pełny tekst źródła
Streszczenie:
Computers have become a vital part of the control of pipeline compressors and compressor stations. For many tasks, computers have helped to improve accuracy, reliability, and safety, and have reduced operating costs. Computers excel at repetitive, precise tasks that humans perform poorly - calculation, measurement, statistical analysis, control, etc. Computers are used to perform these type of precise tasks at compressor stations: engine / turbine speed control, ignition control, horsepower estimation, or control of complicated sequences of events during startup and/or shutdown. For other tasks, however, computers perform very poorly at tasks that humans find to be trivial. A discussion of the differences in the way humans and computer process information is crucial to an understanding of the field of artificial intelligence. In this project, several artificial intelligence/ intelligent control systems were examined: heuristic search techniques, adaptive control, expert systems, fuzzy logic, neural networks, and genetic algorithms. Of these, neural networks showed the most potential for use on large bore engines because of their ability to recognize patterns in incomplete, noisy data. Two sets of experimental tests were conducted to test the predictive capabilities of neural networks. The first involved predicting the ignition timing from combustion pressure histories; the best networks responded within a specified tolerance level 90% to 98.8% of the time. In the second experiment, neural networks were used to predict NOx, A/F ratio, and fuel consumption. NOx prediction accuracy was 91.4%, A/F ratio accuracy was 82.9%, and fuel consumption accuracy was 52.9%. This report documents the assessment of the state of the art of artificial intelligence for application to the monitoring and control of large-bore natural gas engines.
Style APA, Harvard, Vancouver, ISO itp.
3

Mayer, Michael. Operating system boot package for IBM PC compatible computer systems. Web of Open Science, lipiec 2020. http://dx.doi.org/10.37686/asr.v1i1.68.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kohut, Uliana, i Mariya Shyshkina. Providing the Fundamentalisation of Operations Research Learning Using MAXIMA System. [б. в.], listopad 2020. http://dx.doi.org/10.31812/123456789/4464.

Pełny tekst źródła
Streszczenie:
In the article, the problems of using the systems of computer mathe- matics (SCM) as a tool to provide the fundamental component of operations re- search learning and students research activities support are considered. The role of SCM in the process of bachelors of informatics training and special aspects of pedagogical applications of these systems in the “Operations research” study is defined. The analysis of the basic concepts of the fundamentalisation of educa- tion and in particular the basic concepts of the fundamentalisation of informatics disciplines learning is summarized. The attempt to distinguish explicitly and specify the fundamental concepts in the content of “Operation research” learning is made. The method of “Operation research” study using Maxima system as a tool to support the basic concepts learning and an investigation is approved. The results of the pedagogical experiment on MAXIMA application to support the fundamental component of learning in the course of “Operation research” study and the analysis of its results are reported.
Style APA, Harvard, Vancouver, ISO itp.
5

Shyshkina, Mariya, i Uliana Kohut. The Method of Using the Maxima System for Operations Research Learning. [б. в.], czerwiec 2019. http://dx.doi.org/10.31812/123456789/3172.

Pełny tekst źródła
Streszczenie:
In the article, the problems of using the systems of computer mathematics (SCM) as a tool to support the teaching and research activities in the field of informatics and mathematics disciplines training are investigated. The role of SCM in the process of bachelors of informatics training and special aspects of pedagogical applications of these systems in the “Operations research” study is defined. The aim of the article is the justification of the Maxima system use of in the process of “Operations research” teaching in pedagogical university as enchasing the investigative approach to learning and determination of the perspective ways of its introduction. The main characteristics of SCM Maxima and the ways of access organizing to it both in local and the cloud-oriented implementation are considered. The results of the pedagogical experiment on the Maxima application to support the investigative approach to operation research study and the analysis of its conclusions are reported.
Style APA, Harvard, Vancouver, ISO itp.
6

Choquette, Gary. PR-000-SOFTWARE PRCI Software Catalog. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), sierpień 2020. http://dx.doi.org/10.55274/r0011749.

Pełny tekst źródła
Streszczenie:
This document provides a high-level summary of all research deliverables involving software developed with the support of PRCI. Some of these applications were written for older operating systems and may not work on current computer platforms. Many of the applications will work on current operating systems if suitable backward compatibility parameters are set for the application.
Style APA, Harvard, Vancouver, ISO itp.
7

Howell, Steven L. Evaluation Results Report for Next Generation Computer Resources Operating Systems Interface Baseline Selection by Next Generation Computer Resources (NGCR) Operating Systems Standards Working Group (SSWG). Fort Belvoir, VA: Defense Technical Information Center, maj 1990. http://dx.doi.org/10.21236/ada229510.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Shyshkina, Mariya, Uliana Kohut i Maiia Popel. The Design and Evaluation of the Cloud-based Learning Components with the Use of the Systems of Computer Mathematics. Sun SITE Central Europe, maj 2018. http://dx.doi.org/10.31812/0564/2253.

Pełny tekst źródła
Streszczenie:
In the article the problems of the systems of computer mathematics use as a tool for the students learning and research activities support are investigated. The promising ways of providing access to the mathematical software in the university learning and research environment are considered. The special aspects of pedagogical applications of these systems to support operations research study in the process of bachelors of informatics training are defined. The design and evaluation of the cloud-based learning components with the use of the systems of computer mathematics (on the example of Maxima system) as enchasing the investigative approach to learning of engineering and mathematics disciplines and increasing the pedagogical outcomes is justified. The set of psychological and pedagogical and also technological criteria of evaluation is substantiated. The results of pedagogical experiment are provided. The analysis and evaluation of existing experience of mathematical software use both in local and cloud-based settings is proposed.
Style APA, Harvard, Vancouver, ISO itp.
9

White, Alan, Jaison Abel, Ernst Berndt i Cory Monroe. Hedonic Price Indexes for Personal Computer Operating Systems and Productivity Suites. Cambridge, MA: National Bureau of Economic Research, kwiecień 2004. http://dx.doi.org/10.3386/w10427.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Lewis, Dustin, Naz Modirzadeh i Gabriella Blum. War-Algorithm Accountability. Harvard Law School Program on International Law and Armed Conflict, sierpień 2016. http://dx.doi.org/10.54813/fltl8789.

Pełny tekst źródła
Streszczenie:
In War-Algorithm Accountability (August 2016), we introduce a new concept—war algorithms—that elevates algorithmically-derived “choices” and “decisions” to a, and perhaps the, central concern regarding technical autonomy in war. We thereby aim to shed light on and recast the discussion regarding “autonomous weapon systems” (AWS). We define “war algorithm” as any algorithm that is expressed in computer code, that is effectuated through a constructed system, and that is capable of operating in relation to armed conflict. In introducing this concept, our foundational technological concern is the capability of a constructed system, without further human intervention, to help make and effectuate a “decision” or “choice” of a war algorithm. Distilled, the two core ingredients are an algorithm expressed in computer code and a suitably capable constructed system. Through that lens, we link international law and related accountability architectures to relevant technologies. We sketch a three-part (non-exhaustive) approach that highlights traditional and unconventional accountability avenues. We focus largely on international law because it is the only normative regime that purports—in key respects but with important caveats—to be both universal and uniform. In this way, international law is different from the myriad domestic legal systems, administrative rules, or industry codes that govern the development and use of technology in all other spheres. By not limiting our inquiry only to weapon systems, we take an expansive view, showing how the broad concept of war algorithms might be susceptible to regulation—and how those algorithms might already fit within the existing regulatory system established by international law.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii