Rozprawy doktorskie na temat „Virtual computer systems”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Virtual computer systems.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Virtual computer systems”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Nowostawski, Mariusz, i n/a. "Evolvable virtual machines". University of Otago. Department of Information Science, 2008. http://adt.otago.ac.nz./public/adt-NZDU20081204.145510.

Pełny tekst źródła
Streszczenie:
The Evolvable Virtual Machine abstract architecture (EVMA) is a computational architecture for dynamic hierarchically organised virtual machines. The concrete EVM instantiation (EVMI) builds on traditional stack-based models of computation and extends them by notions of hierarchy and reflection on the virtual machine level. The EVM Universe is composed of a number of autonomous and asynchronously communicating EVM machines. The main contribution of this work lies in the new model of computation and in the architecture itself: a novel, compact, flexible and expressive representation of distributed concurrent computation. The EVMA provides a way of expressing and modelling auto-catalytic networks composed of a hierarchical hypercycle of autopoietic subsystems characterised by self-adaptable structural tendencies and self-organised criticality. EVMA provides capabilities for: a) self-learning of dynamical patterns through continuous observation of computable environments, b) self-compacting and generalisation of existing program structures, c) emergence of efficient and robust communication code through appropriate machine assembly on both ends of communication channel. EVMA is in one sense a multi-dimensional generalisation of stack machine with the purpose of modelling concurrent asynchronous processing. EVMA approach can be also seen as a meta-evolutionary theory of evolution. The EVMA is designed to model systems that mimic living autonomous and adaptable computational processes. The EVMI prototype has been designed and developed to conduct experimental studies on complex evolving systems. The generality of our approach not only provides the means to experiment with complex hierarchical, computational and evolutionary systems, but it provides a useful model to evaluate, share and discuss the complex hierarchical systems in general. The EVMA provides a novel methodology and language to pursue research, to understand and to talk about evolution of complexity in living systems. In this thesis, we present the simple single-cell EVMI framework, discuss the multi-cell EVM Universe architecture, present experimental results, and propose further extensions, experimental studies, and possible hardware implementations of the EVMI.
Style APA, Harvard, Vancouver, ISO itp.
2

Watiti, Tom Wanjala. "Vision-based virtual mouse system". To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

King, Steven Paul. "Virtual environments for computer aided control design". Thesis, University of Leeds, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.297652.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zhu, Wenzhang. "Distributed JAVA virtual machine with thread migration /". View the Table of Contents & Abstract, 2004. http://sunzi.lib.hku.hk/hkuto/record/B30396773.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zhu, Wenzhang, i 朱文章. "Distributed JAVA virtual machine with thread migration". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B45015260.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Denz, Robert. "Securing Operating Systems Through Utility Virtual Machines". Thesis, Dartmouth College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10190644.

Pełny tekst źródła
Streszczenie:

The advent of hypervisors revolutionized the computing industry in terms of malware prevention and detection, secure virtual machine managers, and cloud resilience. However, this has resulted in a disjointed response to handling known threats rather than preventing unknown zero-day threats. This thesis introduces a new paradigm to cloud computing – utility virtual machines – that directly leverages virtualization hardware for protection and eliminates often accepted roles of the operating system kernel. This represents a break from prevailing practices and serves to establish a hardware root of trust for system operation.

Style APA, Harvard, Vancouver, ISO itp.
7

Lin, Sammy. "Towards virtual machine integrity using introspection /". Online version of thesis, 2009. http://hdl.handle.net/1850/10648.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sirer, Emin Gün. "Secure, efficient, and manageable virtual machine systems /". Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6970.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Li, Wubin. "Virtual Machine Placement in Cloud Environments". Licentiate thesis, Umeå universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-83385.

Pełny tekst źródła
Streszczenie:
With the emergence of cloud computing, computing resources (i.e., networks, servers, storage, applications, and services) are provisioned as metered on-demand services over networks, and can be rapidly allocated and released with minimal management effort. In the cloud computing paradigm, the virtual machine is one of the most commonly used resource carriers in which business services are encapsulated. Virtual machine placement optimization, i.e., finding optimal placement schemes for virtual machines, and reconfigurations according to the changes of environments, become challenging issues. The primary contribution of this licentiate thesis is the development and evaluation of our combinatorial optimization approaches to virtual machine placement in cloud environments. We present modeling for dynamic cloud scheduling via migration of virtual machines in multi-cloud environments, and virtual machine placement for predictable and time-constrained peak loads in single-cloud environments. The studied problems are encoded in a mathematical modeling language and solved using a linear programming solver. In addition to scientific publications, this work also contributes in the form of software tools (in EU-funded project OPTIMIS) that demonstrate the feasibility and characteristics of the approaches presented.
Style APA, Harvard, Vancouver, ISO itp.
10

Griffiths, R. B. "Virtual memory systems using magnetic bubble memory". Thesis, Bucks New University, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356215.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Whitaker, Andrew. "Building system services with virtual machine monitors /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6855.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Bhandari, Archna. "Enhancements to the frame virtual machine /". Online version of thesis, 1989. http://hdl.handle.net/1850/10581.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Koh, Younggyun. "Kernel service outsourcing: an approach to improve performance and reliability of virtualized systems". Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34700.

Pełny tekst źródła
Streszczenie:
Virtualization environments have become basic building blocks in consolidated data centers and cloud computing infrastructures. By running multiple virtual machines (VMs) in a shared physical machine, virtualization achieves high utilization of hardware resources and provides strong isolation between virtual machines. This dissertation discusses the implementation and the evaluation of an approach, called kernel service outsourcing, which improves the performance and the reliability of guest systems in the virtualized, multi-kernel environments. Kernel service outsourcing allows applications to exploit OS services from an external kernel existing in the shared system, not limiting application OS service requests to the local kernel. Because external kernels may provide more efficient services than the local kernel does, kernel service outsourcing provides new opportunities with applications in the guest OS for better performance. In addition, we apply the kernel service outsourcing technique to implement natural diversity, improving the reliability of the virtualized systems. We present two major benefits of kernel service outsourcing. First, we show that I/O service outsourcing can significantly improve the I/O performance of guest OSes by up to several times. In some important cases, the performance of network applications in the guest OS using network outsourcing was comparable to that of native OS (Linux). We also apply kernel service outsourcing between Windows and Linux, and show that kernel service outsourcing is viable even with two heterogeneous OS kernels. In addition, we study further performance optimization techniques that can be achieved in the external kernel when certain OS services are outsourced to the external kernel. The second benefit of kernel service outsourcing is to improve system reliability through natural diversity created by the combination of different kinds of the OS kernel implementations. Because OS services can be outsourced to different versions or even heterogeneous types of OS kernel for equivalent functions, malicious attacks that aim to exploit certain vulnerabilities in specific versions of OS kernels would not succeed in the outsourced kernels. Our case studies with Windows and Linux show that kernel service outsourcing was able to prevent the malicious attacks designed to exploit implementation-dependent vulnerabilities in the OSes from becoming successful in the outsourced systems.
Style APA, Harvard, Vancouver, ISO itp.
14

Wang, Lulu. "Virtual imaging system". Click here to access this resource online, 2009. http://hdl.handle.net/10292/668.

Pełny tekst źródła
Streszczenie:
The main purpose of this research project was to implement a combination of computer graphics and processing to generate displays that will aid in the visualization of the colour rendering properties of a range of light sources, including the new generation of high-output LEDs (light emitting diodes) that are becoming widely adopted in general lighting service. The CIE (International Commission on Illumination) has developed a colour appearance model CIECAM02 for use in colour imaging and colour management, and this model is utilized in this work. This thesis describes the design and construction of a computer-based model that can be used as a research tool for the simulation and demonstration of the colour rendering properties of various artificial light sources. It is a comprehensive study of the colour models and measurement procedures currently in use in the lighting industry, as recommended by the CIE. This research project focused on the display of a set of surface colour patches as if they were illuminated by a specific light source, and the simultaneous display of two such sets to demonstrate the surface colour differences arising from the use of the two different light sources. A VIS (virtual imaging system) has been developed to display the colour properties of a series of test colour samples under different light sources. This thesis describes the computer models developed for the representation and display of surface colours in general, and colour rendering in particular. The designed system computes and displays the colour of each sample from a knowledge of the light-source spectrum and the spectral reflectance of each surface. It can simultaneously display the colours resulting from illumination by two different sources. In addition, the system computes the colour appearance differences for two sets of colours using the CIECAM02 colour appearance model. Subjective and objective tests were taken to validate the computed results. The VIS has been designed and implemented. It also has been tested by 21 observers and we believe that it will be a powerful research tool for the lighting industry, especially in relation to colour rendering.
Style APA, Harvard, Vancouver, ISO itp.
15

Matthews, Stephen W. Miller Kenneth H. "An open architecture for defense virtual environment training systems /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMatthews.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Rudolph P. Darken, Joseph A. Sullivan. Includes bibliographical references (p. 131-134). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
16

Deshpande, Umesh D. "Improving the performance of live migration of virtual machines". Diss., Online access via UMI:, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Luo, Yang. "Performance modeling and load balancing for Distributed Java Virtual Machine". Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41509043.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Varahamurthy, Varun. "Virtual Reality Engine Development". DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1214.

Pełny tekst źródła
Streszczenie:
With the advent of modern graphics and computing hardware and cheaper sensor and display technologies, virtual reality is becoming increasingly popular in the fields of gaming, therapy, training and visualization. Earlier attempts at popularizing VR technology were plagued by issues of cost, portability and marketability to the general public. Modern screen technologies make it possible to produce cheap, light head-mounted displays (HMDs) like the Oculus Rift, and modern GPUs make it possible to create and deliver a seamless real-time 3D experience to the user. 3D sensing has found an application in virtual and augmented reality as well, allowing for a higher level of interaction between the real and the simulated. There are still issues that persist, however. Many modern graphics/game engines still do not provide developers with an intuitive or adaptable interface to incorporate these new technologies. Those that do, tend to think of VR as a novelty afterthought, and even then only provide tailor-made extensions for specific hardware. The goal of this paper is to design and implement a functional, general-purpose VR engine using abstract interfaces for much of the hardware components involved to allow for easy extensibility for the developer.
Style APA, Harvard, Vancouver, ISO itp.
19

Ghodke, Ninad Hari. "Virtualization techniques to enable transparent access to peripheral devices across networks". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0005684.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Van, der Elst Herman. "Coding of virtual human motion". Thesis, University of Pretoria, 1999. http://hdl.handle.net/2263/27728.

Pełny tekst źródła
Streszczenie:
Please read the abstract in the section 00front of this document
Thesis (PhD (Electronic Engineering))--University of Pretoria, 2007.
Electrical, Electronic and Computer Engineering
unrestricted
Style APA, Harvard, Vancouver, ISO itp.
21

Luo, Yang, i 羅陽. "Performance modeling and load balancing for Distributed Java Virtual Machine". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B41509043.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Panagou, Soterios. "Development of the components of a low cost, distributed facial virtual conferencing system". Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006490.

Pełny tekst źródła
Streszczenie:
This thesis investigates the development of a low cost, component based facial virtual conferencing system. The design is decomposed into an encoding phase and a decoding phase, which communicate with each other via a network connection. The encoding phase is composed of three components: model acquisition (which handles avatar generation), pose estimation and expression analysis. Audio is not considered part of the encoding and decoding process, and as such is not evaluated. The model acquisition component is implemented using a visual hull reconstruction algorithm that is able to reconstruct real-world objects using only sets of images of the object as input. The object to be reconstructed is assumed to lie in a bounding volume of voxels. The reconstruction process involves the following stages: - Space carving for basic shape extraction; - Isosurface extraction to remove voxels not part of the surface of the reconstruction; - Mesh connection to generate a closed, connected polyhedral mesh; - Texture generation. Texturing is achieved by Gouraud shading the reconstruction with a vertex colour map; - Mesh decimation to simplify the object. The original algorithm has complexity O(n), but suffers from an inability to reconstruct concave surfaces that do not form part of the visual hull of the object. A novel extension to this algorithm based on Normalised Cross Correlation (NCC) is proposed to overcome this problem. An extension to speed up traditional NCC evaluations is proposed which reduces the NCC search space from a 2D search problem down to a single evaluation. Pose estimation and expression analysis are performed by tracking six fiducial points on the face of a subject. A tracking algorithm is developed that uses Normalised Cross Correlation to facilitate robust tracking that is invariant to changing lighting conditions, rotations and scaling. Pose estimation involves the recovery of the head position and orientation through the tracking of the triangle formed by the subject's eyebrows and nose tip. A rule-based evaluation of points that are tracked around the subject's mouth forms the basis of the expression analysis. A user assisted feedback loop and caching mechanism is used to overcome tracking errors due to fast motion or occlusions. The NCC tracker is shown to achieve a tracking performance of 10 fps when tracking the six fiducial points. The decoding phase is divided into 3 tasks, namely: avatar movement, expression generation and expression management. Avatar movement is implemented using the base VR system. Expression generation is facilitated using a Vertex Interpolation Deformation method. A weighting system is proposed for expression management. Its function is to gradually transform from one expression to the next. The use of the vertex interpolation method allows real-time deformations of the avatar representation, achieving 16 fps when applied to a model consisting of 7500 vertices. An Expression Parameter Lookup Table (EPLT) facilitates an independent mapping between the two phases. It defines a list of generic expressions that are known to the system and associates an Expression ID with each one. For each generic expression, it relates the expression analysis rules for any subject with the expression generation parameters for any avatar model. The result is that facial expression replication between any subject and avatar combination can be performed by transferring only the Expression ID from the encoder application to the decoder application. The ideas developed in the thesis are demonstrated in an implementation using the CoRgi Virtual Reality system. It is shown that the virtual-conferencing application based on this design requires only a bandwidth of 2 Kbps.
Adobe Acrobat Pro 9.4.6
Adobe Acrobat 9.46 Paper Capture Plug-in
Style APA, Harvard, Vancouver, ISO itp.
23

Akgul, Turgut, i Coskun Kargin. "Develop, build, and test a virtual lab to support vulnerability training system". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1468.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited
A computer security virtual lab architecture was developed and tested for functionality and performance. Four Dell PowerEdge 1650, dual processor, blade servers were configured as host machines with VMware and VNC running on a Linux RedHat 9 Kernel. An Apache-Tomcat web server was configured as the external interface to lab users. Web content was created, the site was secured with SSL, and Java Servlet functionality was enabled. Host machine performance was tested under various load conditions. Analysis indicated that, for our architecture, that the average host machine CPU load was [about]12 % while the average memory load was [about]33 %. We conclude that for the cost and space requirements of 5 1U blade servers we have configured an equivalent 20 computer lab. Performance tests show that the virtual lab could scale easily from 4 - 30 computers.
1st Lieutenant, Turkish Army
1st Lieutenant, Turkish Army
Style APA, Harvard, Vancouver, ISO itp.
24

Coco, Geoffrey P. "The virtual environment operating system : derivation, function, and form /". Connect to this title online (PDF format) Connect to this title online (PostScript format), 1993. http://www.hitl.washington.edu/publications/th%2D93%2D1/th%2D93%2D1.ps.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Kargin, Coskun Akgul Turgut. "Develop, build, and test a virtual lab to support vulnerability training system /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FKargin.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Wang, Tianqi. "An architecture to support scalable distributed virtual environment systems on grid". Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B31473374.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Peña, Selene. "UNIX remote access via IBM S/390 system". [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/SPena2006.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Serin, Ekrem. "Design and test of the cross-format schema protocol (XFSP) for networked virtual environments". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FSerin.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Don Brutzman, Joseph Sullivan, Curt Blais. Includes bibliographical references (p. 127-131). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
29

Seshasayee, Balasubramanian. "Middleware-based services for virtual cooperative mobile platforms". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24791.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--Computing, Georgia Institute of Technology, 2008.
Committee Chair: Schwan, Karsten; Committee Member: Fujimoto, Richard; Committee Member: Narasimhan, Nitya; Committee Member: Pande, Santosh; Committee Member: Riley, George.
Style APA, Harvard, Vancouver, ISO itp.
30

Schechtman, Gregory Michael. "When silence speaks louder than words computer-mediated communications and percieved ostracism /". Online access for everyone, 2008. http://www.dissertations.wsu.edu/Dissertations/Summer2008/g_schechtman_071808.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Dobbs, Verlynda Smithson. "An automated methodology for the design and implementation of virtual interfaces /". The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487262825077755.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Wang, Tianqi, i 王天琦. "An architecture to support scalable distributed virtual environment systems on grid". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31473374.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Fang, Weijian. "Distributed object sharing for cluster-based Java virtual machine /". View the Table of Contents & Abstract, 2004. http://sunzi.lib.hku.hk/hkuto/record/B30575163.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Fang, Weijian, i 方維堅. "Distributed object sharing for cluster-based Java virtual machine". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B45014772.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Milouchev, Alexandre (Alexandre M. ). "Estimating memory locality for virtual machines on NUMA systems". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85448.

Pełny tekst źródła
Streszczenie:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 59-61).
The multicore revolution sparked another, similar movement towards scalable memory architectures. With most machines nowadays exhibiting non-uniform memory access (NUMA) properties, software and operating systems have seen the necessity to optimize their memory management to take full advantage of such architectures. Type 1 (native) hypervisors, in particular, are required to extract maximum performance from the underlying hardware, as they often run dozens of virtual machines (VMs) on a single system and provide clients with performance guarantees that must be met. While VM memory demand is often satisfied by CPU caches, memory-intensive workloads may induce a higher rate of last-level cache misses, requiring more accesses to RAM. On today's typical NUMA systems, accessing local RAM is approximately 50% faster than remote RAM. We discovered that current-generation processors from major manufacturers do not provide inexpensive ways to characterize the memory locality achieved by VMs and their constituents. Instead, we present in this thesis a series of techniques based on statistical sampling of memory that produce powerful estimates for NUMA locality and related metrics. Our estimates offer tremendous insight on inefficient placement of VMs and memory, and can be a solid basis for algorithms aiming at dynamic reorganization for improvements in locality, as well as NUMA-aware CPU scheduling algorithms.
by Alexandre Milouchev.
M. Eng.
Style APA, Harvard, Vancouver, ISO itp.
36

Asli, Kilic. "Coordinate Systems For A Naval Virtual Environment". Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12606465/index.pdf.

Pełny tekst źródła
Streszczenie:
The purpose of this thesis is implementing World Geodetic System (WGS) for Naval Surface Tactical Maneuvering Simulation System (NSTMSS), a High Level Architecture (HLA) based naval simulation, and also implementing body coordinate system for the ships of NSTMSS and its combination with WGS so that NSTMSS can be more accurate, and new ship dynamics models can be integrated to the NSTMSS environment more easily. To improve the coordinate system of NSTMSS these methods were used
World Geodetic System - 1984 (WGS 84) was chosen as the reference system of new coordinate system of NSTMSS and coordinates were transformed to Universal Transverse Mercator (UTM) Coordinate System. Also, the terrains which NSTMSS uses created in OpenFlight (FLT) format with UTM map projection method. In addition to this, Ship Body Coordinate System was implemented as a Cartesian coordinate system. This thesis has achieved improved coordinate systems for the NSTMSS environment to increase the realism of the simulation.
Style APA, Harvard, Vancouver, ISO itp.
37

Koppe, Jason. "Differential virtualization for large-scale system modeling /". Online version of thesis, 2008. http://hdl.handle.net/1850/7543.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Yulga, James. "Implementation of Microsoft's Virtual PC in networking curriculum". [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/JYulgaPartI2006.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Subramaniam, Niran. "User interactions in enterprise systems : the role of virtual co-presence on collective activity". Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/56281/.

Pełny tekst źródła
Streszczenie:
This research stems from the premise that Enterprise Systems (ES) are perceived to be challenging to use as these systems impose rigid processes and practices on ES users. Scholars argue that the mismatch between the embedded business processes of ES and the work practices of people in organisations places constraints on how tasks are coordinated and completed in practice. They propose that in order to be responsive, ES not only need to integrate data and processes, but also need to resolve the interdependencies of tasks of different divisions. Recent academic research argues that social technologies provide a more flexible, ‘people-centric’ platform that offers better alignment between processes and the way people actually work. Social technologies are acknowledged for their capabilities in connecting people with one another in getting work done collectively in the contemporary organisational contexts. ES that are enhanced with capabilities for user interactions in contemporary organisational contexts have become a digital medium for efficient user interaction and collective activity across the divisions of an organisation. This thesis explores user interactions in ES and investigates the impact of social technologies in the completion of tasks in Enterprise Systems (ES). The research is focused on an exploratory field study and an in-depth field study of ES use contexts. The exploratory field study sought to explore the ‘sense of presence’ of users in their interactions in the use contexts of ES at a western Canadian University. Subsequently, the in-depth field study investigated how co-present, dispersed user interactions afforded collective activity in the completion of tasks at a large telecommunication organisation in Europe. The users interviewed, integrated various social technologies in their use contexts of ES and collectively executed tasks from three different countries at this organisation. Findings demonstrate that a ‘sense of co-presence’ of users in the digitally mediated network of ES enabled focused interactions, and affected collective completion of tasks. Through successive focused interactions, virtual co-present users changed roles depending on their privileges for specific tasks, forming an interaction order. The thesis argues that different interaction orders form based on the intensity of virtual co-presence of users and the regularity of their focused interactions, that the interaction orders sediment to serve as memory traces for successive interactions and, that these recursive interactions structure collective action to facilitate the emergence of digital platforms for collective activity. Drawing on the insights gained on the effect of virtual co-presence on ES users’ interaction, the thesis outlines some implications for the theory and practice of collective activity in ES for the contemporary organisations.
Style APA, Harvard, Vancouver, ISO itp.
40

Vildan, Tanriverdi. "A virtual reality interface design (VRID) model and methodology /". Thesis, Connect to Dissertations & Theses @ Tufts University, 2001.

Znajdź pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--Tufts University, 2001.
Adviser: Robert J. K. Jacob. Submitted to the Dept. of Computer Science. Includes bibliographical references (leaves 114-117). Access restricted to members of the Tufts University community. Also available via the World Wide Web;
Style APA, Harvard, Vancouver, ISO itp.
41

Wong, Wai-sang. "A virtual reality modeling tool for students of architecture /". Hong Kong : University of Hong Kong, 2000. http://sunzi.lib.hku.hk/hkuto/record.jsp?B22088994.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Miller, Elliot A. "Quantifying resource sharing, resource isolation and agility for web applications with virtual machines". Link to electronic thesis, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-082707-002653/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Boritz, James. "The effectiveness of three-dimensional interaction". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0028/NQ38856.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Southern, Gabriel. "Symmetric multiprocessing virtualization". Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3225.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--George Mason University, 2008.
Vita: p. 77. Thesis director: David Hwang. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering. Title from PDF t.p. (viewed Aug. 28, 20088). Includes bibliographical references (p. 73-76). Also issued in print.
Style APA, Harvard, Vancouver, ISO itp.
45

Robb, David S. S. "The theory and implementation of a secure system". Thesis, University of St Andrews, 1992. http://hdl.handle.net/10023/13497.

Pełny tekst źródła
Streszczenie:
Computer viruses pose a very real threat to this technological age. As our dependence on computers increases so does the incidence of computer virus infection. Like their biological counterparts, complete eradication is virtually impossible. Thus all computer viruses which have been injected into the public domain still exist. This coupled with the fact that new viruses are being discovered every day is resulting in a massive escalation of computer virus incidence. Computer viruses covertly enter the system and systematically take control, corrupt and destroy. New viruses appear each day that circumvent current means of detection, entering the most secure of systems. Anti-Virus software writers find themselves fighting a battle they cannot win: for every hole that is plugged, another leak appears. Presented in this thesis is both method and apparatus for an Anti-Virus System which provides a solution to this serious problem. It prevents the corruption, or destruction of data, by a computer virus or other hostile program, within a computer system. The Anti-Virus System explained in this thesis will guarantee system integrity and virus containment for any given system. Unlike other anti-virus techniques, security can be guaranteed, as at no point can a virus circumvent, or corrupt the action of the Anti-Virus System presented. It requires no hardware modification of the computer or the hard disk, nor software modification of the computer's operating system. Whilst being largely transparent to the user, the System guarantees total protection against the spread of current and future viruses.
Style APA, Harvard, Vancouver, ISO itp.
46

Cheng, Luwei, i 程芦伟. "Network performance isolation for virtual machines". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47753183.

Pełny tekst źródła
Streszczenie:
Cloud computing is a new computing paradigm that aims to transform computing services into a utility, just as providing electricity in a “pay-as-you-go” manner. Data centers are increasingly adopting virtualization technology for the purpose of server consolidation, flexible resource management and better fault tolerance. Virtualization-based cloud services host networked applications in virtual machines (VMs), with each VM provided the desired amount of resources using resource isolation mechanisms. Effective network performance isolation is fundamental to data centers, which offers significant benefit of performance predictability for applications. This research is application-driven. We study how network performance isolation can be achieved for latency-sensitive cloud applications. For media streaming applications, network performance isolation means both predicable network bandwidth and low-jittered network latency. The current resource sharing methods for VMs mainly focus on resource proportional share, whereas ignore the fact that I/O latency in VM-hosted platforms is mostly related to resource provisioning rate. The resource isolation with only quantitative promise does not sufficiently guarantee performance isolation. Even the VM is allocated with adequate resources such as CPU time and network bandwidth, problems such as network jitter (variation in packet delays) can still happen if the resources are provisioned at inappropriate moments. So in order to achieve performance isolation, the problem is not only how many/much resources each VM gets, but more importantly whether the resources are provisioned in a timely manner. How to guarantee both requirements to be achieved in resource allocation is challenging. This thesis systematically analyzes the causes of unpredictable network latency in VM-hosted platforms, with both technical discussion and experimental illustration. We identify that the varied network latency is jointly caused by VMM CPU scheduler and network traffic shaper, and then address the problem in these two parts. In our solutions, we consider the design goals of resource provisioning rate and resource proportionality as two orthogonal dimensions. In the hypervisor, a proportional share CPU scheduler with soft real-time support is proposed to guarantee predictable scheduling delay; in network traffic shaper, we introduce the concept of smooth window to smooth packet delay and apply closed-loop feedback control to maintain network bandwidth consumption. The solutions are implemented in Xen 4.1.0 and Linux 2.6.32.13, which are both the latest versions when this research was conducted. Extensive experiments have been carried out using both real-life applications and low-level benchmarks. Testing results show that the proposed solutions can effectively guarantee network performance isolation, by achieving both predefined network bandwidth and low-jittered network latency.
published_or_final_version
Computer Science
Master
Master of Philosophy
Style APA, Harvard, Vancouver, ISO itp.
47

Cuvillo, Juan del. "Breaking away from the OS shadow a program execution model aware thread virtual machine for multicore architectures /". Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 120 p, 2008. http://proquest.umi.com/pqdweb?did=1601517941&sid=4&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Valente, Ronald R. "Analysis of virtual environments through a web based visualization tool /". Online version of thesis, 2009. http://hdl.handle.net/1850/10826.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Chow, Angelina. "A research on virtual money exchange systems". Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2130125.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Kumar, Sanjay. "New abstractions and mechanisms for virtualizing future many-core systems". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24644.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--Computing, Georgia Institute of Technology, 2009.
Committee Chair: Dr. Karsten Schwan; Committee Member: Dr. Calton Pu; Committee Member: Dr. Mustaque Ahamad; Committee Member: Dr. Parthasarathy Ranganathan; Committee Member: Dr. Sudhakar Yalamanchili
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii