Academic literature on the topic 'Computer Books: Operating Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer Books: Operating Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer Books: Operating Systems"

1

Cordón-García, José Antonio, Raquel Gómez-Díaz, Araceli García-Rodríguez, and Taísa Dantas. "Operation Patterns in Recommendation Systems." Journal of Information Technology Research 11, no. 4 (October 2018): 16–31. http://dx.doi.org/10.4018/jitr.2018100102.

Full text
Abstract:
The main purpose of this article is to analyze different recommendation systems and examine how they are used within digital environments to establish classifications for books. Following a bibliographical review of recommendation systems, the performance of a number of book recommendation systems is tested. The systems tested are grouped according to whether recommendations are done by specialists, are based on social networking or use more complex statistical stylometry to help each reader find the reading materials best suited to them. Results indicate that progress in technology implementation is favoring the findability of books by combining the strengths of the various systems. The principal social implication of this research is that recommendation systems enable the reader's optimized use of books, as well as allow the development of content appropriation systems. Concerning to originality and value is important to emphasize there is no previous known work establishing the taxonomy proposed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
2

Spragins, J. "Heterogeneous Internetworking: Networking Technically Diverse Operating Systems [New Books]." IEEE Network 10, no. 6 (November 1996): 3. http://dx.doi.org/10.1109/mnet.1996.546350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cassinda Quissanga, Fernando. "Characterization of cellular mobile operating systems: Android, Symbian, iphone and Windows phone." Project, Design and Management 1, no. 2 (November 18, 2019): 75–88. http://dx.doi.org/10.35992/pdm.v1i2.200.

Full text
Abstract:
The present theme refers to the characterization of cellular mobile operating systems: Android, Symbian, iPhone, Windows Phone. To present which of the cellular mobile operating systems, is the most secure and the most susceptible to computer viruses, the qualitative methodology based on the bibliographic reference, data collected in books, technical manuals, manufacturer information and on internet sites; to the analysis of the documentary data, done in tables. However, it is concluded that not all types of computer viruses infect cell phones, it depends on the kernel of the operating system. It was possible to know that Symbian is the operating system most prone to contamination of computer viruses, this operating system is made of a C ++ programming language coming from the C language one of the most popular and has many developers. Android is a mobile operating system, not so secure, based on the kernel of Linux, being free software allows more number of developers of the technology. Windows phone is the least susceptible to virtual pests. And Microsoft has invested heavily in their security system, restricted access to the app store to prevent the user from downloading programs out of the market, since every day are placed numerous applications. Bluetooth technology represents a major form of virus transmission.
APA, Harvard, Vancouver, ISO, and other styles
4

Bychkov, Oleksii. "TO THE CONCEPT OF A PROTECTED OPERATION SYSTEM." Information systems and technologies security, no. 1 (1) (2019): 42–51. http://dx.doi.org/10.17721/ists.2019.1.42-51.

Full text
Abstract:
At the present stage of the use of information technologies in society, the issue of information protection becomes important. Operating systems play a major role in this. They are assigned the role of protectors of all user data and access rights. The authors of the article were tasked with proposing a classification of the use of operating systems and with the requirements for mechanisms of protection of information under this classification. In the article: - the existing security standards that are implemented in modern operating systems are analyzed. Existing security standards are outlined (Trusted Computer System Evaluation Criteria «Orange Book», TCSEC, ISO 17799). In the Orange Book, a trusted system is defined as "a system that uses sufficient hardware and software to provide simultaneous processing of information of varying secrecy by a group of users without violating access rights." Security mechanisms and security classes of modern operating systems and BS 7799 security management model are also considered; this standard contains a systematic, complete, universal list of safety regulators, useful for the organization of almost any size, structure and scope information security management system. The standard Information Security Management System (ISMS) refers to the proportion of the overall risk-based management system designed to design, implement, control, maintain and improve information security activities. This system consists of organizational structures, policies, planning actions, responsibilities, procedures, processes and resources; - the analysis of the mechanisms of the complex system of information security (CSIS) and security, which are implemented in modern operating systems; - classification of operating system usage variants in information and telecommunication systems is offered. Requirements for information security mechanisms for operating systems according to the proposed classification are defined; - requirements for operating system information security standard and requirements for OS security mechanisms within the usage class are proposed
APA, Harvard, Vancouver, ISO, and other styles
5

Bakko, Imad Matti, and Ruwaida Mohammed Yas. "Design and implementing a software tool to ensure undeadlock state by perfect distribution of resources' instances among competing processes." Journal of Advanced Computer Science & Technology 4, no. 2 (July 3, 2015): 237. http://dx.doi.org/10.14419/jacst.v4i2.4857.

Full text
Abstract:
<p>In computer operating systems books, they explain and solve deadlock problems by declaring in advance the maximum needs of resources and their instances for each process, the total number of resources' instances, and the allocation of the resources' instances for each process. In this paper, we introduce an effective software tool to prove that it is not necessary to declare in advance the allocation of resources' instances for each process since we suggested and implement in the tool some equations to calculate and discover a suitable allocation of resources' instances to be distributed among competing processes in such a way that the computer system will never enter a deadlock state. In fact, the only necessary and sufficient conditions to solve deadlock problems are the total number of resources and their instances besides the maximum needs of resources and their instances for each process. The theory and details are explained with some examples in the contents.</p>
APA, Harvard, Vancouver, ISO, and other styles
6

D, Shofia Priya Dharshini, R. Saranya, and S. Sneha. "Esp32 cam based object detection &amp; Identification with opencv." 4 2, no. 4 (December 1, 2022): 166–71. http://dx.doi.org/10.46632/daai/2/4/31.

Full text
Abstract:
Actual image segmentation is a large, vibrant, as well as complicated part of computer perception. The identification of a separate image is referred to as photograph clustering, while the identification of multiple images that contain objects is referred to as object tracking. The above reveals the conceptual objects of a category in image files and films. True image classification is used in numerous implementations such as feature extraction, security cameras, crosswalks acknowledgement, individuals measuring, personality cars, person identification, throw recording in games, and numerous others. Convolution Ne Ural Networks (CNNs) are a form of Deep Teaching tool that can be employed to visual information utilizing Opens (Free software Computer Vision), a books of operating systems aimed mainly toward true machine. Along with vehicular clips, we are analyzing the performance of object detection and identification methods such as ESP32 CAM Based Object Detection &amp; Identification with Open CV,that can be utilized in a wide range of scenarios including security cameras as well as machine vision, face detection, and autonomous driving. We&#39;ve utilized the club Library to detect objects here. To detect objects, the library employs a pre- trained AI model on the COCO dataset. YOLOv3 is the name of the pre- trained model.
APA, Harvard, Vancouver, ISO, and other styles
7

Okinyi, Oyoo Mark, Kelvin Kabeti Omieno, and Kitone K. Margaret. "The Value Of Human Resource Information Systems In Human Resource Management." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 10 (December 5, 2013): 3085–89. http://dx.doi.org/10.24297/ijct.v11i10.2977.

Full text
Abstract:
In today’s organizations Human Resource Management has become one of the key resources of business organizations. The need to integrate Human Resource Management (HRM) with information systems has become a necessity as modern firms are realizing that their people and information resources are vital for their survival. This is the reason Human Resource Information Systems (HRIS) is now used extensively in all organizations irrespective of its size, tenure of establishment, complexities of operations etc. With the growing importance of human resource management and increasing size of the organizations, maintenance of employee related data and generating reports are the crucial aspects of any organization. Therefore more and more organizations are adopting computer based human resource management systems (HRMS) This paper is an attempt to highlight the value of information systems in Human Resource Management. The study is conducted through analysis of secondary data from books, journals and reviews.
APA, Harvard, Vancouver, ISO, and other styles
8

Prabhu, N. U. "A bibliography of books and survey papers on queueing systems: Theory and applications." Queueing Systems 2, no. 4 (December 1987): 393–98. http://dx.doi.org/10.1007/bf01150051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sidhu, Brahmaleen K., Kawaljeet Singh, and Neeraj Sharma. "Refactoring UML Models of Object-Oriented Software: A Systematic Review." International Journal of Software Engineering and Knowledge Engineering 28, no. 09 (September 2018): 1287–319. http://dx.doi.org/10.1142/s0218194018500365.

Full text
Abstract:
Model refactoring enhances the platform-independent design models of software aiming at smoother impact of requirement changes, thereby improving the design quality and assisting in their evolution and maintenance. This study reports a systematic literature review of refactoring techniques particularly in the domain of models of object-oriented software systems. The study used the standard systematic literature review method based on a comprehensive set of 58 articles from a total of 1200 articles published in leading journals, premier conferences, workshops and books. The primary studies were thoroughly analyzed on various aspects of model refactoring process. Identification of methodologies and classification on the basis of model transformation systems, refactoring operations and their application, model behavior specification and preservation, model quality expression, model consistency management and automation of process is reported. This study shows that inadequate model-based approaches for behavior preservation, synchronized model enhancement and empirical evaluation of the proposed refactoring techniques are major obstacles in fully automated model refactoring process.
APA, Harvard, Vancouver, ISO, and other styles
10

Sishadi, Aditya Arya Pratama, and Putri Aisyiyah Rakhma Devi. "Sistem Informasi Perpustakaan Berbasis Web Pada UPT 56 Gresik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 6 (December 30, 2022): 1051–56. http://dx.doi.org/10.32672/jnkti.v5i6.5478.

Full text
Abstract:
Abstrak - Operasi transaksi perpustakaan UPT Negeri 56 Gresik diidentifikasi menggunakan data dari aplikasi website ini. Tata cara keanggotaan, peminjaman, dan pengembalian buku merupakan bagian dari operasional perpustakaan. Website ini dapat menangani tata cara tersebut serta perhitungan halus, pemeliharaan data induk untuk membantu pengelolaan koleksi buku perpustakaan, penggunaan katalog untuk pencarian buku, dan tampilan laporan buku.Website ini dibuat dengan menggunakan proses pembuatan sistem waterfall, pengumpulan informasi melalui wawancara, observasi, dan penelitian literatur, analisis pengguna, teknologi, kebutuhan, data, sistem, informasi, dan kinerja, serta analisis desain sistem flowcharting. Bahasa pemrograman PHP, basis data MySQL, situs web server lokal Apache, dan Sublime sebagai editor situs web semuanya digunakan dalam pembuatan web. Pengujian kotak hitam dan pengujian beta adalah metode yang digunakan untuk menguji data web.Banyak manfaat yang akan diperoleh dari pembuatan aplikasi website perpustakaan di UPT Negeri 56 Gresik ini, yaitu dapat membantu pustakawan dalam pekerjaannya dengan meningkatkan kinerja dan efisiensi, mempercepat pelayanan petugas untuk transaksi peminjaman, pengembalian buku, dan menghitung denda, serta pembuatannya. memudahkan pengguna perpustakaan untuk mencari informasi tentang perpustakaan.Kata kunci: : Aplikasi web, Perpustakaan, Upt 56 gresik Abstract - UPT Negeri 56 Gresik library transaction operations are identified using data from this website application. Procedures for membership, borrowing, and returning books are part of library operations. This website can handle these procedures such as smooth calculations, maintenance of master data to help manage library book collections, use of catalogs to search books, and view book reports.This website was created using processes for creating a waterfall system, for information gathering through interviews, observation, and literature research, for analyzing users, technology, needs, data, systems, information, and performance, and for flowcharting system design analysis. The PHP programming language, MySQL data base, Apache local server website, and Sublime as the website editor are all used in web building. Black-box testing and beta testing are methods used to test web data.There will be many advantages from the creation of the library website application at UPT Negeri 56 Gresik, which can assist librarians in their work by improving performance and efficiency, speeding up officer services for borrowing transactions, returning books, and calculating fines, and making it easier for library users to find information about the library. Keywords: Technology, Company, Computer, PHL, Payslip
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer Books: Operating Systems"

1

Moura, F. C. S. "Performance evaluation of operating systems." Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frame, Charles E. "Personal computer and workstation operating systems tutorial." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280132.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1994.
Thesis advisor(s): Norman F. Schneidewind. "March 1994." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Denz, Robert. "Securing Operating Systems Through Utility Virtual Machines." Thesis, Dartmouth College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10190644.

Full text
Abstract:

The advent of hypervisors revolutionized the computing industry in terms of malware prevention and detection, secure virtual machine managers, and cloud resilience. However, this has resulted in a disjointed response to handling known threats rather than preventing unknown zero-day threats. This thesis introduces a new paradigm to cloud computing – utility virtual machines – that directly leverages virtualization hardware for protection and eliminates often accepted roles of the operating system kernel. This represents a break from prevailing practices and serves to establish a hardware root of trust for system operation.

APA, Harvard, Vancouver, ISO, and other styles
4

Baumann, Andrew Computer Science &amp Engineering Faculty of Engineering UNSW. "Dynamic update for operating systems." Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28356.

Full text
Abstract:
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administrators. The aim of this research is to develop a model for dynamic update of operating systems, allowing a system to be patched without the need for a reboot or other service interruption. In this work, a model for dynamic update based on operating system modularity is developed and evaluated using a prototype implementation for the K42 operating system. The prototype is able to update kernel code and data structures, even when the interfaces between kernel modules change. When applying an update, at no point is the system's entire execution blocked, and there is no additional overhead after an update has been applied. The base runtime overhead is also very low. An analysis of the K42 revision history shows that approximately 79% of past performance and bug-fix changes to K42 could be converted to dynamic updates, and the proportion would be even higher if the changes were being developed for dynamic update. The model also extends to other systems such as Linux and BSD, that although structured modularly, are not strictly object-oriented like K42. The experience with this approach shows that dynamic update for operating systems is feasible given a sufficiently-modular system structure, allows maintenance patches and updates to be applied without disruption, and need not constrain system performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Sinha, Amit 1976. "Energy efficient operating systems and software." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86773.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 153-159).
Energy efficient system design is becoming increasingly important with the proliferation of portable, battery-operated appliances such as laptops, Personal Digital Assistants (PDAs) and cellular phones. Numerous dedicated hardware approaches for energy mini-mization have been proposed while software energy efficiency has been relatively unexplored. Since it is the software that drives the hardware, decisions taken during software design can have a significant impact on system energy consumption. This thesis explores avenues for improving system energy efficiency from application level to the operating system level. The embedded operating system can have a significant impact on system energy by performing dynamic power management both in the active and passive states of the device. Software controlled active power management techniques using dynamic voltage and frequency scaling have been explored. Efficient workload prediction strategies have been developed that enable just-in-time computation. An algorithm for efficient real-time operating system task scheduling has also been developed that minimizes energy consumption. Portable systems spend a lot of time in sleep mode. Idle power management strategies have been developed that consider the effect of leakage and duty-cycle on system lifetime. A hierarchical shutdown approach for systems characterized multiple sleep states has been proposed. Although the proposed techniques are quite general, their applicability and utility have been demonstrated using the MIT [mu]AMPS wireless sensor node an example system wherever possible.
(cont.) To quantify software energy consumption, an estimation framework has been developed based on experiments on the StrongARM and Hitachi processors. The software energy profiling tool is available on-line. Finally, in energy constrained systems, we would like to have the ability to trade-off quality of service for extended battery life. A scalable approach to application development has been demonstrated that allows energy quality trade-offs.
by Amit Sinha.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
6

Neugebauer, Rolf. "Decentralising resource management in operating systems." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/4118/.

Full text
Abstract:
This dissertation explores operating system mechanisms to allow resource-aware applications to be involved in the process of managing resources under the premise that these applications (1) potentially have some (implicit) notion of their future resource demands and (2) can adapt their resource demands. The general idea is to provide feedback to resource-aware applications so that they can proactively participate in the management of resources. This approach has the benefit that resource management policies can be removed from central entities and the operating system has only to provide mechanism. Furthermore, in contrast to centralised approaches, application specific features can be more easily exploited. To achieve this aim, I propose to deploy a microeconomic theory, namely congestion or shadow pricing, which has recently received attention for managing congestion in communication networks. Applications are charged based on the potential "damage" they cause to other consumers by using resources. Consumers interpret these congestion charges as feedback signals which they use to adjust their resource consumption. It can be shown theoretically that such a system with consumers merely acting in their own self-interest will converge to a social optimum. This dissertation focuses on the operating system mechanisms required to decentralise resource management this way. In particular it identifies four mechanisms: pricing & charging, credit accounting, resource usage accounting, and multiplexing. While the latter two are mechanisms generally required for the accurate management of resources, pricing & charging and credit accounting present novel mechanisms. It is argued that congestion prices are the correct economic model in this context and provide appropriate feedback to applications. The credit accounting mechanism is necessary to ensure the overall stability of the system by assigning value to credits.
APA, Harvard, Vancouver, ISO, and other styles
7

Pinnix, Justin Everett. "Operating System Kernel for All Real Time Systems." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010310-181302.

Full text
Abstract:

PINNIX, JUSTIN EVERETT. Operating System Kernel for All Real Time Systems.(Under the direction of Robert J. Fornaro and Vicki E. Jones.)

This document describes the requirements, design, and implementation of OSKAR, ahard real time operating system for Intel Pentium compatible personal computers.OSKAR provides rate monotonic scheduling, fixed and dynamic priority scheduling,semaphores, message passing, priority ceiling protocols, TCP/IP networking, and globaltime synchronization using the Global Positioning System (GPS). It is intended toprovide researchers a test bed for real time projects that is inexpensive, simple tounderstand, and easy to extend.

The design of the system is described with special emphasis on design tradeoffs made toimprove real time requirements compliance. The implementation is covered in detail atthe source code level. Experiments to qualify functionality and obtain performanceprofiles are included and the results explained.

APA, Harvard, Vancouver, ISO, and other styles
8

Jannotti, John 1974. "Applying exokernel principles to conventional operating systems." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stratton, Gregory C. "Consuming online communities : computer operating systems, identity and resistance." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/556.

Full text
Abstract:
A defining feature of the modern era of computer technologies has been a massive reliance upon the mass consumption of personal operating system software. Currently three products dominate how the world experiences computer operating system – Microsoft‘s Windows, Apple‘s Mac, and Linux. The near monopoly held by Windows has been a crucial enabler of the ICT revolution, while the small but significant markets held by Mac and Linux provide alternatives to Windows monoculture. Aside from their technical differences each offers distinct examples of modern-day branding, with individuals forming communities in which members signify their allegiance with these products. This thesis presents these individuals as User-Fans – those who develop an affinity with the mundane products of modern culture. Adapted from the fan models forwarded by Thorne and Bruner (2006), and Hunt, Bristol and Bashaw (1999), it is proposed that User-Fans are an acknowledgement of the extremes of devotion displayed by modern consumerism while also conveying an acceptance that consumerism is a form of discourse where strong allegiances can exist. Central to this thesis is the idea that brand communities exist as a consumer response to the emerging influence of the consumer society. Muñiz and O‘Guinn‘s (2001) brand community theory provides an apt description of the behaviour and bonds exhibited by the consumers central to this study. In outlining the convergence of individual and communal worship‘ of brands the brand community concept is adopted as both a form of communal interaction and the outcome of consumer devotion. The emergence of brand communities and User-Fandom reflects wider shifts in a society enveloped within the rhetoric of consumerism and the influence of the consumer society. Central to this is the manner in which the relationship between producers and consumers has evolved. In noting this relationship it becomes important to determine whether individuals are active agents within this system or if they are passive to the hegemonic forces that surround them. For the purpose of this research the consumer perspective was focused upon. It is the description of these converging forces that stands as the major theoretical contribution of this study. In performing netnographic research on the postings of operating systems users on online forums, the research identifies distinct forms of social interaction and consumer-product relationships. The broad concepts of community, identity, the consumer society and resistance have been brought together to establish a framework in an attempt to explain the socielity within this context. The analysis of the forums through the theoretical grounding allow for the concepts of brand communities, User-Fandom and resistance through consumerism to be explored.
APA, Harvard, Vancouver, ISO, and other styles
10

Adelstein, Frank Nathan. "Network and operating systems support for real-time multimedia /." The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487862972135428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer Books: Operating Systems"

1

1950-, McHoes Ann McIver, ed. Understanding operating systems. Pacific Grove, Calif: Brooks/Cole Pub. Co., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flynn, Ida M. Understanding operating systems. 4th ed. Boston, Mass: Thomson Course Technology, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Flynn, Ida M. Understanding operating systems. 2nd ed. Boston: PWS Pub., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Flynn, Ida M. Understanding operating systems. 5th ed. Boston: Thomson Course Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Flynn, Ida M. Understanding operating systems. Boston: PWS, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barry, Simon, ed. The mother of all Windows 95 books. Reading, Mass: Addison-Wesley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leonhard, Woody. The mother of all Windows 98 books. Reading, Mass: Addison Wesley Longman, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Angelo, Cassano, ed. DOS 5 includes DOS shell commands. New York, NY: Dictation Disc Co., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Knowlton, Joseph. Getting started with DOS 6. New York: Wiley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Knowlton, Joseph. Getting started with DOS 6. New York: John Wiley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer Books: Operating Systems"

1

Alam, Irina, Lara Dolecek, and Puneet Gupta. "Lightweight Software-Defined Error Correction for Memories." In Dependable Embedded Systems, 207–32. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_9.

Full text
Abstract:
AbstractReliability of the memory subsystem is a growing concern in computer architecture and system design. From on-chip embedded memories in Internet-of-Things (IoT) devices and on-chip caches to off-chip main memories, the memory subsystems have become the limiting factor in the overall reliability of computing systems. This is because they are primarily designed to maximize bit storage density; this makes memories particularly sensitive to manufacturing process variation, environmental operating conditions, and aging-induced wearout. This chapter of the book focuses on software managed techniques and novel error correction codes to opportunistically cope with memory errors whenever they occur for improved reliability at minimal cost.
APA, Harvard, Vancouver, ISO, and other styles
2

Ozenbas, Deniz, Michael S. Pagano, Robert A. Schwartz, and Bruce W. Weber. "Trading and Technology: An Information Systems Course Application." In Classroom Companion: Business, 71–86. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74817-3_4.

Full text
Abstract:
AbstractFinancial markets today are highly computerized -- from software-driven order submission to price determination to straight-through clearing and settlement -- computer technology has displaced manual activities and streamlined functions throughout the trading value chain. The previous chapters examined microeconomic principles that underpin trading and price-setting, and finance theory that provides analytical frameworks for market outcomes. Our analysis introduces real market frictions and examines how transactions costs and heterogeneity among market participants makes market structure and tracing mechanism design crucial determinants of market outcomes and behavior. . In this chapter, we drill down further into the realities of a non-frictionless market in order to focus on how technology can enhance the efficiency of an actual marketplace. Challenging market design issues are encountered when developing and operating an actual trading facility, and as IT professionals know, the devil is in the details. The practical considerations in operating a market system successfully are the next topic this book addresses.
APA, Harvard, Vancouver, ISO, and other styles
3

Chalk, B. S. "Operating Systems." In Computer Organisation and Architecture, 137–55. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-13871-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chalk, B. S., A. T. Carter, and R. W. Hind. "Operating systems." In Computer Organisation and Architecture, 154–76. London: Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-0-230-00060-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Page, Daniel. "Operating Systems." In Texts in Computer Science, 495–534. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-256-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grillmeyer, Oliver. "Operating Systems." In Exploring Computer Science with Scheme, 373–409. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2937-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Blum, Edward K. "Operating Systems (OS)." In Computer Science, 97–104. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1168-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Holtz, Herman. "Software and Operating Systems." In Computer Work Stations, 229–38. Boston, MA: Springer US, 1985. http://dx.doi.org/10.1007/978-1-4613-2537-6_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Erciyes, K. "Real-Time Operating Systems." In Computer Communications and Networks, 65–88. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22570-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baun, Christian. "Fundamentals of Computer Science / Grundlagen der Informationstechnik." In Operating Systems / Betriebssysteme, 3–13. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29785-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer Books: Operating Systems"

1

Tingari, Wisal M., Izzeldin M. Osman, and Moawia E. Yahia. "A comparison study on children reading stories from e-books and from traditional books." In 2010 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA). IEEE, 2010. http://dx.doi.org/10.1109/aiccsa.2010.5587012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaciarz, Matthis, and Philippe Mathieu. "Improving classifier agents with order books information." In 2012 1st International Conference on Systems and Computer Science (ICSCS). IEEE, 2012. http://dx.doi.org/10.1109/iconscs.2012.6502447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gentile, Vito, Salvatore Sorce, Giuseppe Russo, Dario Pirrone, and Antonio Gentile. "A Multimodal Fruition Model for Graphical Contents in Ancient Books." In CompSysTech '16: Computer Systems and Technologies 2016. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2983468.2983477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Howatt, James. "Session details: Operating systems." In SIGCSE04: Technical Symposium on Computer Science Education 2004. New York, NY, USA: ACM, 2004. http://dx.doi.org/10.1145/3244212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fitzgerald, Sue. "Session details: Operating systems." In SIGCSE02: The 33rd Technical Symposium on Computer Science Education. New York, NY, USA: ACM, 2002. http://dx.doi.org/10.1145/3248187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Weiqing. "Session details: Operating systems." In SIGCSE10: The 41st ACM Technical Symposium on Computer Science Education. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/3254241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sayoud, Halim. "Automatic authorship classification of two ancient books: Quran and Hadith." In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2014. http://dx.doi.org/10.1109/aiccsa.2014.7073263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Marzinkewitsch, Reiner. "Operating computer algebra systems by handprinted input." In the 1991 international symposium. New York, New York, USA: ACM Press, 1991. http://dx.doi.org/10.1145/120694.120757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

O'Brien, Darragh. "Teaching Operating Systems Concepts with SystemTap." In ITiCSE '17: Innovation and Technology in Computer Science Education. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3059009.3059045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khoroshilov, Alexey. "On formalization of operating systems behaviour verification." In 2017 Computer Science and Information Technologies (CSIT). IEEE, 2017. http://dx.doi.org/10.1109/csitechnol.2017.8312164.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer Books: Operating Systems"

1

Mayer, Michael. Operating system boot package for IBM PC compatible computer systems. Web of Open Science, July 2020. http://dx.doi.org/10.37686/asr.v1i1.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howell, Steven L. Evaluation Results Report for Next Generation Computer Resources Operating Systems Interface Baseline Selection by Next Generation Computer Resources (NGCR) Operating Systems Standards Working Group (SSWG). Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada229510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

White, Alan, Jaison Abel, Ernst Berndt, and Cory Monroe. Hedonic Price Indexes for Personal Computer Operating Systems and Productivity Suites. Cambridge, MA: National Bureau of Economic Research, April 2004. http://dx.doi.org/10.3386/w10427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Simonoff, Adam J., Robert L. Taft, Brian T. McLintock, and Larry A. Fontenot. Operating Methods for Robust Computer Systems Permitting Autonomously Switching Between Alternative/Redundant Components. Fort Belvoir, VA: Defense Technical Information Center, September 1997. http://dx.doi.org/10.21236/add018652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Howell, Steven L. Evaluation Process Report for Next Generation Computer Resources Operating Systems Interface Baseline Selection. Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada228594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Juttelstad, D. P. Recommendation Report for the Next-Generation Computer Resources (NGCR) Operating Systems Interface Standard Baseline. Fort Belvoir, VA: Defense Technical Information Center, June 1990. http://dx.doi.org/10.21236/ada226062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prindle, F. POSIX Delta Document for the Next-Generation Computer Resources (NGCR) Operating Systems Interface Standard Baseline (Version 4). Fort Belvoir, VA: Defense Technical Information Center, June 1994. http://dx.doi.org/10.21236/ada282324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prindle, F. POSIX Delta Document for the Next-Generation Computer Resources (NGCR) Operating Systems Interface Standard Baseline (Version 5). Fort Belvoir, VA: Defense Technical Information Center, June 1995. http://dx.doi.org/10.21236/ada306304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oblinger, J. T. After-Action Report for the Next-Generation Computer Resources (NGCR) operating Systems Interface Standard Baseline Selection Process. Fort Belvoir, VA: Defense Technical Information Center, June 1990. http://dx.doi.org/10.21236/ada225833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lewis, Dustin, Naz Modirzadeh, and Gabriella Blum. War-Algorithm Accountability. Harvard Law School Program on International Law and Armed Conflict, August 2016. http://dx.doi.org/10.54813/fltl8789.

Full text
Abstract:
In War-Algorithm Accountability (August 2016), we introduce a new concept—war algorithms—that elevates algorithmically-derived “choices” and “decisions” to a, and perhaps the, central concern regarding technical autonomy in war. We thereby aim to shed light on and recast the discussion regarding “autonomous weapon systems” (AWS). We define “war algorithm” as any algorithm that is expressed in computer code, that is effectuated through a constructed system, and that is capable of operating in relation to armed conflict. In introducing this concept, our foundational technological concern is the capability of a constructed system, without further human intervention, to help make and effectuate a “decision” or “choice” of a war algorithm. Distilled, the two core ingredients are an algorithm expressed in computer code and a suitably capable constructed system. Through that lens, we link international law and related accountability architectures to relevant technologies. We sketch a three-part (non-exhaustive) approach that highlights traditional and unconventional accountability avenues. We focus largely on international law because it is the only normative regime that purports—in key respects but with important caveats—to be both universal and uniform. In this way, international law is different from the myriad domestic legal systems, administrative rules, or industry codes that govern the development and use of technology in all other spheres. By not limiting our inquiry only to weapon systems, we take an expansive view, showing how the broad concept of war algorithms might be susceptible to regulation—and how those algorithms might already fit within the existing regulatory system established by international law.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography