Dissertations / Theses on the topic 'Computer Books: Operating Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer Books: Operating Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Moura, F. C. S. "Performance evaluation of operating systems." Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374799.
Full textFrame, Charles E. "Personal computer and workstation operating systems tutorial." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280132.
Full textThesis advisor(s): Norman F. Schneidewind. "March 1994." Includes bibliographical references. Also available online.
Denz, Robert. "Securing Operating Systems Through Utility Virtual Machines." Thesis, Dartmouth College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10190644.
Full textThe advent of hypervisors revolutionized the computing industry in terms of malware prevention and detection, secure virtual machine managers, and cloud resilience. However, this has resulted in a disjointed response to handling known threats rather than preventing unknown zero-day threats. This thesis introduces a new paradigm to cloud computing – utility virtual machines – that directly leverages virtualization hardware for protection and eliminates often accepted roles of the operating system kernel. This represents a break from prevailing practices and serves to establish a hardware root of trust for system operation.
Baumann, Andrew Computer Science & Engineering Faculty of Engineering UNSW. "Dynamic update for operating systems." Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28356.
Full textSinha, Amit 1976. "Energy efficient operating systems and software." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86773.
Full textIncludes bibliographical references (p. 153-159).
Energy efficient system design is becoming increasingly important with the proliferation of portable, battery-operated appliances such as laptops, Personal Digital Assistants (PDAs) and cellular phones. Numerous dedicated hardware approaches for energy mini-mization have been proposed while software energy efficiency has been relatively unexplored. Since it is the software that drives the hardware, decisions taken during software design can have a significant impact on system energy consumption. This thesis explores avenues for improving system energy efficiency from application level to the operating system level. The embedded operating system can have a significant impact on system energy by performing dynamic power management both in the active and passive states of the device. Software controlled active power management techniques using dynamic voltage and frequency scaling have been explored. Efficient workload prediction strategies have been developed that enable just-in-time computation. An algorithm for efficient real-time operating system task scheduling has also been developed that minimizes energy consumption. Portable systems spend a lot of time in sleep mode. Idle power management strategies have been developed that consider the effect of leakage and duty-cycle on system lifetime. A hierarchical shutdown approach for systems characterized multiple sleep states has been proposed. Although the proposed techniques are quite general, their applicability and utility have been demonstrated using the MIT [mu]AMPS wireless sensor node an example system wherever possible.
(cont.) To quantify software energy consumption, an estimation framework has been developed based on experiments on the StrongARM and Hitachi processors. The software energy profiling tool is available on-line. Finally, in energy constrained systems, we would like to have the ability to trade-off quality of service for extended battery life. A scalable approach to application development has been demonstrated that allows energy quality trade-offs.
by Amit Sinha.
Ph.D.
Neugebauer, Rolf. "Decentralising resource management in operating systems." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/4118/.
Full textPinnix, Justin Everett. "Operating System Kernel for All Real Time Systems." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010310-181302.
Full textPINNIX, JUSTIN EVERETT. Operating System Kernel for All Real Time Systems.(Under the direction of Robert J. Fornaro and Vicki E. Jones.)
This document describes the requirements, design, and implementation of OSKAR, ahard real time operating system for Intel Pentium compatible personal computers.OSKAR provides rate monotonic scheduling, fixed and dynamic priority scheduling,semaphores, message passing, priority ceiling protocols, TCP/IP networking, and globaltime synchronization using the Global Positioning System (GPS). It is intended toprovide researchers a test bed for real time projects that is inexpensive, simple tounderstand, and easy to extend.
The design of the system is described with special emphasis on design tradeoffs made toimprove real time requirements compliance. The implementation is covered in detail atthe source code level. Experiments to qualify functionality and obtain performanceprofiles are included and the results explained.
Jannotti, John 1974. "Applying exokernel principles to conventional operating systems." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50043.
Full textStratton, Gregory C. "Consuming online communities : computer operating systems, identity and resistance." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/556.
Full textAdelstein, Frank Nathan. "Network and operating systems support for real-time multimedia /." The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487862972135428.
Full textRoth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.
Full textLeslie, Rebekah. "A Functional Approach to Memory-Safe Operating Systems." PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/499.
Full textGoktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Full textThesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Swift, Michael M. "Improving the reliability of commodity operating systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7019.
Full textDodge, Catherine A. "Recommendations for secure initialization routines in operating systems." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1206.
Full textWhile a necessity of all operating systems, the code that initializes a system can be notoriously difficult to understand. This thesis explores the most common architectures used for bringing an operating system to its initial state, once the operating system gains control from the boot loader. Specifically, the ways in which the OpenBSD and Linux operating systems handle initialization are dissected. With this understanding, a set of threats relevant to the initialization sequence was developed. A thorough study was also made to determine the degree to which initialization code adheres to widely accepted software engineering principles. Based upon this threat analysis and the observed strengths and weaknesses of existing systems, a set of recommendations for initialization sequence architecture and implementation have been developed. These recommendations can serve as a guide for future operating system development.
Civilian, Naval Postgraduate School
Dodge, Catherine A. "Recommendations for secure initialization routines in operating systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDodge.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109) Also available online.
Law, Greg. "A new protection model for component-based operating systems." Thesis, City University London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390950.
Full textWentzlaff, David 1979. "dPool : a distributed data structure for factored operating systems." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71494.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 151-158).
Future computer architectures will likely exhibit increased parallelism through the addition of more processor cores. Architectural trends such as exponentially increasing parallelism and the possible lack of scalable shared memory motivate the reevaluation of operating system design. This thesis work takes place in the context of Factored Operating Systems which leverage distributed system ideas to increase the scalability of multicore processor operating systems. fos, a Factored Operating System, explores a new design point for operating systems where traditional low-level operating system services are fine-grain parallelized while internally only using explicit message passing for communication. fos factors an operating system first by system service and then further parallelizes inside of the system service by splitting the service into a fleet of server processes which communicate via messaging. Constructing parallel low-level operating system services which only internally use messaging is challenging because shared resources must be partitioned across servers and the services must provide scalable performance when met with uneven demand. To ease the construction of parallel fos system services, this thesis develops the dPool distributed data structure. The dPool data structure provides concurrent access to an unordered collection of elements by server processes within a fos fleet. Internal to a single dPool instance, all communication between different portions of a dPool is done via messaging. This thesis uses the dPool data structure within the parallel fos Physical Memory Allocation fleet and demonstrates that it is possible to use a dPool to manage shared state in a factored operating system's physical page allocator. This thesis begins by presenting the design of the prototype fos operating system. In the context of fos system service fleets, this thesis describes the dPool data structure, its design, different implementations, and interfaces. The dPool data structure is shown to achieve scalability across even and uneven micro-benchmark workloads. This thesis shows that common parallel and distributed programming techniques apply to the creation of dPool and that background threads within a dPool can increase performance. Finally, this thesis evaluates different dPool implementations and demonstrates that intelligently pushing elements between dPool parts can increase scalability.
by David Wentzlaff.
Ph.D.
Rogers, David T. "A framework for dynamic subversion." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRogers.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
Murray, Kevin. "Wisdom : the foundation of a scalable parallel operating system." Thesis, University of York, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.252628.
Full textTurnbull, Martin John. "A design for a large scale distributed operating system." Thesis, University of Hertfordshire, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.329070.
Full textLarsson, Anders. "Fully automatic benchmarking of real-time operating systems." Thesis, University of Skövde, Department of Computer Science, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-172.
Full textTesting and evaluating the performance of different software solutions is important in order to compare them with each other. Measuring, or benchmark, software is not a trivial task and conducting tests in a real-time environment implicates it further. Still, measuring is the only way to provide useful information, for example, which real-time operating system is best suitable for a specific hardware configuration.
The purpose of this project is to design a benchmark support system, which automatically performs benchmarks of a real-time operating system in a host-target environment. The benchmarks are conducted according to a user-defined specification and the support system also allows a developer to create configurable benchmarks.
The benchmark support system described also allows parameters to increase monotonically within a specified interval during benchmark execution. This is an important feature in order to detect unpredictable behavior of the real-time system.
Guo, Xingang. "Predictable CPU bandwidth management framework for next-generation operating systems /." Full text (PDF) from UMI/Dissertation Abstracts International, 2000. http://wwwlib.umi.com/cr/utexas/fullcit?p3004274.
Full textGrossman, Michael D. "A computer simulation of processor scheduling in UNIX 4.2BSD /." Online version of thesis, 1987. http://hdl.handle.net/1850/10295.
Full textCoco, Geoffrey P. "The virtual environment operating system : derivation, function, and form /." Connect to this title online (PDF format) Connect to this title online (PostScript format), 1993. http://www.hitl.washington.edu/publications/th%2D93%2D1/th%2D93%2D1.ps.
Full textMurray, Jessica L. "An exfiltration subversion demonstration." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMurray.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 83-92). Also available online.
Okyay, Mehmet Onur Aytaç Sıtkı. "A portable real-time operating system for embedded platforms/." [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000477.doc.
Full textYan, Lin Wu. "A Lightweight Framework for Tracing andVisualizing Real-Time Operating Systems." Thesis, Högskolan Väst, Institutionen för ekonomi och it, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-4428.
Full textMesser, Alan. "A market model for controlled resource allocation in distributed operating systems." Thesis, City, University of London, 1999. http://openaccess.city.ac.uk/20134/.
Full textWatson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.
Full textSomanathan, Muthuveer. "An initial operating system adaptation heuristic for Swap Cluster Max (SCM)." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textAustin, Paul Baden. "Towards a file system for a scalable parallel computing engine." Thesis, University of York, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304159.
Full textSeelam, Seetharami R. "Towards dynamic adaptation of I/O scheduling in commodity operating systems." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2006. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textGraunke, Kenneth William. "Extensible Scheduling in a Haskell-based Operating System." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/1.
Full textBurton, Ariel Nahum. "The use of replayable traces in the design and evaluation of operating systems." Thesis, Imperial College London, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.300402.
Full textSpafford, Eugene Howard. "Kernel structures for a distributed operating system." Diss., Georgia Institute of Technology, 1986. http://hdl.handle.net/1853/9144.
Full textForbes, Harold C. "Operating system principles and constructs for dynamic multi-processor real-time control systems." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8165.
Full textKumano, Shintaro. "Boundary clusters in adaptive neighborhood networks." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/9150.
Full textBiondi, Mattia. "An Updated Emulated Architecture to Support the Study of Operating Systems." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/20751/.
Full textSvahnberg, Mikael. "Background Analysis and Design of ABOS, an Agent-Based Operating System." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2792.
Full textMcLean, Angus L. M. Thom III. "Real-time distributed simulation analysis : an application of temporal database and simulation systems research." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9124.
Full textLaguna, Flores Jonathan. "Determining the user experience level of operating computer systems in the Central Bank of Mexico." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122391.
Full textThesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 103-105).
The purpose of this thesis is to measure the user experience (UX) level of operating computer systems built in the Central Bank of Mexico. The user experience is subjective and depends on a user's interaction with the ergonomic and hedonic qualities of a product, service, or system. A user experience framework based on the literature review was proposed. This framework was used to decompose the user experience into ergonomic, hedonic, and appeal attributes, which were used to measure the UX level of the Bank's operating computer systems. Two surveys, one for systems' users and one for systems' developers were applied in the Bank in order to collect their opinions regarding the different UX attributes (variables) of systems on a seven-point scale that made use of semantic differential (polar adjectives) technique. The survey results were analyzed in order to identify UX opportunity areas by category of systems, as well as by UX variable. Differences among the opinions between users and developers regarding the UX level of systems were found. A strongly positive correlation between the UX level (UX index) determined through the ergonomic and hedonic variables, and the appeal (Appeal index), was found. Finally, the spotted UX opportunity areas are discussed.
by Jonathan Laguna Flores.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
Wang, Xiaolong. "A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7589.
Full textPettersson, Erik. "Comparison of System Performance During DDoS Attacks in Modern Operating Systems." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13748.
Full textKou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Bershad, Brian Nathan. "High performance cross-address space communication /." Thesis, Connect to this title online; UW restricted, 1990. http://hdl.handle.net/1773/6939.
Full textSchneck, Phyllis Adele. "Dynamic management of computation and communication resources to enable secure high-performances applications." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/8264.
Full textPurdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.
Full textAckerman, M. C. (Marthinus Casper). "Kernel support for embedded reactive systems." Thesis, Stellenbosch : Stellenbosch University, 1993. http://hdl.handle.net/10019.1/58022.
Full textENGLISH ABSTRACT: Reactive systems are event driven state machines which usually do not terminate, but remain in perpetual interaction with their environment. Such systems usually interact 'With devices which introduce a high degree of concurrency and some real time constraints to the system. Because of the concurrent nature of reactive systems they are commonly implemented as communicating concurrent processes on one or more processors. Jeffay introduces a design paradigm which requires consumer processes to consume messages faster than they are produced by producer processes. If this is guaranteed, the real time constraints of such .. system are always met, and the correctness of the process interaction is guaranteed in terms of the message passing semantics. I developed the ESE kernel, which supports Jeffay systems by providing lightweight processes which communicate over asynchronous channels. Processes are scheduled non-preemptively according to the earliest deadline first policy when they have messages pending on their input channels. The Jeffay design method and the ESE kernel have been found to be highly suitable to implement embedded reactive systems. The general requirements of embedded reactive systems, and kernel support required by such systems, are discussed.
AFRIKAANSE OPSOMMING: Reaktiewe stelsels is toeatandsoutomate wat aangedryf word deur gebeure in hul omgewins. So 'n stelsel termineer gewoonlik nie, maar bly in 'n voortdurende wisselwerking met toestelle in sy omgewing. Toestelle in die omgewing van 'n reaktiewe stelsel veroorsaak in die algemeen 'n hoë mate van gelyklopendheid in die stelsel, en plaas gewoonlik sekere intydse beperkings op die stelsel. Gelyklopende stelsels word gewoonlik as stelsel. van kommunikerende prosesse geïmplementeer op een of meer prosessors. Jeffay beskryf 'n ontwerpsmetodologie waarvolgens die ontvanger van boodskappe hulle vinniger moet verwerk as wat die sender hulle kan stuur. Indien hierdie gedrag tussen alle pare kommunikerende prosesse gewaarborg kan word, sal die stelsel altyd sy intydse beperkings gehoorsaam, en word die korrektheid van interaksies tussen prosesse deur die semantiek van die boodskapwisseling gewaarborg. Die "ESE" bedryfstelselkern wat ek ontwikkel het, ondersteun stelsels wat ontwerp en geïmplementeer word volgens Jeffay se metode. Prosesse kommunikeer oor asinkrone kanale, en die ontvanger van die boodskap met die vroegste keertyd word altyd eerste geskeduleer. Jeffay se ontwerpsmetode en die "ESE" kern blyk in die praktyk baie geskik te wees vir reaktiewe stelsels wat as substelsels van groter stelsels uitvoer. Die vereistes van reaktiewe substelsels, en die kemondersteuning wat daarvoor nodig is, word bespreek.
Swaan, Arons Henk de. "Delfi design, development and applicability of expert system shells /." Delft : Delft University Press, 1991. http://books.google.com/books?id=2NZQAAAAMAAJ.
Full textSummary and vita in Dutch and English; "stellingen" in Dutch. "Stellingen" inserted. Includes bibliographical references (p. 227-252) and index.