To see the other types of publications on this topic, follow the link: Computer Books: Operating Systems.

Dissertations / Theses on the topic 'Computer Books: Operating Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer Books: Operating Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Moura, F. C. S. "Performance evaluation of operating systems." Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frame, Charles E. "Personal computer and workstation operating systems tutorial." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280132.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1994.
Thesis advisor(s): Norman F. Schneidewind. "March 1994." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Denz, Robert. "Securing Operating Systems Through Utility Virtual Machines." Thesis, Dartmouth College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10190644.

Full text
Abstract:

The advent of hypervisors revolutionized the computing industry in terms of malware prevention and detection, secure virtual machine managers, and cloud resilience. However, this has resulted in a disjointed response to handling known threats rather than preventing unknown zero-day threats. This thesis introduces a new paradigm to cloud computing – utility virtual machines – that directly leverages virtualization hardware for protection and eliminates often accepted roles of the operating system kernel. This represents a break from prevailing practices and serves to establish a hardware root of trust for system operation.

APA, Harvard, Vancouver, ISO, and other styles
4

Baumann, Andrew Computer Science &amp Engineering Faculty of Engineering UNSW. "Dynamic update for operating systems." Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28356.

Full text
Abstract:
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administrators. The aim of this research is to develop a model for dynamic update of operating systems, allowing a system to be patched without the need for a reboot or other service interruption. In this work, a model for dynamic update based on operating system modularity is developed and evaluated using a prototype implementation for the K42 operating system. The prototype is able to update kernel code and data structures, even when the interfaces between kernel modules change. When applying an update, at no point is the system's entire execution blocked, and there is no additional overhead after an update has been applied. The base runtime overhead is also very low. An analysis of the K42 revision history shows that approximately 79% of past performance and bug-fix changes to K42 could be converted to dynamic updates, and the proportion would be even higher if the changes were being developed for dynamic update. The model also extends to other systems such as Linux and BSD, that although structured modularly, are not strictly object-oriented like K42. The experience with this approach shows that dynamic update for operating systems is feasible given a sufficiently-modular system structure, allows maintenance patches and updates to be applied without disruption, and need not constrain system performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Sinha, Amit 1976. "Energy efficient operating systems and software." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86773.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 153-159).
Energy efficient system design is becoming increasingly important with the proliferation of portable, battery-operated appliances such as laptops, Personal Digital Assistants (PDAs) and cellular phones. Numerous dedicated hardware approaches for energy mini-mization have been proposed while software energy efficiency has been relatively unexplored. Since it is the software that drives the hardware, decisions taken during software design can have a significant impact on system energy consumption. This thesis explores avenues for improving system energy efficiency from application level to the operating system level. The embedded operating system can have a significant impact on system energy by performing dynamic power management both in the active and passive states of the device. Software controlled active power management techniques using dynamic voltage and frequency scaling have been explored. Efficient workload prediction strategies have been developed that enable just-in-time computation. An algorithm for efficient real-time operating system task scheduling has also been developed that minimizes energy consumption. Portable systems spend a lot of time in sleep mode. Idle power management strategies have been developed that consider the effect of leakage and duty-cycle on system lifetime. A hierarchical shutdown approach for systems characterized multiple sleep states has been proposed. Although the proposed techniques are quite general, their applicability and utility have been demonstrated using the MIT [mu]AMPS wireless sensor node an example system wherever possible.
(cont.) To quantify software energy consumption, an estimation framework has been developed based on experiments on the StrongARM and Hitachi processors. The software energy profiling tool is available on-line. Finally, in energy constrained systems, we would like to have the ability to trade-off quality of service for extended battery life. A scalable approach to application development has been demonstrated that allows energy quality trade-offs.
by Amit Sinha.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
6

Neugebauer, Rolf. "Decentralising resource management in operating systems." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/4118/.

Full text
Abstract:
This dissertation explores operating system mechanisms to allow resource-aware applications to be involved in the process of managing resources under the premise that these applications (1) potentially have some (implicit) notion of their future resource demands and (2) can adapt their resource demands. The general idea is to provide feedback to resource-aware applications so that they can proactively participate in the management of resources. This approach has the benefit that resource management policies can be removed from central entities and the operating system has only to provide mechanism. Furthermore, in contrast to centralised approaches, application specific features can be more easily exploited. To achieve this aim, I propose to deploy a microeconomic theory, namely congestion or shadow pricing, which has recently received attention for managing congestion in communication networks. Applications are charged based on the potential "damage" they cause to other consumers by using resources. Consumers interpret these congestion charges as feedback signals which they use to adjust their resource consumption. It can be shown theoretically that such a system with consumers merely acting in their own self-interest will converge to a social optimum. This dissertation focuses on the operating system mechanisms required to decentralise resource management this way. In particular it identifies four mechanisms: pricing & charging, credit accounting, resource usage accounting, and multiplexing. While the latter two are mechanisms generally required for the accurate management of resources, pricing & charging and credit accounting present novel mechanisms. It is argued that congestion prices are the correct economic model in this context and provide appropriate feedback to applications. The credit accounting mechanism is necessary to ensure the overall stability of the system by assigning value to credits.
APA, Harvard, Vancouver, ISO, and other styles
7

Pinnix, Justin Everett. "Operating System Kernel for All Real Time Systems." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010310-181302.

Full text
Abstract:

PINNIX, JUSTIN EVERETT. Operating System Kernel for All Real Time Systems.(Under the direction of Robert J. Fornaro and Vicki E. Jones.)

This document describes the requirements, design, and implementation of OSKAR, ahard real time operating system for Intel Pentium compatible personal computers.OSKAR provides rate monotonic scheduling, fixed and dynamic priority scheduling,semaphores, message passing, priority ceiling protocols, TCP/IP networking, and globaltime synchronization using the Global Positioning System (GPS). It is intended toprovide researchers a test bed for real time projects that is inexpensive, simple tounderstand, and easy to extend.

The design of the system is described with special emphasis on design tradeoffs made toimprove real time requirements compliance. The implementation is covered in detail atthe source code level. Experiments to qualify functionality and obtain performanceprofiles are included and the results explained.

APA, Harvard, Vancouver, ISO, and other styles
8

Jannotti, John 1974. "Applying exokernel principles to conventional operating systems." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stratton, Gregory C. "Consuming online communities : computer operating systems, identity and resistance." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/556.

Full text
Abstract:
A defining feature of the modern era of computer technologies has been a massive reliance upon the mass consumption of personal operating system software. Currently three products dominate how the world experiences computer operating system – Microsoft‘s Windows, Apple‘s Mac, and Linux. The near monopoly held by Windows has been a crucial enabler of the ICT revolution, while the small but significant markets held by Mac and Linux provide alternatives to Windows monoculture. Aside from their technical differences each offers distinct examples of modern-day branding, with individuals forming communities in which members signify their allegiance with these products. This thesis presents these individuals as User-Fans – those who develop an affinity with the mundane products of modern culture. Adapted from the fan models forwarded by Thorne and Bruner (2006), and Hunt, Bristol and Bashaw (1999), it is proposed that User-Fans are an acknowledgement of the extremes of devotion displayed by modern consumerism while also conveying an acceptance that consumerism is a form of discourse where strong allegiances can exist. Central to this thesis is the idea that brand communities exist as a consumer response to the emerging influence of the consumer society. Muñiz and O‘Guinn‘s (2001) brand community theory provides an apt description of the behaviour and bonds exhibited by the consumers central to this study. In outlining the convergence of individual and communal worship‘ of brands the brand community concept is adopted as both a form of communal interaction and the outcome of consumer devotion. The emergence of brand communities and User-Fandom reflects wider shifts in a society enveloped within the rhetoric of consumerism and the influence of the consumer society. Central to this is the manner in which the relationship between producers and consumers has evolved. In noting this relationship it becomes important to determine whether individuals are active agents within this system or if they are passive to the hegemonic forces that surround them. For the purpose of this research the consumer perspective was focused upon. It is the description of these converging forces that stands as the major theoretical contribution of this study. In performing netnographic research on the postings of operating systems users on online forums, the research identifies distinct forms of social interaction and consumer-product relationships. The broad concepts of community, identity, the consumer society and resistance have been brought together to establish a framework in an attempt to explain the socielity within this context. The analysis of the forums through the theoretical grounding allow for the concepts of brand communities, User-Fandom and resistance through consumerism to be explored.
APA, Harvard, Vancouver, ISO, and other styles
10

Adelstein, Frank Nathan. "Network and operating systems support for real-time multimedia /." The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487862972135428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Roth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Leslie, Rebekah. "A Functional Approach to Memory-Safe Operating Systems." PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/499.

Full text
Abstract:
Purely functional languages--with static type systems and dynamic memory management using garbage collection--are a known tool for helping programmers to reduce the number of memory errors in programs. By using such languages, we can establish correctness properties relating to memory-safety through our choice of implementation language alone. Unfortunately, the language characteristics that make purely functional languages safe also make them more difficult to apply in a low-level domain like operating systems construction. The low-level features that support the kinds of hardware manipulations required by operating systems are not typically available in memory-safe languages with garbage collection. Those that are provided may have the ability to violate memory- and type-safety, destroying the guarantees that motivate using such languages in the first place. This work demonstrates that it is possible to bridge the gap between the requirements of operating system implementations and the features of purely functional languages without sacrificing type- and memory-safety. In particular, we show that this can be achieved by isolating the potentially unsafe memory operations required by operating systems in an abstraction layer that is well integrated with a purely functional language. The salient features of this abstraction layer are that the operations it exposes are memory-safe and yet sufficiently expressive to support the implementation of realistic operating systems. The abstraction layer enables systems programmers to perform all of the low-level tasks necessary in an OS implementation, such as manipulating an MMU and executing user-level programs, without compromising the static memory-safety guarantees of programming in a purely functional language. A specific contribution of this work is an analysis of memory-safety for the abstraction layer by formalizing a meaning for memory-safety in the presence of virtual-memory using a novel application of noninterference security policies. In addition, we evaluate the expressiveness of the abstraction layer by implementing the L4 microkernel API, which has a flexible set of virtual memory management operations.
APA, Harvard, Vancouver, ISO, and other styles
13

Goktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
14

Swift, Michael M. "Improving the reliability of commodity operating systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Dodge, Catherine A. "Recommendations for secure initialization routines in operating systems." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1206.

Full text
Abstract:
Approved for public release; distribution in unlimited.
While a necessity of all operating systems, the code that initializes a system can be notoriously difficult to understand. This thesis explores the most common architectures used for bringing an operating system to its initial state, once the operating system gains control from the boot loader. Specifically, the ways in which the OpenBSD and Linux operating systems handle initialization are dissected. With this understanding, a set of threats relevant to the initialization sequence was developed. A thorough study was also made to determine the degree to which initialization code adheres to widely accepted software engineering principles. Based upon this threat analysis and the observed strengths and weaknesses of existing systems, a set of recommendations for initialization sequence architecture and implementation have been developed. These recommendations can serve as a guide for future operating system development.
Civilian, Naval Postgraduate School
APA, Harvard, Vancouver, ISO, and other styles
16

Dodge, Catherine A. "Recommendations for secure initialization routines in operating systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDodge.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109) Also available online.
APA, Harvard, Vancouver, ISO, and other styles
17

Law, Greg. "A new protection model for component-based operating systems." Thesis, City University London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wentzlaff, David 1979. "dPool : a distributed data structure for factored operating systems." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71494.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 151-158).
Future computer architectures will likely exhibit increased parallelism through the addition of more processor cores. Architectural trends such as exponentially increasing parallelism and the possible lack of scalable shared memory motivate the reevaluation of operating system design. This thesis work takes place in the context of Factored Operating Systems which leverage distributed system ideas to increase the scalability of multicore processor operating systems. fos, a Factored Operating System, explores a new design point for operating systems where traditional low-level operating system services are fine-grain parallelized while internally only using explicit message passing for communication. fos factors an operating system first by system service and then further parallelizes inside of the system service by splitting the service into a fleet of server processes which communicate via messaging. Constructing parallel low-level operating system services which only internally use messaging is challenging because shared resources must be partitioned across servers and the services must provide scalable performance when met with uneven demand. To ease the construction of parallel fos system services, this thesis develops the dPool distributed data structure. The dPool data structure provides concurrent access to an unordered collection of elements by server processes within a fos fleet. Internal to a single dPool instance, all communication between different portions of a dPool is done via messaging. This thesis uses the dPool data structure within the parallel fos Physical Memory Allocation fleet and demonstrates that it is possible to use a dPool to manage shared state in a factored operating system's physical page allocator. This thesis begins by presenting the design of the prototype fos operating system. In the context of fos system service fleets, this thesis describes the dPool data structure, its design, different implementations, and interfaces. The dPool data structure is shown to achieve scalability across even and uneven micro-benchmark workloads. This thesis shows that common parallel and distributed programming techniques apply to the creation of dPool and that background threads within a dPool can increase performance. Finally, this thesis evaluates different dPool implementations and demonstrates that intelligently pushing elements between dPool parts can increase scalability.
by David Wentzlaff.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
19

Rogers, David T. "A framework for dynamic subversion." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRogers.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
20

Murray, Kevin. "Wisdom : the foundation of a scalable parallel operating system." Thesis, University of York, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.252628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Turnbull, Martin John. "A design for a large scale distributed operating system." Thesis, University of Hertfordshire, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.329070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Larsson, Anders. "Fully automatic benchmarking of real-time operating systems." Thesis, University of Skövde, Department of Computer Science, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-172.

Full text
Abstract:

Testing and evaluating the performance of different software solutions is important in order to compare them with each other. Measuring, or benchmark, software is not a trivial task and conducting tests in a real-time environment implicates it further. Still, measuring is the only way to provide useful information, for example, which real-time operating system is best suitable for a specific hardware configuration.

The purpose of this project is to design a benchmark support system, which automatically performs benchmarks of a real-time operating system in a host-target environment. The benchmarks are conducted according to a user-defined specification and the support system also allows a developer to create configurable benchmarks.

The benchmark support system described also allows parameters to increase monotonically within a specified interval during benchmark execution. This is an important feature in order to detect unpredictable behavior of the real-time system.

APA, Harvard, Vancouver, ISO, and other styles
23

Guo, Xingang. "Predictable CPU bandwidth management framework for next-generation operating systems /." Full text (PDF) from UMI/Dissertation Abstracts International, 2000. http://wwwlib.umi.com/cr/utexas/fullcit?p3004274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Grossman, Michael D. "A computer simulation of processor scheduling in UNIX 4.2BSD /." Online version of thesis, 1987. http://hdl.handle.net/1850/10295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Coco, Geoffrey P. "The virtual environment operating system : derivation, function, and form /." Connect to this title online (PDF format) Connect to this title online (PostScript format), 1993. http://www.hitl.washington.edu/publications/th%2D93%2D1/th%2D93%2D1.ps.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Murray, Jessica L. "An exfiltration subversion demonstration." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMurray.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 83-92). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
27

Okyay, Mehmet Onur Aytaç Sıtkı. "A portable real-time operating system for embedded platforms/." [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000477.doc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yan, Lin Wu. "A Lightweight Framework for Tracing andVisualizing Real-Time Operating Systems." Thesis, Högskolan Väst, Institutionen för ekonomi och it, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-4428.

Full text
Abstract:
System tracing is a helpful method for engineersand users to know exactly what happens in an operating system,especially in real-time operating systems (RTOS), because forreal-time system, it is normally more difficult to know theperformance of hardware and software than for desktopcomputers. Although this kind of tracing tools already exist forsome commercial RTOS, it is fairly hard to see those tools forsmall or open source RTOS. Moreover, because the structure andimplementation of different RTOS varies, it is rare to find aframework that can easily be ported to those platforms. In thisthesis, a solution is presented to this general tracing problem ondifferent platforms. By using the portable framework, it ispossible to implement tracing component into a real timeoperating system by some simple reconfigurations. This platformportability feature is accomplished by separating the specificplatform logic from the logic of the tracing part. Finally, adeployment of this framwork onto a small open source real-timeoperating system—AtomThreads, running on an AVRATmega1650 – is used as a demonstration of this framework.
APA, Harvard, Vancouver, ISO, and other styles
29

Messer, Alan. "A market model for controlled resource allocation in distributed operating systems." Thesis, City, University of London, 1999. http://openaccess.city.ac.uk/20134/.

Full text
Abstract:
This thesis explores the potential for providing processes with control over their resource allocation in a general-purpose distributed system. Rather than present processes with blind explicit control or leave the decision to the operating system, a compromise, called process-centric resource allocation is proposed whereby processes have informed control of their resource allocation, while the operating system ensures fair consumption. The motivations for this approach to resource allocation and its background are reviewed culminating in the description of a set of desired attributes for such a system. A three layered architecture called ERA is then proposed and presented in detail. The lowest layer, provides a unified framework for processes to choose resources, describe their priority and describes the range of available resources. A resource information mechanism, used to support choices of distributed resources then utilises this framework. Finally, experimental demonstrations of process-centric resource allocation are used to illustrate the third layer. This design and its algorithms together provide a resource allocation system wherein distributed resources are shared fairly amongst competing processes which can choose their resources. The system allows processes to mimic traditional resource allocations and perform novel and beneficial resource optimisations. Experimental results are presented indicating that this can be achieved with low overhead and in a scalable fashion.
APA, Harvard, Vancouver, ISO, and other styles
30

Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Somanathan, Muthuveer. "An initial operating system adaptation heuristic for Swap Cluster Max (SCM)." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Austin, Paul Baden. "Towards a file system for a scalable parallel computing engine." Thesis, University of York, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Seelam, Seetharami R. "Towards dynamic adaptation of I/O scheduling in commodity operating systems." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2006. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Graunke, Kenneth William. "Extensible Scheduling in a Haskell-based Operating System." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/1.

Full text
Abstract:
This thesis presents Lighthouse, an experimental branch of the Haskell-based House operating system which integrates Li et al.'s Lightweight Concurrency framework. First and foremost, it improves House's viability as a "real operating system" by providing a new extensible scheduler framework which makes it easy to experiment with different scheduling policies. In particular, Lighthouse extends Concurrent Haskell with thread priority and implements a priority-based scheduler which significantly improves system responsiveness when compared with GHC's normal round-robin scheduler. Even while doing this, it improves on House's claim of being "written in Haskell" by moving a whole subsystem out of the complex C-based runtime system and into Haskell itself. In addition, Lighthouse also includes an alternate, simpler implementation of Lightweight Concurrency which takes advantage of House's unique setting (running directly on uniprocessor x86 hardware). This experience sheds light on areas that need further attention before the system can truly be viable---primarily interactions between blackholing and interrupt handling. In particular, this thesis uncovers a potential case of self-deadlock and suggests potential solutions. Finally, this work offers further insight into the viability of using high-level languages such as Haskell for systems programming. Although laziness and blackholing present unique problems, many parts of the system are still much easier to express in Haskell than traditional languages such as C.
APA, Harvard, Vancouver, ISO, and other styles
35

Burton, Ariel Nahum. "The use of replayable traces in the design and evaluation of operating systems." Thesis, Imperial College London, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.300402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Spafford, Eugene Howard. "Kernel structures for a distributed operating system." Diss., Georgia Institute of Technology, 1986. http://hdl.handle.net/1853/9144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Forbes, Harold C. "Operating system principles and constructs for dynamic multi-processor real-time control systems." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kumano, Shintaro. "Boundary clusters in adaptive neighborhood networks." Thesis, Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/9150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Biondi, Mattia. "An Updated Emulated Architecture to Support the Study of Operating Systems." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/20751/.

Full text
Abstract:
One of the most effective ways to learn something new is by actively practising it, and there is—maybe—no better way to study an Operating Systems course than by building your own OS. However, it is important to emphasize how the realization of an operating system capable of running on a real hardware machine could be an overly complex and unsuitable task for an undergraduate student. Nonetheless, it is possible to use a simplified computer system simulator to achieve the goal of teaching Computer Science foundations in the University environment, thus allowing students to experience a quite realistic representation of an operating system. µMPS has been created for this purpose, a pedagogically appropriate machine emulator, based around the MIPS R2/3000 microprocessor, which features an accessible architecture that includes a rich set of easily programmable devices. µMPS has an almost two decades old historical development and the outcome of this following thesis is the third version of the software, dubbed µMPS3. This second major revision aims to simplify, even more, the complexity of the emulator in order to lighten the load of work required by the students during the OS design and implementation. Two of these simplifications are the removal of the virtual memory bit, which allowed address translation to be turned on and off, and the replacement of the tape device, used as storage devices, with a new flash drive device—certainly something more familiar to the new generation of students. Thanks to the employment of this software and the feedback received over the last decade, it has been possible to realize not just this following thesis, but also to develop some major improvements, which concern everything from the project building tools to the front-end, making µMPS a modern and reliable educational software.
APA, Harvard, Vancouver, ISO, and other styles
40

Svahnberg, Mikael. "Background Analysis and Design of ABOS, an Agent-Based Operating System." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2792.

Full text
Abstract:
Modern operating systems should be extensible and flexible. This means that the operating system should be able to accept new behaviour and change existing behaviour without too much trouble and that it should ideally also be able to do this without any, or very little, downtime. Furthermore, during the past years the importance of the network has increased drastically, creating a demand for operating systems to function in a distributed environment. To achieve this flexibility and distribut-edness, I have designed and evaluated ABOS, an Agent-Based Operating System. ABOS uses agents to solve all the tasks of the operating system kernel, thus moving away from traditional monolithic kernel structures. Early results show that I have gained in flexibility and modularity, creating a fault-tolerant distributed operating system that can adapt and be adapted to almost any situa-tion with negligible decrease in performance. Within ABOS some tasks has been designed further, and there exists a demonstration of how the agent-based filesystem might work.
APA, Harvard, Vancouver, ISO, and other styles
41

McLean, Angus L. M. Thom III. "Real-time distributed simulation analysis : an application of temporal database and simulation systems research." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Laguna, Flores Jonathan. "Determining the user experience level of operating computer systems in the Central Bank of Mexico." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122391.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 103-105).
The purpose of this thesis is to measure the user experience (UX) level of operating computer systems built in the Central Bank of Mexico. The user experience is subjective and depends on a user's interaction with the ergonomic and hedonic qualities of a product, service, or system. A user experience framework based on the literature review was proposed. This framework was used to decompose the user experience into ergonomic, hedonic, and appeal attributes, which were used to measure the UX level of the Bank's operating computer systems. Two surveys, one for systems' users and one for systems' developers were applied in the Bank in order to collect their opinions regarding the different UX attributes (variables) of systems on a seven-point scale that made use of semantic differential (polar adjectives) technique. The survey results were analyzed in order to identify UX opportunity areas by category of systems, as well as by UX variable. Differences among the opinions between users and developers regarding the UX level of systems were found. A strongly positive correlation between the UX level (UX index) determined through the ergonomic and hedonic variables, and the appeal (Appeal index), was found. Finally, the spotted UX opportunity areas are discussed.
by Jonathan Laguna Flores.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Xiaolong. "A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7589.

Full text
Abstract:
Building Automation System (BAS) is a complex distributed control system that is widely deployed in commercial, residential, industrial buildings for monitoring and controlling mechanical/electrical equipment. Through increasing industrial and technological advances, the control components of BAS are becoming increasingly interconnected. Along with potential benefits, integration also introduces new attack vectors, which tremendous increases safety and security risks in the control system. Historically, BAS lacks security design and relies on physical isolation and "security through obscurity". These methods are unacceptable with the "smart building" technologies. The industry needs to reevaluate the safety and security of the current building automation system, and design a comprehensive solution to provide integrity, reliability, and confidentiality on both system and network levels. This dissertation focuses on the system level in the effort to provide a reliable computing foundation for the devices and controllers. Leveraged on the preferred security features such as, robust modular design, small privilege code, and formal verifiability of microkernel architecture, this work describes a security enhanced operating system with built-in mandatory access control and a proxy-based communication framework for building automation controllers. This solution ensures policy-enforced communication and isolation between critical applications and non-critical applications in a potentially hostile cyber environment.
APA, Harvard, Vancouver, ISO, and other styles
44

Pettersson, Erik. "Comparison of System Performance During DDoS Attacks in Modern Operating Systems." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13748.

Full text
Abstract:
Distributed Denial of Service attacks are an ever prevalent challenge for system administra-tors today to overcome. The attack, which is all about restricting legitimate users access to a service, such as a web-page. Can cost companies and governments millions of dollars if not properly managed. This study aims to explore if there is any difference in performance between some of the most modern iterations of popular server operating systems today. Those server operating systems are: Windows Server 2016, Ubuntu 16 and FreeBSD 11. And submitting them to one of the most popular DDoS attacks at the time of writing, a so called HTTP-Get request. The webservers used are some of the most widely used today, Apache and Microsoft IIS. Each server will be submitted to attacks, and compared between one another. Different de-fence methods will also be tested and examined. Tests include shorter tests that is repeated multiple times for data validity, and one longer test for every condition in order to control if the results are similar. During these tests, the operating systems will measure CPU/RAM utilization, and a control computer will measure Round Trip Time. Windows Server 2016 using IIS and FreeBSD 11 perform similarly resource wise, but Win-dows Server 2016 with IIS had a better Round Trip Time performance. Windows Server 2016 with Apache performs worst in all measurements, while Ubuntu 16 performs in the middle, but has the most stable performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Kou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.

Full text
Abstract:
This thesis addresses the problem of conformance testing of communication protocol implementations. Test sequence generation techniques for finite state machines (FSM) have been developed to solve the problem of high costs of an exhaustive test. These techniques also guarantee a complete coverage of an implementation in terms of state transitions and output functions, and therefore provide a sound test of the implementation under test. In this thesis, we have modified and applied three test sequence generation techniques on the class 0 transport protocol. A local tester and executable test sequences for the ISO class 0 transport protocol have been developed on a portable protocol tester to demonstrate the practicality of the test methods and test methodologies. The local test is achieved by an upper tester residing on top of the implementation under test (IUT) and a lower tester residing at the bottom of the IUT. Tests are designed based on the state diagram of an IUT. Some methodologies of parameter variations have also been used to test primitive parameters of the implementation. Some problems encountered during the implementation of the testers and how they are resolved are also discussed in the thesis.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
46

Bershad, Brian Nathan. "High performance cross-address space communication /." Thesis, Connect to this title online; UW restricted, 1990. http://hdl.handle.net/1773/6939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Schneck, Phyllis Adele. "Dynamic management of computation and communication resources to enable secure high-performances applications." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/8264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Purdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.

Full text
Abstract:
This dissertation describes the design and implementation of the file system component of the Saguaro operating system for computers connected by a local-area network. Systems constructed on such an architecture have the potential advantage of increased file availability due to their inherent redundancy. In Saguaro, this advantage is made available through two mechanisms that support semi-automatic file replication and access: reproduction sets and metafiles. A reproduction set is a collection of files that the system attempts to keep identical on a "best effort" basis, relying on the user to handle unusual situations that may arise. A metafile is a special file that contains symbolic path names of other files; when a metafile is opened, the system selects an available constituent file and opens it instead. These mechanisms are especially appropriate for situations that do not require guaranteed consistency or a large number of copies. Other interesting aspects of the Saguaro file system design are also described. The logical file system forms a single tree, yet any file can be placed in any of the physical file systems. This organization allows the creation of a logical association among files that is quite different from their physical association. In addition, the broken path algorithm is described. This algorithm makes it possible to bypass elements in a path name that are on inaccessible physical file systems. Thus, any accessible file can be made available, regardless of the availability of directories in its path. Details are provided on the implementation of the Saguaro file system. The servers of which the system is composed are described individually and a comprehensive operational example is supplied to illustrate their interation. The underlying data structures of the file system are presented. The virtual roots, which contain information used by the broken path algorithm, are the most novel of these. Finally, an implementation of reproduction sets and metafiles for interconnected networks running Berkeley UNIX is described. This implementation demonstrates the broad applicability of these mechanisms. It also provides insight into the way in which mechanisms to facilitate user controlled replication of files can be inexpensively added to existing file systems. Performance measurements for this implementation are also presented.
APA, Harvard, Vancouver, ISO, and other styles
49

Ackerman, M. C. (Marthinus Casper). "Kernel support for embedded reactive systems." Thesis, Stellenbosch : Stellenbosch University, 1993. http://hdl.handle.net/10019.1/58022.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University , 1993.
ENGLISH ABSTRACT: Reactive systems are event driven state machines which usually do not terminate, but remain in perpetual interaction with their environment. Such systems usually interact 'With devices which introduce a high degree of concurrency and some real time constraints to the system. Because of the concurrent nature of reactive systems they are commonly implemented as communicating concurrent processes on one or more processors. Jeffay introduces a design paradigm which requires consumer processes to consume messages faster than they are produced by producer processes. If this is guaranteed, the real time constraints of such .. system are always met, and the correctness of the process interaction is guaranteed in terms of the message passing semantics. I developed the ESE kernel, which supports Jeffay systems by providing lightweight processes which communicate over asynchronous channels. Processes are scheduled non-preemptively according to the earliest deadline first policy when they have messages pending on their input channels. The Jeffay design method and the ESE kernel have been found to be highly suitable to implement embedded reactive systems. The general requirements of embedded reactive systems, and kernel support required by such systems, are discussed.
AFRIKAANSE OPSOMMING: Reaktiewe stelsels is toeatandsoutomate wat aangedryf word deur gebeure in hul omgewins. So 'n stelsel termineer gewoonlik nie, maar bly in 'n voortdurende wisselwerking met toestelle in sy omgewing. Toestelle in die omgewing van 'n reaktiewe stelsel veroorsaak in die algemeen 'n hoë mate van gelyklopendheid in die stelsel, en plaas gewoonlik sekere intydse beperkings op die stelsel. Gelyklopende stelsels word gewoonlik as stelsel. van kommunikerende prosesse geïmplementeer op een of meer prosessors. Jeffay beskryf 'n ontwerpsmetodologie waarvolgens die ontvanger van boodskappe hulle vinniger moet verwerk as wat die sender hulle kan stuur. Indien hierdie gedrag tussen alle pare kommunikerende prosesse gewaarborg kan word, sal die stelsel altyd sy intydse beperkings gehoorsaam, en word die korrektheid van interaksies tussen prosesse deur die semantiek van die boodskapwisseling gewaarborg. Die "ESE" bedryfstelselkern wat ek ontwikkel het, ondersteun stelsels wat ontwerp en geïmplementeer word volgens Jeffay se metode. Prosesse kommunikeer oor asinkrone kanale, en die ontvanger van die boodskap met die vroegste keertyd word altyd eerste geskeduleer. Jeffay se ontwerpsmetode en die "ESE" kern blyk in die praktyk baie geskik te wees vir reaktiewe stelsels wat as substelsels van groter stelsels uitvoer. Die vereistes van reaktiewe substelsels, en die kemondersteuning wat daarvoor nodig is, word bespreek.
APA, Harvard, Vancouver, ISO, and other styles
50

Swaan, Arons Henk de. "Delfi design, development and applicability of expert system shells /." Delft : Delft University Press, 1991. http://books.google.com/books?id=2NZQAAAAMAAJ.

Full text
Abstract:
Thesis (doctoral)--Technische Universiteit Delft, 1991.
Summary and vita in Dutch and English; "stellingen" in Dutch. "Stellingen" inserted. Includes bibliographical references (p. 227-252) and index.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography