Dissertations / Theses on the topic 'Computer hardware'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer hardware.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tarnoff, David. "Episode 1.1 – The Importance of Hardware Design." Digital Commons @ East Tennessee State University, 2020. https://dc.etsu.edu/computer-organization-design-oer/1.
Full textRhodes, Daniel Thomas. "Hardware accelerated computer graphics algorithms." Thesis, Nottingham Trent University, 2008. http://irep.ntu.ac.uk/id/eprint/201/.
Full textHemingway, Peter. "Computer display architecture." Thesis, University of Cambridge, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.256743.
Full textNagaonkar, Yajuvendra. "FPGA-based Experiment Platform for Hardware-Software Codesign and Hardware Emulation." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1294.pdf.
Full textMukre, Prakash. "Hardware accelerator for DNA code word searching." Diss., Online access via UMI:, 2008.
Find full textIncludes bibliographical references.
Bissland, Lesley. "Hardware and software aspects of parallel computing." Thesis, University of Glasgow, 1996. http://theses.gla.ac.uk/3953/.
Full textChilingirian, Berj Krikor. "Hashing hardware : identifying hardware during boot-time system verification." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112837.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 85-90).
Modern systems measure the software loaded at boot-time to ensure the machine starts in a trusted state. Such measurements, however, do not include any information about the underlying hardware of the machine. Recent DRAM-based attacks and the growing complexity of the supply chain attest to the importance of measuring hardware at boot. In this thesis, we propose a technique for designing measurement schemes for hardware components. We then apply this technique to designing and implementing a hardware measurement scheme for DRAM on a real system without hardware modifications. Finally, we evaluate our DRAM hardware measurement scheme and demonstrate that it achieves 89% accuracy in mapping a DRAM measurement to the manufacturing process from which that DRAM was produced.
by Berj Krikor Chilingirian.
M. Eng.
Hawkins, Stuart Philip. "Video replay in computer animation." Thesis, University of Cambridge, 1990. https://www.repository.cam.ac.uk/handle/1810/250977.
Full textRay, Gavin Peter. "Computer network analysis and optimisation." Thesis, University of Plymouth, 1993. http://hdl.handle.net/10026.1/1639.
Full textSchoepke, Olaf S. "Dense instruction set computer architecture." Thesis, University of Bath, 1992. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.332540.
Full textLyons, Michael John. "Toward a Hardware Accelerated Future." Thesis, Harvard University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3600206.
Full textHardware accelerators provide a rare opportunity to achieve orders-of-magnitude performance and power improvements with customized circuit designs.
Many forms of hardware acceleration exist—attributes and trade-offs of each approach is discussed. Single-algorithm accelerators, which maximize efficiency gains through maximum specialization, are one such approach. By combining many of these into a many-accelerator system, high specialization is possible with fewer specialization limits.
The development of one such single-algorithm hardware accelerator for managing compressed Bloom filters in wireless sensor networks is presented. Results from the development of the accelerator highlight scalability deficiencies in the way accelerators are currently integrated into processors, and that the majority of accelerator area is consumed by generic SRAM memory rather than algorithm-specific logic.
These results motivate development of the accelerator store, a system architecture designed for the needs of many-accelerator systems. In particular, the accelerator store improves inter-accelerator communication and includes support for sharing accelerator SRAM memories. Using a security application as an example, the accelerator store architecture is able to reduce total processor area by 30% with less than 1% performance overhead.
Using the accelerator store as a base, the ShrinkFit framework allows accelerators to grow and shrink, to achieve accelerated performance within small FPGA budgets and efficiently expand for more performance when larger FPGA budgets are available. The ability to resize accelerators is particularly useful for hybrid systems combining GP-CPUs and FPGA resources, in which applications may deploy accelerators to a shared FPGA fabric. ShrinkFit performance overheads for small and large FPGA resources are found to be low using a robotic bee brain workload and FPGA prototype.
Finally, future directions are briefly discussed along with details about the production of the robotic bee helicopter brain prototype.
Brooks, Piete. "Distribution of functions in computer networks." Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335601.
Full textHiggi, A. H. M. "Computer architecture with high performance peripherals." Thesis, Bucks New University, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373587.
Full textAnderson, Paul. "Computer architecture for wafer scale integration." Thesis, City University London, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.333768.
Full textCoughlin, Michael. "Enabling User Space Secure Hardware." Thesis, University of Colorado at Boulder, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10791863.
Full textUser space software allows developers to customize applications beyond the limits of the privileged operating system. In this dissertation, we extend this concept to the hardware in the system, providing applications with the ability to define secure hardware; effectively enabling hardware to be treated as a user space resource. This addresses a significant challenge facing industry today, which has an increasing need for secure hardware. With the ever increasing leaks of private data, increasing use of a variety of computing platforms controlled by third parties, and increasing sophistication of attacks, secure hardware, now more than ever, is needed to provide protections we need. However, the current ecosystem of secure hardware is fractured and limited. Developers are left with few choices of platforms to implement their applications and oftentimes the choices don’t fully meet their needs. Instead of relying on manufacturers to make the correct design decisions and ensuring that these platforms are implemented correctly, we enable applications to define the exact secure hardware that it needs to protect itself and its data.
This vision leverages the emergence of programmable hardware, specifically FPGAs, to serve as the basis of user space secure hardware. The challenges of this, however, are that (i) sharing of FPGA resources among multiple applications is not currently practical, and (ii) the reprogrammability of FPGAs compromises the security properties of secure hardware. We address these challenges by introducing two systems, Cloud RTR and Software Defined Secure Hardware, which individually solve each challenge, and then combine these solutions together to realize the complete vision. Cloud RTR solves the first challenge by leveraging cloud compilation to allow for an FPGA to be shared between applications, making hardware into a user space resource. SDSHW solves the second challenge by introducing a self-provisioning system that allows for an FPGA to provisioned into a secure state, allowing for secure hardware to be run in an FPGA. We then combine these two systems to implement the user space hardware provided by Cloud RTR on the secure platform provided by SDSHW, which provides our vision of user space secure hardware.
Ibbitson, I. R. "The design and development of a microprocessor based system for computer aided design and computer aided learning." Thesis, University of Sunderland, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.372552.
Full textBaddam, Karthik. "Hardware level countermeasures against differential power analysis." Thesis, University of Southampton, 2012. https://eprints.soton.ac.uk/300786/.
Full textMitchell, David Anthony Paul. "Fast algorithms and hardware for 3D computer graphics." Thesis, University of Sheffield, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.299571.
Full textRoy, Shaunak S. M. Massachusetts Institute of Technology. "Future value chains in the computer hardware industry." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/38568.
Full textIncludes bibliographical references (leaves 96-97).
Companies in the computer hardware industry can benefit by incorporating future business scenarios in their present decision-making processes. Any decision regarding strategic supply chain design is one such area where long-range planning can especially help. This is primarily because investments in new supply chains have a long return period, which also influence the chances of future success of a company. However, developing such long-range views of the whole industry is a challenging task, because of inherent uncertainties of the future and rapid changes in the computer industry itself. This paper takes a step towards achieving this goal by introducing several frameworks for the development of future scenarios and their analysis.
by Shaunak Roy.
M.Eng.in Logistics
S.M.
Pace-Pequeño, Catherine. "Crafton Hills College computer hardware/software tracking system." CSUSB ScholarWorks, 1998. https://scholarworks.lib.csusb.edu/etd-project/1364.
Full textDimitrov, Martin. "Architectural support for improving system hardware/software reliability." Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4533.
Full textID: 028916717; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (Ph.D.)--University of Central Florida, 2010.; Includes bibliographical references (p. 110-119).
Ph.D.
Doctorate
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Jassim, A. R. "Performance modelling of fault tolerant computer networks." Thesis, University of Nottingham, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.371127.
Full textMedeiros, J. C. de. "Aspects of an HF interactive computer link." Thesis, University of Kent, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374421.
Full textStephenson, David Ian. "Creatures : a fine grained parallel computer architecture." Thesis, University of York, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.282322.
Full textButt, Wajeeh U. N. "Load balancing strategies for distributed computer systems." Thesis, Loughborough University, 1993. https://dspace.lboro.ac.uk/2134/14162.
Full textLyons, Michael John. "Toward a Hardware Accelerated Future." Thesis, Harvard University, 2013. http://dissertations.umi.com/gsas.harvard:11152.
Full textLüthi, Martin. "Electronic Commerce im IT-Hardware-Markt : ausgeführt anhand zweier Fallbeispiele aus dem Computer-Hardware- und dem Data-Communication-Hardware-Markt /." [S.l.] : [s.n.], 1999. http://www.ub.unibe.ch/content/bibliotheken_sammlungen/sondersammlungen/dissen_bestellformular/index_ger.html.
Full textCheng, Chih Kang. "Hardware implementation of the complex Hopfield neural network." CSUSB ScholarWorks, 1995. https://scholarworks.lib.csusb.edu/etd-project/1016.
Full textMilligan, Graeme Richard. "Reconfigurable hardware for control applications." Thesis, University of Glasgow, 2008. http://theses.gla.ac.uk/456/.
Full textChau, Man Ping Grace. "Goal-oriented hardware design." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45853.
Full textIncludes bibliographical references (p. 145-146).
This thesis presents Fide, a hardware design system that uses Goal-oriented programming. Goal-oriented programming is a programming framework to specify open-ended decision logic. This approach relies on two fundamental concepts-Goals and Techniques. Goals encode decision points and Techniques are scripts that describe how to satisfy Goals. In Fide, Goals represent the functional requirements (e.g., addition of two 32-bit binary integers) of the target circuit. Techniques represent hardware implementation alternatives that fulfill the functions. Techniques may declare their own subgoals, allowing a hierarchical decomposition of the functions. A Planner selects among Techniques based on the Goals declared to generate an implementation of the target circuit automatically. Users' preferences can be added to generate circuits for different scenarios: for different hardware environments, under different circuit constraints, or different implementation criteria etc. A Beta processor is implemented using Fide. The quality of the implementation is comparable to those optimized manually.
by Man Ping Grace Chau.
S.M.
Baba, Mohd Dani. "Fault tolerance in distributed real-time computer systems." Thesis, University of Sussex, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307238.
Full textAyyad, Abdulkarim Ahmad. "The design of a macro-dataflow computer system." Thesis, University of Brighton, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335148.
Full textMcCormack, Michelle Mary. "The design and evaluation of computer music interfaces." Thesis, City University London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.339694.
Full textMoore, Michael Peter. "The construction and control of an MIMD computer." Thesis, University of Southampton, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.305513.
Full textFleming, Robert Renka Robert Joseph. "General purpose programming on modern graphics hardware." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-6112.
Full textBusch, Holger. "Hardware design by proven transformations." Thesis, Brunel University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293219.
Full textLi, Juan. "Application-directed DVFS using multiple clock domains on graphics hardware." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-011409-144732/.
Full textKeywords: Dynamic Voltage and Frequency Scaling(DVFS); Energy; Graphics Process Unit(GPU); Multiple Clock Domain(MCD). Includes bibliographical references (leaves 78-81).
Fu, Yan Kit. "Some software and hardware implementations of the fast Hartley transform." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29940.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Mash, Peter William Tudor. "Hardware implications for efficient production of computer-generated holograms." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612930.
Full textStamoulis, Iakovos. "Computer graphics hardware using ASICs, FPGAs and embedded logic." Thesis, University of Sussex, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313943.
Full textBartzoudis, Nikolaos. "Using embedded hardware monitor cores in critical computer systems." Thesis, Loughborough University, 2006. https://dspace.lboro.ac.uk/2134/33928.
Full textBRUHNS, THOMAS VICTOR. "HARDWARE AND SOFTWARE FOR A COMPUTER CONTROLLED LIDAR SYSTEM." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/188042.
Full textChen, Hao. "Toward hardware-oriented defensive network infrastructure." Thesis, State University of New York at Binghamton, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3713553.
Full textThe prosperity of the Internet has made it attractive to hackers and malicious attackers. Distributed attacks, such as: DDoS attacks and Internet worms have become major threats towards the network infrastructure. Collaborating existent single-point-deployed security applications over multi-domains for distributed defense is promising. Taking advantage of the small-world network model, a three-layered network modeling platform was developed for exploring behaviors of collaborative defense under the scope of a complex system. Using this platform, a comparison study between two major collaborative defense schemes was conducted. Their performance and eectiveness against signature-embedded worm attacks were evaluated accordingly.
Given the rapid evolution of attack methods and toolkits, software-based solutions to secure the network infrastructure have become overburdened. The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution to close this performance gap is through hardware implementation of security functions. After a comprehensive survey on major recongurable hardware-based approaches application on network infrastructure security area, an optimized design of FPGA-based Power Spectral Density (PSD) data converter for online Shrew DDoS attack detection was proposed and prototyped. Combining an innovative component-reusable Auto-Correlation (AC) algorithm and the adapted 2N-point real-valued Discrete Fourier Transform (DFT) algorithm, a maximum reduction of 61.8% processing time from 27471.4 us to 10504.8 us was achieved. These ecient hardware realization enabled the implementation of this design to a Xilinx Virtex2 Pro FGPA.
The scalability issue against continuously expanding signature databases is another major impediment aecting hardware application for network intrusion detection. With the observation that signature patterns are constructed from combinations of a limited number of primary patterns, a two-stage decomposition approach was developed to solve this issue. The evaluation results show that a reduction in size of over 77% can be achieved on top of signature patterns extracted from the Snort rule database after decomposition.
Massoumi, Mehran Mokhtar 1961. "HARDWARE PROGRAM SIMULATOR: THE INTERACTIVE VERSION." Thesis, The University of Arizona, 1987. http://hdl.handle.net/10150/276502.
Full textOthman, A. T. "Performance analysis and control of computer communication network models." Thesis, University of Bradford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.384333.
Full textLei, Li. "Hardware/Software Interface Assurance with Conformance Checking." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2323.
Full textLópez-Lagunas, Abelardo. "Hardware support for fine-grain parallel architectures." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/14970.
Full textFong, Anthony Shi Sheung. "A computer architecture with system attributes on individual instruction operands." Thesis, University of Sunderland, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.270381.
Full textStubbfält, Erik. "Hardware Architecture Impact on Manycore Programming Model." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-441739.
Full textNguyen, Andrew T. "Investigation of hardware transactional memory." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100643.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 45-47).
Hardware transactional memory is a new method of optimistic concurrency control that can be used to solve the synchronization problem in multicore software. It is a promising solution due to its simple semantics and good performance relative to traditional approaches. Before we can incorporate this nascent technology into high-performing concurrent programs, it is necessary to investigate the physical capacity constraints and performance characteristics of hardware transactions in order to better inform programmers of their abilities and limitations. Our investigation involves the first empirical study of the "capacity envelope" of HTM in Intel's Haswell and IBM's Power8 architectures. We additionally survey how contention parameters, such as transaction size or write ratio, affect HTM performance and we capture these trends in a regression model for predicting the throughput of HTM-enabled concurrent programs. Through our investigation, we aim to provide what we believe is a much needed understanding of the extent to which one can use HTM to replace locks.
by Andrew T. Nguyen.
M. Eng.