To see the other types of publications on this topic, follow the link: Computer System Implementation.

Dissertations / Theses on the topic 'Computer System Implementation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer System Implementation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Raab, John A. "CATSY, computer aided teaching system : construction and implementation." Virtual Press, 1985. http://liblink.bsu.edu/uhtbin/catkey/415659.

Full text
Abstract:
Computer Aided Teaching System (CATSY) is an interactive menu driven system that provides an instructor/presenter with an efficient teaching tool using microcomputer technology and a large screen projection system to enhance lecture presentations. Included in this thesis are descriptions of supporting graphics software and the computer peripherals used in the development of CATSY.The development of data structures used in CATSY is stressed in this thesis, along with their application to manipulate graphics and text. This thesis is intended to support and complement the masters thesis presented by Mr. Vincent Pedraza, which presents the system overview and system applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Shafaghi, Mohammad. "Computer aided tool management system : an implementation model." Thesis, Sheffield Hallam University, 1994. http://shura.shu.ac.uk/3186/.

Full text
Abstract:
In recent years considerable attention has been diverted towards devising new strategies to deal with the competitive nature of manufacturing environments. Such strategies are often influenced by the costs and quality of the manufactured products. An effective tool management and control system can significantly contribute to the efficiency of manufacturing facilities by maintaining the flow of production, reducing manufacturing costs, and be instrumental to the quality of finished goods. Most companies however, have consistently overlooked the importance of tooling and its impact on the efficiency of their manufacturing facilities, consequently it has become a maior production bottleneck. Hence, the need for uncovering the nature, extent, and underlying causes of tooling problems. Having recognised the importance of a Computer Aided Tool Management And Control Systems (CATMACS) as a partial solution to the efficient management of tooling resources, the study then looks at the implementation of CATMACS in fourteen manufacturing companies in the UK, developing some 40 propositions. Based on the developed propositions, a framework for the implementation methodology is constructed. The framework consists of five phases; Tool audit, Strategy, Design, Action, and Review. The framework has been evaluated and the inputs and outputs to the phases have been identified. The framework represents a significant step in understanding of CATMACS implementation, in particular: <ul> <li>It addresses the need for such system.</li> <li>It provides the basis of an implementation toolkit.</li> <li>It provides guidance for the best way of implementing a CATMACS.</li> <li>It is constructed using hard data.</li> </ul>
APA, Harvard, Vancouver, ISO, and other styles
3

Soo, Douglas. "Implementation of temporal typography system." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chung, Edward C. "The implementation of a personal computer-based digital facsimile information distribution system." Ohio : Ohio University, 1991. http://www.ohiolink.edu/etd/view.cgi?ohiou1183661772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Öhrn, Markus. "Implementation av ett Content Management System." Thesis, University of Gävle, Department of Mathematics, Natural and Computer Sciences, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-51.

Full text
Abstract:
<p>Under de senaste åren har webbplatser blivit allt mer komplexa och informationen som ska visas och hanteras allt större. För att underlätta hantering och administration av dessa system har många CMS-system vuxit fram. Dessa system kan skilja sig mycket beträffande pris och funktionalitet, allt från mindre open source system till stora komplexa kommersiellt drivna system. Detta arbete bygger på att skräddarsy ett CMS-system för administration och hantering av innehåll på diverse artist sidor, som hanteras av ett medieföretag. Systemet använder tekniker som JavaScript, PHP, MySQL som grund för dess uppbyggnad. Resultatet av detta arbete blev ett CMS-system där användaren genom att logga in på systemet, enkelt kan hantera och uppdatera bilder, nyheter, textstrukturer, skicka och hantera nyhetsbrev etc.</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Chiang, Ken H. "A prototype implementation of a time interval file protection system in Linux." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2359.

Full text
Abstract:
Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents can be protected appropriately and the period of access to them controlled; and cryptographic keys configured to automatically expire and be unusable beyond a specific time. This thesis implements a prototype of the Time Interval Access Control (TIAC) model in the context of a protected file system for the popular open-source Linux operating system. The Linux Security Module framework is used for the implementation, which includes temporal attributes associated both with the files and the users. The implementation includes modifications to the file system as well as low-level information access constructs. As part of the design process, testing and performance analysis were conducted. Since the temporal access control mechanism is built into the kernel rather than the application, bypassing the mechanism becomes more difficult. Kernel level implementation also affords the same policy enforcement functionality to different applications, thus reducing human errors in their development. This thesis is relevant to the research on dynamic security services for information protection envisioned by the DoD Global Information Grid (GIG).
APA, Harvard, Vancouver, ISO, and other styles
7

Abdel-Jaber, Fadi Fayez. "Design and implementation of car rental system." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1836.

Full text
Abstract:
When someone wants to rent a car, the customer will usually think twice about the company from which they want to rent. The decision will be based on factors such as good rates, quality and customer service. The service the company representative offers the client should be fast, clear and accurate. This goal cannot be achieved without an informative system that will enable the customer representative to answer the various questions the client might have.
APA, Harvard, Vancouver, ISO, and other styles
8

Mylvaganam, Mohanaharan. "Implementation of BMLS (baseline microwave landing system) computer model on hypercube processors." Ohio : Ohio University, 1991. http://www.ohiolink.edu/etd/view.cgi?ohiou1183735092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jonjic, Tomislav. "Design and Implementation of the uMPS2 Educational Emulator." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4472/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ding, Li. "Design and implementation of an advanced telecollaboration system." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/MQ57108.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Xu, Han. "Location Based Educational Web System Design and Implementation." Kent State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=kent1492710083528591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hsieh, Chao-Ho. "Implementation of graph manipulation under X Window system environment." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834634.

Full text
Abstract:
In graph theory graphs are mathematical objects that can be used to model networks, data structures, process scheduling, computations and a variety of other systems where the relations between the objects in the system play a dominant role.We will now consider graphs as mathematically self-contained units with rich structure and comprehensive theory; as models for many phenomena, particularly those arising in computer systems; and as structures which can be processed by a variety of sophisticated and interesting algorithms.For graph theory presentation, we need a very good graphical user interface(GUI) to approach the goal. X Window system is ideally suited for such a purpose. This package program is based on X Window system environment. With this package, we can manipulate graphs by special functions which can put nodes, put edges, delete nodes, delete edges, change the whole graph size, move graph location, and modify edge weights.<br>Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
13

Tan, Kefeng. "Design and Implementation of Spectrum-aware Wireless Multimedia Communication System." Thesis, University of California, Davis, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3596957.

Full text
Abstract:
<p> The explosive mobile data growth needs more spectrum to accommodate the traffic. Existing policy of exclusive spectrum access has made today's spectrum both over-controlled and underutilized. One possibility to improve spectrum efficiency is via dynamic spectrum sharing, which has the potential to release a large percentage of underutilized spectrum. </p><p> Cognitive radio is one of the most promising technologies to facilitate dynamic spectrum sharing. Yet, there exist many problems for cognitive radio to support multimedia communications. This dissertation advances the concept of <i>&ldquo;spectrum aware&rdquo;</i> for cognitive-radio based wireless multimedia communication system. We interpret spectrum awareness in a broad way which includes spectrum sensing, spectrum effectiveness and spectrum efficiency. In particular, we have made the following contributions in this dissertaion: </p><p> &bull; We design and implement RECOG, a cognitive radio (CR) system that improves conventional CR with a smart sensing, fast backup channel searching and QoS managing. The proposed system is the first fully-fledge CR system that can supports real-time applications such as video chat. </p><p> &bull; We design and implement PINOKIO, a system that monitors spectrum usage and improves spectrum efficiency in frequency-agile WiFi networks. </p><p> &bull; We design and implement FAVICS, a frequency-aware video communication system that leverages the nature of unequal error protection (UEP) in frequency diversity for wireless streaming without modifying existing wireless PHY, and improve the peak signal-to-noise ratio (PSNR) of video streaming by 5&sim;10 dB.</p>
APA, Harvard, Vancouver, ISO, and other styles
14

Tang, Xudong 1967. "A complete MEMS analysis system and implementation." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Euresti, David 1979. "Self-certifying file system implementation for Windows." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87422.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (leaves 38-39).<br>by David Euresti.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
16

Tong, Darren Pong-Choi. "Implementation of a protocol validation and synthesis system." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/25061.

Full text
Abstract:
VALISYN, an automated system for the validation and synthesis of error-free protocols has been implemented in C language. It assists designers in the detection and prevention of various kinds of potential design errors, such as state deadlocks, non-executable interactions, unspecified receptions and state ambiguities. The technique employed is a stepwise application of a set of production rules which guarantee complete reception capability. These rules are implemented in a tracking algorithm, which prevents the formation of non-executable interactions and unspecified receptions, and which monitors the existence of state deadlocks and state ambiguities. The implementation of VALISYN is discussed and a number of protocol validation and synthesis examples are presented to illustrate its use and features.<br>Science, Faculty of<br>Computer Science, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
17

Rao, Ananth K. "The DFS distributed file system : design and implementation." Online version of thesis, 1989. http://hdl.handle.net/1850/10500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jing, Ming-Haw. "The implementation of a fault-tolerant computer system for space instrumentation." Thesis, University of Sheffield, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Robb, David S. S. "The theory and implementation of a secure system." Thesis, University of St Andrews, 1992. http://hdl.handle.net/10023/13497.

Full text
Abstract:
Computer viruses pose a very real threat to this technological age. As our dependence on computers increases so does the incidence of computer virus infection. Like their biological counterparts, complete eradication is virtually impossible. Thus all computer viruses which have been injected into the public domain still exist. This coupled with the fact that new viruses are being discovered every day is resulting in a massive escalation of computer virus incidence. Computer viruses covertly enter the system and systematically take control, corrupt and destroy. New viruses appear each day that circumvent current means of detection, entering the most secure of systems. Anti-Virus software writers find themselves fighting a battle they cannot win: for every hole that is plugged, another leak appears. Presented in this thesis is both method and apparatus for an Anti-Virus System which provides a solution to this serious problem. It prevents the corruption, or destruction of data, by a computer virus or other hostile program, within a computer system. The Anti-Virus System explained in this thesis will guarantee system integrity and virus containment for any given system. Unlike other anti-virus techniques, security can be guaranteed, as at no point can a virus circumvent, or corrupt the action of the Anti-Virus System presented. It requires no hardware modification of the computer or the hard disk, nor software modification of the computer's operating system. Whilst being largely transparent to the user, the System guarantees total protection against the spread of current and future viruses.
APA, Harvard, Vancouver, ISO, and other styles
20

Herniter, Bruce Corey. "Design and implementation of a negotiation support system." Diss., The University of Arizona, 1991. http://hdl.handle.net/10150/185379.

Full text
Abstract:
A Negotiation Support System (NSS) is a system consisting of hardware, software, people, and procedures that assists the individual negotiator, mediator, or researcher; and provides a solution or facilitates the process of negotiation. NSS have previously been designed around modeling and simulation, expert systems, and other techniques. However, negotiation can be considered a group process involving two or more teams with communication routed through the group leaders. Electronic Meeting Systems (EMS) provide a model for the use of computers during group processes. EMS provides a research model and a framework for the development of software tools. The framework specifies that a computer-based meeting system consists of the group, the task, and the context and finally the EMS itself. MEDIANSS and its successor GroupSystems/Mediation (GS/M) were tested in two contract negotiations totaling almost 90 hours over 23 sessions. The negotiators generally approved of the GS/M tools and used them: the negotiators spent 19% to 24% of their time using computers. Both negotiations concluded successfully. The major accomplishment of GS/M was its assistance in the secretarial function of the talks. The drafts of the contracts were finalized faster than typically expected.
APA, Harvard, Vancouver, ISO, and other styles
21

Ward, Christopher W. (Christopher William). "Implementation of the Arctic Network Control Interface System." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38136.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.<br>Includes bibliographical references (p. 54).<br>by Christopher W. Ward.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
22

Xu, Shangjin. "Design and Implementation of the Ephemerizer System." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9137.

Full text
Abstract:
<p>This thesis describes the system design and implementation of the secure Ephemerizer System that was first introduced by Radia Perlman in 2005. The system is designed to enable users to keep data for a finite period of time before making the data unrecoverable by destroying the keys with which the data was encrypted. The task of the Ephemerizer System service is to create, advertise, and destroy keys required for the Ephemerizer System's functionalities.</p><p>We designed the Ephemerizer System Service's security by placing the sensitive key management modules into a Trusted Computing Base (TCB). Our compartmentalized approach distributes security requirements at different sensitivity levels into different protection domains. In our approach, we implement the trusted protection domain (our TCB) on a tamper-resistant Javacard.</p><p>We placed the key storage database into the partly trusted protection domain to improve scalability and availability of the Ephemerizer System. The partly trusted protection domain requires memory isolation and other security mechanisms provided by the underlying operating system. We implemented several mechanisms on the TCB, such as the signature engine, cryptographic modules, the on-card expiration validator, and on-card time verification. We make the Ephemerizer System available to users as a web service and expose it though a uniform API. This approach enables the seamless integration of the Ephemerizer System into business processes on heterogeneous platforms.</p>
APA, Harvard, Vancouver, ISO, and other styles
23

Nory, Nawar A. "Design and implementation of the Chunks feature." Thesis, Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Arum, Mochamad. "Implementation consideration for Windows NT integrated network for System Management computer laboratories." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA308151.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1996.<br>Thesis advisor(s): Norman F. Schneidewind, R.A. Buddenberg. "March 1996." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
25

Fletcher, Simon. "Computer aided system for intelligent implementation of machine tool error reduction methodologies." Thesis, University of Huddersfield, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chao, Wei Hsin. "Investigation into a practical implementation of a computer aided music performance system." Thesis, Keele University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.339848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Janson, Dorothy M. "A static scheduler for the computer aided prototyping system: an implementation guide." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23405.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>As demand for hard real-time and embedded computer systems increases, a new approach to software development is critical. Software engineers and users would benefit from an automated methodology allowing validation of design specifications or functional requirements early in the development life cycle. A fast, efficient, easy-to-use tool would increase productivity and would enhance user confidence that software would be delivered at less cost and on schedule. The Computer Aided Prototyping System (CAPS) is a conceptualized tool providing these capabilities. This thesis represents a pioneering effort to develop a Static Scheduler for the CAPS Execution Support System using the Ada programming language. The Static Scheduler initially extracts critical operators, timing constraints and precedence relationships from a high-level prototype source program. The Static Scheduler then creates a static schedule for run-time execution, using worst case scenarios, guaranteeing that timing constraints are met. The primary goal of this thesis is to provide the scheduling algorithms and implementation guidelines for the Static Scheduler. Secondary goals are to demonstrate the significance of continued research to telecommunications applications and to demonstrate the feasibility of Ada as the implementation language.<br>http://archive.org/details/staticschedulerf00jans<br>Lieutenant, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
28

Scott, Terry A. "An implementation of the Kermit protocol using the Edison system." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Widman, Ludvig. "Design and implementation of a web-based time tracking system." Thesis, Umeå universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-49370.

Full text
Abstract:
In this exam project a time tracking system is designed, evaluated and implemented at the Umeå based company Codemill AB. The system used within the company at the start of the project had several usability problems and lacked important features. The goal of the project was therefore to create a system that better meets their needs and can easily be extended with new features when neccessary.A requirements study collected information about what the users needed, how other systems had solved similair problems and what the issues with the existing solution were. A prototype was created from the requirments and evaluated with inspection methods anduser studies.The refined prototype was implemented as a web application. The final system was also evaluated with user studies and refined based on feedback.
APA, Harvard, Vancouver, ISO, and other styles
30

Ayyildiz, Nizam. "An Asynchronous System Design And Implementation On An Fpga." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607566/index.pdf.

Full text
Abstract:
Field Programmable Gate Arrays (FPGAs) are widely used in prototyping digital circuits. However commercial FPGAs are not very suitable for asynchronous design. Both the architecture of the FPGAs and the synthesis tools are mostly tailored to synchronous design. Therefore potential advantages of the asynchronous circuits could not be observed when they are implemented on commercial FPGAs. This is shown by designing an asynchronous arithmetic logic unit (ALU), implemented in the style of micropipelines, on the Xilinx Virtex XCV300 FPGA family. The hazard characteristics of the target FPGA have been analyzed and a methodology for selftimed asynchronous circuits has been proposed. The design methodology proposes first designing a hazard-free cell set, and then using relationally placed macros (RPMs) to keep the hazard-free behavior, and incremental design technique to combine modules in upper levels without disturbing their timing characteristics. The performance of the asynchronous ALU has been evaluated in terms of the logic slices occupied in the FPGA and data latencies, and a comparison is made with a synchronous ALU designed on the same FPGA.
APA, Harvard, Vancouver, ISO, and other styles
31

Pedroso, Marco Antonio L. "The implementation of a split-value verifiable voting system." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100649.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 30-32).<br>This study provides a proof-of-concept of a newly designed verifiable voting system. The implementation elicits details in the communication and synchronization among servers, unavailable in the original design paper [M. O. Rabin and R. L. Rivest, "Efficient End to End Verifiable Electronic Voting Employing Split Value Representations." in Proc. EVOTE '14, Bregenz, Austria.]. The implemented system was tested on networks of virtual machines in a cluster, and its performance was evaluated based on the computational time and amount of data transferred. The preliminary results simulates elections with up to ten thousand votes. The team will conduct further work to implement the handling of server failures and the secure channels among the servers. This study demonstrates the feasibility of running large elections with more transparent voting systems, by leveraging the split-value representation and simple cryptographic primitives.<br>by Marco Antonio L. Pedroso.<br>M. Eng.
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Yong 1973. "Toward implementation of a feature-based lexical access system." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/17463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Miu, Allen Ka Lun 1977. "Design and implementation of an indoor mobile navigation system." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/16810.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (p. 59-60).<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>This thesis describes the design and implementation of CricketNav, an indoor mobile navigation system using the Cricket indoor location sensing infrastructure developed at the MIT Laboratory for Computer Science as part of Project Oxygen. CricketNav navigates users to the desired destination by displaying a navigation arrow on a map. Both the direction and the position of the navigation arrow are updated in real-time as CricketNav steers the users through a dynamically computed path. To support CricketNav, we developed a modular data processing architecture for the Cricket location system, and an API for accessing location information. We implemented a least-squares position estimation algorithm in Cricket and evaluated its performance. We also developed a rich and compact representation of spatial information, and an automated process to extract this information from architectural CAD floorplans.<br>by Allen Ka Lun Miu.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
34

Yang, Lei S. M. Massachusetts Institute of Technology. "Design and implementation of a high performance blockchain system." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127317.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020<br>Cataloged from the official PDF of thesis.<br>Includes bibliographical references (pages 61-64).<br>Bitcoin is the first fully-decentralized permissionless blockchain protocol to achieve a high level of security: the ledger it maintains has guaranteed liveness and consistency properties as long as the adversary has less compute power than the honest nodes. However, its throughput is only 7 transactions per second and the confirmation latency can be up to hours. Prism is a new blockchain protocol that is designed to achieve a natural scaling of Bitcoin's performance while maintaining its full security guarantees. In prior work, Prism's security and performance properties have been analyzed theoretically, but the analysis relies on a simple network model and specifies performance bounds up to large constants. Hence, the results cannot predict the protocol's real-world performance. In this thesis, we present a Bitcoin-like payment system based on the Prism protocol and evaluate it on a network of up to 1000 EC2 virtual machines. Our system achieves a throughput of over 70,000 transactions per second and a confirmation latency of tens of seconds, validating the prior theoretical results. We introduce several optimizations that allow the system to scale linearly up to 8 CPU cores, and a new algorithm to confirm transactions that is faster and more practical than the original protocol. We also evaluate practical security concerns like the censorship attack, the balancing attack, and spamming, and propose a simple solution that reduces spam traffic by 80% while only adding 5 seconds to the confirmation latency.<br>by Lei Yang.<br>S.M.<br>S.M. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
35

Rachal, Randy J. "Design and implementation of a concrete interface generation system." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA245807.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 1990.<br>Thesis Advisor: Berzins, Valdis. Second Reader: Bradbury, Leigh W. "December 1990." Description based on title screen as viewed on April 1, 2010. DTIC Identifier(s): Computer programs, software engineering, theses, ADA programming language, grammars, specifications, interfaces, installation. Author(s) subject terms: Automatic code generation, formal specifications, attribute grammars. Includes bibliographical references (p. 79-80). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
36

Cattrall, David Michael. "The design and implementation of a relational programming system." Thesis, University of York, 1992. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Boumenot, Christopher M. "The performance of a Linux NFS implementation." Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0523102-121726/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Eralp, Ozgur. "Design And Implementation Of A Software Development Process Measurement System." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12604771/index.pdf.

Full text
Abstract:
This thesis study presents a software measurement program. The literature on software measurement is reviewed. Conditions for an effective implementation are investigated. A specific measurement system is designed and implemented in ASELSAN, Inc. This has involved organizational as well as technical work. A software tool has been developed to assist in aggregating measurements obtained from various CASE tools in use. Results of the implementation have started to be achieved. Lots of useful feedbacks have been returned to the organization as a result of analyzing of the measurement data.
APA, Harvard, Vancouver, ISO, and other styles
39

Hunt, David. "An implementation of a cross-platform wireless router operating system." [Denver, Colo.] : Regis University, 2007. http://165.236.235.140/lib/DHunt2007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pearson, Mark Philip. "The design, implementation, and use of a concurrent lisp programming system for distributed computing environments." Diss., Georgia Institute of Technology, 1993. http://hdl.handle.net/1853/13029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Yeang, Chen-Hsiang 1969. "Implementation of a virtual environment system based on geographical information system and environmental models." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/40227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Jadama, Sambou. "Implementation of Web Content Management System for a charity group." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-14167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Englund, Henric. "Evaluation of traffic generation tools and implementation of test system." Thesis, Umeå universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-40730.

Full text
Abstract:
The purpose of this master’s thesis is to examine the possibilities to build an efficient and accurate distributed IP traffic generator based on a open source software traffic generator. The problem lies in the demand for high performance traffic generators during quality assurance of IP equipment and the high price of commercial hardware traffic generators. An evaluation is conducted to identify a suitable traffic generator, given a set of requirements that the traffic generator must fulfill to be usable in performance testing. A distributed system utilizing the most suitable traffic generator is then implemented. The result and conclusion of this report is that hardware traffic generators are superior to the software based counterpart due to the several drawbacks that software traffic generators suffers from, such as disc I/O and CPU load.
APA, Harvard, Vancouver, ISO, and other styles
44

Lu, Xiaofan. "Implementation of an information retrieval system for stock option analysis." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=19677.

Full text
Abstract:
Stock option trading has been very active since options were invented. Option analysis is very useful in helping investors decide investing strategies and predict the trend of the future stock movements. In this thesis, basic theory about stock option trading and some important approaches of option analysis such as option volume, open interest, put/call ratios and breakeven stock prices are discussed. A system called Stock Option Analyzer that can perform the option analysis based on these approaches is described in detail. The Stock Option Analyzer is able to automatically retrieve option quotes on any specified stock from the website Yahoo!Finance and present analysis results in the user's web browser. This analysis information is very useful for us to understand investors' opinions about the underlying stocks. The system is developed using JSP technology, utilizing JavaBeans, Java applets, and the help of the web server to generate web page contents dynamically.
APA, Harvard, Vancouver, ISO, and other styles
45

Joseph, Anton T. "Knowledge acquisition and implementation in an expert process planning system." Thesis, University of Manchester, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.346428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Chao Gilbert Juan E. "CSSE document management system implementation and usability evaluation /." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/WANG_CHAO_41.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Shcherban, V. Yu. "Structure of the computer program of realization algorithm implementation." Thesis, Київський національний університет технологій та дизайну, 2020. https://er.knutd.edu.ua/handle/123456789/16486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Xie, Dawen. "Design and implementation of a departmental information management system." Thesis, [College Station, Tex. : Texas A&M University, 2007. http://hdl.handle.net/1969.1/ETD-TAMU-1429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cheng, Yuxin. "Home Automation System Design And Implementation Based On 6LoWPAN." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-174829.

Full text
Abstract:
Home automation systems are collections of smart devices that enable various functions within a house or building, such as light and plug control, energy monitoring, temperature metering, air conditioning and heating, etc. Usually, these devices are smart sensors, that are implemented with low power communication protocol like ZigBee and 6LoWPAN and only can be controlled from an Internet gateway. Nowadays, there are lots of home automation products on the market for customers. User can use application on smart phone to control the products they bought. The control command can go through a cloud-based server and be directed to the corresponding gateway, and finally reach to the sensor devices, which is referred to as "cloud-based mode" system. However, this single mode is not effcient under some circumstances where the Internet is not enabled or allowed. In this thesis work, a hybrid system architecture is proposed, implemented and evaluated, which include both stand-only and cloud-based mode. It offers a quick connection when user's smart phone and the sensor gateway are in the same private network. The proposed doublemode system architecture fits user's need and provides high reliability.<br>Hemautomationssystem är smarta enheter som möjliggör olika funktioner i ett hus eller en byggnad, såsom kontroll av ljus och uttag, energiövervakning, temperaturm ätning, luftkonditionering och uppvärmning, etc. Dessa enheter är vanligtvis smarta sensorer, implementerade med lågeffekt kommunikationsprotokoll som ZigBee och 6LoWPAN som endast kan styras via en Internet-gateway. Numera finns det era hemautomationprodukter på marknaden. Användaren kan med sin smarta telefon styra sina produkter. Kommandot går via en molnbaserad server och vidarebefordras till motsvarande gateway, kommandot når slutligen till sensoranordningarna, även kallat "molnbaserat läge". Detta "molnbaserade läge" är inte effektiv under vissa omständigheter där internetanslutning ej är tillänglig. I detta avhandlingsarbete föreslås, genomförs och utvärderas en hybrid systemarkitektur som inkluderar både stand-only och molnbaserade läget. Detta erbjuder en snabb anslutning när användarens smartphone och sensor gateway är pår samma privata nätverk. Den föreslagna systemarkitekturen passar användarens behov och ger hög tillförlitlighe
APA, Harvard, Vancouver, ISO, and other styles
50

Kågström, Simon. "Performance and Implementation Complexity in Multiprocessor Operating System Kernels." Licentiate thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00285.

Full text
Abstract:
The increasing use of multiprocessor computers require operating system adaptations to take advantage of the computing power. However, porting an operating system kernel to run on a multiprocessor can be very difficult because of a large code base, concurrency issues when dealing with multiple threads of execution, and limited tool support for development. Likewise, it can be difficult to obtain good performance from a ported operating system without sufficient parallelism in the operating system kernel. This thesis examines the tradeoff between performance and implementation complexity in multiprocessor operating system ports and is based on four papers. The first paper is a survey of existing multiprocessor implementation approaches and focuses on the tradeoff between performance and implementation effort. The second paper describes experiences from performing a traditional lock-based multiprocessor port while the third paper presents an alternative porting approach which aims to minimize implementation complexity. The fourth paper, finally, presents a tool for efficient instrumentation of programs, which can be used during the development of large software systems such as operating system kernels. The main contribution of this thesis is an in-depth investigation into the techniques used when porting operating systems to multiprocessors, focusing on implementation complexity and performance. The traditional approach used in the second paper required longer development time than expected, and the alternative approach in the third paper can therefore be preferable in some cases. The need for efficient tools is also illustrated in the fourth paper.<br>Denna licentiatavhandling analyserar olika tekniker som kan användas vid portering av en operativsystemskärna till en multiprocessordator. Implementationsteknikerna har olika karaktäristik vad gäller prestanda och implementationskomplexitet, vilket genomlyses i avhandlingen.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography