Academic literature on the topic 'Operating systems (Computers)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Operating systems (Computers).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Operating systems (Computers)"

1

Kočíš, Tomáš, and Vilém Srovnal. "Operating Systems for Embedded Computers." IFAC Proceedings Volumes 36, no. 1 (February 2003): 359–64. http://dx.doi.org/10.1016/s1474-6670(17)33774-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Hasnawi, Haider, and Nawal Abbas Abdel. "THE IMPACT OF USING INTERNAL CONTROL UNDER THE ELECTRONIC OPERATING SYSTEM." International journal of business and management sciences 04, no. 05 (May 9, 2024): 119–40. http://dx.doi.org/10.55640/ijbms-04-05-11.

Full text
Abstract:
Internal control tools constitute one of the modern frameworks approved by the Committee of Sponsoring Organizations (COSO). "And the one which takes into account setting the objectives first, then estimating the possibility of those objectives being exposed to threats, then internal control procedures are designed that reduce the risks, and at the same time provide reasonable guarantees for achieving the organization's objectives and introducing all modern developments into the system. The contemporary trend of internal control focuses on the integration between managing the risks to which th
APA, Harvard, Vancouver, ISO, and other styles
3

Vdovjak, Krešimir, Josip Balen, and Krešimir Nenadić. "Experimental Evaluation of Desktop Operating Systems Networking Performance." International journal of electrical and computer engineering systems 11, no. 2 (June 24, 2020): 67–76. http://dx.doi.org/10.32985/ijeces.11.2.2.

Full text
Abstract:
The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck
APA, Harvard, Vancouver, ISO, and other styles
4

Kendysh, I. V. "Automated system for deploying operating systems using LAN (PXE SERVER)." Litiyo i Metallurgiya (FOUNDRY PRODUCTION AND METALLURGY), no. 1 (March 12, 2022): 82–85. http://dx.doi.org/10.21122/1683-6065-2022-1-82-85.

Full text
Abstract:
PXE is an environment for booting computers using a network card without using hard drives, CDs and other devices used while booting operating systems. By choosing a network boot in the BIOS, it is possible to install the OS / rid of viruses /recover disks /test RAM from the PXE Boot server. Such a tool is irreplaceable in the case of a large number of computers
APA, Harvard, Vancouver, ISO, and other styles
5

Ochilov, Nizomiddin. "Creating Secure File Systems in Open-Source Operating Systems." WSEAS TRANSACTIONS ON SYSTEMS 21 (November 24, 2022): 221–32. http://dx.doi.org/10.37394/23202.2022.21.24.

Full text
Abstract:
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer. The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors. Each of them has its shortcomings which manifest themselves during development. Combining the advantages of file encryptors and file system encryptors helped to overcome those
APA, Harvard, Vancouver, ISO, and other styles
6

Craig, John S. "Managing Computer-Related Anxiety and Stress within Organizations." Journal of Educational Technology Systems 22, no. 4 (June 1994): 309–25. http://dx.doi.org/10.2190/mv5d-mykd-blla-06jl.

Full text
Abstract:
Computer-related anxiety and stress affects everyone who uses a computer and is aggravated by poor management, faulty system design, inadequate training, misunderstandings by users of what computers can do, and substandard documentation. Research has shown that computer users, no matter how experienced they are, can experience anxiety and stress that negatively affect their job performance. The problem is so pervasive that no single management strategy, ergonomic plan, training model, or system design can resolve the dilemma. Physical and psychological problems that afflict computer users can
APA, Harvard, Vancouver, ISO, and other styles
7

Dalimunthe, Ruri Ashari, Riki Andri Yusda, and William Ramdhan. "INSTALASI SISTEM OPERASI BERBASIS WINDOWS 10 PADA SEKOLAH MAN KISARAN." Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal 3, no. 2 (July 14, 2020): 163–68. http://dx.doi.org/10.33330/jurdimas.v3i2.499.

Full text
Abstract:
Abstract: Community service activities entitled "Installation of Operating Systems Based on Windows 10" aims to provide information to students from MAN Asahan about Installing Windows Operating Systems. The method used in this activity is a direct observation of the MAN Asahan school by watching and analyzing the problems or troubleshooting that occurs at the Computer Lab at MAN Asahan. In addition, information on problems in the computer Labs of the school was also carried out by a team of lecturers as the perpetrators of this community service by way of direct interviews with the Teachers a
APA, Harvard, Vancouver, ISO, and other styles
8

Saiedian, Hossein, and Munib Siddiqi. "A framework for the assessment of operating systems for small computers." ACM SIGICE Bulletin 21, no. 4 (April 1996): 2–27. http://dx.doi.org/10.1145/1059966.1059967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Colling, J. A., and H. S. von Harrach. "A control and imaging system for dedicated STEM." Proceedings, annual meeting, Electron Microscopy Society of America 50, no. 2 (August 1992): 968–69. http://dx.doi.org/10.1017/s0424820100129474.

Full text
Abstract:
A new digital control system has been developed for the HB600 series of cold field-emission STEM’S manufactured by VG Microscopes. The philosophy behind this control scheme has been to develop a system which is both user-friendly for non-experts in STEM/TEM operation as well as offering access to all functions for unusual modes of operation.The control scheme, as shown in Fig.1, is based on two computers; one for instrument control, using a multi-tasking, real-time operating system (OS/2) with a graphical user interface (Presentation Manager), the other for control of image acquisition and dis
APA, Harvard, Vancouver, ISO, and other styles
10

MORIARTY, K. J. M., and T. TRAPPENBERG. "PROGRAMMING TOOLS FOR PARALLEL COMPUTERS." International Journal of Modern Physics C 04, no. 06 (December 1993): 1285–94. http://dx.doi.org/10.1142/s0129183193001002.

Full text
Abstract:
Although software tools already have a place on serial and vector computers they are becoming increasingly important for parallel computing. Message passing libraries, parallel operating systems and high level parallel languages are the basic software tools necessary to implement a parallel processing program. These tools up to now have been specific to each parallel computer system and a short survey will be given. The aim of another class of software tools for parallel computers is to help in writing or rewriting application programs. Because automatic parallelization tools are not very succ
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Operating systems (Computers)"

1

Neugebauer, Rolf. "Decentralising resource management in operating systems." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/4118/.

Full text
Abstract:
This dissertation explores operating system mechanisms to allow resource-aware applications to be involved in the process of managing resources under the premise that these applications (1) potentially have some (implicit) notion of their future resource demands and (2) can adapt their resource demands. The general idea is to provide feedback to resource-aware applications so that they can proactively participate in the management of resources. This approach has the benefit that resource management policies can be removed from central entities and the operating system has only to provide mecha
APA, Harvard, Vancouver, ISO, and other styles
2

Baumann, Andrew Computer Science &amp Engineering Faculty of Engineering UNSW. "Dynamic update for operating systems." Awarded by:University of New South Wales. Computer Science and Engineering, 2007. http://handle.unsw.edu.au/1959.4/28356.

Full text
Abstract:
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administrators. The aim of this research is to develop a model for dynamic update of operating systems, allowing a system to be patched without the need for a reboot or other service interruption. In this work, a model for dynamic update based on operating system modularity is developed and evaluated using a prototype implementation for the K42 operating system. The prototype is able to update kernel code and data structures, e
APA, Harvard, Vancouver, ISO, and other styles
3

Rogers, David T. "A framework for dynamic subversion." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRogers.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grossman, Michael D. "A computer simulation of processor scheduling in UNIX 4.2BSD /." Online version of thesis, 1987. http://hdl.handle.net/1850/10295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dodge, Catherine A. "Recommendations for secure initialization routines in operating systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDodge.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004.<br>Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109) Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Forbes, Harold C. "Operating system principles and constructs for dynamic multi-processor real-time control systems." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Swift, Michael M. "Improving the reliability of commodity operating systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Operating systems (Computers)"

1

Flynn, Ida M. Understanding operating systems. Boston: PWS, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flynn, Ida M. Understanding operating systems. 5th ed. Boston: Thomson Course Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Flynn, Ida M. Understanding operating systems. 4th ed. Boston, Mass: Thomson Course Technology, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Flynn, Ida M. Understanding operating systems. 2nd ed. Boston: PWS Pub., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Haldar, Sibsankar. Operating systems. Upper Saddle River, NJ: Pearson, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Haldar, Sibsankar. Operating systems. Upper Saddle River, NJ: Pearson Education, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Comer, Douglas. Operating Systems Designs. Englewood Cliffs (N.J.): Prentice-Hall, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

William, Stallings. Operating systems. New York: Macmillan, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

William, Stallings. Operating systems. 2nd ed. Englewood Cliffs, NJ: Prentice Hall, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

William, Stallings. Operating systems. 2nd ed. London: Prentice-Hall, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Operating systems (Computers)"

1

Chakraborty, Pranabananda. "Computers and Software." In Operating Systems, 1–34. Boca Raton: Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003383055-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marwedel, Peter. "System Software." In Embedded Systems, 203–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_4.

Full text
Abstract:
AbstractIn order to cope with the complexity of applications of embedded systems, reuse of components is a key technique. As pointed out by Sangiovanni-Vincentelli (The context for platform-based design. IEEE Design and Test of Computers, 2002), software and hardware components must be reused in the platform-based design methosdology (see p. 296). These components comprise knowledge from earlier design efforts and constitute intellectual property (IP). Standard software components that can be reused include system software components such as embedded operating systems (OSs) and middleware. The last term denotes software that provides an intermediate layer between the OS and application software. This chapter starts with a description of general requirements for embedded operating systems. This includes real-time capabilities as well as adaptation techniques to provide just the required functionality. Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols. We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel. Furthermore, we will explain how Linux can be adapted to systems with tight resource constraints. Finally, we will provide pointers for additional reusable software components, like hardware abstraction layers (HALs), communication software, and real-time data bases. Our description of embedded operating systems and of middleware in this chapter is consistent with the overall design flow.
APA, Harvard, Vancouver, ISO, and other styles
3

Romá, Llorenç, and Bernard Tellenbach. "Secure Operating System." In Trends in Data Protection and Encryption Technologies, 115–20. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_21.

Full text
Abstract:
AbstractThe operating system is the backbone of every modern computer system, managing the system’s resources and executing applications. Therefore, it is essential to improve operating system security to ensure data integrity, confidentiality, and availability. When discussing secure operating systems, we generally refer to security-focused operating systems and security-evaluated operating systems. In critical environments, such as governments and military systems, that typically have higher security restrictions, security-evaluated operating systems are a convenient option used in other countries, ensuring those systems fulfill a set of security requirements. In addition, a trend toward more hardware security components, especially for separating cryptographic functions and implementing critical operations, has emerged. Although using secure operating systems is not a definitive solution to protect against all the dangers of current cyberspace, it is clear that it can reduce the impact of individual vulnerable applications or modules being exploited on the whole system.
APA, Harvard, Vancouver, ISO, and other styles
4

Chalk, B. S. "Operating Systems." In Computer Organisation and Architecture, 137–55. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-13871-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chalk, B. S., A. T. Carter, and R. W. Hind. "Operating systems." In Computer Organisation and Architecture, 154–76. London: Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-0-230-00060-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Page, Daniel. "Operating Systems." In Texts in Computer Science, 495–534. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-256-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grillmeyer, Oliver. "Operating Systems." In Exploring Computer Science with Scheme, 373–409. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4757-2937-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blum, Edward K. "Operating Systems (OS)." In Computer Science, 97–104. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1168-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Crutcher, Paul D., Neeraj Kumar Singh, and Peter Tiegs. "Operating System." In Essential Computer Science, 81–131. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7107-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cherry, Denny. "Computer Operating System Security." In Enterprise-Grade IT Security for Small and Medium Businesses, 71–81. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8628-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Operating systems (Computers)"

1

Desnoyers, Peter J. "Teaching operating systems as how computers work." In the 42nd ACM technical symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1953163.1953249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levinthal, Adam, Pat Hanrahan, Mike Paquette, and Jim Lawson. "Parallel computers for graphics applications." In ASPLOS II: Architectual support for programming languages and operating systems. New York, NY, USA: ACM, 1987. http://dx.doi.org/10.1145/36206.36202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Larina, T. B. "SECURE BOOT OF OPERATING SYSTEMS IN COMPUTERS OF TRANSPORT CONTROL SYSTEMS." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-637-644.

Full text
Abstract:
The article is devoted to the organization of loading operating systems in computers with firmware BIOS and UEFI BIOS. The steps for booting from MBR and GPT mapped hard drives are discussed. Particular attention is paid to the analysis of aspects of secure boot and potential vulnerabilities at all stages of the boot process.
APA, Harvard, Vancouver, ISO, and other styles
4

Lagar-Cavilla, Andres, Junwhan Ahn, Suleiman Souhlal, Neha Agarwal, Radoslaw Burny, Shakeel Butt, Jichuan Chang, et al. "Software-Defined Far Memory in Warehouse-Scale Computers." In ASPLOS '19: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297858.3304053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shi, Yunong, Nelson Leung, Pranav Gokhale, Zane Rossi, David I. Schuster, Henry Hoffmann, and Frederic T. Chong. "Optimized Compilation of Aggregated Instructions for Realistic Quantum Computers." In ASPLOS '19: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297858.3304018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Blahova, Marta. "Diagnostic Management, Operating State Configuration." In 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC). IEEE, 2022. http://dx.doi.org/10.1109/cscc55931.2022.00034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Murali, Prakash, Jonathan M. Baker, Ali Javadi-Abhari, Frederic T. Chong, and Margaret Martonosi. "Noise-Adaptive Compiler Mappings for Noisy Intermediate-Scale Quantum Computers." In ASPLOS '19: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297858.3304075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Murali, Prakash, David C. Mckay, Margaret Martonosi, and Ali Javadi-Abhari. "Software Mitigation of Crosstalk on Noisy Intermediate-Scale Quantum Computers." In ASPLOS '20: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3373376.3378477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Porterfield, Allan, Rob Fowler, Sridutt Bhalachandra, Barry Rountree, Diptorup Deb, and Rob Lewis. "Application Runtime Variability and Power Optimization for Exascale Computers." In ROSS '15: International Workshop on Runtime and Operating Systems for Supercomputers. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2768405.2768408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Du, Dong, Qingyuan Liu, Xueqiang Jiang, Yubin Xia, Binyu Zang, and Haibo Chen. "Serverless computing on heterogeneous computers." In ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3503222.3507732.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Operating systems (Computers)"

1

Wittie, Larry D. Portable Operating Systems for Network Computers: Distributed Operating Systems Support for Group Communications. Fort Belvoir, VA: Defense Technical Information Center, October 1985. http://dx.doi.org/10.21236/ada170113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Willson. L51756 State of the Art Intelligent Control for Large Engines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 1996. http://dx.doi.org/10.55274/r0010423.

Full text
Abstract:
Computers have become a vital part of the control of pipeline compressors and compressor stations. For many tasks, computers have helped to improve accuracy, reliability, and safety, and have reduced operating costs. Computers excel at repetitive, precise tasks that humans perform poorly - calculation, measurement, statistical analysis, control, etc. Computers are used to perform these type of precise tasks at compressor stations: engine / turbine speed control, ignition control, horsepower estimation, or control of complicated sequences of events during startup and/or shutdown. For other task
APA, Harvard, Vancouver, ISO, and other styles
3

Mayer, Michael. Operating system boot package for IBM PC compatible computer systems. Web of Open Science, July 2020. http://dx.doi.org/10.37686/asr.v1i1.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kohut, Uliana, and Mariya Shyshkina. Providing the Fundamentalisation of Operations Research Learning Using MAXIMA System. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4464.

Full text
Abstract:
In the article, the problems of using the systems of computer mathe- matics (SCM) as a tool to provide the fundamental component of operations re- search learning and students research activities support are considered. The role of SCM in the process of bachelors of informatics training and special aspects of pedagogical applications of these systems in the “Operations research” study is defined. The analysis of the basic concepts of the fundamentalisation of educa- tion and in particular the basic concepts of the fundamentalisation of informatics disciplines learning is summarized. The attemp
APA, Harvard, Vancouver, ISO, and other styles
5

Shyshkina, Mariya, and Uliana Kohut. The Method of Using the Maxima System for Operations Research Learning. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3172.

Full text
Abstract:
In the article, the problems of using the systems of computer mathematics (SCM) as a tool to support the teaching and research activities in the field of informatics and mathematics disciplines training are investigated. The role of SCM in the process of bachelors of informatics training and special aspects of pedagogical applications of these systems in the “Operations research” study is defined. The aim of the article is the justification of the Maxima system use of in the process of “Operations research” teaching in pedagogical university as enchasing the investigative approach to learning
APA, Harvard, Vancouver, ISO, and other styles
6

Choquette, Gary. PR-000-SOFTWARE PRCI Software Catalog. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), August 2020. http://dx.doi.org/10.55274/r0011749.

Full text
Abstract:
This document provides a high-level summary of all research deliverables involving software developed with the support of PRCI. Some of these applications were written for older operating systems and may not work on current computer platforms. Many of the applications will work on current operating systems if suitable backward compatibility parameters are set for the application.
APA, Harvard, Vancouver, ISO, and other styles
7

Howell, Steven L. Evaluation Results Report for Next Generation Computer Resources Operating Systems Interface Baseline Selection by Next Generation Computer Resources (NGCR) Operating Systems Standards Working Group (SSWG). Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada229510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shyshkina, Mariya, Uliana Kohut, and Maiia Popel. The Design and Evaluation of the Cloud-based Learning Components with the Use of the Systems of Computer Mathematics. Sun SITE Central Europe, May 2018. http://dx.doi.org/10.31812/0564/2253.

Full text
Abstract:
In the article the problems of the systems of computer mathematics use as a tool for the students learning and research activities support are investigated. The promising ways of providing access to the mathematical software in the university learning and research environment are considered. The special aspects of pedagogical applications of these systems to support operations research study in the process of bachelors of informatics training are defined. The design and evaluation of the cloud-based learning components with the use of the systems of computer mathematics (on the example of Maxi
APA, Harvard, Vancouver, ISO, and other styles
9

White, Alan, Jaison Abel, Ernst Berndt, and Cory Monroe. Hedonic Price Indexes for Personal Computer Operating Systems and Productivity Suites. Cambridge, MA: National Bureau of Economic Research, April 2004. http://dx.doi.org/10.3386/w10427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lewis, Dustin, Naz Modirzadeh, and Gabriella Blum. War-Algorithm Accountability. Harvard Law School Program on International Law and Armed Conflict, August 2016. http://dx.doi.org/10.54813/fltl8789.

Full text
Abstract:
In War-Algorithm Accountability (August 2016), we introduce a new concept—war algorithms—that elevates algorithmically-derived “choices” and “decisions” to a, and perhaps the, central concern regarding technical autonomy in war. We thereby aim to shed light on and recast the discussion regarding “autonomous weapon systems” (AWS). We define “war algorithm” as any algorithm that is expressed in computer code, that is effectuated through a constructed system, and that is capable of operating in relation to armed conflict. In introducing this concept, our foundational technological concern is the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!