Dissertations / Theses on the topic 'Windows NT (Computer system)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 dissertations / theses for your research on the topic 'Windows NT (Computer system).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Rimer, Matthew Scott 1975. "The secure file system under Windows NT." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80571.
Full textIncludes bibliographical references (p. 53-54).
by Matthew Scott Rimer.
M.Eng.
Arum, Mochamad. "Implementation consideration for Windows NT integrated network for System Management computer laboratories." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA308151.
Full textThesis advisor(s): Norman F. Schneidewind, R.A. Buddenberg. "March 1996." Includes bibliographical references. Also available online.
Almedia, Danilo (Danilo D'Amico) 1975. "Framework for implementing file systems in Windows NT." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46208.
Full textIncludes bibliographical references (p. 38-39).
by Danilo Almedia.
S.B.and M.Eng.
Korba, Jonathan (Jonathan James) 1977. "Windows NT attacks for the evaluation of intrusion detection systems." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86454.
Full textIncludes bibliographical references (leaves 99-101).
by Jonathan Korba.
S.B.and M.Eng.
Windingland, Kim L. "A DISTRIBUTED NETWORK ARCHITECTURE FOR PC-BASED TELEMETRY SYSTEMS." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/608384.
Full textThe ever-increasing power of PC hardware combined with the new operating systems available make the PC an excellent platform for a telemetry system. For applications that require multiple users or more processing power than a single PC, a network of PCs can be used to distribute data acquisition and processing tasks. The focus of this paper is on a distributed network approach to solving telemetry test applications. This approach maximizes the flexibility and expandability of the system while keeping the initial capital equipment expenditure low.
Scruggs, Janet E. Yee Michael. "Migration from netware to windows NT network operating system /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA368151.
Full text"June 1999". Thesis advisors(s): Douglas E. Brinkley, Erik Jansen, Mark Nissen. Includes bibliographical references (p. 123-125). Also available online.
Scruggs, Janet E., and Michael Yee. "Migration from netware to windows NT network operating system." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13557.
Full textBoothe-Rabek, Jesse C. (Jesse Clayton) 1979. "WinNTGen : Creation of a Windows NT 5.0+ network traffic generator." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29667.
Full textIncludes bibliographical references (leaves 65-67).
The Lincoln Adaptable Real Time Information Assurance Testbed (LARIAT) project is the first fully automatable network testbed for the evaluation of information assurance (IA) technologies. It allows researchers to easily set up experiments that evaluate the accuracy of host-based and network-based intrusion detection systems (IDSs). Initially, the network traffic it could produce used UNIX services and protocols as implemented for the Linux and Solaris platforms. However, due to the widespread deployment of Windows-based systems in production environments, it is necessary to include Windows-based traffic when testing IA systems in order to provide a comprehensive evaluation. This thesis describes WinNTGen, a Windows network traffic generation system that integrates into the existing LARIAT framework and enables it to produce Windows-based network traffic. To do this, WinNTGen simulates the actions of a user controlling applications that in turn use network resources. This frees WinNTGen from the need to re-implement network protocols and allows it to operate at a higher level of abstraction. WinNTGen controls applications via loadable libraries that encapsulate the manner in which a typical user interacts with a particular application. The statistical parameters that specify the behavior of a user with each application are derived from real users' behavioral data as they interacted with each application. The system is flexible and extensible so that different versions of the same application as well as additional applications can be controlled by modifying and adding libraries. Finally, the reality and the throughput of the network traffic produced by the WinNTGen system are evaluated.
by Jesse C. Boothe-Rabek.
M.Eng.
Lucas, Julie A. "Ensuring a C2 level of trust and interoperability in a networked Windows NT environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA319428.
Full textThesis advisor(s): Gus K. Lott, Cynthia E. Irvine, Rex Buddenberg. "September 1996." Includes bibliographical references (p. 135-140). Also available online.
Zounmevo, Judicaël. "Proposal of an optimized checkpoint-recovery environment for Windows NT 5.x." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=112590.
Full textRhee, Sokwoo. "Development of a Windows NT real-time operating system for NC machine control." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/45474.
Full textKreiner, Barrett. "Issues of implementing X windows on a non-X windows device." Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/770950.
Full textDepartment of Computer Science
Goktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Full textThesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Penna, Sergio D., and Domingos B. Rios. "MIGRATING FROM A VAX/VMS TO AN INTEL/WINDOWS-NT BASED GROUND STATION." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608310.
Full textUpgrading or replacing production systems is always a very resource-consuming task, in particular if the systems being replaced are quite specialized, such as those serving any Flight Test Ground Station. In the recent past a large number of Ground Station systems were based in Digital’s VAX/VMS architecture. The computer industry then expanded very fast and by 1990 realtime PCM data processing systems totally dependent on hardware and software designed for IBM-PC compatible micro-computers were becoming available. A complete system replacement in a typical Ground Station can take from one to several years to become a reality. It depends on how complex the original system is, how complex the resulting system needs to be, how much resources are available to support the operation, how soon the organization needs it, etc. This paper intends to review the main concerns encountered during the replacement of a typical VAX/VMS-based by an Intel-Windows NT-based Ground Station. It covers the transition from original requirements to totally new requirements, from mini-computers to micro-computers, from DMA to high-speed LAN data transfers, while conserving some key architectural features. This 8-month development effort will expand EMBRAER’s capability in acquiring, processing and archiving PCM data in the next few years at a lower cost, while preserving compatibility with old legacy flight test data.
Leichner, Ted, Stephen J. Nicolo, Ed Snyder, Mark Stacy, and Charles Ziegler. "ADVANCED TELEMETRY PROCESSING AND DISPLAY SYSTEM (ATPDS)." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/608270.
Full textThis paper describes a PC-based Advanced Telemetry Processing and Display System (ATPDS)- a highend, real-time telemetry processing and display system implemented on a COTS PC platform. for A network-centric architecture was chosen from candidate architectures as the most viable for the ATPDS. The network-centric architecture is Windows NT-based, client/server based, supporting clients and servers on both local or remote PC workstations. The architecture supports distributing processing loads across multiple workstations, optimizing mission processing requirements. The advantage of this system is its flexibility and expandability with low acquisition and life-cycle support costs. The ATPDS allows the user to configure one or more small systems into a larger high-end system based on varying mission requirements.
Euresti, David 1979. "Self-certifying file system implementation for Windows." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87422.
Full textIncludes bibliographical references (leaves 38-39).
by David Euresti.
M.Eng.
Zeeshan, Ahmed. "Integration of Variants Handling in M-System-NT." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2128.
Full textOfficial Address: Researcher Zeeshan Ahmed, Mechanical Engineering Informatics and TU Virtual Product Development Division (MIVP) Vienna, Austria Permanent Address: Zeeshan Ahmed, Humdered Street Mohala Garhi Shadula Sahib Gujrat, Pakistan
Windingland, Kim, and John LaPlante. "Telemetry System User Interface for Windows™." International Foundation for Telemetering, 1993. http://hdl.handle.net/10150/611849.
Full textDue to the rapid advancement of technology in GUI design tools within Microsoft Windows™, a sophisticated human-machine interface can be developed for telemetry systems. A PC Windows™-based telemetry system would effectively provide a "bridge" between the telemetry world and the Windows™ world, bringing many low cost off-the-shelf software and hardware tools into the telemetry realm that has been unprecedented. This paper describes the results of such an approach in the development of Loral's Visual Telemetry System (VTS) software.
Hashim, Noor Hayati. "An architecture for the forensic analysis of Windows system generated artefacts." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/forensic-analysis-of-windows-system-generated-artefacts(be571569-2afe-4d52-8c99-9dbc8388b1db).html.
Full textSingh, Balraj. "A parametrized CAD tool for VHDL model development with X Windows." Thesis, This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-03242009-040819/.
Full textJohansson, Björn. "Prestandaövervakning av Windows server med WMI : En vidareutveckling av System Monitor." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-42914.
Full textZhu, Tong 1971. "Develop real-time multitasking system and client/server based windows protocol for IBM PC/PS2." Thesis, The University of Arizona, 1992. http://hdl.handle.net/10150/278250.
Full textNilsson, Christoffer, and Marcus Nilsson. "Installationsgränssnitt under Linux och Windows XP utifrån ISO 9241." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3955.
Full textCider, Andreas, and Max Jacobs. "Byggserverövervakning : Utveckling av ett system för att synliggöra integrationsproblem." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-32441.
Full textSoftware in computers control many important functions in today's society and are widely used for communication but also to control equipment. For the software to work reliably it needs to be built correctly and tested extensively. To achieve reliability, a build server can be used to automatically build and test the software. This report describes how a prototype of a monitoring system for the build servers was created. The system will be monitored by a monitoring service that retrieves information from a build server using the CruiseControl.NET [10] software. The information gathered by the monitoring service will be presented on a web portal. The information retrieved from build the server goes from a high level of abstraction down to the smallest detail that is based on the log files from the build server, for example, information about compilation errors. The development of the monitoring system has been focused on making it possible to use cloud services and thus not restrict where a build server is located. One of the cloud services used is the Service Bus Relay [27] that handles the communication between a monitoring service and the web portal. The web portal is developed to be responsive [34] and provide support for mobile devices which give the user the freedom to visit the web portal from whatever device. The web portal uses a database to store information which enables monitoring of multiple build servers. A well-developed user management system is used on the web portal which provides administrators with an effective tool for user management. There have been several lessons learned, including the discovery of a bug in the Microsoft implementation of message handling in the Service Bus Relay.
Bricault, Gary S. "GSD : an interactive window-oriented debugger for the AT & T UNIX-PC /." Online version of thesis, 1989. http://hdl.handle.net/1850/10549.
Full textWen, Shenning. "The study, design, and implementation of Data mart functions in Windows environments." CSUSB ScholarWorks, 1998. https://scholarworks.lib.csusb.edu/etd-project/1374.
Full textJian, Zhang, and Huang Ming-Sheng. "A Multi-Pulse PPK Telemetry System Based on PC." International Foundation for Telemetering, 1995. http://hdl.handle.net/10150/611603.
Full textA new kind of telemetry ground data system--Multi-Pulse PPK (Pulse Position Keying) Telemetry System Based on PC(MPPK-PCTS) is presented in this paper. Being Aimed at the lower bit rate which is the essential shortcoming of Single-Pulse PPK(SPPK), Multi-Pulse PPK(MPPK) signal is introduced to this system. Its signal forms, bit rate, energy efficiency and error probability have been analysed in detail. The symmetric Bi-Pulse PPK(BPPK) signal with fixed reference pulse can be practised in engineering. In this system, front-ends are intelligent and modular, all modules are integrated in a personal computer chassis through EISA/PCI bus. The system operates under multi-media WINDOWS environment, with intelligent user interface. Faults can be detected and located automatically. With flexible performance, good expandibility and small size, the system can be used in reentry telemetry and many other fields where higher rate and lower power are both required.
Olsson, Johan. "Prestandajämförelse mellan Windows Server container och Hyper-V : I vilken grad förloras resurser när ett system partitioneras med dessa?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15747.
Full textThis work had the goal of looking at the loss of resources that Hyper-V and Windows Server container introduce when a system is partitioned with these. By testing this, you could also compare Microsoft's implementation of container-based virtualization with Linux implementation and see if there are any similarities. To be able to compare with previous research, the goal was to try to mimic the method in previous research that made similar tests in the Linux operating system with KVM and LXC as close as possible. The results were largely consistent with the results of tests conducted in Linux. That is, container-based virtualization generally has a smaller loss of resources than hypervisor-based virtualization. The exception was, however, the network tests where container-based virtualization performed poorest, but this also was consistent with previous research.
Zhang, Qi. "The Application of Sequential Pattern Mining in Healthcare Workflow System and an Improved Mining Algorithm Based on Pattern-Growth Approach." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1378113261.
Full textPettersson, Erik. "Comparison of System Performance During DDoS Attacks in Modern Operating Systems." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13748.
Full textDriscoll, Michael T. "A machine vision system for capture and interpretation of an orchestra conductor's gestures." Link to electronic version, 1999. http://www.wpi.edu/Pubs/ETD/Available/etd-051199-142455/unrestricted/thesis.pdf.
Full textKeywords: color thresholding; video for Windows; center of mass calculation; contour extraction; area calculation; virtual orchestra; Broadway. Includes bibliographical references (leaves 62-63).
Ševčík, Andrej. "Zamrznutí." Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2016. http://www.nusl.cz/ntk/nusl-240504.
Full textVašák, Petr. "Helpdesk pro podporu správy firemních počítačových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235535.
Full text李釗城. "The Desing And Implementation Of Single-Server VOD System Over Windows NT." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/90722382612418955473.
Full textMiles, Russell Slater. "Deploying a secure Windows operating system and applications." 2007. http://etd.louisville.edu/data/UofL0306t2007.pdf.
Full textTitle and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
"Chinese window system with distributed fonts." Chinese University of Hong Kong, 1990. http://library.cuhk.edu.hk/record=b5886624.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1990.
Bibliography: leaves [103-106]
Chapter 1. --- THE EMERGENCE OF WINDOW SYSTEMS --- p.1-1
Chapter 2. --- THE NEED OF A CHINESE WINDOW SYSTEM --- p.2-1
Chapter 3. --- REQUIREMENTS AND DIFFICULTIES OF DEVELOPING A CHINESE WINDOW SYSTEM --- p.3-1
Chapter 3.1. --- Input Method and Character Encoding --- p.3-1
Chapter 3.2. --- Layout Direction and Formatting Mechanism --- p.3-3
Chapter 3.3. --- Fonts --- p.3-3
Chapter 3.3.1. --- Bitmap font --- p.3-4
Chapter 3.3.2. --- Outline font --- p.3-6
Chapter 4. --- A TRIAL TO OVERCOME THE DIFFICULTIES IN SUPPORTING CHINESE FONTS - OVERVIEW OF A CHINESE FONT SERVER SYSTEM --- p.4-1
Chapter 4.1. --- Network Font Server --- p.4-3
Chapter 4.2. --- Local Font Server --- p.4-4
Chapter 4.3. --- Fonts --- p.4-5
Chapter 4.3.1. --- Bitmap font --- p.4-5
Chapter 4.3.1. --- Outline font --- p.4-5
Chapter 4.4. --- Caching --- p.4-6
Chapter 5. --- ORGANIZATION OF THE CHINESE FONT SERVER SYSTEM --- p.5-1
Chapter 5.1. --- Communication Module --- p.5-2
Chapter 5.1.1. --- Client connection request channel --- p.5-3
Chapter 5.1.2. --- Client communication channels --- p.5-3
Chapter 5.1.3. --- Network server connection channel --- p.5-4
Chapter 5.2. --- Client Service Module --- p.5-7
Chapter 5.2.1. --- Font manipulation module --- p.5-7
Chapter 5.2.1.1. --- Request to open a new font --- p.5-8
Chapter 5.2.1.2. --- Request to close an opened font --- p.5-8
Chapter 5.2.1.3. --- Request to load a font character --- p.5-9
Chapter 5.2.2. --- Cache module --- p.5-10
Chapter 6. --- FROM THE CHINESE FONT SERVER SYSTEM TO A CHINESE WINDOW SYSTEM --- p.6-4
Chapter 7. --- SCREEN FONTS --- p.7-1
Chapter 7.1. --- Hand-edit --- p.7-3
Chapter 7.2. --- Bitmap Scaling --- p.7-3
Chapter 7.3. --- Outline Scaling --- p.7-5
Chapter 7.4. --- Manual Refinement --- p.7-16
Chapter 8. --- FONT CACHING --- p.8-1
Chapter 8.1. --- Font Caching Strategies --- p.8-1
Chapter 8.1.1. --- Pre-loading --- p.8-1
Chapter 8.1.2. --- Fix-loading --- p.8-4
Chapter 8.1.3. --- Demand loading --- p.8-6
Chapter 8.1.3.1. --- Least Recently Used (LRU) replacement --- p.8-9
Chapter 8.1.3.2. --- Least Frequently Used (LFU) replacement --- p.8-9
Chapter 8.1.4. --- Hybrid loading --- p.8-16
Chapter 8.2. --- Retrieval Method --- p.8-22
Chapter 8.2.1. --- Binary searching --- p.8-22
Chapter 8.2.2. --- Tree searching --- p.8-24
Chapter 8.2.3. --- Hash searching --- p.8 26
Chapter 8.3. --- Cache Expansion and Retraction --- p.8-33
Chapter 9. --- AN EXPERIMENTAL CHINESE FONT SERVER SYSTEM - CAPABILITIES AND RESTRICTIONS --- p.9-1
Chapter 9.1. --- Experimental Servers --- p.9-1
Chapter 9.2. --- Programming Interfaces --- p.9-3
Chapter 9.2.1. --- Connection request --- p.9-3
Chapter 9.2.2. --- Open and close fonts --- p.9-4
Chapter 9.2.3. --- Request to load cache --- p.9-5
Chapter 9.2.4. --- Change the current font --- p.9-5
Chapter 9.2.5. --- Request a font character --- p.9-5
Chapter 9.3. --- Testing Applications --- p.9-6
Chapter 9.4. --- Statistics --- p.9-8
Chapter 9.4.1. --- Cache performance --- p.9-8
Chapter 9.4.1.1. --- Tests --- p.9-8
Chapter 9.4.1.2. --- Results --- p.9-10
Chapter 9.4.1.3. --- Discussion --- p.9-10
Chapter 9.4.2. --- Local Server Vs. Network Server --- p.9-12
Chapter 9.4.2.1. --- Tests --- p.9-12
Chapter 9.4.2.2. --- Results --- p.9-13
Chapter 9.4.2.3. --- Discussion --- p.9-13
Chapter 9.4.3. --- Outline Font --- p.9-14
Chapter 9.4.3.1. --- Tests --- p.9-14
Chapter 9.4.3.2. --- Results --- p.9-14
Chapter 9.4.3.3. --- Discussion --- p.9-15
Chapter 10. --- EPILOGUE --- p.10-1
Chapter 10.1. --- Conclusion --- p.10-1
Chapter 10.2. --- Future Extension --- p.10-2
(6623858), Nicolas Villacis Vukadinovic. "WhatsApp Forensics: Locating Artifacts in Web and Desktop Clients." Thesis, 2019.
Find full text