31 |
Concurrent Checkpointing for Embedded Real-Time SystemsJanuary 2018 (has links)
abstract: The Internet of Things ecosystem has spawned a wide variety of embedded real-time systems that complicate the identification and resolution of bugs in software. The methods of concurrent checkpoint provide a means to monitor the application state with the ability to replay the execution on like hardware and software, without holding off and delaying the execution of application threads. In this thesis, it is accomplished by monitoring physical memory of the application using a soft-dirty page tracker and measuring the various types of overhead when employing concurrent checkpointing. The solution presented is an advancement of the Checkpoint and Replay In Userspace (CRIU) thereby eliminating the large stalls and parasitic operation for each successive checkpoint. Impact and performance is measured using the Parsec 3.0 Benchmark suite and 4.11.12-rt16+ Linux kernel on a MinnowBoard Turbot Quad-Core board. / Dissertation/Thesis / Masters Thesis Computer Engineering 2018
|
32 |
High speed CORDIC processor designs : algorithms, architectures, and applications /Kwak, Jae-hyuck, January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 107-114). Available also in a digital version from Dissertation Abstracts.
|
33 |
Software development as a human activity : a holistic exploration of the social and technical dimensions.Tagg, Clare. January 2000 (has links)
Thesis (Ph. D.)--Open University. BLDSC no. DX225590.
|
34 |
A higher order collective classifierMenon, Vikas. January 2009 (has links)
Thesis (M.S.)--Rutgers University, 2009. / "Graduate Program in Computer Science." Includes bibliographical references (p. 60-63).
|
35 |
Reference architecture representation environment (RARE) systematic derivation and evaluation of domain-specific, implementation-independent software architectures /Graser, Thomas Jeffrey, January 2001 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2001. / Vita. Includes bibliographical references. Available also from UMI/Dissertation Abstracts International.
|
36 |
Configuration tool prototype for the Trusted Computing Exemplar projectWelliver, Terrence M. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Irvine, Cynthia E. Second Reader: Clark, Paul C. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Trusted computing exemplar, Least privilege separation kernel, Graphical user interface, Wxpython, Java, Configuration vector, LPSK, Configuration vector tool, TCX, GUI, SKPP. Includes bibliographical references (p. 97-98). Also available in print.
|
37 |
Research in computer forensics /Wai, Hor Cheong. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Daniel F. Warren, Dan C. Boger. Includes bibliographical references (p. 191). Also available online.
|
38 |
A computational model and multi-agent simulation for information assurance /VanPutte, Michael A. January 2002 (has links) (PDF)
Thesis (Ph. D.)--Naval Postgraduate School, 2002. / Dissertation supervisor: Cynthia Irvine. Includes bibliographical references (p. 155-164). Also available online.
|
39 |
Secure remote network administration and power management /Sullivan, Mark P. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Dale Courtney. Includes bibliographical references (p. 53). Also available online.
|
40 |
CORDIC-based high-speed direct digital frequency synthesisKang, Chang Yong, Swartzlander, Earl E. January 2003 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Supervisor: Earl E. Swartzlander, Jr. Vita. Includes bibliographical references. Also available from UMI.
|
Page generated in 0.0676 seconds