Spelling suggestions: "subject:"computer architecture."" "subject:"coomputer architecture.""
161 |
Load balancing strategies for parallel architecturesIqbal, Saeed. January 2003 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.
|
162 |
Design and analysis of architectures for programmable network processing systems /Crowley, Patrick January 2003 (has links)
Thesis (Ph. D.)--University of Washington, 2003. / Vita. Includes bibliographical references (p. 134-142).
|
163 |
The extensible run-time infrastructure (XRTI) : an experimental implementation of proposed improvements to the high level architecture /Kapolka, Andrzej. January 2003 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Michael Zyda, Bret Michael. Includes bibliographical references (p. 111-114). Also available online.
|
164 |
A hypermedia representation of a taxonomy of usability characteristics in virtual environments /Tokgoz, Asim. January 2003 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, March 2003. / Thesis advisor(s): Rudolph P. Darken, Joseph A. Sullivan. Includes bibliographical references (p. 137-140). Also available online.
|
165 |
Algorithms for efficient state space search /Ganai, Malay Kumar. January 2001 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2001. / Vita. Includes bibliographical references (leaves 117-128). Available also in a digital version from Dissertation Abstracts.
|
166 |
Security architects in practiceLakshminarayanan, Vidya L. 01 September 2015 (has links)
While security has long been a significant issue in military systems, the spread of the internet has stimulated a growing interest in, and increasing demand for, secure systems. Understanding how architects manage security requirements in practice is a necessary first step in providing repeatable processes using effective techniques, methods, and architectural structures. In this thesis, I present the results of multiple cases of practicing security architects: key aspects in security requirements, critical issues in managing security requirements, essential characteristics of security architects, how architects define security architecture, and how requirements are transformed into architectures and implemented.
|
167 |
Load balancing strategies for parallel architecturesIqbal, Saeed 28 August 2008 (has links)
Not available / text
|
168 |
Scalable primary cache memory architecturesAgarwal, Vikas 28 August 2008 (has links)
Not available / text
|
169 |
Polymorphous architectures: a unified approach for extracting concurrency of different granularitiesSankaralingam, Karthikeyan 28 August 2008 (has links)
Not available / text
|
170 |
Techniques to improve the hard and soft error reliability of distributed architecturesShivakumar, Premkishore 28 August 2008 (has links)
Not available / text
|
Page generated in 0.0969 seconds