Spelling suggestions: "subject:"computers."" "subject:"eomputers.""
361 |
The application of cryptography to data base security /Gudes, Ehud January 1976 (has links)
No description available.
|
362 |
An accurate reliability modeling technique for hybrid modular redundant digital systems using modular characteristic error parameters /Nelson, Victor Peter January 1978 (has links)
No description available.
|
363 |
A Learning Machine for Job Sequencing in a General-purpose Computer SystemTaylor, Richard Jon 01 January 1973 (has links) (PDF)
No description available.
|
364 |
A 'User-Friendly' Robot Operator Training AidWashburn, Donald A. 01 January 1984 (has links) (PDF)
There will be an increasing demand for robot operators, since more companies are using robots in production and material handling. In order to train these would-be operators, a 'user-friendly' robot operator training aid was developed. This aid helps the trainee learn how to program a robot using on-line programming, and the trainee also obtains valuable hands-on experience. Since this training aid is user-friendly and has safety features, it requires little or no previous experience with robots or computers and minimal supervision. With this training, the would-be operators will acquire a basic understanding of how they can apply this experience to the programming of large industrial robots. The RHINO XR-2 robot was used, including some of the peripheral equipment that can be easily interfaced with the RHINO. The system can control eight axes of motion. A controlling program was written in BASIC language for the Radio Shack Model III microcomputer. The computer's keyboard was used to simulate a teach pendant, similar to those used with many industrial robots.
|
365 |
Girls' Engagement with Computers While Creating Web Pages During Middle ChildhoodChase, Denise 02 May 2001 (has links)
The purpose of the research study was to describe girls' engagement with computers during middle childhood and to delineate the factors that initiated and sustained the engagement. The research questions were: 1) What patterns distinguish how girls engage in web page development during middle childhood? 2) What roles do environmental and personal factors play in the girls' engagement in the activity of web page development? 3) What are the perceived reasons for the girls' achievement in creating web pages?
The research design followed a qualitative case study approach with descriptive methods of data collection. Four participants were selected through nomination by their elementary school principal based on their computer attitude and aptitude. The data collected included interviews, observations, artifacts, and interviewer's reflective notes. The data were analyzed through coding assisted by NUD*IST computer software. Overall, the access to computers, the relationships with powerful others, and the girls' perceptions of their ability to control influential factors, all worked together as antecedents for engagement with computers. The roles performed and the necessary social interaction sustained the engagement. The product, an educational web page, demonstrated successful achievement. The researcher provided recommendations for educators to create conditions for girls to achieve using computers, which impacts middle childhood girls' perceptions of future career options. / Ph. D.
|
366 |
The relationship between electronic use, sleeping patterns, and EEG patternsWatts, Douglas A. 01 January 2002 (has links)
This correlation study examined the relationship among frontal EEG recordings, and self reports of computer and cell phone use and sleeping habits. Participants were 20 females and 5 males between the ages of 18 and 40. Results indicated owning a laptop was positively correlated with relative power of beta2 (21-32 Hz) in both hemispheres. Number of minutes of cell phone use per month was also positively correlated with relative power of beta2 activity in both hemispheres. Cell phone usage was also positively correlated with absolute power of SMR ( 12-15 Hz) in both hemispheres. Using a desktop for work was positively correlated with absolute power of alpha (8-12 Hz) activity in both hemispheres. Other significant relationships were also found.
|
367 |
Group-based checkpoint/rollback recovery for large scale message-passing systemsHo, Chun-yin., 何俊賢. January 2008 (has links)
published_or_final_version / Computer Science / Master / Master of Philosophy
|
368 |
Very large register file for BLAS-3 operations.January 1995 (has links)
by Aylwin Chung-Fai, Yu. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1995. / Includes bibliographical references (leaves 117-118). / Abstract --- p.i / Acknowledgement --- p.iii / List of Tables --- p.v / List of Figures --- p.vi / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- BLAS-3 Operations --- p.2 / Chapter 1.2 --- Organization of Thesis --- p.2 / Chapter 1.3 --- Contribution --- p.3 / Chapter 2 --- Background Studies --- p.4 / Chapter 2.1 --- Registers & Cache Memory --- p.4 / Chapter 2.2 --- Previous Research --- p.6 / Chapter 2.3 --- Problem of Register & Cache --- p.8 / Chapter 2.4 --- BLAS-3 Operations On RISC Microprocessor --- p.10 / Chapter 3 --- Compiler Optimization Techniques for BLAS-3 Operations --- p.12 / Chapter 3.1 --- One-Dimensional Q-Way J-Loop Unrolling --- p.13 / Chapter 3.2 --- Two-Dimensional P×Q -Ways I×J-Loops Unrolling --- p.15 / Chapter 3.3 --- Addition of Code to Remove Redundant Code --- p.17 / Chapter 3.4 --- Simulation Result --- p.17 / Chapter 3.5 --- Summary --- p.23 / Chapter 4 --- Architectural Model of Very Large Register File --- p.25 / Chapter 4.1 --- Architectural Model --- p.26 / Chapter 4.2 --- Traditional Register File vs. Very Large Register File --- p.32 / Chapter 5 --- Ideal Case Study of Very Large Register File --- p.35 / Chapter 5.1 --- Matrix Multiply --- p.36 / Chapter 5.2 --- LU Decomposition --- p.41 / Chapter 5.3 --- Convolution --- p.50 / Chapter 6 --- Worst Case Study of Very Large Register File --- p.58 / Chapter 6.1 --- Matrix Multiply --- p.59 / Chapter 6.2 --- LU Decomposition --- p.65 / Chapter 6.3 --- Convolution --- p.74 / Chapter 7 --- Proposed Case Study of Very Large Register File --- p.81 / Chapter 7.1 --- Matrix Multiply --- p.82 / Chapter 7.2 --- LU Decomposition --- p.91 / Chapter 7.3 --- Convolution --- p.102 / Chapter 7.4 --- Comparison --- p.111 / Chapter 8 --- Conclusion & Future Work --- p.114 / Chapter 8.1 --- Summary --- p.114 / Chapter 8.2 --- Future Work --- p.115 / Bibliography --- p.117
|
369 |
The design of an interdata implementation of the U. S. Navy MINI- COBOLAnderson-Rovia, Terry Wayne January 2010 (has links)
Digitized by Kansas Correctional Industries
|
370 |
Computers at home, new spatial needs? : a case studyFranco, Adriana January 1982 (has links)
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Architecture, 1982. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ROTCH / Includes bibliographical references (leaves 143-144). / This thesis investigates five families in Boston who have introduced computers into their homes. The analysis is interdisciplinary and each case has been considered in terms of psycho-social and architectural terms. The conclusions address issues of control, gender relations, feelings toward computers, and architectural constraints to easy adaptation to the computer. The thesis concludes that the computer is not just a machine that one takes out of its box and plugs in. There are many considerations in bringing computers into the home. / by Adriana Franco. / M.S.
|
Page generated in 0.1027 seconds