• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 155
  • 94
  • 32
  • 24
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 3
  • 1
  • 1
  • Tagged with
  • 371
  • 371
  • 312
  • 302
  • 186
  • 97
  • 73
  • 65
  • 64
  • 62
  • 53
  • 36
  • 34
  • 34
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Language features for fully distributed processing systems

Maccabe, Arthur Bernard January 1982 (has links)
No description available.
12

Operational survivability in gracefully degrading distributed processing systems

Martin, Edith Waisbrot January 1980 (has links)
No description available.
13

The design of a passive monitor for distributed programs

Robbins, Arnold David January 1983 (has links)
No description available.
14

Distributed and decentralized control in fully distributed processing systems

Saponas, Timothy George January 1981 (has links)
No description available.
15

Work distribution in a fully distributed processing system

Sharp, Donald D. 05 1900 (has links)
No description available.
16

A storage management system for a reliable distributed operating system

Pitts, David Vernon 08 1900 (has links)
No description available.
17

Reliable client-server communication in distributed programs

Ravindran, K. January 1987 (has links)
Remote procedure call (RPC) and shared variable are communication abstractions which allow the various processes of a distributed program, often modelled as clients and servers, to communicate with one another across machine boundaries. A key requirement of the abstractions is to mask the machine and communication failures that may occur during the client-server communications. In practice, many distributed applications can inherently tolerate failures under certain situations. If such application layer information is available to the client-server communication layer (RPC and shared variable), the failure masking algorithms in the communication layer may relax the constraints under which the algorithms may have to operate if the information is not available. The relaxation significantly simplifies the algorithms and the underlying message transport layer and allows formulation of efficient algorithms. This application-driven approach forms the backbone of the failure masking techniques described in the thesis, as outlined below: Orphan handling in RPCs: Using the application-driven approach, the thesis introduces a new technique of adopting the orphans caused by failures during RPCs. The adoption technique is preferable to orphan killing because orphan killing wastes any work already completed and requires rollback which may be expensive and sometimes not meaningful. The thesis incorporates orphan adoption into two schemes of replicating a server: i) Primary-secondary scheme in which one of the replicas of the server acts as the primary and executes RPCs from clients while the other replicas stand by as secondaries. When the primary fails, one of the secondaries becomes the primary, restarts the server execution from the most recent checkpoint and adopts the orphan, ii) Replicated execution scheme in which an RPC on the server is executed by more than one replica of the server. When any of the replicas fails, the orphan generated by the failure is adopted by the surviving replicas. Both schemes employ call re-executions by servers based on the application-level idempotency properties of the calls. Access to shared variables: Contemporary distributed programs deal with a new class of shared variables such as information on name bindings, distributed load and leadership within a service group. Since the consistency constraints on such system variables need not be as strong as those for user data, the access operations on the variables may be made simpler using this application layer information. Along this direction, the thesis introduces an abstraction, which we call application-driven shared variable, to govern access operations on the variables. The algorithms for the access operations on a variable use intra-server group communication and enforce consistency of the variable to the extent required by the application. The thesis describes complete communication models incorporating the application-driven approach to mask failures. / Science, Faculty of / Computer Science, Department of / Graduate
18

A MICROPROCESSOR-BASED DIGITAL VOICE NETWORK

Moses, J., Sklar, R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 22-25, 1984 / Riviera Hotel, Las Vegas, Nevada / The Digital Voice Network project is a 1984 IR&D program within the Microelectronic Systems Division of the Hughes Aircraft Company. The project is intended to advance the state-of-the-art in digital voice technology and demonstrate digital voice transmission using advanced microprocessor technology and token passing bus network architecture. This paper discusses the Digital Voice Network design architecture, voice terminal design and implementation, and finally future plans to satisfy digital voice requirements in a military environment.
19

SPIRIT III Data Verification Processing

Garlick, Dean, Wada, Glen, Krull, Pete 10 1900 (has links)
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California / This paper will discuss the functions performed by the Spatial Infrared Imaging Telescope (SPIRIT) III Data Processing Center (DPC) at Utah State University (USU). The SPIRIT III sensor is the primary instrument on the Midcourse Space Experiment (MSX) satellite; and as builder of this sensor system, USU is responsible for developing and operating the associated DPC. The SPIRIT III sensor consists of a six-color long-wave infrared (LWIR) radiometer system, an LWIR spectrographic interferometer, contamination sensors, and housekeeping monitoring systems. The MSX spacecraft recorders can capture up to 8+ gigabytes of data a day from this sensor. The DPC is subsequently required to provide a 24-hour turnaround to verify and qualify these data by implementing a complex set of sensor and data verification and quality checks. This paper addresses the computing architecture, distributed processing software, and automated data verification processes implemented to meet these requirements.
20

Efficient and resilient distributed algorithms for comparisonproblems

陳敏兒, Chan, Mee-yee. January 1987 (has links)
published_or_final_version / Computer Science / Doctoral / Doctor of Philosophy

Page generated in 0.111 seconds