• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 49
  • 16
  • 10
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 106
  • 37
  • 15
  • 14
  • 12
  • 12
  • 11
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

CCC86, a generic 8086 C-language cross compiler plus communication package / Generic 8086 C-language cross compiler plus communication package. / CCC86.

Hessaraki, Alireza January 1987 (has links)
The Cross Compiler is an excellent and valuable program development tool. It provides to the user a low level compiled language that allows character (byte), integer (8086 word) and pointer (8086 one word address) manipulation. It also allows recursion, has modern flow and a rich set of operators.The Communication Program which include file transfer utility allows the student to download or upload their C program to a PC. It allows use of the Modem. The file transferring can be done using XON/XOFF or XMODEM. It also supports INS 8250 UART chip, plus 16450 high speed device found in hardware such as IBM AT Serial/Parallel Adapter. / Department of Computer Science
12

A microprocessor design using the INTEL 8086 for a color graphics animaton system /

Ampudia, Ricardo (Ricardo Serrano). January 1982 (has links)
No description available.
13

開放原始碼作為商業策略-Intel案例 / Open source as business strategy: a case study - Intel

郭東旭, Kwok, Tung Yuk Unknown Date (has links)
開放原始碼作為商業策略-Intel案例 / ABSTRACT OPEN SOURCE as BUSINESS STRATEGY: A CASE STUDY - Intel Corporation (By Tung Yuk Kwok,郭東旭) Researchers of Open source have often suggested that users’ utopia beliefs about open source are the motivation to develop the open source community. However, research which has empirically documented the link between open source and the strategy in firms is scant. Therefore, the aim of this article attempts to explore how open source projects and the use of strategy in Intel are related. This research involved a survey, comprised of more than twenty open source projects within Intel and face to face interview with six persons working in the business department related with open source activity. The factors from the literature are identified and integrated to build the framework to test the business strategy. The qualitative analysis of the survey was conducted through narrative method in order to indicate the direction and relationship between the open source development and business strategy in Intel. Results of this study showed that the investment on open source in terms of man-power and capital can help Intel win new market segment and leverage the advantage of the scale. The result is consistent with the mission of Intel is to drive Intel x86 platform everywhere and open source is the enabler to meet the target. To conclude, this study may be of importance in explaining the dynamic relationship between open source planning and strategy use in firms, as well as in providing the firms in Taiwan with a better understanding of how to locate the resource on open source projects to meet the business goals.
14

Brand building into PRC : a case study of Intel.

Chan, Chiu-chun, Peggy. January 1998 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1998. / Includes bibliographical references.
15

A microprocessor design using the INTEL 8086 for a color graphics animaton system /

Ampudia, Ricardo Serrano January 1982 (has links)
No description available.
16

Oblivious RAM in Scalable SGX

Marathe, Akhilesh Parag 05 June 2024 (has links)
The prevalence of cloud storage has yielded significant benefits to consumers. Trusted Exe- cution Environments (TEEs) have been introduced to protect program execution and data in the cloud. However, an attacker targeting the cloud storage server through side-channel attacks can still learn some data in TEEs. This data retrieval is possible through the monitor- ing and analysis of the encrypted ciphertext as well as a program's memory access patterns. As the attacks grow in complexity and accuracy, innovative protection methods must be de- signed to secure data. This thesis proposes and implements an ORAM controller primitive in TEE and protects it from all potential side-channel attacks. This thesis presents two vari- ations, each with two different encryption methods designed to mitigate attacks targeting both memory access patterns and ciphertext analysis. The latency for enabling this protec- tion is calculated and proven to be 75.86% faster overall than the previous implementation on which this thesis is based. / Master of Science / Cloud storage and computing has become ubiquitous in recent times, with usage rising ex- ponentially over the past decade. Cloud Service Providers also offer Confidential Computing services for clients requiring data computation which is encrypted and protected from the service providers themselves. While these services are protected against attackers directly looking to access secure data, they are still vulnerable against attacks which only observe, but do not interfere. Such attacks monitor a client's memory access pattern or the encrypted data in the server and can obtain sensitive information including encryption keys. This work proposes and implements an Oblivious RAM design which safeguards against the aforemen- tioned attacks by using a mix of confidential computing in hardware and special algorithms designed to randomize the client's data access patterns. The evaluation of this work shows a significant increase in performance over previous works in this domain while using the latest technology in confidential computing.
17

Intel Integrated Performance Primitives a jejich využití při vývoji aplikací / Intel Integrated Performance Primitives and their use in application development

Machač, Jiří January 2008 (has links)
The aim of the presented work is to demonstrate and evaluate the contribution of computing system SIMD especially units MMX, SSE, SSE2, SSE3, SSSE3 and SSE4 from Intel company, by creation of demostrating applications with using Intel Integrated Performance Primitives library. At first, possibilities of SIMD programming using intrinsic function, vektorization and libraries Intel Integrated Performance Primitives are presented, as next are descibed options of evaluation of particular algorithms. Finally procedure of programing by using Intel Integrated Performance Primitives library are ilustrated.
18

Intel - mot en effektsbaserad bedömningsmetod? : En analys av Intel-domens effekter på bedömningen av dominansmissbruk enligt art. 102 FEUF / Intel – towards an effects-based approach? : An analysis of the Intel-judgement’s impact on the assessment of abuse of dominance according to art. 102 TFEU

Malmgren, Antonia January 2019 (has links)
För att göra ett företag i dominerande ställning ansvarigt för ett missbruk av densamma, krävs det enligt den centrala bestämmelsen på det unionsrättsliga området, art. 102 FEUF, att förekomsten av ett missbruk kan konstateras. I praxis från EU-kommissionen, tribunalen och EU-domstolen har det länge rått koncensus att ett missbruk är ett beteende av sådan art att det kan hämma konkurrensen på den inre marknaden. Vad som däremot varit föremål till debatt under en längre tid är vad som bör krävas för att bevisa att ett visst beteende har en konkurrensbegränsande förmåga; är det tillräckligt att hänvisa till typen av beteende, dvs. beteendets form, eller krävs en mer ingående utredning utifrån de ekonomiska och rättsliga omständigheterna kopplade till beteendet i fråga? Av denna anledning blev domstolens avgörande i det s.k. Intel-målet, där domstolen beslutade att återförvisa ett mål avseende missbruk i form av beviljande av rabattsystem till följd av bristfällig bevisning, betraktat som ett domslut av stor betydelse. I denna uppsats tas läsaren igenom de senaste fyrtio årens mest uppmärksammade rättsfall på området för frågan hur en missbruksbedömning bör gå till enligt art. 102 FEUF, för att därigenom förstå vikten av domstolens avgörande i Intel-målet. Det som länge betraktats som en av de största splittringarna inom den unionsrättsliga konkurrensrätten kan genom Intel-domen, varigenom domstolen bekräftat relevansen av ekonomisk bevisning vid bedömningen av en dominants eventuellt missbrukande beteende, sägas ha fått ett slut. Kritiken mot avgörandet, och tolkningen av dess innebörd, har visserligen varit omfattande, men med stöd av rättspraxis och doktrin är jag av uppfattningen att såväl konkurrensen som konsumenterna i sig kommer att gynnas av en bedömning där avgörande vikt fästs vid beteendets faktiskt konkurrensbegränsande förmåga snarare än dess form. Enligt min mening bör därför domstolens avgörande i Intel-målet tolkas som ett ställningstagande till stöd för slutsatsen att den framtida tillämpningen av art. 102 FEUF kommer att baseras på ett effektsbaserat, mer ekonomiskt, tillvägagångssätt.
19

Implementering av RS232-protokoll / Implementation of a RS232 protocoll

Karlsson, Tomas January 2002 (has links)
Den här rapporten innehåller information om hur man skapar en länk mellan en dator och ett minne via en dators serieport. Ett RS232-protokoll används för att upprätthålla den här länken. För att ta hand om minnet samt upprätthålla kommunikationen med datorn har en FPGA programmerats. Intel hex8 formatet används för datan. Ett program för Windows 98 skapades också. Programmet öppnar en fil och läser tecken. Tecknen översätts till heltal som sänds till serieporten. Programmet kan också spara data till en fil. Data hämtas från minnet via serieporten. / This report contains information how to establish a link between a computer and a memory through the serialport of a computer. The RS232 protocol is used to establish this link. To handle the memory and the communication with the computer a FPGA has been programmed. The data is in Intel hex8 format. A program for Windows 98 were also created. The program opens a file and reads characters from it. The charcters are translated into integers which are sent to the serialport. The program can also store data, recieved from the serialport, to a file.
20

The competition strategy research of Taiwan cloud computing industry

Lin, Yi-Chun 16 August 2010 (has links)
To say cloud computing is a brand new technology or industry development trend, I would prefer to say Cloud computer is the result of commercial business model revolution. The growth of Global information technology industry in recent years have been exhausted, the PC industry in the past, Intel and Microsoft, the Wintel architecture, across the world which exclusive more than 80% of market share. Each year the new products launches, all consumers must pay the bill without exception! However, when Microsoft introduced the new Vista operating system, the sales doesn¡¦t pan out as expectation. The consumers finally decide to penalize steadily increasing selling price. Meanwhile Intel also takes action to provide low-cost processor solutions to response to market needs and rescue declining rate of the market share. When global network coverage gets matured, the era of high-speed network is coming and human life will make a significant change because the business opportunities occur from the Internet. From the message propagation, interpersonal interaction and even food and lifestyle all hook up with the network; this huge business opportunity happens and it is appetizing! In recent years, ¡§Service" becomes the central idea of industry reconstruction. Cloud computing in fact is to serve as a starting point and the resulting value. "Cloud computing" has no "unified" specifications or definition right now, this study attempts to present to a limited data collected and discussed, with five force analysis, competitive analysis, management theory, explained the future of "possible" to become a huge business opportunity for the industry, and the feasibility to Taiwan in the light of the direction. The conclusions of this study are summarized as below: (1)Cloud computing has large business opportunity in the future (2)Taiwan Cloud computing businees opportunity can have 2 portions: one for hardware adding value, another for product reasearch (3)Taiwan has advantage to work with China for Cloud computing market (4)Taiwan government Cloud computing policy can study from Japan or Korea (5)Taiwan government Cloud computing policy can be a favor for local market

Page generated in 0.0518 seconds