• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 193
  • 64
  • 55
  • 16
  • 16
  • 8
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 2
  • Tagged with
  • 436
  • 436
  • 235
  • 227
  • 104
  • 82
  • 77
  • 72
  • 61
  • 56
  • 54
  • 54
  • 51
  • 49
  • 48
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

OS-aware architecture for improving microprocessor performance and energy efficiency

Li, Tao, John, Lizy Kurian, January 2004 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2004. / Supervisor: Lizy K. John. Vita. Includes bibliographical references. Also available from UMI.
22

A framework for dynamic subversion

Rogers, David T. 06 1900 (has links)
Approved for public release, distribution is unlimited / The subversion technique of attacking an operating system is often overlooked in information security. Operating Systems are vulnerable throughout their lifecycle in that small artifices can be inserted into an operating system's code that, on command, can completely disable its security mechanisms. To illustrate that this threat is viable, it is shown that it is not difficult for an attacker to implement the framework for the "two-card loader" type of subversion, a trap door which enables the insertion of arbitrary code into the operating system while the system is deployed and running. This framework provides several services such as memory allocation in the attacked system, and mechanisms for relocating, linking and loading the inserted attack code. Additionally, this thesis shows how Windows XP embedded designers can use Intel's x86 hardware more effectively to build a higher assurance operating system. Principles of hardware support are discussed and recommendations are presented. Subversion is overlooked because critics believe the attack is too difficult to carry out. It is illustrated in this thesis that this is simply not the case. Anyone with access to the operating system code at some point in its lifecycle can design a fairly elaborate subversion artifice with modest effort. / Ensign, United States Navy Reserve
23

MAGNET - a dynamic resource management architecture

Kostkova, Patricie January 1999 (has links)
This thesis proposes a new dynamic resource management architecture, Magnet, to meet the requirements of users in flexible and adaptive systems. Computer systems no longer operate in centralized isolated static environments. Technological advances, such as smaller and faster hardware, and higher reliability of networks have resulted in the growth of mobility of computing and the need for run-time reconfigurability. The dynamic management of this diversity of resources is the central issue addressed in this thesis. Applications in environments with frequently changing characteristics are required to participate in dynamic resource management, to adapt to ever-changing conditions, and to express their requirements in terms of quality of service. Magnet enables dynamic trading of resources which can be requested indirectly by the type of service they offer, rather than directly by their name. A dedicated component, the Trader, matches requests for services against demands and establishes a component binding - resource allocation. In addition, the architecture is extensible - it does not constrain the information on services and allows user-customization of the matching process. Consequently, this allows resource definitions to be parametrized (to include QoS-based characteristics), and the matching process to be user-customized (to preform QoS-based negotiation). In order to fulfill the requirements of users relying on ever-changing conditions, Magnet enables runtime adaptation (dynamic rebinding) to changes in the environment, constant monitoring of resources, and scalability of the architecture. The generality of the Magnet architecture is illustrated with several examples of resource allocation in dynamic environments.
24

Cyclic pipeline with repersonalizable segments.

January 1984 (has links)
by Ma Hon-chung. / Bibliography: leaves [199]-[204] / Thesis (M.Ph.)--Chinese University of Hong Kong, 1984
25

Command processors for the dynamic control of software configurations

Fundis, Roxanna May January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
26

System driver for color graphics computer

McCord Dillinger, Marilyn January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
27

Removing inter-minidisk gaps on IBM's VM/CMS operating systems

Al-Rabeh, Raed H. 27 September 1990 (has links)
Disk space fragmentation is the proliferation of small and unusable gaps. This problem is considered within the context of IBM's VM operating system. Facing this problem, researchers resorted to using algorithms based on memory management techniques, such as placement strategies (first-fit, best-fit, and worst-fit). Solutions based on these algorithms do not yield optimum results. Furthermore, in many cases, their efficiency and cost effectiveness are questionable. This work proposes a new method to address the disk fragmentation problem using improved I/0 techniques. Optimum results and efficiency are some of the qualities that contribute to the superiority of this approach. The algorithm was implemented and test figures were compared with calculated figures. The results clearly favor this new algorithm. / Graduation date: 1991
28

An exfiltration subversion demonstration /

Murray, Jessica L. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 83-92). Also available online.
29

A framework for dynamic subversion /

Rogers, David T. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 105-107). Also available online.
30

Boundary clusters in adaptive neighborhood networks

Kumano, Shintaro 05 1900 (has links)
No description available.

Page generated in 0.1261 seconds