Spelling suggestions: "subject:"aperating lemsystems - computers"" "subject:"aperating lemsystems - eomputers""
81 |
Hardware support for distributed object-based systemsKhalidi, M. Yousef Amin January 1989 (has links)
No description available.
|
82 |
The design of a distributed debugger for action-based object-oriented programsLin, Chu-chung January 1987 (has links)
No description available.
|
83 |
Reconfigurable multiprocessor operating system kernel for high performance computingMukherjee, Bodhisattwa 12 1900 (has links)
No description available.
|
84 |
Kernel structures for a distributed operating systemSpafford, Eugene Howard 08 1900 (has links)
No description available.
|
85 |
Debugging of Distributed object systemsGunaseelan, L. 05 1900 (has links)
No description available.
|
86 |
An open computing infrastructure that facilitates integrated product and process development from a decision-based perspectiveHale, Mark A. 08 1900 (has links)
No description available.
|
87 |
The real-time implementation of hardware-in-the-loop systems on different RTOS platformsLee, Young Joon 08 1900 (has links)
No description available.
|
88 |
Safety through securitySimpson, Andrew C. January 1996 (has links)
In this thesis, we investigate the applicability of the process algebraic formal method Communicating Sequential Processes (CSP) [Hoa85] to the development and analysis of safetycritical systems. We also investigate how these tasks might be aided by mechanical verification, which is provided in the form of the proof tool Failures-Divergences Refinement (FDR) [Ros94]. Initially, we build upon the work of [RWW94, Ros95], in which CSP treatments of the security property of non-interference are described. We use one such formulation to define a property called protection, which unifies our views of safety and security. As well as applying protection to the analysis of safety-critical systems, we develop a proof system for this property, which in conjunction with the opportunity for automated analysis provided by FDR, enables us to apply the approach to problems of a sizable complexity. We then describe how FDR can be applied to the analysis of mutual exclusion, which is a specific form of non-interference. We investigate a number of well-known solutions to the problem, and illustrate how such mutual exclusion algorithms can be interpreted as CSP processes and verified with FDR. Furthermore, we develop a means of verifying the faulttolerance of such algorithms in terms of protection. In turn, mutual exclusion is used to describe safety properties of geographic data associated with Solid State Interlocking (SSI) railway signalling systems. We show how FDR can be used to describe these properties and model interlocking databases. The CSP approach to compositionality allows us to decompose such models, thus reducing the complexity of analysing safety invariants of SSI geographic data. As such, we describe how the mechanical verification of Solid State Interlocking geographic data, which was previously considered to be an intractable problem for the current generation of mechanical verification tools, is computationally feasible using FDR. Thus, the goals of this thesis are twofold. The first goal is to establish a formal encapsulation of a theory of safety-critical systems based upon the relationship which exists between safety and security. The second goal is to establish that CSP, together with FDR, can be applied to the modelling of Solid State Interlocking geographic databases. Furthermore, we shall attempt to demonstrate that such modelling can scale up to large-scale systems.
|
89 |
Dynamic update for operating systemsBaumann, Andrew, Computer Science & Engineering, Faculty of Engineering, UNSW January 2007 (has links)
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administrators. The aim of this research is to develop a model for dynamic update of operating systems, allowing a system to be patched without the need for a reboot or other service interruption. In this work, a model for dynamic update based on operating system modularity is developed and evaluated using a prototype implementation for the K42 operating system. The prototype is able to update kernel code and data structures, even when the interfaces between kernel modules change. When applying an update, at no point is the system's entire execution blocked, and there is no additional overhead after an update has been applied. The base runtime overhead is also very low. An analysis of the K42 revision history shows that approximately 79% of past performance and bug-fix changes to K42 could be converted to dynamic updates, and the proportion would be even higher if the changes were being developed for dynamic update. The model also extends to other systems such as Linux and BSD, that although structured modularly, are not strictly object-oriented like K42. The experience with this approach shows that dynamic update for operating systems is feasible given a sufficiently-modular system structure, allows maintenance patches and updates to be applied without disruption, and need not constrain system performance.
|
90 |
Improving processor utilization in multiple context processor architecturesKilleen, Timothy F. January 1997 (has links)
Thesis (Ph. D.)--Ohio University, August, 1997. / Title from PDF t.p.
|
Page generated in 0.1002 seconds