• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 79
  • 8
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 119
  • 119
  • 119
  • 28
  • 15
  • 14
  • 12
  • 12
  • 11
  • 11
  • 11
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

The theory and implementation of a secure system

Robb, David S. S. January 1992 (has links)
Computer viruses pose a very real threat to this technological age. As our dependence on computers increases so does the incidence of computer virus infection. Like their biological counterparts, complete eradication is virtually impossible. Thus all computer viruses which have been injected into the public domain still exist. This coupled with the fact that new viruses are being discovered every day is resulting in a massive escalation of computer virus incidence. Computer viruses covertly enter the system and systematically take control, corrupt and destroy. New viruses appear each day that circumvent current means of detection, entering the most secure of systems. Anti-Virus software writers find themselves fighting a battle they cannot win: for every hole that is plugged, another leak appears. Presented in this thesis is both method and apparatus for an Anti-Virus System which provides a solution to this serious problem. It prevents the corruption, or destruction of data, by a computer virus or other hostile program, within a computer system. The Anti-Virus System explained in this thesis will guarantee system integrity and virus containment for any given system. Unlike other anti-virus techniques, security can be guaranteed, as at no point can a virus circumvent, or corrupt the action of the Anti-Virus System presented. It requires no hardware modification of the computer or the hard disk, nor software modification of the computer's operating system. Whilst being largely transparent to the user, the System guarantees total protection against the spread of current and future viruses.
12

Study of Virtual Memory

Dixit, Shridhar S. 01 April 1982 (has links) (PDF)
This research report gives a general description of virtual memory systems. The mechanisms and policies and their effect on the operation and efficiency of virtual memory are explained. A virtual memory using a real time virtual address decoder, to decode a 32 bits of virtual address for the secondary memory to obtain the primary address location discussed. The decoder is developed with the use of associative or content-addressable memories. Replacement algorithms, used for selecting the pages of the main memory to be replaced, are described. The hardware implementation of the least recently used and least often used replacement policies using associative memories is presented.
13

Develop, build, and test a virtual lab to support vulnerability training system

Akgul, Turgut, Kargin, Coskun 09 1900 (has links)
Approved for public release; distribution is unlimited / A computer security virtual lab architecture was developed and tested for functionality and performance. Four Dell PowerEdge 1650, dual processor, blade servers were configured as host machines with VMware and VNC running on a Linux RedHat 9 Kernel. An Apache-Tomcat web server was configured as the external interface to lab users. Web content was created, the site was secured with SSL, and Java Servlet functionality was enabled. Host machine performance was tested under various load conditions. Analysis indicated that, for our architecture, that the average host machine CPU load was [about]12 % while the average memory load was [about]33 %. We conclude that for the cost and space requirements of 5 1U blade servers we have configured an equivalent 20 computer lab. Performance tests show that the virtual lab could scale easily from 4 - 30 computers. / 1st Lieutenant, Turkish Army / 1st Lieutenant, Turkish Army
14

The co-design of virtual machines using reconfigurable hardware

Kent, Kenneth Blair 21 April 2017 (has links)
The prominence of the internet and networked computing has driven research efforts into providing support for heterogeneous computing platforms. This has been exemplified by the emergence of virtual machines, such as the Java virtual machine. Unfortunately, most virtual computing platforms come with a performance penalty. This dissertation investigates a new approach for providing virtual computing platforms through the use of reconfigurable computing devices and hardware/software co-design. Traditionally, when designing a hardware/software solution, instance specific methods are used to iterate towards a solution that satisfies the requirements. This is not an ideal approach as the costs involved with integrating hardware and software components are significant. This technique demotes the interface between the hardware and software, often resulting in major complications at the integration stage. These problems can be avoided through adherence to a sound methodology which the co-design process follows. This dissertation examines the original concept of using hardware/software co-design and reconfigurable computing as a means of providing virtual machine platforms. Specifically the contributions include an advancement towards a new general computing paradigm and architecture; guidelines and several algorithms for applying the general hardware/software co-design process to the specific virtual machine class of problems; and an assessment of the potential advantages of using co-design as an implementation approach for virtual machines. These are applied to the Java virtual machine and simulated for insights into the potential benefits, requirements, and caveats of co-design for virtual machines. This research demonstrates that using hardware/software co-design as described specifically for virtual machines, the solution can offer performance benefits over a software-only solution. These performance increases will be shown to be dependent upon several factors such as the application itself and the underlying architectural features. This dissertation will promote and give evidence that reconfigurable computing can be used for more general purpose computing and not just for specific problem instances. / Graduate
15

HIMICS : a virtual memory environment for mini-computers, and a description of its level 2 processor

Bentz, Arlan E January 2010 (has links)
Digitized by Kansas Correctional Industries
16

Performance of a system with multiprogramming virtual machines

Young, Robert Andrew January 2011 (has links)
Digitized by Kansas Correctional Industries
17

Improving the performance of live migration of virtual machines

Deshpande, Umesh D. January 2009 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Computer Science, 2009. / Includes bibliographical references.
18

The virtual environment operating system : derivation, function, and form /

Coco, Geoffrey P. January 1993 (has links) (PDF)
Thesis (M.S.E.)--University of Washington, 1993. / Includes bibliographical references (leaves [116]-119).
19

Analysis of virtual environments through a web based visualization tool /

Valente, Ronald R. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaf 76).
20

Develop, build, and test a virtual lab to support vulnerability training system /

Kargin, Coskun. Akgul, Turgut. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Richard M. Harkins. Includes bibliographical references (p. 75-76). Also available online.

Page generated in 0.0889 seconds