41 |
A generic memory module for eventsTecuci, Dan Gabriel, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2007. / Vita. Includes bibliographical references.
|
42 |
Enhancing memory controllers to improve DRAM power and performanceHur, Ibrahim, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
|
43 |
Development of a system to digitally store, display, and allow manipulation of a raster scan video frameAbbate, Mark Peter January 1977 (has links)
Thesis. 1977. B.S.--Massachusetts Institute of Technology. Dept. of Interdisciplinary Science. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND SCIENCE. / Includes bibliographical references. / by Mark P. Abbate. / B.S.
|
44 |
Multi-Computer Communication with Shared MemoryChang, Jane N. 01 January 1985 (has links) (PDF)
This thesis describes a design for a multi-computer communication system using a shared memory. The design is implemented using the Motorola EXORset 30/DS35 development systems. The primary use for the shared memory is to act as a message center similar to a mailbox, where each computer can leave messages for other computers and also pick up messages from other computers. Status word residing in shared memory, called semaphore, are used to indicate the condition of the mailbox. Each computer polls unique semaphores associated with unique message transfers when requesting to send a message or to receive a message.
|
45 |
Coding for storage systems / CUHK electronic theses & dissertations collectionJanuary 2014 (has links)
Chen, Junyu. / Thesis M.Phil. Chinese University of Hong Kong 2014. / Includes bibliographical references (leaves 56-61). / Abstracts also in Chinese. / Title from PDF title page (viewed on 25, October, 2016).
|
46 |
Novel low power CAM architecture /Ng, Ka Fai. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 73-75).
|
47 |
A framework for the secure use of portable storage devices : a South African higher education perspectiveRothman, Jonathan Sean January 2009 (has links)
South African Higher Education has gone through various changes and challenges, one of these being the merger process. Various Universities and Technikons were forced to merge in an effort to aid the transformation and restructuring of the Higher Education landscape in the post-apartheid era. From an ICT point of view, the merged Institutions ended up with massive and distributed computing facilities. These facilities must be managed and secured and it can be appreciated that the complexity and magnitude of this task is compounded by the large and varied user population (i.e. students) using the facilities. With the exploding use of mobile consumer devices (such as cell phones, personal digital assistants, MP3 players, portable storage devices such as flash drives, etc), Higher Education Institutions are faced with the even more complex task of managing and securing the computing infrastructure, while large numbers of students can enter computer labs and use these devices at random. In some circles, portable devices are touted to be the next panacea in higher education. This, together with the popularity these devices enjoy under the student body, makes it a fait accompli that mobile consumer devices are “here to stay”. Therefore, banning these devices from campus computer labs, is not viable. Universities have to find ways to address security issues through the implementation of appropriate protective measures. This research focuses on finding a solution to mitigating the risks imposed on Higher Education Institutions in South Africa caused by the use of portable storage devices. The research proposes a framework which serves as an outline for the countermeasures that Universities must implement to mitigate the risks inherent to the use of portable storage devices. The scope of the research is limited to flash drives, smart phones and MP3 players.
|
48 |
Switching circuits for a ferrite core storageKaaz, Fred Whittaker. January 1956 (has links)
Call number: LD2668 .T4 1956 K31 / Master of Science
|
49 |
Encoding of multi-track (d,k) modulation codes.Orcutt, Edward Kerry. January 1992 (has links)
Multi-track run-length-limited (d,k) modulation codes were recently introduced as a method to increase storage densities in magnetic and optical recording systems. These codes are a generalization of the usual run-length-limited (d,k) codes and provide for increased storage density by relaxing the k-constraint and encoding multiple tracks in parallel. This dissertation focuses on methods of constructing such codes. Two methods are presented. The first uses state-splitting to construct multi-track (d,k) trellis codes. An example is presented in which a (1,3) trellis code is constructed having a code rate of R = 2/3. The second method results in the construction of multi-track (d,k) block codes which are implemented via an enumeration scheme based on the trellis description of the (d,k) constraints. This implementation results in memory requirements which increase only linearly with block length as opposed to the exponential increases arising from look-up table implementations. Additionally, a new class of multi-track codes referred to as redundant multi-track (d,k) codes, is introduced. These redundant codes, unlike the original multi-track (d,k) codes which are completely intolerant of faulty tracks, allow for r faulty tracks while maintaining synchronization.
|
50 |
Loading the numerical control machine code from AD-APT onto a microcomputer controlled floppy diskLi, Xiaowen January 2011 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
Page generated in 0.0601 seconds