71 |
Level of adjustment as a variable in tachistoscopic perceptionCasavantes, Edward Joseph, 1929- January 1958 (has links)
No description available.
|
72 |
Oscillations of air cushion vehiclesButler, Robert Eugene, 1929- January 1961 (has links)
No description available.
|
73 |
Development of an improved technique for variable velocity tensile impact testing of ultra-high strength aerospace materialsMakhijani, Purshotam Gobindram, 1938- January 1966 (has links)
No description available.
|
74 |
Calibration of combined bending-torsion fatigue reliability research machines and reliability data reductionMcConnell, Jeffrey Bentley, 1945- January 1973 (has links)
No description available.
|
75 |
Usermode kernel : running the kernel in userspace in VM environmentsGeorge, Sharath 11 1900 (has links)
In many instances of virtual machine deployments today, virtual machine
instances are created to support a single application. Traditional operating systems provide an extensive framework for protecting one process from
another. In such deployments, this protection layer becomes an additional
source of overhead as isolation between services is provided at an operating
system level and each instance of an operating system supports only one
service. This makes the operating system the equivalent of a process from
the traditional operating system perspective. Isolation between these operating systems and indirectly the services they support, is ensured by the
virtual machine monitor in these deployments. In these scenarios the process protection provided by the operating system becomes redundant and a
source of additional overhead. We propose a new model for these scenarios
with operating systems that bypass this redundant protection offered by the
traditional operating systems. We prototyped such an operating system by
executing parts of the operating system in the same protection ring as user
applications. This gives processes more power and access to kernel memory
bypassing the need to copy data from user to kernel and vice versa as is
required when the traditional ring protection layer is enforced. This allows
us to save the system call trap overhead and allows application program
mers to directly call kernel functions exposing the rich kernel library. This
does not compromise security on the other virtual machines running on the
same physical machine, as they are protected by the VMM. We illustrate
the design and implementation of such a system with the Xen hypervisor
and the XenoLinux kernel.
|
76 |
Design of a dispensing system for a gel transplanterJakhro, G. Sarwar. January 1986 (has links)
No description available.
|
77 |
A comparative analysis of some new systems for yarn manufacturingStewart, Emory Eugene January 1963 (has links)
No description available.
|
78 |
Dynamic self-balancing of a combination washer/dryer in high-speed spinWalsh, Edward Lavin 12 1900 (has links)
No description available.
|
79 |
A mechanism for restoring dissipated energy to a damped rotational oscillatory systemHorn, William Albert 12 1900 (has links)
No description available.
|
80 |
An adaptive statistically based controller for through-feed centerless grindingCowan, Richard Watson 12 1900 (has links)
No description available.
|
Page generated in 0.0323 seconds