• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 601
  • 214
  • 194
  • 161
  • 101
  • 55
  • 40
  • 39
  • 36
  • 26
  • 20
  • 14
  • 11
  • 10
  • 10
  • Tagged with
  • 1747
  • 505
  • 361
  • 338
  • 242
  • 215
  • 177
  • 150
  • 148
  • 148
  • 135
  • 127
  • 123
  • 122
  • 119
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A structural multi-user operating system : design and implementation on a PDP-1145

McKenzie, Pierre. January 1978 (has links)
No description available.
12

Software Design of A UNIX-like Kernel

Jya, Jean-Ray 15 September 2003 (has links)
Abstract In the age of deep submicron VLSI, we can design various system applications in a single chip. In such system-on-a-chip designs, hardware and software function are integrated and managed by application-specific operating system functions. It motivates us to study design structures of current OS kernels. In this research, we applied an executable specification method for the software design of a UNIX kernel. We studied first the overall software structure of UNIX kernels. Then, we analyzed the detailed designs of process management and memory management. We applied object-oriented analysis and design techniques as well as a hierarchical state machine control design method. We will then map this design onto an executable specification framework to produce system prototype designs for collecting early experimental results and tuning application-specific kernel functionalities.
13

To Review The Performance From The Point of Internal Control

Chen, Shoei-En 27 August 2001 (has links)
ABSTRACT As an era of progress, the business size change from small to a large scale farm, the management concept also affected. Early from the Taylor and Gilbreth´time control in scientific management to the newly developed methods of human behavior and system control, Enterprise no longer used the simple way as in the production line and sales, Global business is another indication of growing. The appraisal system applied to measure the whole system but not for individual. For the sake of protecting the investor under the rapid change in the business runing, The Ministry of Finance applied the internal control system designed by The Committee of Sponsoring Organizations of the Treadway Commission ¡]COSO,1992¡^as a blue print to stipulate the internal control and audit policy, and to force business in this country to follow it. This system will promote the operating efficiency as well as help to attain the goal required for business, Moreover It can assure the truth of financial report and the compliance in following the government regulation. Case company is a typical manufacturing firm, Their management model is traditional such as human resource, financial, quality control, and manufacturing management , Each system have its own discipline in order to achieve their target. However, Internal control will join the above management procedure as a whole, also set up some monitoring system for leading all the managemental activities to obtain the required aim and to correct the great error that might be happened in the enterprise. This paper will point out the difference in performance after introducing the internal control system, and select two critical cycles as example .
14

A Study on The Influential Factors of Underwriters pricing decision in IPOs

Li, Pei-Lin 13 August 2003 (has links)
Abstract The price of the initial public offerings should reflect the real value of the issuers. To quote the IPOs is very important in underwriting process. The mainly roles in IPOs are investors¡]buyer¡^, issuers¡]supplier¡^, and underwriters¡]broker¡^. The pricing-decisions on IPOs are opposite between investors and issuers. It is difficult for underwriters to equalize among risk adverse, specialistic goodwill, and maintenance of clients¡¦ relationship. This research tries to find out the effect factors to underwriters. This research observed 104 IPOs in Taiwan during the period of January 2001 to February 2003. The methods to analyze the data are mainly blocked analysis¡]including six blocks¡^, Pearson correlation analysis and multiple regression analysis. According to the results of empirical research, we can get conclusions as followings: 1.The effect factors of IPO¡¦s are ¡§the favorites with industry¡¨, and ¡§operating performance¡¨. They are statistically significant. 2. The factors of ¡§unit cost of the majority¡¨ and ¡§sales consideration¡¨ which underwriters and issuers always negotiated are not statistically significant. 3.the IPO¡¦s who booked on Emerging Stock are higher than the others.
15

Flexible allocation and space management in storage systems

Kang, Suk Woo 17 September 2007 (has links)
In this dissertation, we examine some of the challenges faced by the emerging networked storage systems. We focus on two main issues. Current file systems allocate storage statically at the time of their creation. This results in many suboptimal scenarios, for example: (a) space on the disk is not allocated well across multiple file systems, (b) data is not organized well for typical access patterns. We propose Virtual Allocation for flexible storage allocation. Virtual allocation separates storage allocation from the file system. It employs an allocate-on-write strategy, which lets applications fit into the actual usage of storage space without regard to the configured file system size. This improves flexibility by allowing storage space to be shared across different file systems. We present the design of virtual allocation and an evaluation of it through benchmarks based on a prototype system on Linux. Next, based on virtual allocation, we consider the problem of balancing locality and load in networked storage systems with multiple storage devices (or bricks). Data distribution affects locality and load balance across the devices in a networked storage system. We propose user-optimal data migration scheme which tries to balance locality and load balance in such networked storage systems. The presented approach automatically and transparently manages migration of data blocks among disks as data access patterns and loads change over time. We built a prototype system on Linux and present the design of user-optimal migration and an evaluation of it through realistic experiments.
16

Operating system support for low-latency streaming /

Goel, Ashvin. January 2003 (has links)
Thesis (Ph. D.)--OGI School of Science & Engineering at OHSU, 2003. / Includes bibliographical references (leaves 170-181).
17

Tools, Techniques, and Trade-offs when Porting Large Software Systems to New Environments

Kågström, Simon January 2008 (has links)
Computer hardware and software evolve very fast. With the advent of chip-multiprocessors and symmetric multithreading, multiprocessor hardware configurations are becoming prevalent. For software, new hardware and requirements such as security, performance and maintainability drive the development of new runtime environments, virtual machines and programming methodologies. These trends present problems when porting legacy software. Multiprocessor hardware require ports of uniprocessor operating system kernels while new software environments might require that programs have to be ported to different languages. This thesis examines the tradeoff between performance and development effort for software porting with case studies in operating system porting to multiprocessors and tool support for porting C and C++ applications to Java virtual machines. The thesis consists of seven papers. The first paper is a survey of existing multiprocessor development approaches and focuses on the tradeoff between performance and implementation effort. The second and third papers describe the evolution a traditional lock-based multiprocessor port, going from a serialized “giant locked” port and evolving into a coarse-grained implementation. The fourth paper instead presents an alternative porting approach which aims to minimize development effort. The fifth paper describes a tool for efficient instrumentation of programs, which can be used during the development of large software systems such as operating system kernels. The sixth and seventh papers finally describe a binary translator which translates MIPS binaries into Java bytecode to allow low-effort porting of C and C++ applications to Java virtual machines. The first main contributions of this thesis is an in-depth investigation of the techniques used when porting operating system kernels to multiprocessors, focusing on development effort and performance. The traditional approach used in the second and third papers required longer development time than expected, and the alternative approach in the fourth paper can therefore be preferable in some cases. The second main contribution is the development of a binary translator that targets portability of C and C++ applications to J2ME devices. The last two papers show that the approach is functional and has good enough performance to be feasible in real-life situations.
18

Rethinking operating system trust

Hofmann, Owen Sebastian 25 February 2014 (has links)
Operating system kernels present a difficult security challenge. Despite their millions of lines of code and broad, complex attack surface, they remain a trusted component shared between all applications. If an attacker can combine an exploit for any application on a system with a kernel exploit or privilege escalation, the attacker can then control any other application, regardless of whether the second application was itself vulnerable. This dissertation presents two hypervisor-based systems: OSck, which increases the trustworthiness of a guest kernel by detecting kernel rootkits, and InkTag, which removes the need for an application to trust the kernel at all. Vital to both systems is their use of information from a potentially malicious kernel. These systems rely on information from the kernel about its own functionality to make their implementation simpler, more efficient, and more secure. Importantly, although they rely on this information, they do not trust it. A kernel that lies about its functionality to appear benign will be detected, as will a kernel that simply acts maliciously. OSck detects kernel rootkits: malicious software programs that are particularly difficult to detect because they modify internal kernel operation to hide their presence. Running concurrently with an operating system and isolated by the hypervisor, OSck verifies safety properties for large portions of the kernel heap with minimal overhead, by deducing type information from unmodified kernel source code and in-memory kernel data structures. InkTag gives strong safety guarantees to trusted applications, even in the presence of a malicious operating system. InkTag isolates applications from the operating system, and enables applications to validate that the kernel is acting in good faith, for example by ensuring that the kernel is mapping the correct file data into the application's address space. InkTag introduces paraverification, a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. InkTag requires that the kernel prove to the hypervisor that its updates to application state (such as page tables) are valid, and also to prove to the application that its responses to system calls are consistent. InkTag is also the first system of its kind to implement access control, secure naming, and consistency for data on stable storage. / text
19

A structural multi-user operating system : design and implementation on a PDP-1145

McKenzie, Pierre. January 1978 (has links)
No description available.
20

The design and implementation of an operating system for the IBM personal computer

Deese, Albert James, Jr. January 1984 (has links)
No description available.

Page generated in 0.0763 seconds