Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,639 Full-Text Articles 2,383 Authors 1,144,547 Downloads 138 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,639 full-text articles. Page 58 of 68.

Application Of Intelligent-Objects Simulation To Manufacturing Process Efficiency Analysis: A Case Study, Justin Hamilton 2012 Morehead State University

Application Of Intelligent-Objects Simulation To Manufacturing Process Efficiency Analysis: A Case Study, Justin Hamilton

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Justin Hamilton on May 12, 2012.


Design, Development, And Evaluation Of An Easily Customized Staff Scheduling System, Lakmal Molligoda 2012 Morehead State University

Design, Development, And Evaluation Of An Easily Customized Staff Scheduling System, Lakmal Molligoda

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Lakmal Molligoda on May 10, 2012.


Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra 2012 SelectedWorks

Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

An email virus makes use of the email technology and attaches itself to an email to transfer itself from one computer to another. Some email viruses create and send new emails using the address book of the victim computer. The email viruses are a matter of concern as they can spread very fast via emails to different geographical locations.

The conventional scanners are file based and not good for scanning emails as the emails can contain different types of files as attachments. Besides they cannot detect viruses until the emails are downloaded and opened by the recipient in order to …


Implementing Virus Scanning In Computer Networks, Umakant Mishra 2012 SelectedWorks

Implementing Virus Scanning In Computer Networks, Umakant Mishra

Umakant Mishra

Some viruses exploit the features and capabilities of computer networks to spread, operate and damage network environments. For example, the virus may copy itself to other computers in the network or may increase network activities congesting the network traffic. The conventional anti-viruses are not efficient enough to detect and control viruses in a network environment. As they are file based they cannot scan the data while being downloaded from the server.

Most of the drawbacks of conventional scanning are taken care by a firewall-based virus scanning. But this method requires high-end machines to withstand the load of centralized scanning. There …


Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr 2012 The University of the South Pacific

Mis Mock Questions (Why Mis In Corporate Turbulant Times), Deogratias Harorimana Sr

Dr Deogratias Harorimana

With corporate strategy becoming more and more dependent on speed,focus, innovation and strategy, what can MIS do? and what should be MIS role ? what is the relationship between Corporate Strategy KPI and MIS? These questions are answered in an MBA Management Information Systems at USP. This programme is delivered across the entire Pacific region through the Graduate School of Business. It is my privilege to post here few questions that students who attended one of the course in Nadi, at Tanoa International Hotel had to answer in one of the Quiz test.


An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub 2012 Michigan State University College of Law

An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub

Federal Communications Law Journal

Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …


Dsm64: A Distributed Shared Memory System In User-Space, Stephen Alan Holsapple 2012 California Polytechnic State University, San Luis Obispo

Dsm64: A Distributed Shared Memory System In User-Space, Stephen Alan Holsapple

Master's Theses

This paper presents DSM64: a lazy release consistent software distributed shared memory (SDSM) system built entirely in user-space. The DSM64 system is capable of executing threaded applications implemented with pthreads on a cluster of networked machines without any modifications to the target application. The DSM64 system features a centralized memory manager [1] built atop Hoard [2, 3]: a fast, scalable, and memory-efficient allocator for shared-memory multiprocessors.

In my presentation, I present a SDSM system written in C++ for Linux operating systems. I discuss a straight-forward approach to implement SDSM systems in a Linux environment using system-provided tools and concepts avail- …


Decimal Alu, Ming Zhu 2012 University of Nevada, Las Vegas

Decimal Alu, Ming Zhu

College of Engineering: Graduate Celebration Programs

The decimal number system is used in many commercial applications, such as financial analysis, banking, tax calculation, currency conversion, insurance and accounting. With the explosively increasing amount the data to be proposed, computers are introduced to help deal with it. However, in digital Arithmetic Logic Unit (ALU) circuit systems, the binary number system is widely used for its simplicity and easy realization in physical layout. This project aims at constructing an ALU that contains decimal additions, subtractions and multiplications using binary coded decimal (BCD) on a binary system platform.


Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr 2012 The University of the South Pacific

Economic Benefits Analysis Of Mining Industries In Png And Solomon Islands, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper discusses mining and mineral operations in the two countries Papua New Guinea and Solomon Islands with regards to its contribution to the overall Gross domestic Product and the economic development of each country.

Our finding shows that mining is an excellent contributor to economic growth and development as in the case of Papua New Guinea.Tax revenue from PNG Mining industries contributions to the PNG fiscal basket remains strong and growing steadily. The mining and minerals tax revenue remains an important contributor to the government fiscal budget over the last 10 years. This has been a strong contributor to …


Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr 2012 The University of the South Pacific

Understanding Economics Of The Pacific Island Nations: Issues And Cases, Deogratias Harorimana Sr

Dr Deogratias Harorimana

No abstract provided.


Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr 2012 The University of the South Pacific

Job Creation In The Tuna Industry Of The Solomon Islands- A Tentative Strategic Analysis, Deogratias Harorimana Sr

Dr Deogratias Harorimana

The principal objective of this paper is to review the current Tuna Fisheries Policies in the Solomon Islands with a view to proposing strategies that will maximize Job creation while at the same time address the issues that currently exist in this sector. Although the Tuna Industry’s contribution to GDP is quite significant, the Solomon Island Government (SIG) gets little or close to nothing out of it in the form of revenue and Job creation with the majority of vessels being foreign owned and fishing license fees amongst the lowest in the Pacific. SOLTAI which is partly owned by the …


Modeling Product Development As A System Design Game, C. Jason WOODARD 2012 Singapore Management University

Modeling Product Development As A System Design Game, C. Jason Woodard

C. Jason Woodard

A system design game is a model of a situation in which agents’ actions determine the structure of a system, which in turn affects the system’s value and the share of value that each agent may capture through bargaining or market competition. This paper describes a class of games in which agents design interdependent products, for example software programs, which may be complements or substitutes for each other. These relationships are epresented by an object called a design structure network (DSN). Depending on the modeler’s choice of allocation rules, agents may benefit from owning critical nodes in the DSN, corresponding …


Modeling Architectural Strategy Using Design Structure Networks, C. Jason WOODARD 2012 Singapore Management University

Modeling Architectural Strategy Using Design Structure Networks, C. Jason Woodard

C. Jason Woodard

System architects face the formidable task of purposefully shaping an evolving space of complex designs. Their task s further complicated when they lack full control of the design process, and therefore must anticipate the behavior of other stakeholders, including the designers of component products and competing systems. This paper presents a conceptual tool called a design structure network (DSN) to help architects and design scientists reason effectively about these situations. A DSN is a graphical representation of a system’s design space. DSNs improve on existing representation schemes by providing a compact and intuitive way to express design options—the ability to …


Datalogger Sequence Execution Engine (Dsqee), Edmund Yingxiang Yee 2012 California Polytechnic State University - San Luis Obispo

Datalogger Sequence Execution Engine (Dsqee), Edmund Yingxiang Yee

Computer Engineering

The PolySat Research Group accepts projects from several companies that wish to use a CubeSat for some experiment. One of the projects called Intelligent Payload Experiment, or IPEX, needs software to interact with out system avionics. One of these software will be datalogger, which will be augmented from its original datalogging scheme to support sequentially execution of commands/algorithms that our client, Jet Propulsion Laboratory, or JPL, need. My part of the project explains the software design decisions behind datalogger.


Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr 2012 The University of the South Pacific

Review Of Solomon Islands’ Policies And Programs To Promote Private Sector Development And Small Business, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Solomon Islands is a nation with vast resources with huge potential to excel economically if proper business atmosphere is provided for both private sector development and small and medium enterprises entrepreneurship. Conducive policies that, not only, a mere statement but is broken down to workable strategies with quantitative expected outcome with a strong mentoring mechanism is very important. Previous governments have continuously ignored the importance of having small business policies until lately when NCRA government came up with a set of policies that strategically addresses the significance of small and medium businesses. However, notwithstanding foreign investment is very important in …


Scheduling Medical Application Workloads On Virtualized Computing Systems, Javier Delgado 2012 Florida International University

Scheduling Medical Application Workloads On Virtualized Computing Systems, Javier Delgado

FIU Electronic Theses and Dissertations

This dissertation presents and evaluates a methodology for scheduling medical application workloads in virtualized computing environments. Such environments are being widely adopted by providers of “cloud computing” services. In the context of provisioning resources for medical applications, such environments allow users to deploy applications on distributed computing resources while keeping their data secure. Furthermore, higher level services that further abstract the infrastructure-related issues can be built on top of such infrastructures. For example, a medical imaging service can allow medical professionals to process their data in the cloud, easing them from the burden of having to deploy and manage these …


Digital Content Preservation Across Domain Verticals, Soha Maad, Borislav Dimitrov 2012 Royal College of Surgeons in Ireland

Digital Content Preservation Across Domain Verticals, Soha Maad, Borislav Dimitrov

Borislav D Dimitrov

The authors present a novel approach to develop scalable systems and services for preserving digital content generated from various application domains. The aim is to deliver an integrative scalable approach for digital content preservation across domain verticals. This would involve consolidating approaches for modeling document workflow, preserving the integrity of heterogeneous data, and developing robust and scalable tools for digital preservation ensuring interoperability across domains verticals. The authors consider various application domains including: healthcare, public, business and finance, media and performing art, and education. The authors focus on specific case studies of digital content preservation across the considered domain verticals. …


The Uconn Vpc: A Collaborative Story About Desktop Virtualization, Tony Molloy, Jeremy Pollack, Ed Swindelles 2012 University of Connecticut - Storrs

The Uconn Vpc: A Collaborative Story About Desktop Virtualization, Tony Molloy, Jeremy Pollack, Ed Swindelles

UConn Library Presentations

The UConn vPC is a collaborative IT project among the UConn School of Business, the School of Engineering, and the University Libraries. The project delivered virtual desktops to UConn students beginning the fall semester of 2011. Students now have access to UConn-licensed applications from their PCs, Macs, and mobile devices from anywhere in the world where they have Internet access. This session discusses both the technology behind the service and the collaboration between the academic units that built a scalable, centralized service. An overview of the service can be found at http://vpc.uconn.edu.


Bluemote!, Philip Kaye 2012 California Polytechnic State University - San Luis Obispo

Bluemote!, Philip Kaye

Computer Engineering

In today’s society, our mobile phones are an extremely useful device when we are on the go and away from our homes; however, when we return home, our smart phone becomes just a communication tool again. Home automation is inevitable, and it will find its way into every house. The first person to commercialize it to the point where it is as easy to set-up and as affordable as a home router will end up breaking this slow trend. The key to this success is the smart phone; this should end up being the most expensive piece of hardware for …


Location Of Processor Allocator And Job Scheduler And Its Impact On Cmp Performance, Dawid Zydek, Grzegorz Chmaj, Alaa Shawky, Henry Selvaraj 2012 Idaho State University

Location Of Processor Allocator And Job Scheduler And Its Impact On Cmp Performance, Dawid Zydek, Grzegorz Chmaj, Alaa Shawky, Henry Selvaraj

Electrical & Computer Engineering Faculty Research

High Performance Computing (HPC) architectures are being developed continually with an aim of achieving exascale capability by 2020. Processors that are being developed and used as nodes in HPC systems are Chip Multiprocessors (CMPs) with a number of cores. In this paper, we continue our effort towards a better processor allocation process. The Processor Allocator (PA) and Job Scheduler (JS) proposed and implemented in our previous works are explored in the context of its best location on the chip. We propose a system, where all locations on a chip can be analyzed, considering energy used by Network-on-Chip (NoC), PA and …


Digital Commons powered by bepress