نتایج جستجو برای: operating system computer
تعداد نتایج: 2675067 فیلتر نتایج به سال:
Forensic artifacts refer to bits of information that an operating system records, when a user is using his computer system. These bits of data are user/session specific and provide all information regarding the use of a particular application or program along with the necessary time stamps. A digital forensic investigator needs to be aware of such artifacts in order to perform a legally accepta...
ARISO [3] Computer Architecture and Operating Systems (webpage [4]) ARISO1 [5] Computer Architecture and Operating Systems 1 (webpage [6]) ARISO2 [7] Computer Architecture and Operating Systems 2 (webpage [8]) LABARISO [9] Computer Architecture and Operating Systems Laboratory (webpage [10]) MOO [11] Object-Oriented Methodology and Programming SC [12] Communication software TELFIB [13] Optical ...
We have developed a system that uses computer vision to replace standard computer mouse functions with hand gestures. The system is designed to enable non-contact human-computer interaction (HCI), so that surgeons will be able to make more effective use of computers during surgery. In this paper, we begin by discussing the need for non-contact computer interfaces in the operating room. We then ...
Energy Efficient Mobile Operating Systems Muhammad Waseem Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt Email: [email protected] ------------------------------------------------------------------ABSTRACT-------------------------------------------------------------Energy is an important resource in mobile computers now days. It is important to man...
Traditionally, operating systems have fulfilled the dual roles of enforcing security on computer systems, as well as managing and virtualizing resources for the various applications sharing the machine. However, more recently, there have been some promising proposals in creating systems where hardware, rather than software enforces security and protection. These proposals would require an opera...
Scheduling and load balancing of applications on distributed or shared memory machine architectures can be executed by optimizing algorithms in various levels of the architecture. We are viewing four di erent levels, namely, the application layer, the compiler layer, the run time layer, and the operating system layer. The approach to scheduling and load balancing ranges from very specialized an...
چکیده ندارد.
Trace-driven simulation is commonly used by the computer architecture research community to pursue answers to a wide variety of architectural design issues. Traces taken from benchmark execution (e.g., SPEC, Bytemark, SPLASH) have been studied extensively to optimize the design of pipelines, branch predictors, and especially cache memories. Today’s computer designs have been optimized based on ...
Simple approaches to context can improve performance of existing applications and operating systems, especially when providing lightweight interpreters for user inputs such as speech and vision. A central service for internal computer contexts and external user contexts can also provide a means for improved resource management. User behavior analysis and command properties (such as safety, reve...
This paper describes the operating characteristics of the primary components that form the PEP Instrumentation and Control System. Descriptions are provided for the computer control system,.beam monitors , and other support systems.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید