Results 311 to 320 of about 27,924,758 (382)
Some of the next articles are maybe not open access.
RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT
IEEE Internet of Things Journal, 2018As the Internet of Things (IoT) emerges, compact operating systems (OSs) are required on low-end devices to ease development and portability of IoT applications. RIOT is a prominent free and open source OS in this space.
E. Baccelli+8 more
semanticscholar +1 more source
1985
Publisher Summary Systems programs control the operation of the computer. Applications programs instruct the computer how to handle an organization's information-processing needs. Systems programmers require an understanding of the internal operation of computer hardware.
HARVEY M. DEITEL, BARBARA DEITEL
openaire +4 more sources
Publisher Summary Systems programs control the operation of the computer. Applications programs instruct the computer how to handle an organization's information-processing needs. Systems programmers require an understanding of the internal operation of computer hardware.
HARVEY M. DEITEL, BARBARA DEITEL
openaire +4 more sources
Algebra Universalis, 1987
An operation inducing system is a collection [S,(G,\(\circ),f,h,\Gamma,\cdot]\) composed of a nonempty set S, a groupoid (G,\(\circ)\), functions f:S\(\to G\) and h:S\(\to S\), a subset \(\Gamma\) of G such that f(S)\(\subseteq \Gamma\) and a function ``\(\cdot ''\) from \(\Gamma\times S\) into S. The groupoid (S,*) defined by \(x*y=f(x)\cdot h(y)\) is
Henry E. Heatherly, Gary F. Birkenmeier
openaire +3 more sources
An operation inducing system is a collection [S,(G,\(\circ),f,h,\Gamma,\cdot]\) composed of a nonempty set S, a groupoid (G,\(\circ)\), functions f:S\(\to G\) and h:S\(\to S\), a subset \(\Gamma\) of G such that f(S)\(\subseteq \Gamma\) and a function ``\(\cdot ''\) from \(\Gamma\times S\) into S. The groupoid (S,*) defined by \(x*y=f(x)\cdot h(y)\) is
Henry E. Heatherly, Gary F. Birkenmeier
openaire +3 more sources
Protection in operating systems
Communications of the ACM, 1976A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The “safety” problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, it can be shown that this problem is decidable, i.e.
Jeffrey D. Ullman+2 more
openaire +2 more sources
1984
At this point in this work, it is useful to examine the record of the European Monetary System. However, this record should be placed in its proper context. This implies that we are not examining an EMU — but an EMS — which is a kind of de-facto monetary union.
openaire +2 more sources
At this point in this work, it is useful to examine the record of the European Monetary System. However, this record should be placed in its proper context. This implies that we are not examining an EMU — but an EMS — which is a kind of de-facto monetary union.
openaire +2 more sources
2014
Documents submitted to the Faculty of the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Master of Fine Arts in the Department of Art.
openaire +1 more source
Documents submitted to the Faculty of the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Master of Fine Arts in the Department of Art.
openaire +1 more source
Proceedings of the February 11-12, 1954, western computer conference: Trends in computers: automatic control and data processing on - AIEE-IRE '53 (Western), 1954
The gentlemen who have preceded me here today have all represented what might be titled the "heroes" of the computer world; the business men of vision who can foresee the coming revolution in business data processing which the modern computer portends, the system engineer who molds this tool into usable and workable forms, and the computer designer who
openaire +3 more sources
The gentlemen who have preceded me here today have all represented what might be titled the "heroes" of the computer world; the business men of vision who can foresee the coming revolution in business data processing which the modern computer portends, the system engineer who molds this tool into usable and workable forms, and the computer designer who
openaire +3 more sources
A System of Operator Equations
Canadian Mathematical Bulletin, 1987AbstractLet be a separable Hilbert space, the algebra of all bounded operators on and Ai, Bi, ∊ , i = 1,. . . , r. It is shown that if no nontrivial linear combination of the operators Ai, is compact, then there exist X, Y ∊ such that X Ai, Y = Bi, for all i.
openaire +3 more sources
2005
This chapter discusses operating systems. The operating system of a computer is software, which controls all the computer`s resources and provides the base upon which the application programs can be written. Modern operating systems also provide numerous services, such as inter-process communication, file and directory systems, data transfer over ...
openaire +2 more sources
This chapter discusses operating systems. The operating system of a computer is software, which controls all the computer`s resources and provides the base upon which the application programs can be written. Modern operating systems also provide numerous services, such as inter-process communication, file and directory systems, data transfer over ...
openaire +2 more sources
1981
Only the very simplest kind of microcomputer is without any form of backing store, that is, discs or cassettes. Any system which is as simple as this has all the programs which make it work stored in ROMs. Such programs are called firmware and they can only be changed by replacing one ROM with another. Anything in the way of instructions or data stored
openaire +2 more sources
Only the very simplest kind of microcomputer is without any form of backing store, that is, discs or cassettes. Any system which is as simple as this has all the programs which make it work stored in ROMs. Such programs are called firmware and they can only be changed by replacing one ROM with another. Anything in the way of instructions or data stored
openaire +2 more sources