Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Computer performance evaluation.
Date
1988
Author
Hamad, Ghassan
Metadata
Show full item record
Item Usage Stats
162
views
0
downloads
Cite This
Computer Performance Evaluation (CPE) is necessary to design computer hardware and software, and to select or develop computer systems. The performance evaluation is done by using various techniques. The objective of this thesis is to study these evaluation techniques, system life cycle, and to present some actual CPE applications, carried out on site in METU computer center.
Subject Keywords
Computer Performance Evaluation
,
System Life Cycle
,
CPE Tools
,
CPE Measures
URI
https://hdl.handle.net/11511/7987
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Implementation and simulation of mc68hc11 microcontroller unit using systemc for co-design studies
Tuncalı, Cumhur Erkan; Aşkar, Murat; Department of Electrical and Electronics Engineering (2007)
In this thesis, co-design and co-verification of a microcontroller hardware and software using SystemC is studied. For this purpose, an MC68HC11 microcontroller unit, a test bench that contains input and output modules for the verification of microcontroller unit are implemented using SystemC programming language and a visual simulation program is developed using C# programming language in Microsoft .NET platform. SystemC is a C++ class library that is used for co-designing hardware and software of a system...
Computer Graphics
Şehitoğlu, Onur Tolga(2009)
Hardware and software components of graphics systems. Output and filled-data primitives. 2D and 3D geometric transformations. Two dimensional viewing: Viewing pipeline, clipping, and windowing. Three dimensional viewing: Viewing pipeline, viewing parameters, projections, viewing transformations, clipping. Visible surface detection. Introduction to illumination models and surface rendering.
Computer Graphics
Can, Tolga(2009)
Hardware and software components of graphics systems. Output and filled data primitives. 2D and 3D geometric transformations. Two dimensional viewing: viewing pipeline, clipping, and windowing. Three dimensional viewing: viewing pipeline, viewing parameters, projections, viewing transformations, clipping, visible surface detection. Introduction to illumination models and surface rendering.
CFD Analyses of a Notebook Computer Thermal Management System and a Proposed Passive Cooling Alternative
Tarı, İlker (2010-06-01)
A notebook computer thermal management system is analyzed using a commercial computational fluid dynamics software package (ANSYS Fluent). The active and passive paths that are used for heat dissipation are examined for different steady state operating conditions. For each case, average and hot-spot temperatures of the components are compared with the maximum allowable operating temperatures. It is observed that when low heat dissipation components are put on the same passive path, the increased heat load o...
Design and implementation of an open security architecture for a software-based security module
Kaynar, Kaan; Özgit, Attila; Department of Computer Engineering (2009)
Main purpose of this thesis work is to design a comprehensive and open security architecture whose desired parts could be realized on a general-purpose embedded computer without any special cryptography hardware. The architecture provides security mechanisms that implement known cryptography techniques, operations of some famous network security protocols and appropriate system security methods. Consequently, a server machine may offload a substantial part of its security processing tasks to an embedded com...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
G. Hamad, “Computer performance evaluation.,” Middle East Technical University, 1988.