Sciweavers

1299 search results - page 76 / 260
» On the Correctness of Operating System Kernels
Sort
View
USENIX
2007
15 years 6 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
WSC
2001
15 years 5 months ago
Practical approaches for validating a construction simulation
This paper presents three methods implemented in the activity-based construction modeling and simulation (ABC) system for validating a construction simulation. The first method re...
Jonathan Jingsheng Shi
IWPC
2000
IEEE
15 years 8 months ago
Architectural Repair of Open Source Software
As a software system evolves, its architecture will drift. System changes are often done without considering their effects on the system structure. These changes often introduce s...
John B. Tran, Michael W. Godfrey, Eric H. S. Lee, ...
ISORC
2002
IEEE
15 years 9 months ago
Handling Aperiodic Tasks in Diverse Real-Time Systems via Plug-Ins
Functionality for various services of scheduling algorithms is typically provided as extensions to a basic algorithm. Aperiodic task handling, guarantees, etc., are integrated wit...
Tomas Lennvall, Gerhard Fohler, Björn Lindber...
SEUS
2007
IEEE
15 years 10 months ago
Transparent and Selective Real-Time Interrupt Services for Performance Improvement
The popularity of mobile and multimedia applications made real-time support a mandatory feature for embedded operating systems. However, the current situation is that the overall p...
Jinkyu Jeong, Euiseong Seo, Dongsung Kim, Jinsoo K...