Sciweavers

1299 search results - page 91 / 260
» On the Correctness of Operating System Kernels
Sort
View
USS
2010
15 years 2 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
SIES
2007
IEEE
15 years 10 months ago
A Timed Multitasking Architecture for Distributed Embedded Systems
— The paper presents a software architecture for Distributed Timed Multitasking - a new model of computation that can be used to engineer open, and the same time, predictable emb...
Christo Angelov, Jesper Berthing
WISA
2007
Springer
15 years 10 months ago
Detecting Motifs in System Call Sequences
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pat...
William O. Wilson, Jan Feyereisl, Uwe Aickelin
DEXA
2000
Springer
165views Database» more  DEXA 2000»
15 years 8 months ago
DIMS: Implementation of a Federated Information Management System for PRODNET II
The Esprit project PRODNET II1 (Production Planning and Management in an Extended Enterprise) had as its main objective the development of a reference architecture and a support in...
César Garita, Yasemin Ugur, Anne Frenkel, H...
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
15 years 10 months ago
Performance analysis of BSTs in system software
Binary search tree (BST) based data structures, such as AVL trees, red-black trees, and splay trees, are often used in system software, such as operating system kernels. Choosing ...
Ben Pfaff