Sciweavers

13618 search results - page 53 / 2724
» The Newton Operating System
Sort
View
OSDI
2006
ACM
14 years 8 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
13 years 11 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
ICC
2007
IEEE
173views Communications» more  ICC 2007»
14 years 2 months ago
A Distributed Approach to Interference Mitigation Between OFDM-Based 802.16 Systems Operating in License-Exempt Spectrum
— An approach to mitigating interference between 802.16 license-exempt systems is proposed in this paper. More specifically, the approach focuses on solving problems which arise...
Omar Ashagi, Seán Murphy, Liam Murphy
ACSC
2005
IEEE
14 years 1 months ago
A High Performance Kernel-Less Operating System Architecture
Operating Systems provide services that are accessed by processes via mechanisms that involve a ring transition to transfer control to the kernel where the required function is pe...
Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla
USENIX
2007
13 years 10 months ago
Exploring Recovery from Operating System Lockups
Operating system lockup errors can render a computer unusable by preventing the execution other programs. Watchdog timers can be used to recover from a lockup by resetting the pro...
Francis M. David, Jeffrey C. Carlyle, Roy H. Campb...