The Tenth “Eros” Circular 1

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The EROS System Structure

One thing that causes me problems in these discussions ... is that I often don’t know if you are talking about just the kernel or also the user space system when refering to Coyotos. The space bank in particular is logically outside the kernel and part of the user space operating system. But there seem to be some complicated interactions between the kernel design and the way memory is organized...

متن کامل

The Meaning of Eros/macho

Most of the mass density in the Universe—and in the halo of our own galaxy—exists in the form of dark matter. Overall, the contribution of luminous matter (in stars) to the mass density of the Universe is less than 1%; primordial nucleosynthesis indicates that baryons contribute between 1% and 10% of the critical density (0.01h <∼ ΩB <∼ 0.02h; h = the Hubble constant in units of 100 km sMpc); a...

متن کامل

Verifying the EROS Confinement Mechanism

Capability systems can be used to implement higher-level security policies including the *-property if a mechanism exists to ensure confinement. The implementation can be efficient if the “weak” access restriction described in this paper is introduced. In the course of developing EROS, a pure capability system, it became clear that verifying the correctness of the confinement mechanism was nece...

متن کامل

EROs in the EIS fields

The publicly available EIS-DEEP optical-NIR data for the AXAF (Chandra) Deep Field have been used to construct samples of Extremely Red Objects (EROs) using various single-band and multi-band color criteria. In this work we define as EROs objects with colors consistent with passively evolving elliptical galaxies at z ≥ 1. The EROs surface densities we derive are intermediate between previous pu...

متن کامل

The EROS Trusted Window System

Window systems are the primary mediator of user input and output in modern computing systems. As a result, they play a key role in the enforcement of security policies and the protection of sensitive information. A user typing a password or passphrase must be assured that it is disclosed exclusively to the intended program. The interprocess communication functionality that underlies “cut and pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1903

ISSN: 0028-0836,1476-4687

DOI: 10.1038/068276a0