نتایج جستجو برای: operating policy
تعداد نتایج: 412364 فیلتر نتایج به سال:
The lifetime of an operating system is long compared with that of its many varied applications and uses. General purpose or exible systems design are solutions that address such lifetime diierences. General purpose systems suuer from size and ineeciency. Flexible operating systems suuer from the overhead introduced by the mechanisms permitting exibility. Structured dynamic customization facilit...
Current operating systems are designed to provide least-common-denominator service to a variety of applications. They export few internal kernel facilities, and those which are exported have irregular interfaces. As a result, resource intensive applications such as database management systems and multimedia applications, are often poorly served by the operating system. These applications often ...
In this paper we present an idea of system library, based on generic components within microkernel system in the area of embedded systems. The paper describes basic Exokernel structure and functionality with focus on Exokernel ability to separate high level abstraction from kernel itself. Equally class hierarchy based Choices framework is briefly described. A Choices divides parts of operating ...
This paper describes a multiprocessor operating system simulator that was developed by the authors in the Fall semester of 1987. The sinmlator was built in response to the need to provide students with an en_t in which to build and test operatLug system concepts as part of the coursework of a third-year undergraduate operating systems course. Written in C++ [I], the simn]ator uses the co-routin...
Several recent operating systems provide system calls that allow an application to explicitly manage the privileges of modules with which the application interacts. Such privilege-aware operating systems allow a programmer to a write a program that satisfies a strong security policy, even when it interacts with untrusted modules. However, it is often non-trivial to rewrite a program to correctl...
The class of NUMA (nonuniform memory access time) shared memory architectures is becoming increasingly important with the desire for larger scale multiprocessors. In such machines, the placement and movement of code and data are crucial to performance. The operating system can play a role in managing placement through the policies and mechanisms of the virtual memory subsystem. An implementatio...
Genetic Algorithms (GAs) application in the field of water resources engineering is of recent origin. Genetic Algorithms is one of the tools, which handles nonlinear optimization problems in an efficient manner. Optimal reservoir operation of reservoir for hydropower production involves constrained nonlinear optimization. The constrained problem is converted into unconstrained problem by using ...
This study empirically observes the impact of corporate governance index on dividend payout policy by using the data on thirty textile firms listed at Karachi Stock Exchange. The data cover the five-year period from 2009 to 2013. The data were gathered from financial statements of all the sample firms. Multiple regression models were used to check the impact of corporate governance on dividend ...
Mobile phones running open operating systems such as Google Android will soon be the norm in cellular networks. These systems expose previously unavailable phone and network resources to application developers. However, with increased exposure comes increased risk. Poorly or maliciously designed applications can compromise the phone and network. While Android defines a base set of permissions t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید