نتایج جستجو برای: operating system computer
تعداد نتایج: 2675067 فیلتر نتایج به سال:
The use of language mechanisms to enforce protection boundaries around software modules has become increasingly attractive. This paper examines the advantages and disadvantages of languagebased protection over more traditional protection mechanisms, such as standard virtual memory protection hardware, software fault isolation, and capability systems. Arguably, state-of-the-art language-based pr...
Three major technological directions in computer technology are transaction processing, object orientation, and microkernel operating systems. The KeyKOS operating system and the KeyTXF transaction processing system combine all three of these technologies. The design of KeyKOS directly provides operating system level objects on a microkernel base. In order to maintain the integrity of these obj...
residue number system (rns) is a non-weighted number system for integer number arithmetic, which is based on the residues of a number to a certain set of numbers called module set. the main characteristics and advantage of residue number system is reducing carry propagation in calculations. the elimination of carry propagation leads to the possibility of maximizing parallel processing and reduc...
از منظر امنیت کامپیوتر، می توان موفقیت سیستم های زیستی در حفظ بقاء و پایداری را بعنوان الگوی مناسبی در نظر گرفت. ابزارها و روشهای متداولی که برای تولید سیستم های محاسباتی قوی استفاده می شوند نمی توانند حتی کوچکترین شکل حیات را به شکل مناسب پیاده سازی نمایند، در حالیکه سیستم های زیستی در طول زمان متکامل شده تا در محیط های گوناگون و در مقابل هجومهای مختلف، زنده بمانند و تکثیر شوند. در این پایان ...
The mechanization of computer operations and the extension of hardware functions are seen as the basic purposes of an operating system. An operating system must fu@U those purposes while providing stability and continuity to its users. Starting with the data processing environment of twenty-$ve years ago, this paper describes the forces that led to the development of the OS/360 system design an...
Dept. of Mathematics and Computer Science Vrije Universiteit Amsterdam, The Netherlands Most distributed operating systems constructed to date have lacked a unifying mechanism for naming and protection. In this paper we discuss a system, Amoeba, that uses capabilities for naming and protecting objects. In contrast to traditional, centralized operating systems, in which capabilities are managed ...
One of the challenges facing computer systems is resisting attack and compromise in a networked environment. Today’s computing environment is fairly homogeneous, due to a relatively small number of operating systems and application functions running on the vast majority of computers. This environment allows attackers to focus their efforts on the few types of systems deployed. Once an exploit i...
Angelos d. Keromytis is an Associate Professor of computer Science at columbia University. His research interests revolve around systems and software security and reliability. He received his Phd in 2001 from the University of Pennsylvania. [email protected] Kernel exploits have become increasingly popular over the past several years. We have developed kGuard, a cross-platform system that...
Computers are a very important part of our lives and the major reason why they have been such a success is because of the excellent graphical operating systems that run on these powerful machines. As the computer hardware is becoming more and more powerful, it is also vital to keep the software updated in order to utilize the hardware of the system efficiently and make it faster and smarter. Th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید