نتایج جستجو برای: computer operating system
تعداد نتایج: 2675067 فیلتر نتایج به سال:
Robustness is becoming more important as critical software increasingly affects our daily lives. Success in building robust software requires understanding and improving the robustness of the operating system API, but to date there has been no accurate, reproducible way to measure robustness. This paper presents the first full-scale, quantitative measurements of operating system robustness. Eac...
UNIX is a registered trademark of X/Open in the United States and other countries. FreeBSD and the FreeBSD logo used on the covero ft his book are registered and unregis-tered trademarks of the FreeBSD Foundation and are used by Pearson Education with the permission of the FreeBSD Foundation. Manyo ft he designations used by manufacturers and sellers to distinguish their products are claimed as...
The Newton MessagePad Personal Digital Assistant (PDA) is the first in a class of devices distinguished by their pen-based user interface, communications capability, small size, and low cost. A PDA operating system needs to support the simultaneous demands of user interface, applications, and communications. It must operate in an environment that has little main memory, no secondary storage, an...
Wissenheim is designed as a virtual 3D-world for avatar-based leisure and learning. It is geared to offer a sophisticated alternative to violent and often pointless computer games. Students will go to Wissenheim to meet friends, to find learning material and to relax. Learning material is presented in the traditional web-style and as a collection of interactive 3D scenes illustrating selected t...
An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and preventing the kernel from loading loading any file with a bad checksum. The check may be placed in the kernel, but that requires a kernel that is...
One of an operating system's duties is to provide a trustful security architecture to protect user information from threats coming from all aspects the information world. Trojan horses, viruses, and other threats are all aimed at users' personal information. Therefore, the concept of access control has been introduced to system security area years ago. Typically, it guaranties that only process...
Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but breakdown with code mobility. In this paper, we investigate the need for endto-end s...
This paper describes the architecture and performance of the JX operating system. JX is both an operating system completely written in Java and a runtime system for Java
The Android is an operating system for mobile devices such as cellular phones, table computersand netbooks. Android is developed by Google and is based upon the Linux Kernel and GNUsoftware. Android has a large community of developers writing application programs("apps") that extend the functionality of the devices. The Android operating SystemSoftware Stack consis...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید