نتایج جستجو برای: computer operating system

تعداد نتایج: 2675067  

1999
John DeVale

Robustness is becoming more important as critical software increasingly affects our daily lives. Success in building robust software requires understanding and improving the robustness of the operating system API, but to date there has been no accurate, reproducible way to measure robustness. This paper presents the first full-scale, quantitative measurements of operating system robustness. Eac...

2014
Marshall Kirk McKusick George V. Neville-Neil Robert N.M. Watson

UNIX is a registered trademark of X/Open in the United States and other countries. FreeBSD and the FreeBSD logo used on the covero ft his book are registered and unregis-tered trademarks of the FreeBSD Foundation and are used by Pearson Education with the permission of the FreeBSD Foundation. Manyo ft he designations used by manufacturers and sellers to distinguish their products are claimed as...

1994
Robert Welland Greg Seitz Lieh-Wuu Wang Landon Dyer Tim Harrington Daniel Culbert

The Newton MessagePad Personal Digital Assistant (PDA) is the first in a class of devices distinguished by their pen-based user interface, communications capability, small size, and low cost. A PDA operating system needs to support the simultaneous demands of user interface, applications, and communications. It must operate in an environment that has little main memory, no secondary storage, an...

2007
Peter Schulthess Markus Fakler Steffen Gerhold Michael Sonnenfroh

Wissenheim is designed as a virtual 3D-world for avatar-based leisure and learning. It is geared to offer a sophisticated alternative to violent and often pointless computer games. Students will go to Wissenheim to meet friends, to find learning material and to relax. Learning material is presented in the traditional web-style and as a collection of interactive 3D scenes illustrating selected t...

2013
Lars Rasmusson Mazdak Rajabi Nasab

An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and preventing the kernel from loading loading any file with a bad checksum. The check may be placed in the kernel, but that requires a kernel that is...

2012
Xiaowei Wang

One of an operating system's duties is to provide a trustful security architecture to protect user information from threats coming from all aspects the information world. Trojan horses, viruses, and other threats are all aimed at users' personal information. Therefore, the concept of access control has been introduced to system security area years ago. Typically, it guaranties that only process...

2002
Mohammad Samarah James Whittaker

Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but breakdown with code mobility. In this paper, we investigate the need for endto-end s...

2010
Mercy St Vincent Ben Sawyer Jim Rosenblum

2002
Michael Golm Meik Felser Christian Wawersich Jürgen Kleinöder

This paper describes the architecture and performance of the JX operating system. JX is both an operating system completely written in Java and a runtime system for Java

2017
Ashish Kumar

The Android is an operating system for mobile devices such as cellular phones, table computersand netbooks. Android is developed by Google and is based upon the Linux Kernel and GNUsoftware. Android has a large community of developers writing application programs("apps") that extend the functionality of the devices. The Android operating SystemSoftware Stack consis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید