نتایج جستجو برای: network operating system

تعداد نتایج: 2793382  

2008
Russell Thomas Hunt Frans Kaashoek Gregory R. Ganger

Operating system (OS) emulation consists of running a binary executable intended for a particular OS on a different OS. This ability allows users to run more programs and OS manufacturers to jumpstart new OSs with non-native programs. There are several OSs that can run binaries compiled for the same processor but for different operating systems. There are also systems that can run multiple OS s...

Journal: :Computing Systems 1988
Marc Rozier Vadim Abrossimov François Armand Ivan Boule Michel Gien Marc Guillemont F. Herrmann Claude Kaiser S. Langlois P. Leonard W. Neuhauser

The Cnonus technology has been designed for building o'new generations" of open, distributed, scalable Operating Systems. CHoRus has the following main characteristics: ¡ Ír comÍ[tnication-based technology, relying on a minimal Nucleus integrating distributed processing and communication at the lowest level, and providing generic services used by a set of subsystem servers to provide extended s...

2005

• uniform interfaces—same for kernel and user-level services • extensibility—can add new services • flexibility—can subtract/modify services • portability—easier to port operating system because os-specific part is smaller • reliability—smaller kernel makes its implementation likely to be more reliable. Also more well-defined APIs. • distributed system support—pieces can be on another machine. ...

2008
Trent Jaeger

Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build “secure” operating systems — operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we...

2002
Zhong Tang

The course ‘Operating System Internals’ (OSI) usually focuses on teaching the concepts and issues surrounding the design of an OS in general. Students are advised to learn by example and through experiments, which are fundamental for the real understanding of operating system. Although controlled experiments with a commercial OS is one of basic approaches in organizing the practical work of stu...

2011
Gaurav Sharma Ashish Kumar Vandana Sharma

Computers have brought about a revolution across all industries. Computers have become the most important part for the success of any enterprise. Computers are the best means for proper storage and management of data. They can assist as knowledge bases and can be utilized for financial transactions due to their processing power and storage capacities. PCs handle and keep a track of data which i...

2009
Susanna Martinelli Laura Ricci

PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services)

2017
Zhenping Lu Fucai Chen Jiangxing Wu Guozhen Cheng

Vulnerabilities and backdoors in NOS (Network operating system) allow malicious actors to disrupt network or hijack NOS. The current work proposes a NOS architecture called secure control plane (SCP) that enhances security through a rotation of hetergeneous and multiple NOSs.Theory analysis proves validity and availability of the SCP and its more effective security performance over traditional ...

2014

Enea is a global vendor of Linux and Real-time operating system solutions including middleware, tools, protocols and services. The company is a world leader in developing software platforms for communication-driven products in multiple verticals, with extreme demands on high-availability and performance. Enea’s expertise in operating systems and high availability middleware shortens development...

Journal: :Journal of Systems and Software 2015
Manuel Delamo Ramos Santiago Felici-Castell Juan José Pérez Solano Andrew David Foster

We discuss the entire process for the analysis and design of an Environmental Monitoring Application for Wireless Sensor Networks, using existing open source components to create the application. We provide a thorough study of the different alternatives, from the selection of the embedded operating system to the different algorithms and strategies. The application has been designed to gather te...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید