OPERATING SYSTEM
12,613 Followers
Recent papers in OPERATING SYSTEM
In 2005, Oak Ridge National Laboratory received delivery of a 5,294 processor Cray XT3. The XT3 is Cray's third-generation massively parallel processing system. The ORNL system uses a singleprocessor node built around the AMD Opteron and... more
In this work an optimized version of the field-mill sensor structure for atmospheric electric field measurements was presented. Both the mechanical structure and the electronic front-end, acquisition and control system are optimized in... more
The integration of strong encryption into operating systems is creating challenges for forensic examiners, potentially preventing us from recovering any digital evidence from a computer. Because strong encryption cannot be circumvented... more
In recent times, globalization has brought us not only new opportunities but also new challenges. The theme of innovation has become a mandatory topic for all industries—it has become a focal point for the enterprise, society, and the... more
This paper presents the development of a unique parallel and distributed real-time digital simulator for power engineering research at the University of Alberta. The simulator is built entirely from commodity-off-the-shelf (COTS) hardware... more
We present DROIDCAP, a retrofitting of Android's central Binder IPC mechanism to change the way how permissions are being represented and managed in the system. In DROIDCAP, permissions are per-process Binder objectcapabilities.... more
Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time of services they ingest.... more
Reuters Corpus Volume I (RCV1) is an archive of over 800,000 manually categorized newswire stories recently made available by Reuters, Ltd. for research purposes. Use of this data for research on text categorization requires a detailed... more
Korea Astronomy and Space Science Institute (KASI) launched the development project of two satellite laser ranging (SLR) systems in early 2008 after the government fund approval of the SLR systems in 2007. One mobile SLR system and one... more
Malware is one of the major security threats that can break computer operation. However, commercial antivirus or anti-spyware that used signature-based matching to detects malware cannot solve that kind of threats. Nowadays malware... more
Web server performance has steadily improved since the inception of the World Wide Web. We observe performance gains of two orders of magnitude between the original process-based Web servers and today’s threaded Web servers. Commercial... more
Recent advances in the development of reconfigurable optical interconnect technologies allow for the fabrication of low cost and run-time adaptable interconnects in large distributed shared-memory (DSM) multiprocessor machines. This can... more
Linux has become one of the most popular UNIX operating systems. Commercial support for Linux and adoption of Linux in real world applications have n o w started to emerge. Some of the applications have strict real-time requirements. In... more
Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on... more
In the view of escalating global threat in security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack... more
Most hypervisors today rely either on (1) full virtualization on high-end hardware (i.e., hardware with virtualization extensions), (2) paravirtualization, or (3) both. These, however, do not fulfill embedded systems' requirements, or... more
Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics... more
The goal of the GUARDS project is to design and develop a generic fault-tolerant computer architecture that can be built from predefined standardised components. The architecture favours the use of commercial off-the-shelf (COTS) hardware... more
We describe the design and implementation of Dynamo, a software dynamic optimization system that is capable of transparently improving the performance of a native instruction stream as it executes on the processor. The input native... more
José Moreira*, Michael Brutman**, José Castaños*, Thomas Engelsiepen***, Mark Giampapa*, Tom Gooding**, Roger Haskin***, Todd Inglett**, Derek Lieber*, Pat McCarthy**, Mike Mundy**, Jeff Parker**, Brian Wallenfelt****
MEDICUS is a teleradiology system which has been developed in a joint project of the German Cancer Research Center (Deutsches Krebsforschungszentrum) and the Transfer Center Medical Informatics (Steinbeis-Transferzentrum Medizinische... more
As the gap between memory and processor speeds continues to widen, cache efficiency is an increasingly important component of processor performance. Compiler techniques have been used to improve instruction and data cache performance for... more
A determinação dos mecanismos básicos e dos critérios de implantação de um pacote de software de rede num sistema operacional específico é apresentada em detalhe. Em seguida, são analisadas alternativas de arquitetura de rede susceptíveis... more
For the last decade or so, the biggest category of the IT investment has unarguably been Enterprise Resource Planning (ERP). Most of the bigger corporations in the developed countries have implemented ERP systems with an aim to achieving... more
Energy-efficiency is key to meet lifetime requirements of Wireless Sensor Networks (WSN) applications. Today's run-time platforms and development environments leave it to the application developer to manage power consumption. For best... more
During the last decade, operational monitoring and forecasting systems have been developed in all the European seas. The exchange of data and products and the development of services for a wide community of users pose some fundamental... more
Performance is a pervasive quality of software systems; everything affects it, from the software itself to all underlying layers, such as operating system, middleware, hardware, communication networks, etc. Software Performance... more
The formal analysis described here detects two so far undetected real deadlock situations per thousand C source files or million lines of code in the open source Linux operating system kernel, and three undetected accesses to freed... more
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments and the development of models is still weak. Addressing... more
ABSTRACT This article deals with the role of server operating systems (SOS) in sustaining availability and reliability of contemporary E-business. A framework that can be used in identifying the most critical SOS functions and selecting... more
This paper presents methods towards making an operating system malicious activity conscious. In addition to the existing focus of operating systems mainly on resource and user management, we propose that an operating system should also... more
workloads is the first step in tuning disk subsystem performance. This paper presents an efficient implementation of disk I/O workload characterization using online histograms in a virtual machine hypervisor-VMware ESX Server. This... more
This manuscript describes the Sensor Web Adaptive Resource Manager (SWARM) project. The primary focus of the project is on the design and prototyping of middleware for managing computing and network resources in a way that enables the... more
Software-based global positioning system (GPS) receivers perform all the baseband signal processing and the high level functions on a general purpose processor. The heavy computational loads of the signal correlation in baseband... more
Kerberos has become a mature, reliable, secure network authentication protocol. Kerberos is based on secret key encryption technology. It is the native network authentication protocol in the Microsoft Windows 2000 operating system and may... more
Scheduling of many different kinds of activities takes place in distributed real-time and multimedia systems. It includes scheduling of computations, window services, filesystem management, I/O services and communication protocol... more
The Bologna Declaration and the implementation of the European Higher Education Area are promoting the use of active learning methodologies such as cooperative learning and project based learning. This study was motivated by the... more
This work presents several approaches for designing the memory management component of self-stabilizing operating systems. We state the requirements a memory manager should satisfy. One requirement is eventual memory hierarchy consistency... more
Network experiments are essential for assessing and validating new networking technologies, architectures and protocols. These assessments have long been performed using network simulators. But it clearly appeared that the results got in... more