Results 11 to 20 of about 447,234 (333)

Minimalist's Linux Cluster [PDF]

open access: yesNuclear Physics B - Proceedings Supplements, 2003
Using barebone PC components and NIC's, we construct a linux cluster which has 2-dimensional mesh structure. This cluster has smaller footprint, is less expensive, and use less power compared to conventional linux cluster.
Chang-Yeong Choi   +3 more
core   +2 more sources

Unikernels: the next stage of Linux’s dominance [PDF]

open access: yesUSENIX Workshop on Hot Topics in Operating Systems, 2019
Unikernels have demonstrated enormous advantages over Linux in many important domains, causing some to propose that the days of Linux's dominance may be coming to an end.
Appavoo, Jonathan   +8 more
core   +2 more sources

Unikernel Linux (UKL) [PDF]

open access: yesEuropean Conference on Computer Systems, 2022
This paper presents Unikernel Linux (UKL), a path toward integrating unikernel optimization techniques in Linux, a general purpose operating system. UKL adds a configuration option to Linux allowing for a single, optimized process to link with the kernel
Ali Raza   +11 more
semanticscholar   +1 more source

Operating System Noise in the Linux Kernel

open access: yesIEEE transactions on computers, 2023
As modern network infrastructure moves from hardware-based to software-based using Network Function Virtualization, a new set of requirements is raised for operating system developers.
Daniel Bristot de Oliveira   +2 more
semanticscholar   +1 more source

ghOSt: Fast & Flexible User-Space Delegation of Linux Scheduling

open access: yesSymposium on Operating Systems Principles, 2021
We present ghOSt, our infrastructure for delegating kernel scheduling decisions to userspace code. ghOSt is designed to support the rapidly evolving needs of our data center workloads and platforms.
J. Humphries   +9 more
semanticscholar   +1 more source

Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets [PDF]

open access: yesInternational Conference on Trust, Security and Privacy in Computing and Communications, 2020
With the widespread of Artificial Intelligence (AI)-enabled security applications, there is a need for collecting heterogeneous and scalable data sources for effectively evaluating the performances of security applications.
Nour Moustafa, Mohiuddin Ahmed, S. Ahmed
semanticscholar   +1 more source

Coase's Penguin, or Linux and the Nature of the Firm [PDF]

open access: yesarXiv.org, 2001
For decades our common understanding of the organization of economic production has been that individuals order their productive activities in one of two ways: either as employees in firms, following the directions of managers, or as individuals in ...
Y. Benkler
semanticscholar   +1 more source

HFL: Hybrid Fuzzing on the Linux Kernel

open access: yesNetwork and Distributed System Security Symposium, 2020
Hybrid fuzzing, combining symbolic execution and fuzzing, is a promising approach for vulnerability discovery because each approach can complement the other.
Kyungtae Kim   +5 more
semanticscholar   +1 more source

Automated patch backporting in Linux (experience paper)

open access: yesInternational Symposium on Software Testing and Analysis, 2021
Whenever a bug or vulnerability is detected in the Linux kernel, the kernel developers will endeavour to fix it by introducing a patch into the mainline version of the Linux kernel source tree.
Ridwan Shariffdeen   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy