Results 31 to 40 of about 447,234 (333)

Linux kernel compaction through cold code swapping [PDF]

open access: yes, 2009
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented ...
A. Milanova   +13 more
core   +2 more sources

UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel

open access: yesESEC/SIGSOFT FSE, 2020
Use-before-Initialization (UBI) bugs in the Linux kernel have serious security impacts, such as information leakage and privilege escalation. Developers are adopting forced initialization to cope with UBI bugs, but this approach can still lead to ...
Yizhuo Zhai   +8 more
semanticscholar   +1 more source

Explainable human‐in‐the‐loop healthcare image information quality assessment and selection

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Smart healthcare applications cannot be separated from healthcare data analysis and the interactive interpretability between data and model. A human‐in‐the‐loop active learning approach is introduced to reduce the cost of healthcare data labelling by evaluating the information quality of unlabelled medical data and then screening the high ...
Yang Li, Sezai Ercisli
wiley   +1 more source

Design and implementation of partial dynamically reconfigurable FPGA process scheduling

open access: yesDianzi Jishu Yingyong, 2023
In view of the diverse edge computing requirements of the 6G era, reconfigurable technology based on FPGAs can achieve lower latency and provide diversified services.
Qian Hongwen   +5 more
doaj   +1 more source

Millisecond accuracy video display using OpenGL under Linux [PDF]

open access: yes, 2006
To measure people’s reaction times to the nearest millisecond, it is necessary to know exactly when a stimulus is displayed. This article describes how to display stimuli with millisecond accuracy on a normal CRT monitor, using a PC running Linux.
A. Nye   +11 more
core   +2 more sources

Simple and precise static analysis of untrusted Linux kernel extensions

open access: yesACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2019
Extended Berkeley Packet Filter (eBPF) is a Linux subsystem that allows safely executing untrusted user-defined extensions inside the kernel. It relies on static analysis to protect the kernel against buggy and malicious extensions. As the eBPF ecosystem
Elazar Gershuni   +7 more
semanticscholar   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

Adobe Flash as a medium for online experimentation: a test of reaction time measurement capabilities [PDF]

open access: yes, 2007
Adobe Flash can be used to run complex psychological experiments over the Web. We examined the reliability of using Flash to measure reaction times (RTs) using a simple binary-choice task implemented both in Flash and in a Linux-based system known to ...
N. Stewart   +9 more
core   +1 more source

A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS

open access: yesInternational Journal of Computer Applications, 2020
Varieties of operating systems (OS) have emerged over the years having different features and functionalities. Understanding the functionalities of each OS guides users’ decisions about the OS to install on their computers.
A. Adekotujo   +3 more
semanticscholar   +1 more source

Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method

open access: yesIET Networks, Accepted Article., 2022
This research uses big data technology to combine the process of product innovation design method, which has certain significance for the formation of intelligent and systematic product innovation design method. Meanwhile, while predicting the results of all products innovative design methods, it can improve the product's predictive innovative design ...
Ren Li, Qiang Zeng
wiley   +1 more source

Home - About - Disclaimer - Privacy