Linux kernel compaction through cold code swapping [PDF]
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented ...
A. Milanova +13 more
core +2 more sources
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel
Use-before-Initialization (UBI) bugs in the Linux kernel have serious security impacts, such as information leakage and privilege escalation. Developers are adopting forced initialization to cope with UBI bugs, but this approach can still lead to ...
Yizhuo Zhai +8 more
semanticscholar +1 more source
Explainable human‐in‐the‐loop healthcare image information quality assessment and selection
Abstract Smart healthcare applications cannot be separated from healthcare data analysis and the interactive interpretability between data and model. A human‐in‐the‐loop active learning approach is introduced to reduce the cost of healthcare data labelling by evaluating the information quality of unlabelled medical data and then screening the high ...
Yang Li, Sezai Ercisli
wiley +1 more source
Design and implementation of partial dynamically reconfigurable FPGA process scheduling
In view of the diverse edge computing requirements of the 6G era, reconfigurable technology based on FPGAs can achieve lower latency and provide diversified services.
Qian Hongwen +5 more
doaj +1 more source
Millisecond accuracy video display using OpenGL under Linux [PDF]
To measure people’s reaction times to the nearest millisecond, it is necessary to know exactly when a stimulus is displayed. This article describes how to display stimuli with millisecond accuracy on a normal CRT monitor, using a PC running Linux.
A. Nye +11 more
core +2 more sources
Simple and precise static analysis of untrusted Linux kernel extensions
Extended Berkeley Packet Filter (eBPF) is a Linux subsystem that allows safely executing untrusted user-defined extensions inside the kernel. It relies on static analysis to protect the kernel against buggy and malicious extensions. As the eBPF ecosystem
Elazar Gershuni +7 more
semanticscholar +1 more source
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley +1 more source
Adobe Flash as a medium for online experimentation: a test of reaction time measurement capabilities [PDF]
Adobe Flash can be used to run complex psychological experiments over the Web. We examined the reliability of using Flash to measure reaction times (RTs) using a simple binary-choice task implemented both in Flash and in a Linux-based system known to ...
N. Stewart +9 more
core +1 more source
A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS
Varieties of operating systems (OS) have emerged over the years having different features and functionalities. Understanding the functionalities of each OS guides users’ decisions about the OS to install on their computers.
A. Adekotujo +3 more
semanticscholar +1 more source
Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method
This research uses big data technology to combine the process of product innovation design method, which has certain significance for the formation of intelligent and systematic product innovation design method. Meanwhile, while predicting the results of all products innovative design methods, it can improve the product's predictive innovative design ...
Ren Li, Qiang Zeng
wiley +1 more source

