Results 91 to 100 of about 78,918 (241)

Glider: A GPU Library Driver for Improved System Security [PDF]

open access: yes, 2014
Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks.
Sani, Ardalan Amiri   +2 more
core  

CamFlow: Managed Data-sharing for Cloud Services

open access: yes, 2015
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
Bacon, Jean   +3 more
core   +2 more sources

Faster Positional‐Population Counts for AVX2, AVX‐512, and ASIMD

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT The positional population count operation pospopcnt counts for an array of w$$ w $$‐bit words how often each of the w$$ w $$ bits was set. Various applications in bioinformatics, database engineering, and digital processing exist. Building on earlier work by Klarqvist et al., we show how positional population counts can be rapidly computed ...
Robert Clausecker   +2 more
wiley   +1 more source

IMPLEMENTASI PENGATURAN DAN PRIORITAS BANDWIDTH DENGAN HIERARCHICAL TOKEN BUCKET BERBASISKAN GUI PADA LINUX SERVER CLEAROS

open access: yesKomputika, 2021
Hierarchical Token Bucket (HTB) adalah metode yang digunakan untuk mengatur bandwidth pada jaringan dengan mengatur packet yang dikirimkan pada jaringan.
Sukmajati Prayoga
doaj  

Deductive Verification of Unmodified Linux Kernel Library Functions

open access: yes, 2018
This paper presents results from the development and evaluation of a deductive verification benchmark consisting of 26 unmodified Linux kernel library functions implementing conventional memory and string operations.
B Jacobs   +6 more
core   +1 more source

Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]

open access: yes, 2014
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core   +1 more source

Incremental development of environment model and requirement specifications for subsystems of operating system monolithic kernels

open access: yesТруды Института системного программирования РАН, 2018
Methods and tools for automated static verification aim at detecting all violations of checked requirements in target programs under certain assumptions even without complete models and formal specifications.
I. S. Zakharov, E. M. Novikov
doaj   +1 more source

A Generic Checkpoint-Restart Mechanism for Virtual Machines [PDF]

open access: yes, 2012
It is common today to deploy complex software inside a virtual machine (VM). Snapshots provide rapid deployment, migration between hosts, dependability (fault tolerance), and security (insulating a guest VM from the host).
Cooperman, Gene   +2 more
core  

Operating System’s Kernel Hooking Methods (Study Case of Linux Kernel)

open access: yesБезопасность информационных технологий, 2014
The article presents an overview of dynamic integration in the kernel Linux, allowed to modify (add, change) its functionality. Traditional methods of integration based on changing in the kernel code (patching), and methods based on using system ...
Ilya Vladimirovich Matveychikov
doaj  

Achieving Consistent Real-Time Latency at Scale in a Commodity Virtual Machine Environment Through Socket Outsourcing-Based Network Stacks

open access: yesIEEE Access, 2018
It is challenging to achieve a consistent real-time (RT) response time in commodity virtual machine (VM) environments because they have longer and more complex network protocol stacks.
Oscar F. Garcia   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy