Results 61 to 70 of about 78,918 (241)
Adjustable method with predicate abstraction for detection of race conditions in operating systems
The paper presents a configurable method of static data race detection that is trying to keep a balance between resource consumption and a number of false alarms. The method is based on well known Lockset approach.
P. S. Andrianov +2 more
doaj +1 more source
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel [PDF]
We present the first static approach that systematically detects potential double-fetch vulnerabilities in the Linux kernel. Using a pattern-based analysis, we identified 90 double fetches in the Linux kernel.
Dodier-Lazaro, S +4 more
core
A fine-grain time-sharing Time Warp system [PDF]
Although Parallel Discrete Event Simulation (PDES) platforms relying on the Time Warp (optimistic) synchronization protocol already allow for exploiting parallelism, several techniques have been proposed to further favor performance.
Pellegrini, Alessandro +1 more
core +1 more source
Linux security modules: general security support for the linux kernel [PDF]
The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced access control mechanisms have failed to win acceptance into mainstream operating systems due in part to a lack of consensus within the security community on the right solution.
C. Wright +4 more
openaire +1 more source
Deep learning pipeline developed to filter high‐speed bat flight recordings captured inside a custom flight tunnel. ABSTRACT This research aims to investigate the flying kinematics of bats, drawing inspiration from nature to benefit humans in achieving vision‐independent flights. The project uses 50 cameras mounted inside a specially designed tunnel to
D. P. Jayathunga +4 more
wiley +1 more source
Linux kernel configuration build for application systems
The Linux operating system is a modern open operating system containing more than 10,000 configuration variables and a large variety of functional system elements that handle the processing of various kinds of tasks. The task is to create some version of
S. V. Kozin
doaj +1 more source
A Multi‐Layered Analysis of Energy Consumption in Spark
ABSTRACT Although energy has become a major concern in data processing systems, it is usually hard to get a deep understanding of how performance and energy consumption relate to each other when planning how to configure a computing environment to execute a specific data‐oriented workload.
Nestor D. O. Volpini +2 more
wiley +1 more source
Safer Linux Kernel Modules Using the D Programming Language
Since its creation, the Linux kernel has gained international recognition and has been employed on a large range of devices: servers, supercomputers, smart devices and embedded systems.
Constantin Eduard Staniloiu +3 more
doaj +1 more source
Membangun Embedded Linux Pada ALIX3d2 Dengan Buildroot Pada Aplikasi Stasiun Cuaca [PDF]
Embedded computer memerlukan sistem operasi yang cukup padat namun handal untuk menjalankan fungsi tertentu secara kontinyu. Embedded Linux menggunakan kernel Linux dengan sumber yang terbatas sebagai inti dari sistem operasi.
Arif, S. (Sahrul) +1 more
core
Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers
In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system.
Abed, Amr S. +2 more
core +1 more source

