Results 61 to 70 of about 78,918 (241)

Adjustable method with predicate abstraction for detection of race conditions in operating systems

open access: yesТруды Института системного программирования РАН, 2018
The paper presents a configurable method of static data race detection that is trying to keep a balance between resource consumption and a number of false alarms. The method is based on well known Lockset approach.
P. S. Andrianov   +2 more
doaj   +1 more source

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel [PDF]

open access: yes, 2017
We present the first static approach that systematically detects potential double-fetch vulnerabilities in the Linux kernel. Using a pattern-based analysis, we identified 90 double fetches in the Linux kernel.
Dodier-Lazaro, S   +4 more
core  

A fine-grain time-sharing Time Warp system [PDF]

open access: yes, 2017
Although Parallel Discrete Event Simulation (PDES) platforms relying on the Time Warp (optimistic) synchronization protocol already allow for exploiting parallelism, several techniques have been proposed to further favor performance.
Pellegrini, Alessandro   +1 more
core   +1 more source

Linux security modules: general security support for the linux kernel [PDF]

open access: yesFoundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], 2004
The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced access control mechanisms have failed to win acceptance into mainstream operating systems due in part to a lack of consensus within the security community on the right solution.
C. Wright   +4 more
openaire   +1 more source

Improved YOLOv5 for Efficient Elimination of Unwanted Video Frames From High‐Speed Video Arrays Capturing Bat's Kinematics

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Deep learning pipeline developed to filter high‐speed bat flight recordings captured inside a custom flight tunnel. ABSTRACT This research aims to investigate the flying kinematics of bats, drawing inspiration from nature to benefit humans in achieving vision‐independent flights. The project uses 50 cameras mounted inside a specially designed tunnel to
D. P. Jayathunga   +4 more
wiley   +1 more source

Linux kernel configuration build for application systems

open access: yesТруды Института системного программирования РАН, 2019
The Linux operating system is a modern open operating system containing more than 10,000 configuration variables and a large variety of functional system elements that handle the processing of various kinds of tasks. The task is to create some version of
S. V. Kozin
doaj   +1 more source

A Multi‐Layered Analysis of Energy Consumption in Spark

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 3, February 2026.
ABSTRACT Although energy has become a major concern in data processing systems, it is usually hard to get a deep understanding of how performance and energy consumption relate to each other when planning how to configure a computing environment to execute a specific data‐oriented workload.
Nestor D. O. Volpini   +2 more
wiley   +1 more source

Safer Linux Kernel Modules Using the D Programming Language

open access: yesIEEE Access, 2022
Since its creation, the Linux kernel has gained international recognition and has been employed on a large range of devices: servers, supercomputers, smart devices and embedded systems.
Constantin Eduard Staniloiu   +3 more
doaj   +1 more source

Membangun Embedded Linux Pada ALIX3d2 Dengan Buildroot Pada Aplikasi Stasiun Cuaca [PDF]

open access: yes, 2011
Embedded computer memerlukan sistem operasi yang cukup padat namun handal untuk menjalankan fungsi tertentu secara kontinyu. Embedded Linux menggunakan kernel Linux dengan sumber yang terbatas sebagai inti dari sistem operasi.
Arif, S. (Sahrul)   +1 more
core  

Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

open access: yes, 2016
In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system.
Abed, Amr S.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy