Results 1 to 10 of about 4,676,074 (371)
On the definition of a theoretical concept of an operating system [PDF]
We dwell on how a definition of a theoretical concept of an operating system, suitable to be incorporated in a mathematical theory of operating systems, could look like. This is considered a valuable preparation for the development of a mathematical theory of operating systems.
Bergstra, J. A., Middelburg, C. A.
arxiv +4 more sources
Operating-system support for distributed multimedia [PDF]
Multimedia applications place new demands upon processors, networks and operating systems. While some network designers, through ATM for example, have considered revolutionary approaches to supporting multimedia, the same cannot be said for operating ...
Leslie, Ian M.+2 more
core +26 more sources
Evaluation and Refinement of an Explicit Virtual-Memory Primitive
The general-purpose virtual-memory subsystem of Linux does not scale to the multimillion IOP/s SSDs of today. Further, its implicit write-back and back-fill semantic hinders data-intensive applications, like databases, more than it actually helps.
Yannick Loeck, Christian Dietrich
doaj +1 more source
Cardiovascular disease is now one of the leading causes of morbidity and mortality. Electrocardiogram (ECG) is a reliable tool for monitoring the health of the cardiovascular system.
Taki Hasan Rafi, Young Woong Ko
doaj +1 more source
Assessment of the moderating effects of Nigerian market environment on the relationship between management success determinants and SMEs’ performance [PDF]
A reported eighty-five percentage failure rate of SMEs in Nigeria before five years of operation was ascribed to a lack of knowledge of the market environment.
Olalekan Asikhia, Vannie Naidoo
doaj +1 more source
Operation System Vulnerabilities Analysis Based on Code Clone Detection
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj +1 more source
Unveiling the Landscape of Operating System Vulnerabilities
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and
Manish Bhurtel, Danda B. Rawat
doaj +1 more source
A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis
Advances in technology and computing power have led to the emergence of complex and large-scale software architectures in recent years. However, they are prone to performance anomalies due to various reasons, including software bugs, hardware failures ...
Iman Kohyarnejadfard+3 more
doaj +1 more source
Methods for Lowering the Power Consumption of OS-Based Adaptive Deep Brain Stimulation Controllers
The identification of a new generation of adaptive strategies for deep brain stimulation (DBS) will require the development of mixed hardware–software systems for testing and implementing such controllers clinically.
Roberto Rodriguez-Zurrunero+2 more
doaj +1 more source
A Technical Review on Development of an Advanced Electromechanical System
Development of an advanced electromechanical system requires a blend of technical expertise and knowledge, from electrical and mechanical engineering to software and system engineering.
Nazita Taghavi+2 more
doaj +1 more source