Results 11 to 20 of about 4,194,012 (324)
Distributed operating systems [PDF]
In the past five years, distributed operating systems research has gone through a consolidation phase. On a large number of design issues there is now considerable consensus between different research groups. In this paper, an overview of recent research in distributed systems is given.
openaire +2 more sources
Video game performance analysis on selected operating systems
The video game industry is currently one of the most dominant in IT. Unfortunately, developers rarely focus on maintaining older games, which often leads to the inability to launch them on newer systems.
Agata Wrześniewska +1 more
doaj +1 more source
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov +3 more
doaj +1 more source
Distributed operating systems have many aspects in common with centralized ones, but they also differ in certain ways. This paper is intended as an introduction to distributed operating systems, and especially to current university research about them.
Tanenbaum, A.S., van Renesse, R.
openaire +3 more sources
You and I are Past Our Dancing Days [PDF]
Operating systems have grown in size and functionality. Today's many flavours of Unix provide a multi-user environment with protection, address spaces, and attempts to allocate resources fairly to users competing for them, They provide processes and ...
Mullender, Sape J.
core +3 more sources
Branch prediction apparatus, systems, and methods [PDF]
An apparatus and a system, as well as a method and article, may operate to predict a branch within a first operating context, such as a user context, using a first strategy; and to predict a branch within a second operating context, such as an operating ...
John, Lizy K., Li, Tao
core +1 more source
Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices
Mobile devices are widely replacing the standard personal computers thanks to their small size and userfriendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising.
Vincenzo Conti +3 more
doaj +1 more source
PROGRAM CODE OPTIMIZATION OF RELACY RACE DETECTOR LIBRARY [PDF]
The paper presents the results of Relacy Race Detector (RRD) library research as applied to the problem of multithreaded code testing. The study revealed several shortcomings of the RRD library.
O. V. Doronin +3 more
doaj +1 more source
ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS
In the European Union, in the first half of 2018, the General Data Protection Regulation came into force, which established the new rules for processing users’ personal data for IT companies.
Olexander Zadreyko +2 more
doaj +1 more source
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems [PDF]
The capabilities of a sensor network are strongly influenced by the operating system used on the sensor nodes. In general, two different sensor network operating system types are currently considered: event driven and multi-threaded.
Duffy, Cormac +3 more
core +6 more sources

