Results 21 to 30 of about 27,924,758 (382)
The eXpress data path: fast programmable packet processing in the operating system kernel
Programmable packet processing is increasingly implemented using kernel bypass techniques, where a userspace application takes complete control of the networking hardware to avoid expensive context switches between kernel and userspace.
Toke Høiland-Jørgensen+6 more
semanticscholar +1 more source
Branch prediction apparatus, systems, and methods [PDF]
An apparatus and a system, as well as a method and article, may operate to predict a branch within a first operating context, such as a user context, using a first strategy; and to predict a branch within a second operating context, such as an operating ...
John, Lizy K., Li, Tao
core +1 more source
Unveiling the Landscape of Operating System Vulnerabilities
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and
Manish Bhurtel, Danda B. Rawat
doaj +1 more source
Quality of service in distributed multimedia systems [PDF]
The Unix operating system made a vital contribution to information technology by introducing the notion of composing complicated applications out of simple ones by means of pipes and shell scripts.
Mullender, S.J., Sijben, P.
core +2 more sources
Methods for Lowering the Power Consumption of OS-Based Adaptive Deep Brain Stimulation Controllers
The identification of a new generation of adaptive strategies for deep brain stimulation (DBS) will require the development of mixed hardware–software systems for testing and implementing such controllers clinically.
Roberto Rodriguez-Zurrunero+2 more
doaj +1 more source
Outside the Safe Operating Space of the Planetary Boundary for Novel Entities
We submit that the safe operating space of the planetary boundary of novel entities is exceeded since annual production and releases are increasing at a pace that outstrips the global capacity for assessment and monitoring. The novel entities boundary in
L. Persson+13 more
semanticscholar +1 more source
The paper presents selected information on the newest results of a wide investigation of the state of information and communication technologies development in agricultural production enterprises in the Czech Republic.
J. Vaněk+3 more
doaj +1 more source
Performance evaluation of windows virtual machines on a Linux host
Virtualization has experienced a dramatic expansion recently and today is ubiquitous in modern IT industry since it provides numerous benefits to companies and individual users.
Josip Balen+2 more
doaj +1 more source
A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis
Advances in technology and computing power have led to the emergence of complex and large-scale software architectures in recent years. However, they are prone to performance anomalies due to various reasons, including software bugs, hardware failures ...
Iman Kohyarnejadfard+3 more
doaj +1 more source