Sciweavers

213 search results - page 2 / 43
» Introducing technology into the Linux kernel: a case study
Sort
View
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
13 years 11 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
FAST
2011
12 years 8 months ago
Making the Common Case the Only Case with Anticipatory Memory Allocation
We present Anticipatory Memory Allocation (AMA), a new method to build kernel code that is robust to memoryallocation failures. AMA avoids the usual difficulties in handling allo...
Swaminathan Sundararaman, Yupu Zhang, Sriram Subra...
SCAM
2007
IEEE
13 years 11 months ago
A Framework for Studying Clones In Large Software Systems
Clones are code segments that have been created by copying-and-pasting from other code segments. Clones occur often in large software systems. It is reported that 5 to 50% of the ...
Zhen Ming Jiang, Ahmed E. Hassan
AINTEC
2006
Springer
13 years 9 months ago
Building Fault Tolerant Networks Using a Multihomed Mobile Router: A Case Study
In this paper, we will build a fault-tolerant network using a Multiple Care-of Addresses registration implementation on NEPL (NEMO Platform for Linux) for the GNU/Linux Operating S...
Romain Kuntz, Jean Lorchat
EUROSYS
2007
ACM
14 years 2 months ago
Fine grained kernel logging with KLogger: experience and insights
Understanding the detailed behavior of an operating system is crucial for making informed design decisions. But such an understanding is very hard to achieve, due to the increasin...
Yoav Etsion, Dan Tsafrir, Scott Kirkpatrick, Dror ...