Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ASPLOS
2012
ACM
10 years 7 months ago
Understanding modern device drivers
Device drivers are the single largest contributor to operating-system kernel code with over 5 million lines of code in the Linux kernel, and cause significant complexity, bugs an...
Asim Kadav, Michael M. Swift
FAST
2009
11 years 9 months ago
Enabling Transactional File Access via Lightweight Kernel Extensions
Transactions offer a powerful data-access method used in many databases today trough a specialized query API. User applications, however, use a different fileaccess API (POSIX) wh...
Richard P. Spillane, Sachin Gaikwad, Manjunath Chi...
ACSAC
2010
IEEE
11 years 9 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
JSS
2010
138views more  JSS 2010»
11 years 10 months ago
The Linux kernel as a case study in software evolution
We use 810 versions of the Linux kernel, released over a period of 14 years, to characterize the system’s evolution, using Lehman’s laws of software evolution as a basis. We i...
Ayelet Israeli, Dror G. Feitelson
ESEM
2010
ACM
11 years 10 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
PDPTA
2000
12 years 27 days ago
The PODOS File System - Exploiting the High-Speed Communication Subsystem
Performance Oriented Distributed Operating System (PODOS) is a clustering environment, being built on a monolithic Linux kernel. PODOS augments very few components to the Linux ke...
Sudharshan Vazhkudai, P. Tobin Maginnis
USENIX
2004
12 years 28 days ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
ISCAPDCS
2008
12 years 1 months ago
LinSched: The Linux Scheduler Simulator
The Linux kernel 2.6.23 scheduler includes substantial changes that may entice researchers with no prior interest in Linux to attempt to understand or modify its behavior. Often, ...
John M. Calandrino, Dan P. Baumberger, Tong Li, Je...
SPLC
2010
12 years 1 months ago
Evolution of the Linux Kernel Variability Model
Abstract. Understanding the challenges faced by real projects in evolving variability models, is a prerequisite for providing adequate support for such undertakings. We study the e...
Rafael Lotufo, Steven She, Thorsten Berger, Krzysz...
RTSS
2003
IEEE
12 years 4 months ago
Power-aware QoS Management in Web Servers
Power management in data centers has become an increasingly important concern. Large server installations are designed to handle peak load, which may be significantly larger than...
Vivek Sharma, Arun Thomas, Tarek F. Abdelzaher, Ke...
books