Sciweavers

CCS
2010
ACM
13 years 3 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
SAC
2008
ACM
13 years 3 months ago
Frequent pattern mining for kernel trace data
Operating systems engineers have developed tracing tools that log details about process execution at the kernel level. These tools make it easier to understand the actual executio...
Christopher LaRosa, Li Xiong, Ken Mandelberg
SIGCSE
2002
ACM
192views Education» more  SIGCSE 2002»
13 years 4 months ago
A new instructional operating system
This paper presents a new instructional operating system, OS/161, and simulated execution environment, System/161, for use in teaching an introductory undergraduate operating syst...
David A. Holland, Ada T. Lim, Margo I. Seltzer
STANDARDVIEW
1998
128views more  STANDARDVIEW 1998»
13 years 4 months ago
Compatibility, standards, and software production
Compatibility is a key strategic decision in software production. Proposals exist for standards in several fields of software production, such as networking (ISO and IEEE), operat...
Giancarlo Succi, Andrea Valerio, Tullio Vernazza, ...
SIGOPS
1998
378views more  SIGOPS 1998»
13 years 4 months ago
Introducing Empirical Investigation in Undergraduate Operating Systems
Abstract: The undergraduate operating systems course can provide students with a valuable introduction to empirical testing and experimentation. This paper announces the availabili...
Steven Robbins
SIGMETRICS
1998
ACM
170views Hardware» more  SIGMETRICS 1998»
13 years 4 months ago
Better operating system features for faster network servers
Widely-used operating systems provide inadequate support for large-scale Internet server applications. Their algorithms and interfaces fail to e ciently support either event-drive...
Gaurav Banga, Peter Druschel, Jeffrey C. Mogul
SIGMETRICS
2000
ACM
147views Hardware» more  SIGMETRICS 2000»
13 years 4 months ago
High-capacity Internet middleware: Internet caching system architectural overview
Previous studies measuring the performance of general-purpose operating systems running large-scale Internet server applications, such as proxy caches, have identified design defi...
Gary Tomlinson, Drew Major, Ron Lee
CN
2002
96views more  CN 2002»
13 years 4 months ago
A transparent deployment method of RSVP-aware applications on UNIX
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications ...
Yu-Ben Miao, Wen-Shyang Hwang, Ce-Kuen Shieh
TR
2008
98views more  TR 2008»
13 years 4 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
SIGOPS
2008
120views more  SIGOPS 2008»
13 years 4 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...