Sciweavers

451 search results - page 37 / 91
» Maintainability of the Linux kernel
Sort
View
105
Voted
SAC
2009
ACM
15 years 7 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
106
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Request-Aware Scheduling for Busy Internet Services
— Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies scheduling algorithms for in...
Jingyu Zhou, Caijie Zhang, Tao Yang, Lingkun Chu
KBSE
2010
IEEE
14 years 11 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo
101
Voted
EUC
2006
Springer
15 years 4 months ago
Write Back Routine for JFFS2 Efficient I/O
Abstract. When flash memory is used as a storage in embedded systems, block level translation layer is required between conventional filesystem and flash memory chips due to its ph...
Seung Ho Lim, Sung Hoon Baek, Joo Young Hwang, Kyu...
USENIX
2008
15 years 2 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox