The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
: A majority of biodiversity research projects depend on field recording and ecology data. Therefore it is important to provide a seamless and transparent data flow from the field ...
Stefan Jablonski, Alexandra Kehl, Dieter Neubacher...
The role of the operating system (OS) in managing shared resources such as CPU time, memory, peripherals, and even energy is well motivated and understood [23]. Unfortunately, one...
: We have designed a Real-Time Co-Operating System (RTCOS) for simultaneously supporting real-time and non-real-time activities on a workstation with two or more processors. The RT...
Gebran Krikor, Md. Touhidur Raza, David B. Stewart
This paper describes the new architecture for supporting the Teradata commercial VLDB on several new operating environments. We start with an overview of the Teradata database sof...