Sciweavers

883 search results - page 68 / 177
» The RETOS operating system: kernel, tools and applications
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
DAC
2011
ACM
13 years 9 months ago
Process-level virtualization for runtime adaptation of embedded software
Modern processor architectures call for software that is highly tuned to an unpredictable operating environment. Processlevel virtualization systems allow existing software to ada...
Kim M. Hazelwood
JSSPP
1997
Springer
15 years 2 months ago
An Experimental Evaluation of Processor Pool-Based Scheduling for Shared-Memory NUMA Multiprocessors
In this paper we describe the design, implementation and experimental evaluation of a technique for operating system schedulers called processor pool-based scheduling [51]. Our tec...
Tim Brecht
SIGADA
2004
Springer
15 years 3 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
SPLC
2007
14 years 11 months ago
Tailoring Infrastructure Software Product Lines by Static Application Analysis
Besides ordinary applications, also infrastructure software such as operating systems or database management systems is being developed as a software product line. With proper too...
Horst Schirmeier, Olaf Spinczyk