Information Technology Reference
In-Depth Information
Improve Performance of Networked Storage Servers.
27th International Conference on Distributed Computing
Systems (ICDCS'07)
, (p. 64).
In
Proceedings of the ACM SIGPLAN Conference on
Programming Language Design and Implementation,
(pp. 190-200).
Liedtke, J. (1995). On Micro-Kernel Construction. In
Proceedings of the 15th ACM Symposium on Operating
System Principles
. New York: ACM.
MacAfee AVERT Labs. (2006).
Rootkits, part 1 of 3: A
growing threat
. MacAfee AVERT Labs Whitepaper.
Maeda, T. (2002).
Kernel Mode Linux: Execute user
process in kernel mode
. Retrieved from http://www.
yl.is.s.u-tokyo.ac.jp/~tosh/kml/
Liedtke, J. (1996). Toward Real Microkernels.
Communi-
cations of the ACM
,
39
(9). doi:10.1145/234215.234473
LINUX Pentiums using BYTE UNIX Benchmarks
(2005).
Winston-Salem, NC: SilkRoad, Inc.
Maeda, T. (2002).
Safe Execution of User programs in
Kernel Mode Using Typed Assembly Language
. Master
Thesis, The University of Tokyo, Tokyo, Japan.
Liu, Y., & Knightly, E. (2003). Opportunistic fair sched-
uling over multiple wireless channels. In
Proceedings of
the IEEE Conference on Computer Communications
.
Maeda, T. (2003). Kernel Mode Linux.
Linux Journal
,
109
, 62-67.
Lo, S.-C., & Chen, A. L. P. (2000). Optimal index and
data allocation in multiple broadcast channels. In
Pro-
ceedings of the 16th International Conference on Data
Engineering
.
Manber, U. (1989).
Introduction to Algorithms - A Cre-
ative Approach,
(pp.130-131). Harlow, MA: Addison-
Wesley.
Mantegazz, P., Bianchi, E., Dozio, L., Papacharalambous,
S., & Hughes, S. (2000).
RTAI: Real-Time Application
Interface
. Retrieved from http://www.linuxdevices.com/
articles/ AT6605918741.html.
London, K., Moore, S., Mucci, P., Seymour, K., & Luczak,
R. (2001, June 18-21). The PAPI cross-platform interface
to hardware performance counters. In
Proceedings of the
Department of Defense Users' Group Conference
.
Marsaglia, G. (1996).
The marsaglia random number
cdrom including the diehard battery of tests of random-
ness
. Retrieved from http://stat.fsu.edu/pub/diehard
Loscocco, P. A., Smalley, S. D., Mucklebauer, P. A.,
Taylor, R. C., Turner, S. J., & Farrell, J. F. (1998). The
inevitability of failure: The flawed assumption of security
in modern computing national security agency.
Martello, S., & Toth, P. (1990). Lower Bounds and Reduc-
tion Procedures for the Bin Packing Problem.
Discrete
Applied Mathematics
,
28
, 59 -70. doi:10.1016/0166 -
218X(90)90094-S
Love, R. (2003).
Linux Kernel Development
(1
st
Ed.).
Sams.
Lowe, E. (2005).
Automatic Large page selection policy
.
Retrieved from http://www.opensolaris.org/os/project/
muskoka/virtual_memory/policy_v1.1.pdf.
Marti, D. (2002). System Development Jump Start Class.
Linux Journal, 7
.
McCalpin, J. D. (1995). Memory bandwidth and ma-
chine balance in current high performance computers.
IEEE Technical Committee on Computer Architecture
newsletter
.
Lu, X., & Smith, S. F. (2006). A Microkernel Virtual
Machine: Building Security with Clear Interfaces.
ACM
SIGPLAN Workshop on Programming Languages and
Analysis for Security
, Ottawa, Canada, June 10, (pp.
47-56).
McKusick, M. K., Bostic, K., Karels, M. J., & Quarter-
man, J. S. (1996).
The Design and Implementation of
the 4.4 BSD Operating System
. Reading, MA: Addison
Wesley.
Luk, C., Cohn, R., Muth, R., Patil, H., Klauser, A.,
Lowney, G., et al. (2005). Pin: Building customized
program analysis tools with dynamic instrumentation.
Search WWH ::
Custom Search