Information Technology Reference
In-Depth Information
Improve Performance of Networked Storage Servers.
27th International Conference on Distributed Computing
Systems (ICDCS'07) , (p. 64).
In Proceedings of the ACM SIGPLAN Conference on
Programming Language Design and Implementation,
(pp. 190-200).
Liedtke, J. (1995). On Micro-Kernel Construction. In
Proceedings of the 15th ACM Symposium on Operating
System Principles . New York: ACM.
MacAfee AVERT Labs. (2006). Rootkits, part 1 of 3: A
growing threat . MacAfee AVERT Labs Whitepaper.
Maeda, T. (2002). Kernel Mode Linux: Execute user
process in kernel mode . Retrieved from http://www.
yl.is.s.u-tokyo.ac.jp/~tosh/kml/
Liedtke, J. (1996). Toward Real Microkernels. Communi-
cations of the ACM , 39 (9). doi:10.1145/234215.234473
LINUX Pentiums using BYTE UNIX Benchmarks (2005).
Winston-Salem, NC: SilkRoad, Inc.
Maeda, T. (2002). Safe Execution of User programs in
Kernel Mode Using Typed Assembly Language . Master
Thesis, The University of Tokyo, Tokyo, Japan.
Liu, Y., & Knightly, E. (2003). Opportunistic fair sched-
uling over multiple wireless channels. In Proceedings of
the IEEE Conference on Computer Communications .
Maeda, T. (2003). Kernel Mode Linux. Linux Journal ,
109 , 62-67.
Lo, S.-C., & Chen, A. L. P. (2000). Optimal index and
data allocation in multiple broadcast channels. In Pro-
ceedings of the 16th International Conference on Data
Engineering .
Manber, U. (1989). Introduction to Algorithms - A Cre-
ative Approach, (pp.130-131). Harlow, MA: Addison-
Wesley.
Mantegazz, P., Bianchi, E., Dozio, L., Papacharalambous,
S., & Hughes, S. (2000). RTAI: Real-Time Application
Interface . Retrieved from http://www.linuxdevices.com/
articles/ AT6605918741.html.
London, K., Moore, S., Mucci, P., Seymour, K., & Luczak,
R. (2001, June 18-21). The PAPI cross-platform interface
to hardware performance counters. In Proceedings of the
Department of Defense Users' Group Conference .
Marsaglia, G. (1996). The marsaglia random number
cdrom including the diehard battery of tests of random-
ness . Retrieved from http://stat.fsu.edu/pub/diehard
Loscocco, P. A., Smalley, S. D., Mucklebauer, P. A.,
Taylor, R. C., Turner, S. J., & Farrell, J. F. (1998). The
inevitability of failure: The flawed assumption of security
in modern computing national security agency.
Martello, S., & Toth, P. (1990). Lower Bounds and Reduc-
tion Procedures for the Bin Packing Problem. Discrete
Applied Mathematics , 28 , 59 -70. doi:10.1016/0166 -
218X(90)90094-S
Love, R. (2003). Linux Kernel Development (1 st Ed.).
Sams.
Lowe, E. (2005). Automatic Large page selection policy .
Retrieved from http://www.opensolaris.org/os/project/
muskoka/virtual_memory/policy_v1.1.pdf.
Marti, D. (2002). System Development Jump Start Class.
Linux Journal, 7 .
McCalpin, J. D. (1995). Memory bandwidth and ma-
chine balance in current high performance computers.
IEEE Technical Committee on Computer Architecture
newsletter .
Lu, X., & Smith, S. F. (2006). A Microkernel Virtual
Machine: Building Security with Clear Interfaces. ACM
SIGPLAN Workshop on Programming Languages and
Analysis for Security , Ottawa, Canada, June 10, (pp.
47-56).
McKusick, M. K., Bostic, K., Karels, M. J., & Quarter-
man, J. S. (1996). The Design and Implementation of
the 4.4 BSD Operating System . Reading, MA: Addison
Wesley.
Luk, C., Cohn, R., Muth, R., Patil, H., Klauser, A.,
Lowney, G., et al. (2005). Pin: Building customized
program analysis tools with dynamic instrumentation.
Search WWH ::




Custom Search