Information Technology Reference
In-Depth Information
Pai, R., Pulavarty, B., & Cao, M. (2004). Linux 2.6 per-
formance improvement through readahead optimization.
In .
Proceedings of the Linux Symposium
,
2
, 391-402.
Red Hat-1, Red Hat Linux Reference Guide, Shadow
Passwords. Retrieved January 6, 2005 from http://www.
redhat.com/docs/manuals/linux/RHL-9-Manual/ref-
guide/s1-users-groups-shadow-utilities.html
Papadopouli, M., & Schulzrinne, H. (2001). Effects of
power conservation, wireless coverage and cooperation
on data dissemination among mobile devices. In
Proceed-
ings of the International Symposium on Mobile Ad Hoc
Networking and Computing
.
Reiss, S. P. (2003). Visualizing Java in action. In
Pro-
ceedings of the 2003 ACM Symposium on Software
Visualization
, (p. 57).
Reiss, S. P. (2005). Efficient monitoring and display of
thread state in java. In
Proceedings of the IEEE Inter-
national Workshop on Program Comprehension
(pp.
247-256). St. Louis, MO.
Papathanasiou, A. E., & Scott, M. L. (2005). Aggressive
prefetching: An idea whose time has come. In
Proceed-
ings of the 10th Workshop on Hot Topics in Operating
Systems (HotOS).
Reuven, M., & Wiseman, Y. (2005).
Reducing the Thrash-
ing Effect Using Bin Packing, Proc. IASTED Modeling,
Simulation, and Optimization Conference
, MSO-2005,
Oranjestad, Aruba, (pp. 5-10).
Paris, J.-F. Amer, A. & Long, D. D. E. (2003). A stochastic
approach to file access prediction. In
Proceedings of the
international workshop on Storage network architecture
and parallel I/Os
, (pp. 36-40).
Reuven, M., & Wiseman, Y. (2006). Medium-Term
Scheduler as a Solution for the Thrashing Effect.
The
Computer Journal
,
49
(3), 297-309. doi:10.1093/comjnl/
bxl001
Patel, P. (2002). An Introduction to Active Network
Node Operating Systems.
Crossroads
,
9
(2), 21-26.
doi:10.1145/904067.904072
Patterson III, Russel. H. (1997).
Informed Prefetching
and Caching
. PhD thesis, School of Computer Science,
Carnegie Mellon University, Pittsburgh, PA.
Riechmann, T., & Kleinöder, J. (1996).
User-Level
Scheduling with Kernel Threads
. Unpublished.
Rinard, M. (2001).
Analysis of multithreaded programs
.
(LNCS 2126, pp. 1-19).
Patterson, D. A., & Hennessy, J. L. (1997).
Computer
Organization and Design
(pp. 434-536). San Francisco,
CA: Morgan Kaufmann Publishers, INC.
Ritchie, D. M. & Thompson, K. (1978). The UNIX time-
sharing system.
The Bell System Technical Journal, 57
,
1905-1920.
Patterson, R. H., Gibson, G. A., & Satyanarayanan, M.
(1993). A status report on research in transparent informed
prefetching.
SIGOPS Operating Systems Review
,
27
(2),
21-34. doi:10.1145/155848.155855
Ritchie, D. M. (1979).
On the Security of UNIX
, in UNIX
SUPPLEMENTARY DOCUMENTS, AT & T.
Robbins, A. (2004).
Linux Programming by Example
.
Upper Saddle River, NJ: Pearson Education Inc.
Patterson, R. H., Gibson, G. A., Ginting, E., Stodolsky,
D., & Zelenka, J. (1995). Informed prefetching and cach-
ing. In
Proceedings of the fifteenth ACM symposium on
Operating systems principles
, (pp. 79-95).
Robertson, J., & Devarakonda, M. (1990). Data cache
management using frequency-based replacement. In
Proc. SIGMETRICS Conference on Measurement
and Modeling of computer systems
. New York: ACM
Press.
Petroni, N., Jr., Fraser, T., Molina, J., & Arbaugh, W. A.
(2004). Copilot - a coprocessor-based kernel runtime
integrity monitor. In
Proceedings of the USENIX Security
Symposium
, San Diego, CA.
Romer, T. H., Ohllrich, W. H., Karlin, A. R., & Bershad,
B. N. (1995). Reducing TLB and memory overhead using
online superpage promotion. In
Proceedings of the 22nd
Pietrik, M. (1998, May). Under the hood.
Microsoft
Systems Journal
. Retrieved March 11, 2008, from http://
www.microsoft.com/msj/0598/hood0598.aspx
Search WWH ::
Custom Search