Information Technology Reference
In-Depth Information
Pai, R., Pulavarty, B., & Cao, M. (2004). Linux 2.6 per-
formance improvement through readahead optimization.
In . Proceedings of the Linux Symposium , 2 , 391-402.
Red Hat-1, Red Hat Linux Reference Guide, Shadow
Passwords. Retrieved January 6, 2005 from http://www.
redhat.com/docs/manuals/linux/RHL-9-Manual/ref-
guide/s1-users-groups-shadow-utilities.html
Papadopouli, M., & Schulzrinne, H. (2001). Effects of
power conservation, wireless coverage and cooperation
on data dissemination among mobile devices. In Proceed-
ings of the International Symposium on Mobile Ad Hoc
Networking and Computing .
Reiss, S. P. (2003). Visualizing Java in action. In Pro-
ceedings of the 2003 ACM Symposium on Software
Visualization , (p. 57).
Reiss, S. P. (2005). Efficient monitoring and display of
thread state in java. In Proceedings of the IEEE Inter-
national Workshop on Program Comprehension (pp.
247-256). St. Louis, MO.
Papathanasiou, A. E., & Scott, M. L. (2005). Aggressive
prefetching: An idea whose time has come. In Proceed-
ings of the 10th Workshop on Hot Topics in Operating
Systems (HotOS).
Reuven, M., & Wiseman, Y. (2005). Reducing the Thrash-
ing Effect Using Bin Packing, Proc. IASTED Modeling,
Simulation, and Optimization Conference , MSO-2005,
Oranjestad, Aruba, (pp. 5-10).
Paris, J.-F. Amer, A. & Long, D. D. E. (2003). A stochastic
approach to file access prediction. In Proceedings of the
international workshop on Storage network architecture
and parallel I/Os , (pp. 36-40).
Reuven, M., & Wiseman, Y. (2006). Medium-Term
Scheduler as a Solution for the Thrashing Effect. The
Computer Journal , 49 (3), 297-309. doi:10.1093/comjnl/
bxl001
Patel, P. (2002). An Introduction to Active Network
Node Operating Systems. Crossroads , 9 (2), 21-26.
doi:10.1145/904067.904072
Patterson III, Russel. H. (1997). Informed Prefetching
and Caching . PhD thesis, School of Computer Science,
Carnegie Mellon University, Pittsburgh, PA.
Riechmann, T., & Kleinöder, J. (1996). User-Level
Scheduling with Kernel Threads . Unpublished.
Rinard, M. (2001). Analysis of multithreaded programs .
(LNCS 2126, pp. 1-19).
Patterson, D. A., & Hennessy, J. L. (1997). Computer
Organization and Design (pp. 434-536). San Francisco,
CA: Morgan Kaufmann Publishers, INC.
Ritchie, D. M. & Thompson, K. (1978). The UNIX time-
sharing system. The Bell System Technical Journal, 57 ,
1905-1920.
Patterson, R. H., Gibson, G. A., & Satyanarayanan, M.
(1993). A status report on research in transparent informed
prefetching. SIGOPS Operating Systems Review , 27 (2),
21-34. doi:10.1145/155848.155855
Ritchie, D. M. (1979). On the Security of UNIX , in UNIX
SUPPLEMENTARY DOCUMENTS, AT & T.
Robbins, A. (2004). Linux Programming by Example .
Upper Saddle River, NJ: Pearson Education Inc.
Patterson, R. H., Gibson, G. A., Ginting, E., Stodolsky,
D., & Zelenka, J. (1995). Informed prefetching and cach-
ing. In Proceedings of the fifteenth ACM symposium on
Operating systems principles , (pp. 79-95).
Robertson, J., & Devarakonda, M. (1990). Data cache
management using frequency-based replacement. In
Proc. SIGMETRICS Conference on Measurement
and Modeling of computer systems . New York: ACM
Press.
Petroni, N., Jr., Fraser, T., Molina, J., & Arbaugh, W. A.
(2004). Copilot - a coprocessor-based kernel runtime
integrity monitor. In Proceedings of the USENIX Security
Symposium , San Diego, CA.
Romer, T. H., Ohllrich, W. H., Karlin, A. R., & Bershad,
B. N. (1995). Reducing TLB and memory overhead using
online superpage promotion. In Proceedings of the 22nd
Pietrik, M. (1998, May). Under the hood. Microsoft
Systems Journal . Retrieved March 11, 2008, from http://
www.microsoft.com/msj/0598/hood0598.aspx
Search WWH ::




Custom Search