Academic literature on the topic 'Linux (Computer operating system)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Linux (Computer operating system).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Linux (Computer operating system)"

1

Sami, Muhammad, and Akram M. Zeki. "Mini-ATX Computer System in Vehicle." Advanced Materials Research 1115 (July 2015): 484–87. http://dx.doi.org/10.4028/www.scientific.net/amr.1115.484.

Full text
Abstract:
The aim of this study is to create and assemble the system with customizing/building Linux kernel and environments to be compatible and efficient on mini-ITX computer. The objective of the study is to create/customizing lightweight operating system using GNU/Linux to be used on computer to be used on vehicle. The system would also optimize the size and functionalities most probably would be implemented on car computer system.Keywords: mini-ATX, CarPC, Linux, Ubuntu, Qt, QML
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Huimin. "A Design of Information Teaching Platform Based on Linux Operating System." Journal of Physics: Conference Series 2138, no. 1 (December 1, 2021): 012018. http://dx.doi.org/10.1088/1742-6596/2138/1/012018.

Full text
Abstract:
Abstract Linux operating system provides a good platform for the research on computer science due to its characteristics of open source, stability and efficiency. The teaching platform based on Linux has many advantages over that of Windows operating system. To promote the application of Linux and develop domestic software with independent intellectual property rights, the author studies and analyzes the feasibility of Linux teaching platform which can adapt to the current cross platform teaching of information technology in Colleges and universities and meet the requirements of computer grade examination. The author proposes to build an information technology teaching platform based on Linux operating system, and realize the cross platform of mainstream application software through Wine, and meanwhile use virtual machine to support Windows operating system environment. The author puts forward suggestions and measures in the application process, and verifies the feasibility of platform implementation, and proposes the preliminary scheme of platform construction.
APA, Harvard, Vancouver, ISO, and other styles
3

KOJIMA, MITSUHIRO. "Linux. A Free Operating System for Computer Users." Journal of the Institute of Electrical Engineers of Japan 119, no. 8/9 (1999): 523–26. http://dx.doi.org/10.1541/ieejjournal.119.523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Winzerling, Werner. "Linux und Freie Software." PROKLA. Zeitschrift für kritische Sozialwissenschaft 32, no. 126 (March 1, 2002): 37–55. http://dx.doi.org/10.32387/prokla.v32i126.712.

Full text
Abstract:
Since the great success of the operating system Linux, the development of Free and Open Source Software is broad discussed. This is also seen as the beginning of a new economic development. This paper examines, what makes Linux actually so significant for the computer industry. First Linux is critical evaluated and placed opposite the Microsoft operating systems. Than some substantial new influences on the development and production in the computer industry are worked out. On the one hand this are modifications in the production chain of computers and on the other hand network effects (externalization), which proceed from these products. On the basis of this new economic situation the Linux phenomenon is explained and it is shown from which the great importance of Microsoft in the computer industry results at present.
APA, Harvard, Vancouver, ISO, and other styles
5

Basorudin, Gunarso, Erni Rouza, Luth Fimawahib, and Asep Supriyanto. "Perancangan dan Implementasi Sistem Operasi Linux Debian untuk Konfigurasi Content Management System (CMS) Wordpress Dengan Winscp." Bulletin of Computer Science Research 3, no. 1 (December 31, 2022): 21–29. http://dx.doi.org/10.47065/bulletincsr.v3i1.188.

Full text
Abstract:
The operating system is one of the vital components in a computer system. The operating system is responsible for managing the use of computer hardware such as processors, memory, I/O devices, storage media, and others.( Wamiliana, At All. 2013). The purpose of making this title is the first as a reference for future researchers in creating websites but using Linux and as a reference for lecturers and teachers especially in the field of computer networks for teaching and for making scientific work related to the same problem but using a different Linux, for example Ubuntu, Mandrake, Caldera and other operating systems. This research has been successfully carried out with the final result in the form of Debian Linux implementation for website creation. In making a Wordpress CMS Website using Linux, you don’t need internet access, but instead create your own server with a text-based Debian Linux operating system, and the result is a Graphic User Interface (GUI) display that can be accessed, modified, added images, added videos, changed background, installed. Plugin, post news like wordpress which is connected to the internet.
APA, Harvard, Vancouver, ISO, and other styles
6

I nyoman, Edy saputra Edy, IGAP Raka Agung, and Yoga Divayana. "ED-255EK Embeded Education Platform Sebagai Modul Praktikum Embeded System Dengan Robot Arm Module Dan Voice Module." Majalah Ilmiah Teknologi Elektro 18, no. 1 (May 6, 2019): 91. http://dx.doi.org/10.24843/mite.2019.v18i01.p13.

Full text
Abstract:
Abstract— Literally embedded systems are defined as equipment that computes a particular job. Embedded Linux System was also developed as a means of education, one of which is ED-255EK Embedded Education Platform, designed to be very practical and consume very low power. ED-255EK is also equipped with a PXA255 processor that is compatible with ARM version 5TE ISA, so it can be used to carry out various kinds of lab work or experiments on embedded systems. The working principle of this tool begins with the configuration of data communication between Fedora Linux and ED-255EK. When the communication goes well, it is downloaded by the ED-255EK system to a laptop or computer that has been installed with the Fedora 9.0 Linux operating system. To take advantage of the ED-255FPGA module, driver module installation is required first, after which the application program is installed. Laptops or computers that have installed the Fedora 9.0 Linux operating system will act as input and output programs making it easier to monitor each module that is being run. The module used is the ARM 1923 Robot Module and Voice Module ED4321.
APA, Harvard, Vancouver, ISO, and other styles
7

Sari, Renny Puspita, and Fiqri Syah Redha. "Sistem Pendukung Keputusan Pemilihan Distro Linux Menggunakan Metode Simple Additive Weighting (SAW)." Jurnal Sistem Komputer dan Informatika (JSON) 2, no. 3 (May 30, 2021): 348. http://dx.doi.org/10.30865/json.v2i3.3039.

Full text
Abstract:
Linux is a kernel whose development has been very active since it was first released to the public. With a large community, Linux development has penetrated into various fields in the world of computerization, including personal computers. Today, Linux can be used on a variety of devices from personal computers to embedded systems. The development is very active thanks to the large community and Linux adopting open source, many developers are making their own version of the Linux-based operating system. Versions and types of Linux-based operating systems are called distros or distributions. The number of versions and types of Linux-based operating systems, of course, confuses users who are trying Linux for the first time or who want to fully switch to Linux from another operating system. Decision support systems can provide alternative solutions for those users who are confused about choosing a Linux distribution. By using the Simple Additive Weighting (SAW) method, the existing criteria can be used as benchmarks in determining the Linux distribution of choice and therefore the accuracy of the system can exceed 90%
APA, Harvard, Vancouver, ISO, and other styles
8

Abdulrahman, Aysar A., and Alaa K. Jumaa. "Exploitnig DNS Server Vulnerabilites Using Linux Operating System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 9 (June 22, 2016): 7049–59. http://dx.doi.org/10.24297/ijct.v15i9.636.

Full text
Abstract:
Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer. Exploiting domain name system (DNS) vulnerabilities have resulted in a range of high profile disruptions and outages for major internet sites around the world. DNS attack is an exploit in which an attacker takes advantage of vulnerabilities is the (DNS). This paper will present the vulnerabilities and the weak points of the DNS server and how attackers (black hat hakcer) can exploit those vulnerabilities to attack and gain access to the server machine. In conclusion, presenting and implementing this project make users understand the hazard of hackers. Then, will lead to build secure and protected systems and applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhen, Xiao Qiong, Zhen Dong Yao, and Wen Bin Wang. "Scheme Design for Communication between Network Port and Serial Port Based on ARM." Advanced Engineering Forum 6-7 (September 2012): 941–47. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.941.

Full text
Abstract:
The data transmission scheme between a transmission control protocol/internet protocol (TCP/IP) network port and a serial port based on an ARM embedded system is introduced in the paper. The data transmission between a personal computer (PC) and remote equipment through an Internet is realized. The structure of a hardware platform is simply introduced, the cutting and transplant of operating system, the communication program design of the network port and the serial port and the cross compiling between the two ports are introduced in detail. The AT91SAM9261 chip of ATMEL Corporation is employed as the embedded board of a kernel processor. The Redhat9 Linux operating system is employed as a software development platform, an ARM-Linux operating system is employed as a program operation platform and the kernel version is Linux-2.6.2. The C program is used and an ARM-Linux-GNU tool chain is used for the cross compiling. The experimental result proves that the real-time, parallel full duplex data transmission between the network port and the serial port is realized by the scheme provided in the paper.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Xiaowen. "Practical Research on Mixed Teaching Reform of Linux Operating System Course." Contemporary Education and Teaching Research 5, no. 1 (January 19, 2024): 1–6. http://dx.doi.org/10.61360/bonicetr242015560101.

Full text
Abstract:
With the rapid development of technology and the diversification of educational needs, the traditional teaching mode can no longer fully meet the requirements of modern education. Linux is widely used in servers, cloud computing, network infrastructure, embedded systems high-performance computing, etc. As an important part of the field of computer science and information technology, the teaching method of the Linux operating system needs to be constantly innovated and improved to adapt to this change. to adapt to this change. The hybrid teaching mode is a teaching method that combines online and offline teaching resources, which provides new possibilities to improve the teaching quality of Linux courses and the learning effect of students. The purpose of this paper is to discuss the reform practice of Linux operating system courses under the hybrid teaching mode, including the teaching method, course content, evaluation mechanism, and the cultivation of practical application ability.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Linux (Computer operating system)"

1

Boman, Simon, and Olof Rutgersson. "Replacing OSE with Real Time capable Linux." Thesis, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-18128.

Full text
Abstract:

For many years OSE has been a common used operating system, with real time extensions enhancements, in embed-ded systems. But in the last decades, Linux has grown and became a competitor to common operating systems and, in recent years, even as an operating system with real time extensions. With this in mind, ÅF was interested in replacing the quite expensive OSE with some distribution of the open source based Linux on a PowerPC MPC8360. Therefore, our purpose with thesis is to implement Linux on the named platform and make some tests to see if it is possible to replace OSE with Linux. Using Linux has several advantages, for example it is free of charge to use and over the years the popularity of Linux within the developer community has resulted in numerous tools and utilities available for free.

As a result, this study shows that Linux with real time extensions on the MPC8360 PowerPC platform is a viable alternative to OSE regarding cost efficiency, flexibility, adaptability and competence available on the market.

Further studies can be done towards benchmarking for I/O systems and implementing support for more hardware on the MPC8360 AF platform.

APA, Harvard, Vancouver, ISO, and other styles
2

Öberg, Jonas. "Comparative study of operating system security using SELinux and Systrace." Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-2015.

Full text
Abstract:

This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) and SELinux (usedexclusively with Linux), trying to answer the question as to whichtype of security is offered by each respective system, and wheneach should be used. The key difference between SELinux andSystrace seems to be their mode of operation, where SELinux,built around the LSM framework in the Linux kernel, works withtype enforcement on files, sockets and other objects, whereasSystrace works on a strict system call basis. The two systems areseen to serve two different purposes which sometimes overlap,but in just as many cases provide solutions for entirely differentquality priorities.

APA, Harvard, Vancouver, ISO, and other styles
3

Kalidindi, Srinivas R. "Linux Operating System Configuration Management Framework: A Scalable and Efficient Approach Using Open Source Utilities." Ohio : Ohio University, 2007. http://www.ohiolink.edu/etd/view.cgi?ohiou1193950374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Somanathan, Muthuveer. "An initial operating system adaptation heuristic for Swap Cluster Max (SCM)." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Procházka, Boris. "Útoky na operační systém Linux v teorii a praxi." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237139.

Full text
Abstract:
This master's thesis deals with Linux kernel security from the attacker's point of view. It maps methods and techniques of disguising the computing resources used by today's IT pirates. The thesis presents a unique method of attack directed on the system call interface and implemented in the form of two tools (rootkits). The thesis consists of a theoretical and a practical part. Emphasis is placed especially on the practical part, which manifests the presented information in the form of experiments and shows its use in real life. Readers are systematically guided as far as the creation of a unique rootkit, which is capable of infiltrating the Linux kernel by a newly discovered method -- even without support of loadable modules. A part of the thesis focuses on the issue of detecting the discussed attacks and on effective defence against them.
APA, Harvard, Vancouver, ISO, and other styles
6

Yi, Long. "KernTune: self-tuning Linux kernel performance using support vector machines." Thesis, University of the Western Cape, 2006. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6921_1249280496.

Full text
Abstract:

Self-tuning has been an elusive goal for operating systems and is becoming a pressing issue for modern operating systems. Well-trained system administrators are able to tune an operating system to achieve better system performance for a specific system class. Unfortunately, the system class can change when the running applications change. The model for self-tuning operating system is based on a monitor-classify-adjust loop. The idea of this loop is to continuously monitor certain performance metrics, and whenever these change, the system determines the new system class and dynamically adjusts tuning parameters for this new class. This thesis described KernTune, a prototype tool that identifies the system class and improves system performance automatically. A key aspect of KernTune is the notion of Artificial Intelligence oriented performance tuning. Its uses a support vector machine to identify the system class, and tunes the operating system for that specific system class. This thesis presented design and implementation details for KernTune. It showed how KernTune identifies a system class and tunes the operating system for improved performance.

APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Zhen. "A lightweight intrusion detection system for the cluster environment." Master's thesis, Mississippi State : Mississippi State University, 2003. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07102003-152642/unrestricted/ZhenLiu%5Fthesis.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nilsson, Christoffer, and Marcus Nilsson. "Installationsgränssnitt under Linux och Windows XP utifrån ISO 9241." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3955.

Full text
Abstract:
This thesis investigates how different Linux-distributions installation interface relate to the ISO 9241 standard, parts 12 and 13, and how they relate to the installation interface of Windows XP, with the hypothesis: "There is a Linux-distribution whose installation interface according to applicable HCIrecommendations is equivalent to that of Windows XP." With the checklists provided by ISO 9241 an empirical study has been made, and so comparable measurements of how well the Linux-distributions and Windows XP follows the recommendations of the standard was obtained. By comparing the results from the tests similarities and differences between the installation interfaces can be deducted. As the result and the conclusion shows there are Linux-distributions whose installation interface, according to the applicable HCI-recommendations, are equivalent to that of Windows XP.
APA, Harvard, Vancouver, ISO, and other styles
9

Motara, Yusuf Moosa. "File integrity checking." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.

Full text
Abstract:
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized code. File integrity checking is examined as a means of removing this attack vector, and the design, implementation, and evaluation of a best-of-breed file integrity checker for the Linux operating system is undertaken. We conclude that the resultant file integrity checker does succeed in removing file execution as an attack vector, does so at a computational cost that is negligible, and displays innovative and useful features that are not currently found in any other Linux file integrity checker.
APA, Harvard, Vancouver, ISO, and other styles
10

Koya, Bharath Kumar. "Sched-ITS: An Interactive Tutoring System to Teach CPU Scheduling Concepts in an Operating Systems Course." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495656458526149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Linux (Computer operating system)"

1

Love, Robert. Linux System Programming. Sebastopol: O'Reilly Media, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stanfield, Vicki. Linux system administration. San Francisco: Network, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carasik, Anne H. Linux system administration. Foster City, CA: M&T Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stanfield, Vicki. Linux system administration. 2nd ed. San Francisco: Sybex, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stanfield, Vicki. Linux system administration. San Francisco: Network, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kerrisk, Michael. The Linux Programming Interface: A Linux and Unix System Programming Handbook. San Francisco: No Starch Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kerrisk, Michael. The Linux programming interface: A Linux and UNIX system programming handbook. San Francisco: No Starch Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Negus, Chris. Linux Bible. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Barkakati, Nabajyoti. Linux taizen. Tōky ̄: Sofuto Banku, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kamran, Husain, ed. Linux unleashed. Indianapolis, Ind: Sams Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Linux (Computer operating system)"

1

Shacklette, Mark. "Linux Operating System." In Handbook of Computer Networks, 78–90. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zegzhda, Dmitry P., and Alex M. Vovk. "Secure Hybrid Operating System “Linux over Fenix”." In Lecture Notes in Computer Science, 272–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Laforenza, Domenico. "XtreemOS: Towards a Grid-Enabled Linux-Based Operating System." In Lecture Notes in Computer Science, 241–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70504-8_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oleksiuk, Vasyl, and Oleg Spirin. "The Experience of Using Cloud Labs in Teaching Linux Operating System." In Communications in Computer and Information Science, 281–91. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14841-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huang, Conghui, Jing Chen, Li Zhang, and Qiao Luo. "Performance Evaluation of Virtualization Technologies for Windows Programs Running on Linux Operating System." In Communications in Computer and Information Science, 759–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marwedel, Peter. "System Software." In Embedded Systems, 203–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_4.

Full text
Abstract:
AbstractIn order to cope with the complexity of applications of embedded systems, reuse of components is a key technique. As pointed out by Sangiovanni-Vincentelli (The context for platform-based design. IEEE Design and Test of Computers, 2002), software and hardware components must be reused in the platform-based design methosdology (see p. 296). These components comprise knowledge from earlier design efforts and constitute intellectual property (IP). Standard software components that can be reused include system software components such as embedded operating systems (OSs) and middleware. The last term denotes software that provides an intermediate layer between the OS and application software. This chapter starts with a description of general requirements for embedded operating systems. This includes real-time capabilities as well as adaptation techniques to provide just the required functionality. Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols. We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel. Furthermore, we will explain how Linux can be adapted to systems with tight resource constraints. Finally, we will provide pointers for additional reusable software components, like hardware abstraction layers (HALs), communication software, and real-time data bases. Our description of embedded operating systems and of middleware in this chapter is consistent with the overall design flow.
APA, Harvard, Vancouver, ISO, and other styles
7

Korndörfer, Jonas H. Müller, Ahmed Eleliemy, Osman Seckin Simsek, Thomas Ilsche, Robert Schöne, and Florina M. Ciorba. "How Do OS and Application Schedulers Interact? An Investigation with Multithreaded Applications." In Euro-Par 2023: Parallel Processing, 214–28. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-39698-4_15.

Full text
Abstract:
AbstractScheduling is critical for achieving high performance for parallel applications executing on high performance computing (HPC) systems. Scheduling decisions can be taken at batch system, application, and operating system (OS) levels. In this work, we investigate the interaction between the Linux scheduler and various OpenMP scheduling options during the execution of three multithreaded codes on two types of computing nodes. When threads are unpinned, we found that OS scheduling events significantly interfere with the performance of compute-bound applications, aggravating their inherent load imbalance or overhead (by additional context switches). While the Linux scheduler balances system load in the absence of application-level load balancing, we also found it decreases performance via additional context switches and thread migrations. We observed that performing load balancing operations both at the OS and application levels is advantageous for the performance of concurrently executing applications. These results show the importance of considering the role of OS scheduling in the design of application scheduling techniques and vice versa. This work motivates further research into coordination of scheduling within multithreaded applications and the OS.
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Shenghao, Frédéric Besson, and Jean-Pierre Talpin. "End-to-End Mechanized Proof of a JIT-Accelerated eBPF Virtual Machine for IoT." In Computer Aided Verification, 325–47. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65627-9_16.

Full text
Abstract:
AbstractModern operating systems have adopted Berkeley Packet Filters (BPF) as a mechanism to extend kernel functionalities dynamically, e.g., Linux’s eBPF or RIOT’s rBPF. The just-in-time (JIT) compilation of eBPF introduced in Linux eBPF for performance has however led to numerous critical issues. Instead, RIOT’s rBPF uses a slower but memory-isolating interpreter (a virtual machine) which implements a defensive semantics of BPF; and therefore trades performance for security. To increase performance without sacrificing security, this paper presents a fully verified JIT implementation for RIOT’s rBPF, consisting of: i/ an end-to-end refinement workflow to both proving the JIT correct from an abstract specification and by deriving a verified concrete C implementation; ii/ a symbolic CompCert interpreter for executing binary code; iii/ a verified JIT compiler for rBPF; iv/ a verified hybrid rBPF virtual machine. Our core contribution is, to the best of our knowledge, the first and fully verified rBPF JIT compiler with correctness guarantees from high-level specification to low-level implementation. Benchmarks on microcontrollers hosting the RIOT operating system demonstrate significant performance improvements over the existing implementations of rBPF, even in worst-case application scenarios.
APA, Harvard, Vancouver, ISO, and other styles
9

Fox, Richard. "Linux." In Linux with Operating System Concepts, 1–38. 2nd ed. Boca Raton: Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9781003203322-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarwar, Syed Mansoor, and Robert M. Koretsky. "“Quick Start” into the Linux Operating System." In Linux, 15–54. Second edition. | Boca Raton : Taylor & Francis, CRC Press,: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/b22134-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Linux (Computer operating system)"

1

Jia, Xi, Xiaofeng Yao, and Xu Xue. "Design of ERM Based on Embedded Linux Operating System." In 2019 IEEE 5th International Conference on Computer and Communications (ICCC). IEEE, 2019. http://dx.doi.org/10.1109/iccc47050.2019.9064410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zeng, Rong. "Embedded Linux Operating System Network Accelerated Operation Method Based on ARM Processor." In 2021 Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS). IEEE, 2021. http://dx.doi.org/10.1109/acctcs52002.2021.00069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Qiong, and Minqiang Guo. "Digital Recordable Integrated Television Based on Embedded Linux Operating System." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Eric, Chris Heistand, and Deepak Mishra. "Space-operating Linux: An Operating System for Computer Vision on Commercial-Grade Equipment in LEO." In 2023 IEEE Aerospace Conference. IEEE, 2023. http://dx.doi.org/10.1109/aero55745.2023.10115703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xiong, Hongzhou, and Fangqin Xu. "Architecture Design of SDN Operating System Based on Linux Kernel." In 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). IEEE, 2020. http://dx.doi.org/10.1109/icmcce51767.2020.00225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Xuebing, and Ruini Wang. "A User Mode Deadlock Detection Method for Linux Operating System." In 2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS). IEEE, 2023. http://dx.doi.org/10.1109/isctis58954.2023.10213126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jing Wang, Qingbo Wu, Yusong Tan, Jing Xu, and Xiaoli Sun. "A graph method of package dependency analysis on Linux Operating system." In 2015 4th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2015. http://dx.doi.org/10.1109/iccsnt.2015.7490780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yaroslavtseva, A. I. "Development of Software for the Orientation System of a Mobile Robotic System in Space Based on Stereo Vision." In 32nd International Conference on Computer Graphics and Vision. Keldysh Institute of Applied Mathematics, 2022. http://dx.doi.org/10.20948/graphicon-2022-584-596.

Full text
Abstract:
Stereovision algorithms may be of great interest for the design of computer vision systems for autonomous mobile objects. The article presents the content and results of the stereo vision method implementation on a single-board computer. It is worth noting that for many mobile systems, energy efficiency, size, and cost will be more important than performance. As a result of the work, a software shell was deployed to implement the stereovision algorithm on a Raspberry Pi single-board computer running the Linux operating system, as well as a comparison of the performance of singleboard computers with various technical characteristics. The proposed results may be of interest in the design of vision systems for applied applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Lan, Yuqing, and Tao Han. "SADP: Security assurance development process for building reliable Linux-based operating system." In 2015 IEEE International Conference on Computer and Communications (ICCC). IEEE, 2015. http://dx.doi.org/10.1109/compcomm.2015.7387539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiaoming, Zhang, and Song Xiaoying. "Net Devise Drive Program's Research and Implement in Embedded Linux Operating System." In 2009 International Forum on Computer Science-Technology and Applications. IEEE, 2009. http://dx.doi.org/10.1109/ifcsta.2009.163.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Linux (Computer operating system)"

1

Garlick, J. E., and C. M. Dunlap. Building CHAOS: An Operating System for Livermore Linux Clusters. Office of Scientific and Technical Information (OSTI), February 2003. http://dx.doi.org/10.2172/15003391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Luo, Jim, Margery Li, Amitabh Khashnobish, John McDermott, and Judy Froscher. A Taxonomy of Software Deceptive Interpretation in the Linux Operating System. Fort Belvoir, VA: Defense Technical Information Center, November 2004. http://dx.doi.org/10.21236/ada430296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Allen, Bruce. Remote Boot of a Diskless Linux Client for Operating System Integrity. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada423694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mayer, Michael. Operating system boot package for IBM PC compatible computer systems. Web of Open Science, July 2020. http://dx.doi.org/10.37686/asr.v1i1.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gallmeister, Bill O. CLOCS (Computer with Low Context-Switching Time) Operating System Reference Documents. Fort Belvoir, VA: Defense Technical Information Center, May 1988. http://dx.doi.org/10.21236/ada203274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ruff, Eric P. Whitenton, A. W. A computer-controlled test system for operating different wear test machines. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.ir.89-4107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Andelis, Diana I., and William A. Gibson. The Impact of Computer-Based Training on Operating and Support Costs for the AN/SQQ-89 (v) Sonar System. Fort Belvoir, VA: Defense Technical Information Center, April 2013. http://dx.doi.org/10.21236/ada585047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lewis, Dustin, Naz Modirzadeh, and Gabriella Blum. War-Algorithm Accountability. Harvard Law School Program on International Law and Armed Conflict, August 2016. http://dx.doi.org/10.54813/fltl8789.

Full text
Abstract:
In War-Algorithm Accountability (August 2016), we introduce a new concept—war algorithms—that elevates algorithmically-derived “choices” and “decisions” to a, and perhaps the, central concern regarding technical autonomy in war. We thereby aim to shed light on and recast the discussion regarding “autonomous weapon systems” (AWS). We define “war algorithm” as any algorithm that is expressed in computer code, that is effectuated through a constructed system, and that is capable of operating in relation to armed conflict. In introducing this concept, our foundational technological concern is the capability of a constructed system, without further human intervention, to help make and effectuate a “decision” or “choice” of a war algorithm. Distilled, the two core ingredients are an algorithm expressed in computer code and a suitably capable constructed system. Through that lens, we link international law and related accountability architectures to relevant technologies. We sketch a three-part (non-exhaustive) approach that highlights traditional and unconventional accountability avenues. We focus largely on international law because it is the only normative regime that purports—in key respects but with important caveats—to be both universal and uniform. In this way, international law is different from the myriad domestic legal systems, administrative rules, or industry codes that govern the development and use of technology in all other spheres. By not limiting our inquiry only to weapon systems, we take an expansive view, showing how the broad concept of war algorithms might be susceptible to regulation—and how those algorithms might already fit within the existing regulatory system established by international law.
APA, Harvard, Vancouver, ISO, and other styles
9

Bruce and Fiore. L51629 Users Manual-Field Validation of the Low-Frequency Eddy Current Instrument-Software Listings. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), October 1990. http://dx.doi.org/10.55274/r0010602.

Full text
Abstract:
When an eddy current probe is placed near a conductive material, the alternating magnetic field from the probe causes electrical currents to flow in the material. These currents have associated with them their own magnetic field, which opposes the original magnetic field from the coil. The result is that the impedance of the probe is greatly reduced by the presence of the conducting material. If the conductor is also magnetic, as is normal steel, the situation is similar though slightly more complicated. Here, the impedance of the probe may be either increased or decreased depending on the permeability of the material and the frequency of the alternating field. Anything that affects the flow of current in the conductive material will also affect the impedance of the eddy current probe. For example, the electrical currents cannot flow through a crack but must flow around it. The alteration in the currents also changes the magnetic field produced by the currents and, consequently, the impedance of the probe. Normally, the impedance change caused by a defect is much smaller than that caused by the presence of the material in the first place, and measuring this small change requires a bridge circuit much like the balanced bridge used with strain gauges. The balanced bridge allows one to amplify the small changes in impedance caused by defects in the presence of the much larger change caused by the presence of the conductive and magnetic pipeline steel. The LFEC instrument is constructed using an� IBM-AT compatible portable computer. Inside the PAC-386 are two plug-in circuit cards that turn the PAC-386 into an eddy current instrument. The first, also commercially available, is a Spectrum DSP56000 digital signal processing card, while the second is a specially-built interface card for the eddy current probe. The PAC-386 is a standard MS-DOS machine and will operate most MS-DOS software. In the discussion below, it is assumed that the user is familiar with the MSDOS operating system.
APA, Harvard, Vancouver, ISO, and other styles
10

Federal Information Processing Standards Publication: portable operating system interface for computer environments. Gaithersburg, MD: National Bureau of Standards, 1987. http://dx.doi.org/10.6028/nist.fips.151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography