Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 137
21.
  • Trickle: Automated infeasib... Trickle: Automated infeasible path detection using all minimal unsatisfiable subsets
    Blackham, Bernard; Liffiton, Mark; Heiser, Gernot 2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS), 2014-April
    Conference Proceeding

    Static analysis techniques can be used to compute safe bounds on the worst-case execution time (WCET) of programs. For large programs, abstractions are often required to curb computational ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
22.
  • Microarchitectural Timing Channels and their Prevention on an Open-Source 64-bit RISC-V Core
    Wistoff, Nils; Schneider, Moritz; Gurkaynak, Frank K. ... 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021-Feb.-1
    Conference Proceeding

    Microarchitectural timing channels use variations in the timing of events, resulting from competition for limited hardware resources, to leak information in violation of the operating system's ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
23.
  • The role of virtualization ... The role of virtualization in embedded systems
    Heiser, Gernot Proceedings of the 1st workshop on Isolation and integration in embedded systems, 04/2008
    Conference Proceeding

    System virtualization, which enjoys immense popularity in the enterprise and personal computing spaces, is recently gaining significant interest in the embedded domain. Starting from a comparison of ...
Celotno besedilo
Dostopno za: NUK, UL
24.
  • A Scalable Lock Manager for... A Scalable Lock Manager for Multicores
    Jung, Hyungsoo; Han, Hyuck; Fekete, Alan ... ACM transactions on database systems, 12/2014, Letnik: 39, Številka: 4
    Journal Article
    Recenzirano

    Modern implementations of DBMS software are intended to take advantage of high core counts that are becoming common in high-end servers. However, we have observed that several database platforms, ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
25.
  • CAmkES: A component model f... CAmkES: A component model for secure microkernel-based embedded systems
    Kuz, Ihor; Liu, Yan; Gorton, Ian ... The Journal of systems and software, 05/2007, Letnik: 80, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Component-based software engineering promises to provide structure and reusability to embedded-systems software. At the same time, microkernel-based operating systems are being used to increase the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
26.
  • Tutorial: Using the seL4 Microkernel
    Heiser, Gernot; Velickovic, Ivan 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), 2023-June
    Conference Proceeding

    The seL4 microkernel 3 is the first general-purpose operating system (OS) kernel with a formal proof of implementation correctness. By now, its verification covers functional correctness to the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
27.
  • File systems deserve verifi... File systems deserve verification too
    Keller, Gabriele; Murray, Toby; Amani, Sidney ... Operating systems review, 05/2014, Letnik: 48, Številka: 1
    Journal Article

    File systems are too important, and current ones are too buggy, to remain unverified. Yet the most successful verification methods for functional correctness remain too expensive for current file ...
Celotno besedilo
Dostopno za: NUK, UL
28.
  • The systems hacker's guide ... The systems hacker's guide to the galaxy energy usage in a modern smartphone
    Carroll, Aaron; Heiser, Gernot Proceedings of the 4th Asia-Pacific Workshop on Systems, 07/2013
    Conference Proceeding

    Modern smartphones are increasingly performant and feature-rich but remain highly power-constrained. Effective energy management demands an informed policy, and to that end we present a detailed ...
Celotno besedilo
Dostopno za: NUK, UL
29.
  • Spatially resolved analysis... Spatially resolved analysis and minimization of resistive losses in high-efficiency Si solar cells
    Altermatt, Pietro P.; Heiser, Gernot; Aberle, Armin G. ... Progress in photovoltaics, November/December 1996, Letnik: 4, Številka: 6
    Journal Article
    Recenzirano

    This paper presents an improved method for measuring the total lumped series resistance (Rs) of high‐efficiency solar cells. Since this method greatly minimizes the influence of non‐linear ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
30.
  • Towards trustworthy computi... Towards trustworthy computing systems
    Heiser, Gernot; Elphinstone, Kevin; Kuz, Ihor ... Operating systems review, 07/2007, Letnik: 41, Številka: 4
    Journal Article

    As computer systems become increasingly mission-critical, used in life-critical situations, and relied upon to protect intellectual property, operating-system reliability is becoming an ever growing ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
1 2 3 4 5
zadetkov: 137

Nalaganje filtrov