Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 137
31.
  • The OKL4 microvisor The OKL4 microvisor
    Heiser, Gernot; Leslie, Ben Proceedings of the first ACM asia-pacific workshop on Workshop on systems, 08/2010
    Conference Proceeding

    We argue that recent hypervisor-vs-microkernel discussions completely miss the point. Fundamentally, the two classes of systems have much in common, and provide similar abstractions. We assert that ...
Celotno besedilo
Dostopno za: NUK, UL
32.
  • A scalable lock manager for... A scalable lock manager for multicores
    Jung, Hyungsoo; Han, Hyuck; Fekete, Alan D. ... Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, 06/2013
    Conference Proceeding

    Modern implementations of DBMS software are intended to take advantage of high core counts that are becoming common in high-end servers. However, we have observed that several database platforms, ...
Celotno besedilo
Dostopno za: NUK, UL
33.
  • Sichere IT ohne Schwachstel... Sichere IT ohne Schwachstellen und Hintertüren
    Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk ... TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis (Online), 04/2020, Letnik: 29, Številka: 1
    Journal Article
    Recenzirano

    Unsere zunehmende Abhängigkeit von Informationstechnik erhöht kontinuierlich die Safety- und Security-Anforderungen bei deren Einsatz. Ein zentrales Problem hierbei sind Schwachstellen von Hard- und ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
34.
  • State of the Journal State of the Journal
    Montuschi, Paolo IEEE transactions on computers, 2016-July-1, 2016-7-1, 20160701, Letnik: 65, Številka: 7
    Journal Article
    Recenzirano

    Discusses the current state of the journal, reports on current and future areas of exploration and research, and presents new editors.
Celotno besedilo
Dostopno za: IJS, NUK, UL
35.
  • Time Protection Time Protection
    Ge, Qian; Yarom, Yuval; Chothia, Tom ... Proceedings of the Fourteenth EuroSys Conference 2019, 03/2019
    Conference Proceeding
    Odprti dostop

    Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
36.
  • Are virtual-machine monitor... Are virtual-machine monitors microkernels done right?
    HEISER, Gernot; UHLIG, Volkmar; LEVASSEUR, Joshua Operating systems review, 2006, 2006-01-00, 20060101, Letnik: 40, Številka: 1
    Journal Article
    Odprti dostop

    A paper by Hand et al. at the recent HotOS workshop re-examined microkernels and contrasted them to virtual-machine monitors (VMMs). It found that the two kinds of systems share architectural ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
37.
  • Numerical quantification an... Numerical quantification and minimization of perimeter losses in high-efficiency silicon solar cells
    Altermatt, Pietro P.; Heiser, Gernot; Green, Martin A. Progress in photovoltaics, September/October 1996, Letnik: 4, Številka: 5
    Journal Article
    Recenzirano

    This paper presents a quantitative analysis of perimeter losses in high‐efficiency silicon solar cells. A new method of numerical modelling is used, which provides the means to simulate a full‐sized ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
38.
  • Sequoll: A framework for mo... Sequoll: A framework for model checking binaries
    Blackham, B.; Heiser, G. 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS), 2013-April
    Conference Proceeding

    Multi-criticality real-time systems require protected-mode operating systems with bounded interrupt latencies and guaranteed isolation between components. A tight WCET analysis of such systems ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
39.
  • CoGENT CoGENT
    Amani, Sidney; Sewell, Thomas; Tuong, Joseph ... Operating systems review, 03/2016, Letnik: 50, Številka: 2
    Journal Article
Celotno besedilo
Dostopno za: NUK, UL
40.
  • No Security Without Time Pr... No Security Without Time Protection
    Ge, Qian; Yarom, Yuval; Heiser, Gernot Proceedings of the 9th Asia-Pacific Workshop on Systems, 08/2018
    Conference Proceeding

    The recent Spectre exploits demonstrated that covert timing channels are a mainstream security threat. Their prevention requires that operating systems provide time protection, in addition to the ...
Celotno besedilo
Dostopno za: NUK, UL
2 3 4 5 6
zadetkov: 137

Nalaganje filtrov