Microkernel

Results: 368



#Item
31The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

Add to Reading List

Source URL: www.cap-lore.com

Language: English - Date: 2009-05-04 18:57:36
32Temporal Fairness of a Microkernel Scheduler Matthias Daum Computer Science Dept., Saarland University Saarbr¨ ucken, Germany

Temporal Fairness of a Microkernel Scheduler Matthias Daum Computer Science Dept., Saarland University Saarbr¨ ucken, Germany

Add to Reading List

Source URL: www-wjp.cs.uni-sb.de

Language: English - Date: 2015-04-11 11:47:52
    33Modelling User Programs on top of a Microkernel? Matthias Daum Saarland University, Germany

    Modelling User Programs on top of a Microkernel? Matthias Daum Saarland University, Germany

    Add to Reading List

    Source URL: www-wjp.cs.uni-sb.de

    Language: English - Date: 2015-04-11 11:47:52
      34Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

      Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

      Add to Reading List

      Source URL: sel4.systems

      Language: English - Date: 2014-07-28 22:03:39
      35Will appear in the 2009 IEEE Symposium on Security and Privacy  Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki

      Will appear in the 2009 IEEE Symposium on Security and Privacy Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki

      Add to Reading List

      Source URL: nativeclient.googlecode.com

      Language: English - Date: 2009-03-30 19:57:13
      36Verifying Security Invariants in ExpressOS Haohui Mai Edgar Pek Hui Xue Samuel T. King P. Madhusudan

      Verifying Security Invariants in ExpressOS Haohui Mai Edgar Pek Hui Xue Samuel T. King P. Madhusudan

      Add to Reading List

      Source URL: haohui.me

      Language: English
      37seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

      seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

      Add to Reading List

      Source URL: sel4.systems

      Language: English - Date: 2014-09-23 22:58:53
      38

      PDF Document

      Add to Reading List

      Source URL: www.cs.vu.nl

      Language: English - Date: 2001-08-05 10:53:02
      39SP-15 SCHEDULE Monday - Breakfast 7:30 - 9:25 8:00 - 9:25

      SP-15 SCHEDULE Monday - Breakfast 7:30 - 9:25 8:00 - 9:25

      Add to Reading List

      Source URL: coa.edu

      Language: English - Date: 2015-04-14 11:46:28