Modern Operating Systems by Herbert Bos ...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf-M ODERN O PERATING S YSTEMS
Showing 1075 out of 1137
Modern Operating Systems by Herbert Bos and Andrew...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf-M ODERN O PERATING S YSTEMS
Modern Operating Systems by Herbert...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf-M ODERN O PERATING S YSTEMS
Page 1075
1044
READING LIST AND BIBLIOGRAPHY
CHAP. 13
BHEDA, R.A., BEU,J.G., RAILING, B.P., and CONTE, T.M.:
‘‘Extrapolation Pitfalls When
Evaluating Limited Endurance Memory,’’
Proc. 20th Int’l Symp. on Modeling, Analy-
sis, & Simulation of Computer and Telecomm. Systems
, IEEE, pp. 261–268, 2012.
BHEDA, R.A., POOVEY, J.A., BEU, J.G., and CONTE, T.M.:
‘‘Energy Efficient Phase
Change Memory Based Main Memory for Future High Performance Systems,’’
Proc.
Int’l Green Computing Conf.
, IEEE, pp. 1–8, 2011.
BHOEDJANG, R.A.F., RUHL, T., and BAL, H.E.:
‘‘User-Level Network Interface Proto-
cols,’’
Computer
, vol. 31, pp. 53–60, Nov. 1998.
BIBA, K.:
‘‘Integrity Considerations for Secure Computer Systems,’’ Technical Report
76–371, U.S. Air Force Electronic Systems Division, 1977.
BIRRELL, A.D., and NELSON, B.J.:
‘‘Implementing Remote Procedure Calls,’’
ACM Trans.
on Computer Systems
, vol. 2, pp. 39–59, Feb. 1984.
BISHOP, M., and FRINCKE, D.A.:
‘‘Who Owns Your Computer?’’
IEEE Security and Pri-
vacy
, vol. 4, pp. 61–63, 2006.
BLACKHAM, B, SHI, Y. and HEISER, G.:
‘‘Improving Interrupt Response Time in a Verifi-
able Protected Microkernel,’’
Proc. Seventh European Conf. on Computer Systems
(EUROSYS)
, April, 2012.
BOEHM, B.:
Software Engineering Economics
, Upper Saddle River, NJ: Prentice Hall,
1981.
BOGDANOV, A., AND LEE, C.H.:
‘‘Limits of Provable Security for Homomorphic Encryp-
tion,’’
Proc. 33rd Int’l Cryptology Conf.
, Springer, 2013.
BORN, G:
Inside the Windows 98 Registry
, Redmond, WA: Microsoft Press, 1998.
BOTELHO, F.C., SHILANE, P., GARG, N., and HSU,W.:
‘‘Memory Efficient Sanitization of
a Deduplicated Storage System,’’
Proc. 11th USENIX Conf. on File and Storage Tech.
,
USENIX, pp. 81–94, 2013.
BOTERO, J. F., and HESSELBACH, X.:
‘‘Greener Networking in a Network Virtualization
Environment,’’
Computer Networks
, vol. 57, pp. 2021–2039, June 2013.
BOULGOURIS, N.V., PLATANIOTIS, K.N., and MICHELI-TZANAKOU, E.:
Biometics: The-
ory Methods, and Applications
, Hoboken, NJ: John Wiley & Sons, 2010.
BOVET, D.P., and CESATI, M.:
Understanding the Linux Kernel
, Sebastopol, CA: O’Reilly
& Associates, 2005.
BOYD-WICKIZER, S., CHEN, H., CHEN, R., MAO, Y., KAASHOEK, F., MORRIS, R.,
PESTEREV, A., STEIN, L., WU, M., DAI, Y., ZHANG, Y., and ZHANG, Z.:
‘‘Corey: an
Operating System for Many Cores,’’
Proc. Eighth Symp. on Operating Systems Design
and Implementation
, USENIX, pp. 43–57, 2008.
BOYD-WICKIZER, S., CLEMENTS A.T., MAO, Y., PESTEREV,A., KAASHOEK, F.M.,
MORRIS, R., and ZELDOVICH, N.:
‘‘ An Analysis of Linux Scalability to Many
Cores,’’
Proc. Ninth Symp. on Operating Systems Design and Implementation
,
USENIX, 2010.
BRATUS, S.:
‘‘What Hackers Learn That the Rest of Us Don’t: Notes on Hacker Curricu-
lum,’’
IEEE Security and Privacy
, vol. 5, pp. 72–75, July/Aug. 2007.


Ace your assessments! Get Better Grades
Browse thousands of Study Materials & Solutions from your Favorite Schools
Concordia University
Concordia_University
School:
Operating_Systems
Course:
Great resource for chem class. Had all the past labs and assignments
Leland P.
Santa Clara University
Introducing Study Plan
Using AI Tools to Help you understand and remember your course concepts better and faster than any other resource.
Find the best videos to learn every concept in that course from Youtube and Tiktok without searching.
Save All Relavent Videos & Materials and access anytime and anywhere
Prepare Smart and Guarantee better grades

Students also viewed documents