• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,404
Next 10 →

Table 10: Comparison of compile time of Linux kernel

in Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems
by Julian Bennett Grizzard 2006
"... In PAGE 115: ...2 Normalized performance relative to Linux L4Linux w/spine L4Linux Linux Figure 25: SPEC CPU 2000 benchmarks comparing Linux, L4Linux, and spine dynamic control ow graph can be assessed. Figure 25, Table 9, and Table10 show performance results of the spine architecture as compared to the normal L4Linux system and the stock Linux kernel. The SPEC CPU 2000 benchmarks show virtually no di erence in performance.... In PAGE 115: ... The spine column shows a performance penalty near 30% relative to L4Linux but has a worst case of a 74% increase in penalty. The lmbench results show a signi cant performance penalty as compared to Linux, however the Linux kernel compile time benchmark in Table10 provides a better approximation of how the overal system will be penalized. Table 10 shows a performance penalty of about 34% for the spine system as compared to Linux system.... In PAGE 115: ... The lmbench results show a signi cant performance penalty as compared to Linux, however the Linux kernel compile time benchmark in Table 10 provides a better approximation of how the overal system will be penalized. Table10 shows a performance penalty of about 34% for the spine system as compared to Linux system. It should be noted that the implementation of spine is not optimized.... ..."
Cited by 2

Table 1 Linux kernels most important events

in Analyzing cloning evolution in the Linux kernel
by unknown authors
"... In PAGE 5: ...bout 1.6 MLOCs. The core kernel and file systems contain 12 KLOCs and 235 KLOCs, respectively. Table1 , which is an updated version of the one published in Ref. [24], shows the most important events in the Linux kernel development time table, along with the number of releases produced for each development series.... ..."

Table 2. The performance index of the Linux kernels

in Abstract A Dynamic Aspect-oriented System for OS Kernels
by Yoshisato Yanagisawa, Kenichi Kourai, Shigeru Chiba, Rei Ishikawa
"... In PAGE 6: ... On the other hand, the monolithic and KLASY kernels are statically linked and thus they should have performance advantages. Table2 lists the index numbers reported by the benchmark programs. A larger number is better.... ..."

Table 1. Linux Kernels Most Important Events

in Identifying Clones in the Linux Kernel
by G. Casazza, G. Antoniol, U. Villano, E. Merlo, M. Di Penta 2001
Cited by 14

Table 1: Relative performance of the deputized Linux kernel.

in Beyond bug-finding: Sound program analysis for Linux
by Zachary Anderson, Eric Brewer, Jeremy Condit, Robert Ennals, David Gay, Matthew Harren, George C. Necula, Feng Zhou 2007
Cited by 2

Table 1: Relative performance of the deputized Linux kernel.

in Beyond bug-finding: Sound program analysis for Linux
by Zachary Anderson, Eric Brewer, Jeremy Condit, Robert Ennals, David Gay, Matthew Harren, George C. Necula, Feng Zhou 2007
Cited by 2

Table 3 : Distribution of Files in the Linux Kernel

in Applying Machine Learning to Software Clustering
by Susan Elliott Sim

Table 1: 18 Linux kernel rootkits used for our evaluation

in Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection
by Min Xu, Ravi Sandhu, Xuxian Jiang, Xinwen Zhang 2007
"... In PAGE 7: ... 5.2 Evaluation We have evaluated our system with 18 real-world kernel-level rootk- its ( Table1 ) that are publicly available. Note that all of these rootk- its can successfully compromise the OS kernel integrity on vulner-... In PAGE 7: ... The detailed examinations are helpful to understand how our system is able to effectively detect and prevent kernel integrity violations. As shown in Table1 , the adore rootkit makes use of the loadable ker- nel module (LKM) support in commodity Linux kernels to directly hijack a number of system call table entries. The adore-ng rootkit uses the same LKM support to subtly modify the jump table of the virtual file system.... ..."
Cited by 1

Table 2. Data for six successive versions of three Linux kernel modules.

in Quality Impacts of Clandestine Common Coupling
by Stephen R. Schach, Bo Jin, David R. Wright, Gillian Z. Heller, Jeff Offutt
"... In PAGE 6: ...he module level. We also ignored common coupling of constants. In this way we determined the number of instances of common coupling between each kernel module and all the other modules in each version of Linux. Data for six successive versions of three kernel modules are shown in Table2 , and also in Figure 1, which displays the data of Table 2 in graphical form. A blank in the date column denotes that the code has not changed between successive versions.... In PAGE 6: ...he module level. We also ignored common coupling of constants. In this way we determined the number of instances of common coupling between each kernel module and all the other modules in each version of Linux. Data for six successive versions of three kernel modules are shown in Table 2, and also in Figure 1, which displays the data of Table2 in graphical form. A blank in the date column denotes that the code has not changed between successive versions.... In PAGE 6: ....1.104 of Linux. As can be seen in the second column of Table2 , the number of instances of common coupling then steadily increased to 946 in version 2.1.... In PAGE 7: ... Page 7 Figure 1 shows that, even when the code is unchanged, the number of instances of common coupling can progressively increase. [Figure 1 should go here] [ Table2 should go here] 4. Results Details of the 6499 kernel modules appear in Table 3.... In PAGE 17: ... Growth in the size of Linux. Table2 . Data for six successive versions of three Linux kernel modules.... ..."

Table 2: Number of locks in the Linux kernel. Number of locks

in Scalability vs. Development Effort for Multiprocessor Operating System Kernels
by Lars Lundberg
"... In PAGE 12: ... 5.2 Locking and Source Code Changes Table2 shows the how the lock usage has evolved throughout the Linux development. The table shows the number of places in the kernel where locks are acquired and released.... ..."
Next 10 →
Results 1 - 10 of 6,404
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University