Open AccessBook
Operating Systems: Internals and Design Principles, 6/e
Reads0
Chats0
TLDR
This book presents the nature and characteristics of modern-day operating systems clearly and completely, and serves as both a basic reference and an up-to-date survey of the state of the art.Abstract:
Serving as both a basic reference and an up-to-date survey of the state of the art, this book covers the concepts, structure, and mechanisms of operating systems. Stallings presents the nature and characteristics of modern-day operating systems clearly and completely. Updated treatment of Windows as a case study to cover Windows Vista. Online animations with references incorporated throughout. A new chapter on Embedded Operating Systems. Part Six (Distributed Systems and Security) moved online, reducing the cost and size of the book without loss of content. Expanded coverage of security. New figures added, with many existing figures updated to enhance clarity. A useful reference for programmers, systems engineers, network designers and others involved in the design of computer products, information system and computer system personnel.read more
Citations
More filters
Journal ArticleDOI
Determining the Optimum Time Quantum Value in Round Robin Process Scheduling Method
TL;DR: A non- linear programming mathematical model is developed to determine the optimum value of the time quantum, in order to minimize the average waiting time of the processes.
Journal ArticleDOI
Multiobjective grid scheduling using a domain decomposition based parallel micro evolutionary algorithm
TL;DR: The experimental analysis performed on both well-known and new large problem instances that model medium-sized grid environments demonstrate that the new parallel micro evolutionary algorithm achieves a high problem-solving efficacy and shows very good scalability behaviour when facing high-dimensional instances.
Journal ArticleDOI
CSP-based counter abstraction for systems with node identifiers
Tomasz Mazur,Gavin Lowe +1 more
TL;DR: This paper presents how counter abstraction techniques can be extended to processes that make use of node identifiers in a symmetrical way, and creates a process Abstr that is independent of t and is refined by @f(Impl(T) for all sufficiently large T, thus obtaining a positive answer to the original verification problem.
Proceedings ArticleDOI
From Requirements to Embedded Software - Formalising the Key Steps
Toby Myers,R. Geoff Dromey +1 more
TL;DR: This paper introduces a more rigorous approach to design using Behavior Engineering, which has previously been applied primarily to requirements analysis and specification development, and introduces the embedded Behavior Runtime Environment, a virtual machine created to execute a Behavior Engineering design on an embedded system.
Fuzzy Priority CPU Scheduling Algorithm
TL;DR: This proposed algorithm improves the priority based CPU scheduling algorithm as obvious from simulation results.