scispace - formally typeset
Open AccessBook

Operating Systems: Internals and Design Principles, 6/e

Reads0
Chats0
TLDR
This book presents the nature and characteristics of modern-day operating systems clearly and completely, and serves as both a basic reference and an up-to-date survey of the state of the art.
Abstract
Serving as both a basic reference and an up-to-date survey of the state of the art, this book covers the concepts, structure, and mechanisms of operating systems. Stallings presents the nature and characteristics of modern-day operating systems clearly and completely. Updated treatment of Windows as a case study to cover Windows Vista. Online animations with references incorporated throughout. A new chapter on Embedded Operating Systems. Part Six (Distributed Systems and Security) moved online, reducing the cost and size of the book without loss of content. Expanded coverage of security. New figures added, with many existing figures updated to enhance clarity. A useful reference for programmers, systems engineers, network designers and others involved in the design of computer products, information system and computer system personnel.

read more

Citations
More filters
Journal ArticleDOI

Determining the Optimum Time Quantum Value in Round Robin Process Scheduling Method

TL;DR: A non- linear programming mathematical model is developed to determine the optimum value of the time quantum, in order to minimize the average waiting time of the processes.
Journal ArticleDOI

Multiobjective grid scheduling using a domain decomposition based parallel micro evolutionary algorithm

TL;DR: The experimental analysis performed on both well-known and new large problem instances that model medium-sized grid environments demonstrate that the new parallel micro evolutionary algorithm achieves a high problem-solving efficacy and shows very good scalability behaviour when facing high-dimensional instances.
Journal ArticleDOI

CSP-based counter abstraction for systems with node identifiers

TL;DR: This paper presents how counter abstraction techniques can be extended to processes that make use of node identifiers in a symmetrical way, and creates a process Abstr that is independent of t and is refined by @f(Impl(T) for all sufficiently large T, thus obtaining a positive answer to the original verification problem.
Proceedings ArticleDOI

From Requirements to Embedded Software - Formalising the Key Steps

TL;DR: This paper introduces a more rigorous approach to design using Behavior Engineering, which has previously been applied primarily to requirements analysis and specification development, and introduces the embedded Behavior Runtime Environment, a virtual machine created to execute a Behavior Engineering design on an embedded system.

Fuzzy Priority CPU Scheduling Algorithm

TL;DR: This proposed algorithm improves the priority based CPU scheduling algorithm as obvious from simulation results.