scispace - formally typeset
Search or ask a question

What kind of interface do operating systems use today? 

Answers from top 15 papers

More filters
Papers (15)Insight
We suggest that the conventional course on operating systems, based --- apparently --- on folk memory of an archetypal operating system, could usefully be reorganised to emphasise the importance of the people who use the system, and comment on our experience in designing and presenting such a course.
The results indicate some trends for wearable operating systems.
We show that these ideas are transferrable to operating systems.
This eliminates hardware and operating system issues thus allowing people with different hardware and heterogeneous operating systems to collaborate and code with ease.
The interface may be applied as an overlay to virtually any operating system.
This kind of model can be used as an interface between the user and the computer, for overview and control of applications, file systems, networks and other computer resources, as well as for communication and collaboration with other users in the networked environment.
It supports portable operating system interface (POSIX) semantics, and provides high bandwidth, low latency, and huge storage capacity.
Our operating systems and programming abstractions should be expanded to let applications tap into these computational resources and make the best use of them.
We propose an operating system interface that can be used by applications to achieve energy savings.
Journal ArticleDOI
01 Oct 2009-IEEE Computer
18 Citations
Over time, these developments could affect what constitutes an operating system, what its roles and responsibilities will be, and how it will be installed and used.
By separating aspects and components of the operating systems in every layer, we can provide a better generic design model of the operating systems.
Journal ArticleDOI
D.R. Gentner, Jonathan Grudin 
01 Jun 1996-IEEE Computer
31 Citations
The interface-design models used in these mechanical systems play similar roles in computer systems, despite the obvious differences between the two types of systems.
It also routes system calls of an application among operating systems, to provide applications with the illusion of running on a single operating system.
Open accessBook ChapterDOI
Steven J. Murdoch, Stephen Lewis 
06 Jun 2005
332 Citations
The techniques used can be extended to other operating systems.
Recent evidence suggests that trends will require rethinking the traditional role of operating systems.

See what other people are reading

What are the current trends in the implementation of point-of-sale systems in local studies?
5 answers
Current trends in local studies regarding point-of-sale systems indicate a shift towards mobile cash registers that offer convenience and fast transactions by utilizing technologies like Bluetooth and NFC. Additionally, there is a growing interest in implementing innovative features such as notification pop-ups for overdue payments and out-of-stock items to enhance system effectiveness and usability. Furthermore, the use of mobile technology for point-of-sale surveillance is gaining traction, with a focus on improving data collection methods through audio/video recording, electronic photographs, and electronic location data. These trends highlight a move towards more efficient, flexible, and technologically advanced point-of-sale systems in local studies.
What is the current state of research on hierarchical address event representation in neuromorphic computing?
5 answers
The current state of research on hierarchical address event representation (AER) in neuromorphic computing is focused on enhancing scalability and efficiency in large-scale neural processing. Novel techniques like Time-to-Event Margin Propagation (TEMP) leverage causal temporal primitives within the AER protocol for scalable computing, demonstrating high accuracy in tasks like image recognition. Additionally, advancements in multicast network-on-chip (NoC) architectures, such as Multicast-HiAER, enable high-bandwidth inter-core spike event transmission, supporting brain-scale neural network connectivity across processing cores. Furthermore, the introduction of hierarchical token-rings (HTR) encoding schemes improves latency, throughput, and power efficiency in scientific imaging applications, addressing performance issues with existing encoding methods in large sensor arrays. These research directions signify a growing emphasis on optimizing communication protocols and network architectures for efficient and scalable neuromorphic computing systems.
What is A/B Split Testing?
5 answers
A/B Split Testing, also known as A/B Testing, is a method commonly used in industry to enhance innovation by introducing new features or modifying existing software. This approach involves conducting experiments on different segments of a population to determine the effectiveness of various strategies. By automating A/B testing pipelines and splitting the population based on user criteria, A/B Split Testing accelerates the identification of statistically significant results compared to traditional sequential testing methods. It aims to optimize marketing activities, such as email campaigns or website design, by comparing different versions to improve user experience and profitability. A/B Split Testing is a valuable tool for businesses of all sizes, offering a cost-effective and efficient way to iterate products and enhance user engagement.
How effective are current migration trategies in addressing the challenges posed by migration, and what alternatives have been proposed?
5 answers
Current migration strategies face challenges due to resource constraints on IoT devices, intermittent wireless connections, and high delays when communicating with cloud servers. To address these issues, a proactive approach involving threat modeling is proposed to mitigate security risks during cloud migration. Additionally, policy recommendations emphasize the need to strengthen institutions, frameworks, and data collection to enhance safe legal migration, especially in the context of the COVID-19 pandemic. Proposed alternatives include a DNN model migration framework that focuses on preprocessing, partition-offloading, and partition-uploading plans to overcome challenges and improve efficiency in DNN migration. These strategies aim to enhance security, optimize resource utilization, and ensure smoother migration processes in the face of evolving technological landscapes and global challenges.
What are the key principles and technologies that define Web 3 gaming?
4 answers
Web3 gaming is defined by key principles and technologies that aim to revolutionize the gaming industry. The transition to Web3 emphasizes decentralization, transparency, and security in gaming experiences. Technologies such as blockchain, decentralized applications (dApps), smart contracts, and non-fungible tokens (NFTs) play a crucial role in shaping Web3 gaming. These technologies enable peer-to-peer transactions, ownership of in-game assets, and provably fair gameplay. Additionally, the integration of 3D characters and multimedia data in online gaming further enhances user experiences and customization. Web3 gaming strives to create a more equitable and immersive gaming environment by leveraging decentralized technologies and innovative approaches to game development and interaction.
How Does Calculator Affect the Mathematical Competencies of Students?
5 answers
The impact of calculators on students' mathematical competencies varies based on factors such as the timing of introduction and frequency of use. Research indicates that early exposure to calculators may hinder arithmetic proficiency, with students who start using calculators in primary school performing significantly worse than those introduced later. However, incorporating calculators in college settings has shown positive effects on mathematical performance, with students using calculators outperforming those who do not. Moreover, implementing complex calculators in hardware projects can enhance students' learning experiences by integrating math, software programming, and hardware design, leading to increased intrinsic motivation and positive perceptions of challenging subjects like math and hardware design. Ultimately, the appropriate use of calculators can enhance mathematical competencies, but a balance is crucial to prevent overreliance.
What are state-of-the-art methods for construction site monitoring-related technology?
5 answers
State-of-the-art methods for construction site monitoring-related technology include various innovative approaches. These encompass the use of smart devices with UHF RFID technology for worker and gear monitoring, deep-learning-based tracking systems like Multi-Domain Convolutional Neural Networks (MD-CNN) for accurate worker tracking in complex construction scenarios, and the utilization of UAV technology for visual monitoring and progress assessment through orthomosaic images processed via photogrammetric techniques. Additionally, advancements in object detection through lightweight Optimized Positioning (OP) modules in deep neural networks have shown promise in automating construction monitoring tasks and enhancing safety measures on-site. Furthermore, the development of a Construction Sound Localization Framework (CSLF) using time delay of arrival techniques enables precise identification and categorization of sound sources for safety management and productivity monitoring at construction sites.
What are the major differences in the data models and features of CityGML 2 and 3?
5 answers
The transition from CityGML 2 to CityGML 3 brought significant changes in data models and features. CityGML 3.0 introduced new concepts like the Versioning module and the Dynamizer module, adding dynamic semantics to the data model. Additionally, CityGML 3.0 addressed legal boundary modeling flaws present in CityGML 2.0, making it more suitable for representing physical and non-physical boundaries of building units in 3D cadastre applications. On the other hand, the complexity of CityGML data models in 3D city modeling led to the proposal of alternative solutions like cjdb, which offers a simpler table structure and data model design compared to traditional solutions like 3DCityDB, resulting in lower storage space demands and faster data import/export processes.
How can biocomputing be used in the development of Neuroprosthetics?
5 answers
Biocomputing technologies leverage biological communication mechanisms for computations. By incorporating neurons and astrocytes in mathematical models, logic gates like OR and AND can be realized, enhancing the reliability of biocomputing. Neuromorphic computing models, mimicking biological nervous systems, offer a promising approach for high-performance neuroprostheses by enabling seamless brain-machine integration through spike-based information exchange. Additionally, the use of field-programmable gate array (FPGA) technology facilitates the development of scalable neural models for neuroprosthetic devices, showcasing computational efficiency and the ability to restore damaged biological networks. Optimization strategies like the Evolutionary Neuromorphic Optimization Framework (ENOF) further enhance the architecture of neuroprosthetics, reducing energy consumption and improving stability for biomedical applications.
Who is bukhary ikhwan from mimos?
5 answers
Bukhary Ikhwan is not directly related to Mimos. However, there is a mention of "BMT Al-Ikhwan," which is a Business Multipurpose Cooperative that implemented a web-based information system for more effective operations. Additionally, there is a reference to the book "Bughyatul Ikhwan" by Imam Ramli, where behavioristic learning theory is constructed, emphasizing the process of forming expected behaviors through teaching and environmental interactions. Furthermore, the article discusses the authority of al-Bukhary as an intellectual figure proficient in both hadith and fiqh, highlighting his independence in scientific authority and interactions with scholars to become an absolute mujtahid. Therefore, while there is no direct connection between Bukhary Ikhwan and Mimos, the contexts provide insights into different aspects related to the term "Ikhwan."
What is encapsulation in cybersecurity?
5 answers
Encapsulation in cybersecurity refers to the technique of securing data packets or applications within a protective layer to prevent unauthorized access or tampering. This method involves encrypting sensitive information, such as payloads or applications, and adding security headers or mechanisms to safeguard them from malicious attacks. Encapsulation can also involve isolating potentially harmful applications within a secure environment, like a capsule, to prevent them from affecting the operating system or other applications outside of this protected space. By encapsulating data or applications, cybersecurity measures can be enhanced, ensuring the integrity and confidentiality of information while mitigating the risks posed by malware or unauthorized access.