Monolithic kernels

Results: 158



#Item
101Kernel Development in Userspace - The Rump Approach Antti Kantee Helsinki University of Technology [removed]  Abstract

Kernel Development in Userspace - The Rump Approach Antti Kantee Helsinki University of Technology [removed] Abstract

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2014-01-05 17:31:15
102Rump Device Drivers: Shine On You Kernel Diamond Antti Kantee Helsinki University of Technology [removed].fi  Abstract

Rump Device Drivers: Shine On You Kernel Diamond Antti Kantee Helsinki University of Technology [removed].fi Abstract

Add to Reading List

Source URL: 2010.asiabsdcon.org

Language: English - Date: 2014-01-03 03:46:13
103The Linux FAQ  David C. Merrill david −AT− lupercalia.net 2003−09−19 Revision History

The Linux FAQ David C. Merrill david −AT− lupercalia.net 2003−09−19 Revision History

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2005-01-25 17:11:23
104Cloud Operating Systems for Servers 
 Mike Day
 Distinguished Engineer, Virtualization and Linux
 August 20, 2014


Cloud Operating Systems for Servers 
 Mike Day
 Distinguished Engineer, Virtualization and Linux
 August 20, 2014


Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-08-20 10:55:35
105The Linux FAQ  David C. Merrill david −AT− lupercalia.net 2003−09−19 Revision History

The Linux FAQ David C. Merrill david −AT− lupercalia.net 2003−09−19 Revision History

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2005-01-25 17:11:23
106Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-10-09 13:10:59
107Making Information Flow Explicit in HiStar doi:[removed][removed]  By Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazières

Making Information Flow Explicit in HiStar doi:[removed][removed] By Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazières

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
108Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
109Tech Digest Figure Template_2 column_01-06-12

Tech Digest Figure Template_2 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:11:39
110Tech Digest Figure Template_2 column_01-06-12

Tech Digest Figure Template_2 column_01-06-12

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:11:39