Recent trends and opportunities in domain specific operating systems

A Sha, K Anvesh, GN Naidu, R Dasari… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Operating System forms an integral part of any device with computing capabilities. They form
a layer between the hardware and software which helps the software to better utilize the …

Safe and Secure Communication Using SSL/TLS

DD Kumar, JD Mukharzee, CVD Reddy… - … on Emerging Smart …, 2024 - ieeexplore.ieee.org
In an ever-evolving digital environment, prioritizing user security and authentication
processes is critical. It presents a comprehensive approach to creating a secure login page …

Performance Analysis of Machine Learning-Based Scheduling Policies for Operating Systems

BSS Nadh, A Sha, V Addanki… - 2023 7th …, 2023 - ieeexplore.ieee.org
This study investigates the effectiveness of machine learning-based approaches for
predicting a target variable in a given dataset. We compare the performance of several …

A Comprehensive Review on Functional Analysis of Real-Time Operating Systems

BSN Reddy, BS Venkat, GN Naidu… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
A real-time operating system (RTOS) is a system made to help us in real-time using real-time
applications that provide no delay. A RTOS is time-bound, which means that time is the main …

A review on reliability, security and memory management of numerous operating systems

M Marufuzzaman, S Al Karim… - … Journal of Electrical …, 2019 - section.iaesonline.com
With the improvement of technology and the growing needs of computer systems, it is
needed to ensure that operating systems are able to provide the required functionalities. To …

ConfigMaster: An Interactive Solution for System Management

A Ganapathi, P Sivakumar, KV Divya… - 2024 8th …, 2024 - ieeexplore.ieee.org
The “ConfigMaster: An interactive solution for system management” is a simple utility written
using Bash scripting. It is designed for Unix-like systems. The tool lets users easily configure …

Quantitative Analysis of Scheduling Efficiency: A Case Study of Fcfs and Round Robin Algorithms

A Shanmukha Reddy, KS Charan… - Kolla Sriram and …, 2024 - papers.ssrn.com
The project will assess the performance of two approaches Round Robin and First Come
First Serves (FCFS) to reveal their effectiveness in the computer operating systems. CPU …

The Design and Implementation of a Linux Kernel Module for File Descriptor Revocation

A TU, H NN - Proceedings of International Conference on Recent …, 2019 - papers.ssrn.com
Privilege separation systems that are implemented in applications such as Chromium and
OpenSSH Dae-mon (SSHD) are complex, cumbersome because they have to be built on top …

[PDF][PDF] SYSTEM CALL AUTHORIZATION IN LINUX BY A SECURE DAEMON

V Radhakrishnan, H Narayanan, S Sathyadevan - 2006 - academia.edu
Compromises on data integrity and confidentiality have exposed the vulnerability of security
architectures of traditional Linux-based operating systems against malicious attacks …