• No results found

kernel module

The Linux Kernel Module Programming Guide - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

The Linux Kernel Module Programming Guide - Free Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials

... This kernel module is an example of ...the kernel module calls ...the kernel data structure which holds information about a process and the system call it's in, if any) to ...

82

ENHANCING FILE AND SYSTEM SECURITY BY ADDING LOADABLE KERNEL MODULE FOR REMOVABLE STORAGE DEVICE

ENHANCING FILE AND SYSTEM SECURITY BY ADDING LOADABLE KERNEL MODULE FOR REMOVABLE STORAGE DEVICE

... Mridul Sankar Barik et al. [1] presented a solution for obtaining authentic date and time stamps of digital documents. The implemented solution uses preinstalled plug-in in the form of Loadable Kernel ...

8

Analyzing and Improving Linux Kernel Memory Protection: A Model Checking Approach.

Analyzing and Improving Linux Kernel Memory Protection: A Model Checking Approach.

... into kernel space when ...loadable kernel module allocation), while the latter is used strictly for short-term access to physical pages located in the high ...the kernel virtual address space ...

95

Implementing Distributable Real-Time Threads in the Linux Kernel: Programming Interface and Scheduling Support

Implementing Distributable Real-Time Threads in the Linux Kernel: Programming Interface and Scheduling Support

... a kernel thread on the schedul- ing co-processor using CPU affinity to bind the thread to the appropriate ...This module (actually a thread) is now referred to as yet another schedulable ...The ...

8

Efficient Multicast for Grid Environment Using Robber and Bit Torrent Protocol

Efficient Multicast for Grid Environment Using Robber and Bit Torrent Protocol

... Besides routing inter-cluster traffic, the hubs also emulate the wide-area bandwidth and delay between clusters using the Linux Traffic Control (LTC) kernel module to slow down outgoi[r] ...

8

W H I T E P A P E R : V E R I T A S C L U S T E R S E R V ER. Veritas Cluster Server:

W H I T E P A P E R : V E R I T A S C L U S T E R S E R V ER. Veritas Cluster Server:

... Note: If you validate the IMF functionality by causing a monitored application to fault and restart, after each restart of the resource, the agent needs to reregister with the IMF kernel module. Based on ...

10

LiME_Documentation_1.1.pdf

LiME_Documentation_1.1.pdf

... With USB Storage mode deactivated, we copy the LiME kernel module to the device using the same steps described in the last section. When installing the module using insmod, we set the path parameter ...

8

Sun Microsystems, Inc Garcia Avenue Mountain View, CA FAX

Sun Microsystems, Inc Garcia Avenue Mountain View, CA FAX

... loadable kernel module can optionally be loaded at boot ...the module at boot. If you don’t want the module to be loaded at reboot you can answer ...

23

How To Balance A Load Balancer On A Server On A Linux (Or Ipa) (Or Ahem) (For Ahem/Netnet) (On A Linux) (Permanent) (Netnet/Netlan) (Un

How To Balance A Load Balancer On A Server On A Linux (Or Ipa) (Or Ahem) (For Ahem/Netnet) (On A Linux) (Permanent) (Netnet/Netlan) (Un

... ● Affinity can be preserved with a Cookie ● LVS (linux virtual server) can do state-. replication (using a kernel module)[r] ...

26

HPC Computation on Hadoop Storage with PLFS

HPC Computation on Hadoop Storage with PLFS

... For readback with a 1MB access unit size, the PVFS bandwidth is about the same as the write bandwidth. For HDFS, reading 1MB does not got as fast as PVFS, though the library version of HDFS comes close. HDFS has the ...

13

inside: THE MAGAZINE OF USENIX & SAGE April 2003 volume 28 number 2 SECURITY Chuvakin: Ups and Downs of UNIX/Linux Host-Based Security Solutions

inside: THE MAGAZINE OF USENIX & SAGE April 2003 volume 28 number 2 SECURITY Chuvakin: Ups and Downs of UNIX/Linux Host-Based Security Solutions

... An attacker can deploy a malicious loadable kernel module (LKM) to remap the sys- tem calls. As a result the open() call to open a certain file for checking will be redirected to another target. Thus the ...

7

An Empirical Evaluation of the Android Security Framework

An Empirical Evaluation of the Android Security Framework

... Linux kernel is limited to some type of calls only or else it is a more general issue in the ...Linux kernel. To this end we have implemented a new kernel module, called Monitoring ...

14

EXPLODE: a Lightweight, General System for Finding Serious Storage System Errors

EXPLODE: a Lightweight, General System for Finding Serious Storage System Errors

... User Mode Linux JFS User-written Checker Linux Kernel Hardware Our code User code JFS User-written Checker Linux Kernel Hardware EKM. EKM = EXPLODE kernel module E X PLODE[r] ...

42

Cloud Cam: Internet-Connected Security Camera

Cloud Cam: Internet-Connected Security Camera

... special kernel module to make the Pi camera work with Linux's Video4Linux 2 API and look like a normal video ...V4L2 module you can use the Pi camera with motion and most other Linux video ...

57

Super Sparse Convolutional Neural Networks

Super Sparse Convolutional Neural Networks

... A “ point-wise” convolutional layer is first used to project the input feature maps into a required dimensional space, which can also fuse the previous module’s output features from different groups. The obtained ...

8

Learning the Kernel with Hyperkernels     (Kernel Machines Section)

Learning the Kernel with Hyperkernels     (Kernel Machines Section)

... We have shown that when the empirical quality functional is the regularized risk functional, the resulting optimization problem is convex, and in fact is a SDP. This SDP, which learns the best kernel given the ...

29

Identification of nonlinear systems using generalized kernel models

Identification of nonlinear systems using generalized kernel models

... generalized kernel modeling approach, in comparison with the standard kernel ...standard kernel approach would typically require cross validation for specifying the common single kernel ...

11

Forecast of fund volatility using least squares wavelet support vector regression machines

Forecast of fund volatility using least squares wavelet support vector regression machines

... different kernel functions to forecasting fund ...Morlet kernel function offers better volatility forecasting performance than LS-WSVR based Mexican hat kernel function and DOG kernel ...

6

Characteristic and Universal Tensor Product Kernels

Characteristic and Universal Tensor Product Kernels

... Maximum mean discrepancy (MMD), also called energy distance or N-distance in statis- tics and Hilbert-Schmidt independence criterion (HSIC), specifically distance covariance in statistics, are among the most popular and ...

29

Show all 10000 documents...

Related subjects