Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Linux system")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 363

  • Page / 15
Export

Selection :

  • and

Système Linux = Linux systemCOCQUEBERT, Cédric.Techniques de l'ingénieur. Informatique. 2001, Vol HB1, Num H1538, pp H1538.1-H1538.20, issn 0245-9612Article

Système temps réel RTLinux = RTLinux real time systemDELACROIX, Joëlle; MENIVAL, Christophe.Techniques de l'ingénieur. Informatique. 2002, Vol HB1, Num H1568, pp H1568.1-H1538.16, issn 0245-9612Article

Readily Available Methods for Testing LinuxBLANSIT, B. Douglas.Journal of electronic resources in medical libraries. 2009, Vol 6, Num 2, pp 174-183, issn 1542-4065, 10 p.Article

Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 ProcessorsWEINING GU; KALBARCZYK, Zbigniew; IYER, Ravishankar K et al.International Conference on Dependable Systems and Networks. 2004, pp 887-896, isbn 0-7695-2052-9, 1Vol, 10 p.Conference Paper

KickstartROUGEAU, P.Micro bulletin. 1998, Num 74, pp 38-44, issn 0761-2907Article

L'installation de Linux sur un portable Dell Latitude CP = Linux installation on Dell Latitude CP portableMAUNY, M.Micro bulletin. 1998, Num 73, pp 33-36, issn 0761-2907Article

Les grands constructeurs et Linux = The big entreprises and LinuxLEON, L; ROUGEAU, P.Micro bulletin. 1998, Num 74, pp 82-95, issn 0761-2907Article

Software Visualization: Replacing Tab in Python Programming with Cell Block in SpreadsheetYOO, Hyungjun; LEE, Young.Software engineering research & practice. International conferenceWorldComp'2010. 2010, pp 76-79, isbn 1-60132-160-0 1-60132-166-X 1-60132-167-8, 4 p.Conference Paper

Using evolutionary learning of behavior to find weaknesses in operating systemsDENZINGER, Jörg; WILLIAMS, Tim.Lecture notes in computer science. 2004, pp 381-390, issn 0302-9743, isbn 3-540-22817-9, 10 p.Conference Paper

Using programmer-written compiler extensions to catch security holesASHCRAFT, Ken; ENGLER, Dawson.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 143-159, issn 1081-6011, isbn 0-7695-1543-6, 17 p.Conference Paper

FLUKA-LIVE : an embedded framework, for enabling a computer to execute FLUKA under the control of a Linux OSCOHEN, A; BATTISTONI, G; MARK, S et al.Radiation measurements. 2008, Vol 43, Num 1, pp 121-124, issn 1350-4487, 4 p.Article

Rootkit modeling and experiments under LinuxLACOMBE, Erie; RAYNAL, Frédéric; NICOMETTE, Vincent et al.Journal in computer virology. 2008, Vol 4, Num 2, pp 137-157, issn 1772-9890, 21 p.Conference Paper

Linux en entreprise = Linux in enterpriseCHABOISSEAU, C.Micro bulletin. 1998, Num 74, pp 135-144, issn 0761-2907Article

Reducing Obsolescence of Linux-Based ATEs with VirtualizationWELTZIN, Casey; SCHLONSKY, Sarah.IEEE instrumentation & measurement magazine. 2011, Vol 14, Num 4, pp 8-10, issn 1094-6969, 3 p.Article

Complex library mapping for embedded software using symbolic algebraPEYMANDOUST, Armita; SIMUNIC, Tajana; DE MICHELI, Giovanni et al.Design automation conference. 2002, pp 325-330, isbn 1-58113-461-4, 6 p.Conference Paper

LinuxActivations : un support système performant pour les applications de calcul multithreads = LinuxActivations: an efficient systeme support for the multithread applicationsDANJEAN, Vincent.Rencontres francophones du parallélisme des arxhitectures et des systèmes. 2001, pp 87-92Conference Paper

Implementation and evaluation of the Shim6 protocol in the Linux kernelBARRE, S; RONAN, J; BONAVENTURE, O et al.Computer communications. 2011, Vol 34, Num 14, pp 1685-1695, issn 0140-3664, 11 p.Article

SIP Message Classification ― Design and Performance : System Work at IBM ResearchACHARYA, Arup; XIPING WANG; WRIGHT, Charles et al.Operating systems review. 2008, Vol 42, Num 1, pp 100-101, issn 0163-5980, 2 p.Article

Discovering and exploiting 802.11 wireless driver vulnerabilitiesBUTTI, Laurent; TINNES, Julien.Journal in computer virology. 2008, Vol 4, Num 1, pp 25-37, issn 1772-9890, 13 p.Conference Paper

P.R.O.S.E : Partitioned reliable operating system environment : Operating and runtime systems for high-end computing systemsVAN HENSBERGEN, Eric.Operating systems review. 2006, Vol 40, Num 2, pp 12-15, issn 0163-5980, 4 p.Article

Static deadlock detection in the Linux KernelBREUER, Peter T; GARCIA VALLS, M.Lecture notes in computer science. 2004, pp 52-64, issn 0302-9743, isbn 3-540-22011-9, 13 p.Conference Paper

Experimental analysis of the errors induced into Linux by three fault injection techniquesJARBOUI, Tahar; ARLAT, Jean; CROUZET, Yves et al.International conference on dependable systems and networks. 2002, pp 331-336, isbn 0-7695-1597-5, 6 p.Conference Paper

La Red Hat Linux 5.0 = The Red Hat Linux 5.0PROVOST, L.Micro bulletin. 1998, Num 74, pp 114-118, issn 0761-2907Article

Shortening the Boot Time of Android OSXIA YANG; NAN SANG; ALVES-FOSS, Jim et al.Computer (Long Beach, CA). 2014, Vol 47, Num 7, pp 53-58, issn 0018-9162, 6 p.Article

Fractal Weyl law for Linux Kernel architectureERMANN, L; CHEPELIANSKII, A. D; SHEPELYANSKY, D. L et al.The European physical journal. B, Condensed matter physics (Print). 2011, Vol 79, Num 1, pp 115-120, issn 1434-6028, 6 p.Article

  • Page / 15