The Case for Case Study assignments in Undergraduate Operating Systems Courses

Author(s):  
Alessio Gaspar ◽  
Sarah Langevin
Keyword(s):  
2011 ◽  
Vol 110-116 ◽  
pp. 2872-2878
Author(s):  
Mojtaba Mahdavi ◽  
Mohamad Mahdavi

—This paper explores a new method to find most reliable lifetime distribution function of systems, via an applied heuristic model. In most operating systems which complicity of system obligates high degree of reliability, this model will be use to propose a more appropriate reliability function between lifetime distribution based and another that is based on relevant Extreme Value distribution. A numeric study will be reviewed to clear the concepts of this paper.


2017 ◽  
Vol 55 (11) ◽  
pp. 170-177 ◽  
Author(s):  
Sonia Pamplona ◽  
Isaac Seoane ◽  
Javier Bravo-Agapito ◽  
Nelson Medinilla

Author(s):  
Jun Du ◽  
Yuan-Yuan Jiao ◽  
Jianxin (Roger) Jiao

This chapter develops a security blueprint for an e-business environment taking advantage of the three-tiered e-business architecture. This security blueprint suggests best practices in general. It involves (1) security control by layers — from physical access, to network communication, to operating systems, to applications, and (2) different stages of the management process, including planning, deployment, administration, and auditing. Also reported is a case study of the implementation of the proposed security blueprint in a Singapore multinational corporation. Such issues as security control analysis, management process analysis, and cost-benefits analysis are discussed in detail.


2020 ◽  
Author(s):  
André Gradvohl

Pandemic brought new forms of remote education into the discussion. However, facilitating students' access to good computing infrastructure is not a widespread task. This paper presents a report on the use of computing resources in the AWS cloud by students in the Operating Systems class during the pandemic, from March to July 2020. The use of these computational resources was essential to consolidate some of the concepts covered in the course and, at the same time, to complement the students' knowledge about cloud computing. The results of this survey were very positive. Students said they learned more about the resources available in the cloud, the potential of cloud computing, and how to use it. Besides, they were able to create their remote infrastructure to carry out the work proposed in the Operating System class.


2000 ◽  
Vol 7 (3) ◽  
Author(s):  
Fredrik Larsson ◽  
Paul Pettersson ◽  
Wang Yi

A major problem in model-checking timed systems is the<br />huge memory requirement. In this paper, we study the memory-block<br />traversal problems of using standard operating systems in exploring the<br />state-space of timed automata. We report a case study which demonstrates<br />that deallocating memory blocks (i.e. memory-block traversal)<br />using standard memory management routines is extremely time-consuming.<br />The phenomenon is demonstrated in a number of experiments by<br />installing the Uppaal tool on Windows95, SunOS 5 and Linux. It seems<br />that the problem should be solved by implementing a memory manager<br />for the model-checker, which is a troublesome task as it is involved in<br />the underlining hardware and operating system. We present an alternative<br />technique that allows the model-checker to control the memory-block<br />traversal strategies of the operating systems without implementing<br />an independent memory manager. The technique is implemented in the<br />Uppaal model-checker. Our experiments demonstrate that it results in<br />significant improvement on the performance of Uppaal. For example, it<br />reduces the memory deallocation time in checking a start-up synchronisation<br />protocol on Linux from 7 days to about 1 hour. We show that the<br />technique can also be applied in speeding up re-traversals of explored<br />state-space.


Sign in / Sign up

Export Citation Format

Share Document