From the Publisher: FEATURES \ NEWNew chapters on computer security, multimedia operating systems, and multiple processor systems. NEWExtensive coverage of Linux, UNIX®, and Windows 2000™ as examples. NEWNow includes coverage of graphical user interfaces, multiprocessor operating systems, trusted systems, viruses, network terminals, CD-ROM file systems, power management on laptops, RAID, soft timers, stable storage, fair-share scheduling, three-level scheduling, and new paging algorithms. NEWMost chapters have a new section on current research on the chapter's topic. NEWFocus on single-processor computer systems; a new book for a follow-up course on distributed systems is also available from Prentice Hall. NEWOver 200 references to books and papers published since the first edition. NEWThe Web site for this book contains PowerPoint slides, simulators, figures in various formats, and other teaching aids.
Cited By
- Kudrjavets G, Rastogi A, Thomas J and Nagappan N Who Ate My Memory? Towards Attribution in Memory Management Proceedings of the 45th International Conference on Software Engineering: Software Engineering in Practice, (381-383)
- Panigrahy N, Nain P, Neglia G and Towsley D (2022). A New Upper Bound on Cache Hit Probability for Non-Anticipative Caching Policies, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 7:2-4, (1-24), Online publication date: 31-Dec-2022.
- Panigrahy N, Nain P, Neglia G and Towsley D (2021). A New Upper Bound on Cache Hit Probability for Non-anticipative Caching Policies, ACM SIGMETRICS Performance Evaluation Review, 48:3, (138-143), Online publication date: 5-Mar-2021.
- Pranav P, Dutta S and Chakraborty S (2021). Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 25:21, (13127-13145), Online publication date: 1-Nov-2021.
- Quan G, Tan J and Eryilmaz A (2020). Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels, IEEE/ACM Transactions on Networking, 28:6, (2461-2474), Online publication date: 1-Dec-2020.
- Quan G, Tan J and Eryilmaz A Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, (694-702)
- Tan J, Quan G, Ji K and Shroff N (2018). On Resource Pooling and Separation for LRU Caching, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2:1, (1-31), Online publication date: 3-Apr-2018.
- Quan G, Ji K and Tan J LRU Caching with Dependent Competing Requests IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, (459-467)
- Ji K, Quan G and Tan J Asymptotic Miss Ratio of LRU Caching with Consistent Hashing IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, (450-458)
- Aghaei Khouzani H, Hosseini F and Yang C (2017). Segment and Conflict Aware Page Allocation and Migration in DRAM-PCM Hybrid Main Memory, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36:9, (1458-1470), Online publication date: 1-Sep-2017.
- Khouzani H, Fotouhi P, Yang C and Gao G Leveraging access port positions to accelerate page table walk in DWM-based main memory Proceedings of the Conference on Design, Automation & Test in Europe, (1454-1459)
- Rettenberger S, Meister O, Bader M and Gabriel A ASAGI Proceedings of the Exascale Applications and Software Conference 2016, (1-9)
- Khouzani H, Xue Y and Yang C (2016). Fully Exploiting PCM Write Capacity Within Near Zero Cost Through Segment-Based Page Allocation, ACM Journal on Emerging Technologies in Computing Systems, 12:4, (1-26), Online publication date: 26-Jul-2016.
- Rauti S, Holvitie J and Leppänen V Towards a diversification framework for operating system protection Proceedings of the 15th International Conference on Computer Systems and Technologies, (286-293)
- Aghaei Khouzani H, Xue Y, Yang C and Pandurangi A Prolonging PCM lifetime through energy-efficient, segment-aware, and wear-resistant page allocation Proceedings of the 2014 international symposium on Low power electronics and design, (327-330)
- Tavangarian D Virtual computing Software Service and Application Engineering, (53-70)
- Atanassov I An approach for indexing file names in a directory Proceedings of the 13th International Conference on Computer Systems and Technologies, (259-266)
- Goldweber M, Davoli R and Jonjic T Supporting operating systems projects using the μMPS2 hardware simulator Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education, (63-68)
- Zivan R, Dudík M, Paruchuri P and Sycara K Maximizing revenue in symmetric resource allocation systems when user utilities exhibit diminishing returns The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, (1165-1166)
- Aigner M, Haas A, Kirsch C, Lippautz M, Sokolova A, Stroka S and Unterweger A (2011). Short-term memory for self-collecting mutators, ACM SIGPLAN Notices, 46:11, (99-108), Online publication date: 18-Nov-2011.
- Aigner M, Haas A, Kirsch C, Lippautz M, Sokolova A, Stroka S and Unterweger A Short-term memory for self-collecting mutators Proceedings of the international symposium on Memory management, (99-108)
- Plantec A, Singhoff F, Dissaux P and Legrand J Enforcing applicability of real-time scheduling theory feasibility tests with the use of design-patterns Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I, (4-17)
- Zacarias M, Pinto H, Magalhães R and Tribolet J (2010). A 'context-aware' and agent-centric perspective for the alignment between individuals and organizations, Information Systems, 35:4, (441-466), Online publication date: 1-Jun-2010.
- Ramsurrun V and Soyjaudah K The stateful cluster security gateway (CSG) architecture for robust switched Linux cluster security Proceedings of the Seventh Australasian Conference on Information Security - Volume 98, (109-118)
- Hu G Formal specification of bounded buffer using stream functions Proceedings of the 10th IEEE international conference on Information Reuse & Integration, (230-235)
- Schubert L, Kipp A, Koller B and Wesner S (2009). Service-oriented operating systems, IEEE Wireless Communications, 16:3, (42-50), Online publication date: 1-Jun-2009.
- Hui B, Yang Y and Webb G (2009). Anytime classification for a pool of instances, Machine Language, 77:1, (61-102), Online publication date: 1-Oct-2009.
- Delange J, Pautet L, Plantec A, Kerboeuf M, Singhoff F and Kordon F (2009). Validate, simulate, and implement ARINC653 systems using the AADL, ACM SIGAda Ada Letters, 29:3, (31-44), Online publication date: 9-Nov-2009.
- Delange J, Pautet L, Plantec A, Kerboeuf M, Singhoff F and Kordon F Validate, simulate, and implement ARINC653 systems using the AADL Proceedings of the ACM SIGAda annual international conference on Ada and related technologies, (31-44)
- Gamzu I and Segev D (2009). Improved online algorithms for the sorting buffer problem on line metrics, ACM Transactions on Algorithms, 6:1, (1-14), Online publication date: 1-Dec-2009.
- Gracioli G and Fischmeister S (2009). Tracing interrupts in embedded software, ACM SIGPLAN Notices, 44:7, (137-146), Online publication date: 28-Jun-2009.
- Russo A, Claessen K and Hughes J (2008). A library for light-weight information-flow security in haskell, ACM SIGPLAN Notices, 44:2, (13-24), Online publication date: 28-Jan-2009.
- Gracioli G and Fischmeister S Tracing interrupts in embedded software Proceedings of the 2009 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems, (137-146)
- Black M (2009). Build an operating system from scratch, ACM SIGCSE Bulletin, 41:1, (448-452), Online publication date: 4-Mar-2009.
- Sibai F, Ma M and Lill D Teaching page replacement algorithms with a Java-based VM simulator Proceedings of the 14th Western Canadian Conference on Computing Education, (22-28)
- Ferreira Filho J, de S. R. Neto J, Lima C and Andrade R A framework for text visualization using memory traffic management for mobile devices Proceedings of the 2009 ACM symposium on Applied Computing, (1847-1848)
- Black M Build an operating system from scratch Proceedings of the 40th ACM technical symposium on Computer science education, (448-452)
- Larsson A, Gidenstam A, Ha P, Papatriantafilou M and Tsigas P (2009). Multiword atomic read/write registers on multiprocessor systems, ACM Journal of Experimental Algorithmics, 13, (1.7-1.30), Online publication date: 1-Feb-2009.
- Buchty R, Mattes O and Karl W Self-aware memory Proceedings of the 21st international conference on Architecture of computing systems, (98-113)
- Din G, Schieferdecker I and Petre R Performance Test Design Process and Its Implementation Patterns for Multi-services Systems Proceedings of the 20th IFIP TC 6/WG 6.1 international conference on Testing of Software and Communicating Systems: 8th International Workshop, (135-152)
- Zyulkyarov F, Cristal A, Cvijic S, Ayguade E, Valero M, Unsal O and Harris T WormBench Proceedings of the 9th workshop on MEmory performance: DEaling with Applications, systems and architecture, (61-68)
- Robbins S (2008). A three pronged approach to teaching undergraduate operating systems, ACM SIGOPS Operating Systems Review, 42:6, (93-100), Online publication date: 1-Oct-2008.
- Russo A, Claessen K and Hughes J A library for light-weight information-flow security in haskell Proceedings of the first ACM SIGPLAN symposium on Haskell, (13-24)
- Prause C and Eisenhauer M Social aspects of a continuous inspection platform for software source code Proceedings of the 2008 international workshop on Cooperative and human aspects of software engineering, (85-88)
- Prause C and Apelt S An approach for continuous inspection of source code Proceedings of the 6th international workshop on Software quality, (17-22)
- Filho J, Pinho H, Rios R and Andrade R A strategy for memory traffic management of bitmap fonts for text visualization in mobile devices Proceedings of the 2008 ACM symposium on Applied computing, (449-450)
- Guzmán J and Bobbie P (2007). Hands-on operating systems made easy, Journal of Computing Sciences in Colleges, 22:4, (145-151), Online publication date: 1-Apr-2007.
- Gössler G, Graf S, Majster-Cederbaum M, Martens M and Sifakis J Ensuring properties of interaction systems Program analysis and compilation, theory and practice, (201-224)
- Kalgin K, Malyshkin V, Nechaev S and Tschukin G Runtime system for parallel execution of fragmented subroutines Proceedings of the 9th international conference on Parallel Computing Technologies, (544-552)
- Zacarias M, Pinto H and Tribolet J Integrating engineering, cognitive and social approaches for a comprehensive modeling of organizational agents and their contexts Proceedings of the 6th international and interdisciplinary conference on Modeling and using context, (517-530)
- Gamzu I and Segev D Improved online algorithms for the sorting buffer problem Proceedings of the 24th annual conference on Theoretical aspects of computer science, (658-669)
- Radulescu V Deadlock detection in automata arrays Proceedings of the 26th IASTED International Conference on Modelling, Identification, and Control, (308-313)
- Eggendorfer T A secure and covert communication channel for HTTP tar pits to implement dynamic web page blocks to bar spammer's harvesters Proceedings of the 9th WSEAS International Conference on Data Networks, Communications, Computers, (394-400)
- Dutta K, Datta A, VanderMeer D, Thomas H and Ramamritham K (2007). ReDAL, IEEE Transactions on Parallel and Distributed Systems, 18:11, (1516-1528), Online publication date: 1-Nov-2007.
- Chen H, Jiang G and Yoshihira K (2007). Failure Detection in Large-Scale Internet Services by Principal Subspace Mapping, IEEE Transactions on Knowledge and Data Engineering, 19:10, (1308-1320), Online publication date: 1-Oct-2007.
- Majster-Cederbaum M, Martens M and Minnameier C A Polynomial-Time Checkable Sufficient Condition for Deadlock-Freedom of Component-Based Systems Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (888-899)
- Atanassov I Simulation of dynamic priority calculation for multilevel priority queue Proceedings of the 2007 international conference on Computer systems and technologies, (1-6)
- Pitter C and Schoeberl M Towards a Java multiprocessor Proceedings of the 5th international workshop on Java technologies for real-time and embedded systems, (144-151)
- Seelam S and Teller P Virtual I/O scheduler Proceedings of the 3rd international conference on Virtual execution environments, (105-115)
- Wagner S and Deissenboeck F An Integrated Approach to Quality Modelling Proceedings of the 5th International Workshop on Software Quality
- Gressmann J, Janhunen T, Mercer R, Schaub T, Thiele S and Tichy R On Probing and Multi-Threading in PLATYPUS Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (392-396)
- El Kateeb A and Gadde M High speed routers design using reconfigurable technology Proceedings of the 17th IASTED international conference on Modelling and simulation, (465-469)
- Zacarias M, Pinto H and Tribolet J Discovering multitasking behavior at work Proceedings of the 5th international conference on Task models and diagrams for users interface design, (292-307)
- Sadaoui S and Sharifimehr N A novel object pool service for distributed systems Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II, (1757-1771)
- Spear M, Roeder T, Hodson O, Hunt G and Levi S (2006). Solving the starting problem, ACM SIGOPS Operating Systems Review, 40:4, (45-57), Online publication date: 1-Oct-2006.
- Spear M, Roeder T, Hodson O, Hunt G and Levi S Solving the starting problem Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, (45-57)
- Wong P, Hendrickson R, Rizvi H and Pratt S Performance evaluation of linux file systems for data warehousing workloads Proceedings of the 1st international conference on Scalable information systems, (43-es)
- Ghandeharizadeh S, Kapadia S and Krishnamachari B An evaluation of availability latency in carrier-based wehicular ad-hoc networks Proceedings of the 5th ACM international workshop on Data engineering for wireless and mobile access, (75-82)
- Robbins S (2006). A UNIX concurrent I/O simulator, ACM SIGCSE Bulletin, 38:1, (303-307), Online publication date: 31-Mar-2006.
- Robbins S A UNIX concurrent I/O simulator Proceedings of the 37th SIGCSE technical symposium on Computer science education, (303-307)
- Milicevic M, Baranovic M and Batos V QoS control based on query response time prediction Proceedings of the 9th WSEAS International Conference on Computers, (1-5)
- Meyer-Wegener K Thirty years of server technology — from transaction processing to web services Data Management in a Connected World, (51-65)
- Bucci G, Sassoli L and Vicario E (2005). Correctness Verification and Performance Analysis of Real-Time Systems Using Stochastic Preemptive Time Petri Nets, IEEE Transactions on Software Engineering, 31:11, (913-927), Online publication date: 1-Nov-2005.
- Bardram E (2005). The trouble with login: on usability and computer security in ubiquitous computing, Personal and Ubiquitous Computing, 9:6, (357-367), Online publication date: 16-Nov-2005.
- Lufei H and Shi W Fractal Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
- Goldweber M, Davoli R and Morsiani M (2005). The Kaya OS project and the μMPS hardware emulator, ACM SIGCSE Bulletin, 37:3, (49-53), Online publication date: 1-Sep-2005.
- Pardo A and Kloos C Deploying interactive e-labs for a course on operating systems Proceedings of the 6th conference on Information technology education, (71-78)
- Goldweber M, Davoli R and Morsiani M The Kaya OS project and the μMPS hardware emulator Proceedings of the 10th annual SIGCSE conference on Innovation and technology in computer science education, (49-53)
- Robbins S An address translation simulator Proceedings of the 36th SIGCSE technical symposium on Computer science education, (515-519)
- Null L and Rao K CAMERA Proceedings of the 36th SIGCSE technical symposium on Computer science education, (96-100)
- Robbins S (2005). An address translation simulator, ACM SIGCSE Bulletin, 37:1, (515-519), Online publication date: 23-Feb-2005.
- Null L and Rao K (2005). CAMERA, ACM SIGCSE Bulletin, 37:1, (96-100), Online publication date: 23-Feb-2005.
- Vuletic M, Pozzi L and Ienne P (2005). Seamless Hardware-Software Integration in Reconfigurable Computing Systems, IEEE Design & Test, 22:2, (102-113), Online publication date: 1-Mar-2005.
- Attie P and Chockler H Efficiently verifiable conditions for deadlock-freedom of large concurrent programs Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (465-481)
- Robbins S A disk head scheduling simulator Proceedings of the 35th SIGCSE technical symposium on Computer science education, (325-329)
- Braubach L, Pokahr A, Moldt D and Lamersdorf W Goal representation for BDI agent systems Proceedings of the Second international conference on Programming Multi-Agent Systems, (44-65)
- Chan T (2004). A software tool in Java for teaching CPU scheduling, Journal of Computing Sciences in Colleges, 19:4, (257-263), Online publication date: 1-Apr-2004.
- Li H and Li X Embedded operating system design Proceedings of the First international conference on Embedded Software and Systems, (412-417)
- Fendler P Securing varieties of file systems Proceedings of the 1st annual conference on Information security curriculum development, (107-111)
- Meneguzzi F, Meirelles L, Martins Mano F, de Souza Oliveira J and Benso da Silva A Strategies for document optimization in digital publishing Proceedings of the 2004 ACM symposium on Document engineering, (163-170)
- Helps C and Renshaw S Design of a flexible case-study instructional module for operating systems for information technology Proceedings of the 5th conference on Information technology education, (56-59)
- Robbins S (2004). A disk head scheduling simulator, ACM SIGCSE Bulletin, 36:1, (325-329), Online publication date: 1-Mar-2004.
- Delgado N, Gates A and Roach S (2004). A Taxonomy and Catalog of Runtime Software-Fault Monitoring Tools, IEEE Transactions on Software Engineering, 30:12, (859-872), Online publication date: 1-Dec-2004.
- Kothari S, Bishop L, Sauceda J and Daugherty G (2004). A Pattern-Based Framework for Software Anomaly Detection, Software Quality Journal, 12:2, (99-120), Online publication date: 1-Jun-2004.
- Levine G (2003). Defining deadlock, ACM SIGOPS Operating Systems Review, 37:1, (54-64), Online publication date: 1-Jan-2003.
- Nikolov L Teaching operating system at the technical university-Sofia Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning, (673-679)
- Reek K The well-tempered semaphore Proceedings of the 33rd SIGCSE technical symposium on Computer science education, (356-359)
- Reek K (2002). The well-tempered semaphore, ACM SIGCSE Bulletin, 34:1, (356-359), Online publication date: 1-Mar-2002.
- Christopher T (2002). Facilities for parallelism, ACM SIGPLAN Notices, 37:2, (20-22), Online publication date: 1-Feb-2002.
- Momtchev M and Marquet P An Asymmetric Real-Time Scheduling for Linux Proceedings of the 16th International Parallel and Distributed Processing Symposium