Showing 1 - 18 results of 18 for search '"FreeBSD"', query time: 0.10s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Módulo de recuperación de fallos de los procesos de un sistema FreeBSD utilizando variables en disco by Javier Vargas, David Guevara, Franklin Mayorga, Ernesto Jiménez

    Published 2017-11-01
    “… ABSTRACT This paper describes the creation of a crash-recovery module of the processes in a reliable communication program with fall and recovery of equipment, on a FreeBSD system. The creation of this module is based on the parameters or values that a running process contains, establishing a variable or file that is stored on disk. …”
    Get full text
    Article
  8. 8

    ANALISIS PERBANDINGAN VOIP SERVER ANTARA BRIKER IPPBX DENGAN ASTERISK by , Setiya Nugroho, , Dr. Ir. Sasongko Pramono H., DEA.

    Published 2011
    “…Asterisk VoIP server installed on FreeBSD has the QoS and MOS values are better than Briker VoIP server.…”
    Thesis
  9. 9

    NCT: pacote de tratamento de coordenadas normais (versão 7) NCT: normal coordinate treatment package (version 7) by Yoshiyuki Hase

    Published 2004-08-01
    “…Program codes were almost wholly rewritten to be more efficient with GNU Fortran77, or g77, and compiled under FreeBSD and MS-DOS with the DJGPP implementation. …”
    Get full text
    Article
  10. 10

    Mining Change Logs and Release Notes to Understand Software Maintenance and Evolution by Liguo Yu

    Published 2009-08-01
    “…This approach is applied in the study of the change logs of Linux and the release notes of FreeBSD. The results show that the software maintenance process and evolution process share some common properties and the keyword-based text mining technique could be used as a systematic method to study software maintenance and evolution.…”
    Get full text
    Article
  11. 11

    Attack and vulnerability penetration testing: freebsd by Stiawan, Deris, Idris, Mohd. Yazid, Abdullah, Abdul Hanan

    Published 2013
    “…This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. …”
    Get full text
    Article
  12. 12

    Modular verification of preemptive OS kernels by Gotsman, A, Yang, H

    Published 2011
    “…This interdependency is even stronger in mainstream kernels, such as Linux, FreeBSD or XNU, where the scheduler and processes interact in complex ways.…”
    Conference item
  13. 13

    Network Traffic Anomaly Detection via Deep Learning by Konstantina Fotiadou, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, Theodore Zahariadis

    Published 2021-05-01
    “…In this work, we propose novel Deep Learning formulations for detecting threats and alerts on network logs that were acquired by pfSense, an open-source software that acts as firewall on FreeBSD operating system. pfSense integrates several powerful security services such as firewall, URL filtering, and virtual private networking among others. …”
    Get full text
    Article
  14. 14

    A widening approach to multithreaded program verification by Kaiser, A, Kroening, D, Wahl, T

    Published 2014
    “…Its job being merely to prevent bad widening choices, such an engine need not be complete for coverability analysis, which enables a range of existing partial (e.g., nonterminating) techniques.We present extensive experiments on multithreaded C programs, including device driver code from FreeBSD, Solaris, and Linux distributions. Our approach outperforms existing coverability methods by orders of magnitude. …”
    Journal article
  15. 15

    PERANCANGAN DAN IMPLEMENTASI PROXY SERVER UNTUK FILTERING BERDASARKAN ALAMAT SITUS DAN ALAMAT IP by Lurio Lurio, Susmini Indriani Lestariningati

    Published 2021-07-01
    “…Sistem operasi pada proxy server yang dibangun menggunakan FreeBSD, dengan program filtering menggunakan Squid. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Monotonicity in shared-memory program verification by Kaiser, A

    Published 2013
    “…</p> <p>We present an implementation of our techniques and extensive experiments on multi-threaded C programs, including device driver code from FreeBSD and Solaris. The experiments demonstrate that by exploiting monotonicity, model checking techniques - enabled by predicate abstraction - scale to realistic programs even of a few thousands of multi-threaded C code lines.…”
    Thesis