-
1
-
2
-
3
-
4
Design of a Mutual Exclusion and Deadlock Algorithm in PCBSD – FreeBSD
Published 2014-12-01Subjects: “…FreeBSD…”
Get full text
Article -
5
-
6
-
7
Módulo de recuperación de fallos de los procesos de un sistema FreeBSD utilizando variables en disco
Published 2017-11-01“… ABSTRACT This paper describes the creation of a crash-recovery module of the processes in a reliable communication program with fall and recovery of equipment, on a FreeBSD system. The creation of this module is based on the parameters or values that a running process contains, establishing a variable or file that is stored on disk. …”
Get full text
Article -
8
ANALISIS PERBANDINGAN VOIP SERVER ANTARA BRIKER IPPBX DENGAN ASTERISK
Published 2011“…Asterisk VoIP server installed on FreeBSD has the QoS and MOS values are better than Briker VoIP server.…”
Thesis -
9
NCT: pacote de tratamento de coordenadas normais (versão 7) NCT: normal coordinate treatment package (version 7)
Published 2004-08-01“…Program codes were almost wholly rewritten to be more efficient with GNU Fortran77, or g77, and compiled under FreeBSD and MS-DOS with the DJGPP implementation. …”
Get full text
Article -
10
Mining Change Logs and Release Notes to Understand Software Maintenance and Evolution
Published 2009-08-01“…This approach is applied in the study of the change logs of Linux and the release notes of FreeBSD. The results show that the software maintenance process and evolution process share some common properties and the keyword-based text mining technique could be used as a systematic method to study software maintenance and evolution.…”
Get full text
Article -
11
Attack and vulnerability penetration testing: freebsd
Published 2013“…This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. …”
Get full text
Article -
12
Modular verification of preemptive OS kernels
Published 2011“…This interdependency is even stronger in mainstream kernels, such as Linux, FreeBSD or XNU, where the scheduler and processes interact in complex ways.…”
Conference item -
13
Network Traffic Anomaly Detection via Deep Learning
Published 2021-05-01“…In this work, we propose novel Deep Learning formulations for detecting threats and alerts on network logs that were acquired by pfSense, an open-source software that acts as firewall on FreeBSD operating system. pfSense integrates several powerful security services such as firewall, URL filtering, and virtual private networking among others. …”
Get full text
Article -
14
A widening approach to multithreaded program verification
Published 2014“…Its job being merely to prevent bad widening choices, such an engine need not be complete for coverability analysis, which enables a range of existing partial (e.g., nonterminating) techniques.We present extensive experiments on multithreaded C programs, including device driver code from FreeBSD, Solaris, and Linux distributions. Our approach outperforms existing coverability methods by orders of magnitude. …”
Journal article -
15
PERANCANGAN DAN IMPLEMENTASI PROXY SERVER UNTUK FILTERING BERDASARKAN ALAMAT SITUS DAN ALAMAT IP
Published 2021-07-01“…Sistem operasi pada proxy server yang dibangun menggunakan FreeBSD, dengan program filtering menggunakan Squid. …”
Get full text
Article -
16
PCI Express multi-root switch reconfiguration during system operation
Published 2011Get full text
Thesis -
17
-
18
Monotonicity in shared-memory program verification
Published 2013“…</p> <p>We present an implementation of our techniques and extensive experiments on multi-threaded C programs, including device driver code from FreeBSD and Solaris. The experiments demonstrate that by exploiting monotonicity, model checking techniques - enabled by predicate abstraction - scale to realistic programs even of a few thousands of multi-threaded C code lines.…”
Thesis